Army - FM34 3 - Intelligence Analysis
Army - FM34 3 - Intelligence Analysis
Army - FM34 3 - Intelligence Analysis
INTELLIGENCE ANALYSIS
MARCH 1990
INTELLIGENCE ANALYSIS
,
Table of Contents
Page
Preface iv
CHAPTER 1 - T h e I n t e l l i g e n c e M i s s i o n 1-1
The AirLand Battle 1-1
The Battlefield Area 1-4
The Intelligence Analysis System 1-6
CHAPTER 2 - T h e I n t e l l i g e n c e C y c l e 2-1
Directing 2-1
Collecting 2-2
Processing 2-3
Dissemination 2-18
CHAPTER 3 - O r d e r o f B a t t l e 3-1
Order of Battle Factors 3-1
Order of Battle References 3-6
Order of Battle Records 3-11
Enemy Combat Effectiveness 3-28
Arbitrary Unit Designators 3-28
CHAPTER 5 - A n a l y s i s i n D e p t h 5-1
Meeting User Requirements 5-1
Determining the Risk Factor 5-3
The Threat Model 5-5
B i ases 5-11
CHAPTER 9 - C o u n t e r i n t e l l i g e n c e A n a l y s i s 9-1
Counter Human Intelligence Collection 9-2
Counter Signals Intelligence Collection 9-3
Counter Imagery Intelligence Collection 9-3
Other Intelligence Support to Cl Analysis 9-3
Multidiscipline Counterintelligence 9-13
IntelIigence Support to Combatting Terrorism 9-13
ii
Page
GLOSSARY Glossary -1
REFERENCES References -1
1 NDEX Index -1
iii
PREFACE
This publ c a t i o n i m p l e m e n t s i n t e r n a t i o n a l s t a n d a r d i z a t i o n a g r e e m e n t
(STANAG) 2077 and quadripartite agreement 511. it is in compliance with
STANAGS 1059, 2033, 2044, 2149, 6004, and 6010: quadripartite agreements
170, 295, 354 492, 523, 528, and 593; and air agreement 101/3D. The
proponent of h i s p u b l i c a t i o n i s H e a d q u a r t e r s , United States Army Training
and Doctrine Command (HQ TRADOC), Submit changes for improving this
publication on DA Form 2028 (Recommended Changes to Publications and Blank
Forms) and forward it to the Commander, US Army Intelligence Center and
School (USAICS), ATTN: ATSI-TD-PAL, Fort Huachuca, Arizona 85613-7000.
iv
CHAPTER 1
1-1
Figure 1-1. Deep attack.
using the weather and the terrain, the friendly commander can successfully
defeat a superior enemy force.
0 See the enemy early and determine the capabilities and intentions
of the enemy.
1-2
0
Effectively use electronic warfare (EW) to support the AirLand
Battle while protecting friendly use of the electromagnetic
spectrum.
0
Determine the enemy’s capability and guard against that
capability.
0
Protect friendly forces and operations from enemy intelIigence
colIection operations.
0
Use the weather and terrain to friendly advantage.
1-3
THE BATTLEFIELD AREA
Each commander determines his own Al. The commander generally relies
on higher headquarters and adjacent units to provide information and
intelIigence about enemy forces in that area. Figure 1-2 shows the
battlefield areas of division.
1-4
0
Determine how the weather and terrain will affect friendly and
enemy operations.
0
Detect opportunities to exploit enemy weaknesses and seize or
retain the initiative.
0
Assess the relative value of enemy combat systems, which serves as
a basis for selecting HVTs.
1-5
EW (discussed in Chapter 8) exploits, disrupts, and deceives the enemy
c o m m a n d a n d c o n t r o l ( C 2 ) system while protecting friendly use of
communications and non-communications systems. It is a significant force
multiplier when integrated and employed with fire and maneuver. EW
consists of the following functions:
0
EW support measures (ESM), which provide commanders the capability
to intercept, identify, and locate enemy emitters.
0
Electronic countermeasures (ECM), which provide commanders the
capability to disrupt enemy use of the electromagnetic spectrum.
0
Electronic counter-countermeasures (ECCM), which are used to
p r o t e c t f r i e n d l y c o m m a n d , c o n t r o l , and communications (C 3) systems
against enemy radioelectronic combat (REC) activities.
0
Countering the hostiIe intelIigence threat.
0
Deceiving the enemy commander.
0
Countering enemy sabotage, subversion, and t e r r o r i s m .
0
Developing essential elements of friendly nformation (EEFI).
T h e i n t e l l i g e n c e a n a l y s i s s y s t e m IS a s i n g l e , i n t e g r a t e d system that
extends from battalion level to national agencies. Figure 1-3 shows the
all-source intelligence system.
Ana I ys s e l e m e n t s a r e t h e h e a r t o f t h e i n t e l l i g e n c e s y s t e m . They
include--
0
I n t e Iigence officers and their staff sections.
0
E c h e ons above corps intelligence centers (EACICs).
1-6
Figure 1-3. All-source intelligence system.
EXECUTORS
PRODUCERS UNIT COMMANDERS
Ml, CAVALRY,
ARTILLERY,
G2 SECTIONS MANEUVER,
EACIC ENGINEER,
TOC SUPPORT ELEMENTS AVIATION AND
B ALL OTHERS.
1-7
0
Tactical operations center (TOC) support elements at division and
corps levels.
0
Technical control and analysis elements (TCAEs) organic to
military intelIigence (Ml) combat electronic warfare and
intelligence (CEWI) battalions at division-level and Ml CEWI
brigades at corps-level.
0
Battlefield information coordination centers (BICCs) at maneuver
and artillery battalions and brigades.
Commander
Staffs
While the commander approves the PIR for the command, every staff
officer in the command needs intelligence to support the functions under
their staff responsibilities. However, t h e s t a f f o f f i c e r s t h a t a r e m o s t
invoived with intelligence requirements are the G2 or S2, the G3 or S3,
and the FS coordinator (FSCOORD).
1-8
is provided by intelligence. The G3 or S3 IRs are the same as, only more
d e t a i l e d t h a n , those of the commander. The operations officer plays
a k e y r o l e , in conjunction with G2 or S2, in developing and recommending
the PIR.
1-9
TOCS as an integral part of the S2 section. They provide an organic
inte Iigence management, production, and dissemination capability. B I CCs
vary in the size and type of support they provide, For example, maneuver
unit BICCs concentrate on both situation and target development, while
arti Iery unit BICCs are almost exclusively interested in target
acqu sition (1A) and development.
1-1o
CHAPTER 2
The intelligence cycle is continuous. Even though the four phases are
conducted in sequence, all are conducted concurrently. While available
information is processed, additional information is collected, and the
intelligence staff is planning and directing the coIIection effort to meat
new demands. Previously collected and processed information
(intelligence) is disseminated as soon as it is available or needed.
DIRECTING
T h e i n t e l l i g e n c e e f f o r t b e g i n s by determining requirements,
e s t a b l i s h i n g t h e i r p r i o r i t i e s , a n d communicating information or
i n t e l l i g e n c e c o l l e c t i o n o r d e r s ( t o subordinate elements) and requests (to
2-1
higher and adjacent units). This is accomplished by the commander and the
intelligence and operations staff. Sources of information or intelligence
requirements include the following:
0
Commander’s planning guidance, concept of the operation, and
stated requirements.
0
METT-T analysis by intelIigence and operations staffs.
0
Requests for intelIigence information (RIIs) from higher,
adjacent, allied, and subordinate units and elements, and from other
staff elements within the command.
IRs are those items of information regarding the enemy and the
environment needing collection and processing to meet the intelligence
requirements of the commander. IRs can either support PIRs or be
stand-alone requirements of a lesser priority than PIRs. Both PIRs and
IRs serve as the basis for collection and intelligence efforts.
Intelligence analysts in the ASPS advise the G2 regarding the PIRs and
. IRs. They analyze METT-T factors and the commander’s guidance and concept
of the operation to determine what intelligence and information is
needed. The ASPS reviewa the existing data base to identify information
that is already available and that which must be acquired. They pass
requirements for new information to the CM&D section as additional
collection requirements. Figure 2-2 shows the directing phase from the
commander’s intent to the commander’s requirements.
COLLECTING
The ASPS assists the CM&D section in planning and supervising the
collection effort. The ASPS helps convart intelligence requirements into
specific information requirements (SIR). SIR are keyed to indicators (see
Appendix C) which when integrated with other indicators and factors
present on the battlefield may provide clues to the enemy’s most probable
course of action. The ASPS monitors incoming reports, advises the CM&D
s e c t i o n w h e n P I R o r I R a r e s a t i s f i e d , identifies naw requirements, and
determines when previously requested information is no longer needed.
2-2
Figure 2-2. Commander’s requirements and guidance.
Collection operations generate information from various sources. This
information is fed into the ASPS. The ASPS--
0
Reports combat information immediately.
0
Processes information to develop the intelIigence needed for
tactical decisions and targeting.
PROCESSING
0
Recording. Recording is the reduction of information to writing
or some other form of graphical representation and the arranging of
this information into groups of related items.
2-3
o Evaluation. Evaluation is the determination of the pertinence of
i n f o r m a t i o n t o t h e o p e r a t i o n . reliabiIity of the source or agency,
and accuracy of the information.
2-4
The sequence for processing varies with the nature and urgency of the
information. Information is normally recorded first: however, if it
contributes to the development of urgent intelIigence, it is recorded
simultaneously with or after evaluation and analysis. Combat information
or partially developed intelIigence that is needed immediately is
disseminated before it is completely processed. Information that is not
of immediate value is processed before it is disseminated.
0
Central I n t e l l gence Agency (CIA).
0
D e f e n s e I n t e l l gence Agency (DIA).
0
N a t i o n a l S e c u r ty Agency (NSA).
0
US Army Intelligence Agency (USAIA),
0
Theater commands.
2-5
0
Allies.
0
Open sources.
The analyst identifies gaps in the data base and passes requirements
to the collection manager. As information is received from t h e v a r i o u s
collection agencies, it is correlated with existing information in the
data base to assess its significance. Combat information, often highly
perishable in nature, is disseminated immediately.
RECORDING
Recording information into the data base makes evaluation and analysis
easier and more accurate and facilitates preparation of intelligence
reports by conveniently drawing together all available information on a
s p e c i f i c s u b j e c t . The recording means used must be adequate to handle the
volume of information and intelligence received and to serve the needs of
those who must have access to it. Means and techniques of recording must
permit timely dissemination of information and intelligence.
0
I n t e Iigence journal.
0
I n t e Iigence files.
0
Situation map (SITMAP).
0
IntelIigence workbook.
0
Coordinate register.
0
Order of battle (OB) records.
Intelligence Journal
0
An accurate and concise statement of the message, report, or
event.
0
A notation about the sender or individual making the report, to
include unit duty position and section: for example, S3 1/60
Infantry Battalion.
2-6
0
The time of receipt or dispatch and method of transmission.
0
A c t i o n t a k e n a s a r e s u l t , to include dissemination given to
r e p o r t s , o t h e r i n f o r m a t i o n r e c e i v e d , and other internal G2 recording
(workbook, SITMAP),
Journal entries are concise and record the time and essential facts.
As a minimum the journal entries include--
0
P u r p o s e , subject, and conclusions of conferences.
0
Command decisions and summarizations of plans.
0
Movements of enemy units, one echelon above and two echelons below
your own level,
0
Significant messages (radio, radio teletypewriter (RATT),
h a r d - c o p y , o v e r l a y s , p h o t o s , and any other verbal or written
reports) transmitted and received.
0
Incidents of enemy activity.
0
Friendly patrol activity.
0
Liaison activities.
0
C h a n g e s i n p e r s o n n e l w i t h i n t h e s t a f f s e e ” ion.
0
Summaries of written messages and orders.
0
Summaries of action based on enemy and fr e n d l y activity.
Intelligence Files
2-7
Figure 2-4. Intelligence journal sample page.
2-8
Reference File. The reference file includes all information that is not
of immediate interest but may be of future value. Information is
cross-indexed to permit easy retrieval.
The working situation map (SITMAP) is the primary analytic tool at all
echelons. It is a temporary graphic display of the current dispositions
and major activities of the enemy. Information about friendly forces on
t h i s m a p u s u a l l y i s l i m i t e d t o b o u n d a r i e s ; locations of command posts
( C P s ) o f h i g h e r , l o w e r , a n d a d j a c e n t u n i t s ; reconnaissance units; the
forward edge of the battle area (FEBA), and forward line of own troops
(FLOT) . The level of detail of the working SITMAP will be proportionate
to the echelon at which it is maintained.
Generally, enemy maneuver units are posted which are two echelons
below that of the friendly unit. Enemy units, regardless of size, in our
rear area are always posted because of the amount of damage they can do to
administrative and logistical nodes.
0
Automatic weapons (battalion SITMAP only).
●
0
S u p p o r t i n g m o r t a r s ( b a t t a l on SITMAP only).
0
A n t i t a n k g u n s ( b a t t a l i o n S TMAP only).
0
Artillery,
0
Air defense artilIery.
0
Minefields.
0
Roadblocks.
0
Entrenchments.
0
Obstacles.
0
Defensive positions.
0
Logistics and command facilities.
0
Aircraft and helicopter staging areas.
0
Nuclear, b i o l o g i c a l , and chemical (NBC) contaminated areas.
2-9
0
Ground surveiIlance devices.
0
Smoke screens.
When the intelligence and operations staffs use separate maps, ensure
that acetate overlays are readily interchangeable between these maps.
This permits easy comparison of the current enemy situation (G2 or S2 map)
with the disposition of friendly forces (G3 or S3 map), and easy
comparison of enemy obstacles, barriers, a n d m i n e f i e l d w i t h p l a n n e d
routes of march.
2-10
0
Enemy fortifications.
0
High value targets.
0
Obstacles.
0
OB data.
0
Friendly reconnaissance patrols.
0
SurveiIlance activities (include the ground coverage of each
system).
The maintenance of the working SITMAP takes precedence over ail other
recording means during combat operations. In a fast-moving situation,
particularly at the maneuver battalion level, it is the oniy recording
device used.
Use the working SITMAP to make sound tactical decisions; its primary
intelligence uses are to--
0
Display the enemy disposition and situation.
0
Provide a basis for comparison to determine the significance of
newly received data about enemy forces. IPB situation and event
templates provide a basis for comparison.
0
Provide a background and basis for briefings and other required
intelligence reports.
0
Provide the basis for overlays which graphicalIy portray the enemy
situation.
0
Assist in the determination of movement patterns of guerrilla or
insurgent forces.
0
Show possible intelligence gaps which require redirection of the
collection effort. For example, the need to locate and identify
enemy units reported for the first time.
0
Computations of enemy personnel and weapon strengths and
weaknesses.
2-11
0
Organization charts of specified enemv units.
0
Summaries of weather and terrain data.
0
A listing of PIR and IR.
0
Notations about the current patrol plan.
0
Movement computations.
0
A listing of friendly attachments.
0
B a t t l e damage assessment (BDA).
Intelligence Workbook
2-12
I
* m.. . . .
EVALUAT 10N
2-13
eche o n s g e n e r a l l y i s a c q u i r e d b y d i r e c t o b s e r v a t i o n o r a c t u a l c o n t a c t
w i t h the enemy.
Pertinence
0
Pertinent with regard to the enemy or to the battlefield area.
Information that relates to a unit’s AO or Al normally is pertinent.
0
Needed immediately, and if so, by whom? Of possible present or
f u t u r e v a l u e , a n d i f so , to whom?
Reliability
The source of nformat on and the agency by which it was collected are
both evaluated for r e l i a b i l i t y . The principal basis for judging the
reliability of a source or an agency, other than troop units, is previous
experience with the source. C r i t e r i a f o r e v a l u a t i n g t r o o p u n i t s include a
knowledge of their training, experience, and past performance.
Credibility ..
0
Is it possible for the reported fact or event to have taken place?
0
Is the report consistent within itself?
0
I s t h e r e p o r t c o n f i r m e d o r corroborated by information from
d i f f e r e n t s o u r c e s o r a g e n t es?
0
D o e s t h e r e p o r t a g r e e o r d sagree in any way with other available
information?
0
If the report does not agree with information from other sources
or agencies, which one is more Iikely to be true?
2-14
M a r k e d d i f f e r e n c e s i n t h e e v a l u a t i o n o f t h e a c c u r a c y o f i n f o r m a t on
may occur between higher and lower echelons. The reason for this
difference is because higher echelons, which have more sources of
information and intelIigence than lower echelons, have a greater
opportunity to confirm, corroborate, or refute the accuracy of repor
data. Regardless of the source, reevaluate the accuracy of incoming
information and intelligence at each echelon. Thus, the role of higher
echelons in evaluating the credibility (or probable truth) of information
differs somewhat from its role in evaluating the reliability of the source
(again, usually done best by the echelon closest to the source),
A - comp e t e l y reliable.
B - usua I y reliable.
c - f a i r y reliable.
E - unreliable.
2 - probably true.
3 - possibly true.
4 - doubtfully true.
5 - improbable.
2-15
If it can be stated with certainty that the reportsd information
originates from a source other than that for already existing information
on the same subject, it is classified as “confirmed by other sources” and
is rated “’l.’”
Although both letters and numerals are used to indicate the evaluation
of an item of information, they are independent of each other. A
completely reliable agency may report information obtained from a
completely reliable source which, o n t h e b a s i s o f o t h e r i n f o r m a t i o n , i s
judged to be improbable. In such a case, the evaluation of the
i n f o r m a t i o n i s A - 5 . A source known to be unreliable may provide raw
information that is accepted as accurate information, when confirmed by
reliable sources. In this case, a report is evaluated E-1. A report
evaluated F-6 may be accurate and should not be arbitrarily discarded.
2-16
A r e p o r t d i s s e m i n a t e d t o h i g h e r , l o w e r , a n d a d j a c e n t units should
c o n t a i n t h e e v a l u a t i o n f o r e a c h i t e m o f i n f o r m a t i o n ; f o r example, ‘“The
d i v i s i o n a r t i l l e r y o f t h e e n e m y 4 6 t h T k D i v c a n f i r e n u c ear rounds of
0.5 kt yield (C-3).”
T h e e v a l u a t i o n a n d i n t e r p r e t a t i o n o f i n f o r m a t i o n a t he brigade and
battalion is a simplified mental process: thus, the standard evaluation
rating has little if any application. This system assists the G2 or S2 in
processing information received from other headquarters and in evaluating
information disseminated to other headquarters.
ANALYSIS
Assessment
I n t e g r a t on
I n t e g r a t i o n , p a r t i c u l a r l y t h e d e v e l o p m e n t o f h y p o t h e s e s , r e q u i r e s the
same good judgment and thorough background knowledge essential to mak ng a
good assessment. In formulating hypotheses, the intelligence officer
avoids preconceived opinions and hypotheses based solely on personal
experience or preference. T h e o f f i c e r a t t e m p t s t o a d o p t t h e r o l e o f he
enemy commander in the development of these hypotheses.
2-17
existence or nonexistence of these indications within the Iimitations of
available time and means.
Deduction
DISSEMINATION
2-18
CHAPTER 3
ORDER OF BATTLE
This chapter describes the OB analysis process and the tools used to
develop and integrate OB.
Data is developed in many fields outeide the scope of 0B, but all
intelligence is related ultimately to it. For example, technical
intelligence (Tl) produces intelligence on the capabilities of weapons
systems, but OB intelligence determines the effect of weapon capabilities
and characteristics on enemy tactics, combat effectiveness, and
organization.
0 Composition.
0 Disposition.
0 Strength.
0 Tactics.
0 Training.
0 Logistics.
0 Combat effectiveness.
0 Miscellaneous data.
COMPOSITION
3-1
identification often is called the key to 0B intelIigence because it leads
to the answers to many questions concerning the enemy, Unit
identification consists of the complete designation of a specific unit by
name or number, t y p e , r e l a t i v e s i z e o r s t r e n g t h , a n d ( u s u a l l y )
subordination. Through identification, the OB analyst develops a history
of the composition, training, tactics, and combat effectiveness of an
enemy unit. T h e i d e n t i f i c a t i o n o f a s p e c i f i c u n i t w i t h i n a n organization
alerts the analyst to the possible presence of other unident fied or
unlocated units of the sama organization.
T h e b a s i c s e l f - s u f f i c i e n t t a c t i c a l u n i t ( n o r . .a l l y a c o m b a t d i v i s i o n )
is considered when developing intelligence concerning composition. In
some countries, t h e f i e l d a r m y i s c o n s i d e r e d t h e b a s i c s e l f - s u f f i c i e n t
tactical unit. In others, it is the regiment. The importance of this
concept I ies in the term “’self-sufficient.’” Units subordinate to
s e l f - s u f f i c i e n t t a c t i c a l u n i t s , although capable of limited independent
action, cannot sustain themselves over relatively long periods of time.
Subordinate units seldom are employed independently or separately from the
basic self-sufficient tactical unit. For example, a new Soviet motorized
rifle regiment (MRR) is reported in the AO, Knowing that the division is
the Soviets’ basic self-sufficient tactical unit and the three MRRs of a
motorized rifle division (MRD) seldom are employed independently, the
presence not only of a new regiment but of a new MRD is given tentative
acceptance. When one of these regiments is located, suspect that the
remaining elements of the division also are in the area.
DISPOSITION
3-2
units are arranged in echelon indicates (if the Threat assumes the
offensive) which units are used in the initial attack and which units are
employed in supporting and reserve roles. Tactical deployment with
respect to terrain also is important. A study of disposition with an
analysis of the terrain leads to conclusions concerning Threat
c a p a b i l i t i e s , v u l n e r a b i l i t i e s , and probable courses of action. Accomplish
this through the IPB process detailed in FM 34-130.
STRENGTH
TACT I CS
3-3
TRAINING
LOGISTICS
0 Logistical requirements.
0 Procurement methods.
0 Terminals.
0 Maintenance.
3-4
COMBAT EFFECTIVENESS
0
Personnel strength.
0
Amount and condition of weapons and equipment.
0
Status of training.
0
Efficiency of the officer and NCO corps.
0
Quality of leadership.
0
Length of time a unit has been committed in combat.
0
Traditions and past performance.
0
Personality traits of the unit commanders.
0
Geographical area in which committed.
0
M o r a l e , esprit, health, discipline, and political reliability (or
belief in the cause for which they fight).
. 0
Status of technical and logistical support of the unit.
0
Adequacy of military schooling at all levels.
0
National characteristics of the people.
3-5
MISCELLANEOUS DATA
3-6
ORDER OF BATTLE BOOK
0
Identification, to include:
0
FPN.
0
Subordination (parent unit) .
0
Subordinate units.
0
Location, to include:
0
Category and effective strength.
0
Nickname (unofficial popular name).
0
Honors or honor titles.
0
Unit insignia.
0
Latitude and longitude of subject (in addition to UTM
coordinates) .
3-7
0
Commander’s name, rank, initials and specialty, and those of other
key personnel.
0
Combat effectiveness (including any data on special ized training).
0
Signature equipment.
0
Turret numbers, vehicle registration numbers, or other tactica
identification signs.
0
Any other data at the discretion of the originator for example
basic encyclopedia (BE) or target data inventory (TDI) numbers
Section 1. General
S e c t i o n I I0 D e t a i l e d Order of Battle
3-8
political or governmental structure and military establishment, including
its tactics and doctrine. It includes more technical data, such as the
logistical system used and the characteristics of weapons and equipment.
Like the OB book, higher US and allied commands publish the handbook.
The OB handbook normally deals with only one country. It deals with
two or more countries in separate parts, especially when these countries
are closely associated with each other by pact, geographicalIy, or in some
other way. As a minimum it contains--
0
History, governmental, and political structure. A short history
of the nation and a comprehensive description of its governmental
and political structure.
0
Armed forces organization. A description of the nation’s military
establishment (including paramilitary and an expl anation of how C2
of the ground forces is affected).
0
Ground forces organization. A complete explanat on of the
organization and composition of all the various types of ground
force units and formations. The organization and composition of a
nonground force unit also is included if that unit is likely to be
placed under command or in support of the ground forces in time of
war .
0
Logistical support organization. A n e x p l a n a t i o n o f t h e I o g i s t ca I
system the ground forces employs from ministerial level to the
lowest echelon.
o
Reserve forces or mobi I z a t i o n . A description of reserve forces,
the mobilization system a n d t i m e s r e q u i r e d f o r m o b i l i z a t i o n .
0
Military education and training. A description of the military
education and training system and an explanation of the personnel
recruitment and selection process.
0
Uniforms and insignia. A full description of all armed forces
uniforms, ranks, and insignia.
0
Weapons and equipment. A listing and brief description including
characteristics of the various types of weapons and equipment found
in the ground forces. The list includes weapon and equipment’s
country of origin, availability of technical expertise, and
likelihood of resupply of equipment and spares.
3-9
° A lies. A list of likely military and political allies, and type
o’ support each may render.
0
Armed forces organization, governmental and political structure.
Organizational charts are to support the narrative description of
these subjects where P O S S b l e . There is no format for such charts.
0
Organizational structure. Depict organizational structure for
e a c h t y p e o f u n i t , Within NATO, the-symbols depicted in STANAG 2019
r a p r e s e n t t h e v a r i o u s u n i t s , f o r m a t i o n s , o r i n s t a l I a t i o n s . Arrange
the organizational diagrams in the following sequence: headquarters,
combat units, CS units, service support units.
0
Tables of personnel , weapons, and equipment. Produce the tables
according to STANAG 2077. Figure 3-1 shows a sample equipment list.
INSTALLATION HANDBOOKS
MISCELLANEOUS REFERENCES
O t h e r p u b l i c a t i o n s a n d p e r i o d i c a l s p r e p a r e d a t d e p a r t m e n t and area
command levels are of value to the OB analyst. These references may deal
specifically with 0B or with any or all phases of tactical, operational,
and strategic intelligence. Specialized technical intelligence agencies
provide detailed evaluations of equipment. The Soviet Battlefield
Development Plan provides current and projected Soviet battlefield
capabilities. The CIA produces studies on general mil itary capabilities,
and economic factors which impact on military capabilities. Civilian
organizations under contract to the Department of Defense (DOD) make
special studies on various subjects concerning foreign and enemy military
forces. These studies usually are detailed, technical in nature, and
provide a wealth of special information not otherwise available.
3-1o
NATO Original or
Serial short Description Remarks
No NATO Title
Equipment lists are to conform to the format shown above. The sequence and numbering of
equipment are to be established by Supreme Headquarters Allied Powers Europe (SHAPE)
according to STANAG 2077.
3-11
0
U n t workbook.
0
0 B workbook.
0
O B S I TMAP .
0
0 B card file.
0
Personal ity fi e.
0
Military insta Iation file.
° Organizational worksheet.
0
Strength worksheet.
Other file systems or forms are deve oped localIy for spec al
situations.
UNIT WORKBOOK
The format of the unit workbook depends upon the structure of the
foreign army being monitored. Typically, it consists of a collection of
OB cards supplemented by supporting documentation and is arranged by type
of unit or in numerical sequence. Minimally this documentation includes
organization and strength worksheets with the workbook being updated as
new information is received. The enemy parent unit listed on the unit
worksheet should agree with the analyst’s level of command.
.
The analyst normally maintains records for enemy units one level above
and two levels below the command’s. In some special purpose units, three
levels or more down are followed as well. Review information from units
three levels down to develop identities on units two levels down. List
personalities on the worksheet as a ready reference to the personalities
of the enemy unit. Note and use unit, postal, and vehicle numbers on the
worksheet to determine 0B changes or to confirm current data. Note
details which may reveal any facet of the enemy unit’s 0B or indicate the
source of information in the remarks column. Enter reports of branch
insignia, number and type of weapons, and statements of local residents in
this column in abbreviated form. Include the data and the source of
i n f o r m a t i o n f o r e a c h e n t r y . The installation column of the worksheet
shows the numerical designation assigned to a particular enemy
installation when plotted on a sketch, map sheet, or town plan attached to
the workbook. For consistency and to facilitate exchange of information
between headquarters, use installation numbers Previously assigned by
theater or MACOM, Figure 3-2 shows a sample unit workbook. Figure 3-3
shows a sample page from the unit workbook.
3-12
Figure 3-2. Sample unit workbook.
3-13
Parent Unit
As a general rule, threat units one echelon above and two echelons
below the analyst’s own Ievel of command are plotted by using the
appropriate symbols in FM 101-5-1. For example, division plots maneuver
regiments and battalions; corps plots maneuver divisions and regiments.
Plot higher units to tha extent practicable. The foregoing information is
only a guide. Analysts at theater level who are responsible for
publication of OB books may plot separata battalions. Peculiarities of
unit organization, the tactical situation, and time and personnel
available within the analysis section determines more precisely what is
plotted and what is omitted on OB maps. Enter the time and date of the
information to the left of each symbol or plot. During counterinsurgency
operations, however, it may be necessary to plot guerilla or insurgent
units down to the squad level, since, depending on the situation and the
3-14
ORDER OF BATTLE
WORKBOOK
ASPS, X CORPS
FROM:
(HOUR AND DATE)
TO:
(HOUR AND DATE)
— . . .
Figure 3-4. Order of battle workbook.
0
Overlay title.
3-15
Figure 3-5. Order of battle situation map with caption box.
3-16
0
Map sheet name.
0
Map sheet number.
0
Map series.
0
Map scale.
0
Prepared by .
The OB analyst must be aware of what is not known about the enemy.
The unlocated units caption box lists existing unlocated units. These
units pose a threat to the accomplishment of the friendly mission, and
maximum effort must be directed toward establishing the disposition of
unlocated units in the AO.
0
Identification (numerics designat on, type of unit, and
national ity) .
0
FPN.
0
S u b o r d i n a t i o n ( p a r e n t u n t) .
3-17
0
Subordinate formations or units.
0
Code name (offical name assigned by the enemy for convenience or
as a cover) .
0
Honorific title.
0 Insignia.
0 Commander.
0 Unit history.
0
MiscelIaneous.
Record validity dates and source references on the back of the card.
Also record information subject to frequent changes on the back of the
card. This includes--
*
0
Unit locations.
0
Strength.
0
Combat effectiveness.
Figure 3-6 shows the front and back sides of the 08 card.
PERSONALITY FILE
3-18
d
..
(Front)
cd
I
lD
Figure 3-6. Order of baffle cards (continued).
3-20
is of significant value in the establishment of unit identification,
t a c t i c s , and combat effectiveness. Keep the file in alphabetical order.
The personality file also includes information which aids the friendly
commander, G2, and G3 in deception planning and operations. This includes
habits that make the opposing comrnander and staff vulnerable to deception,
t h e m o s t l i k e l y d e c e p t i o n t a r g e t s , the degree of freedom the cormmander
allows subordinates, how the commander reacts to new situations, and how
the fear of the unknown influences the commander’s actions. Figure 3-7
shows a suggested format for biographies used in personality files
required by STANAG 2077. Similar files may be maintained for key staff
officers and other categories of key personnel.
ORGANIZATIONAL WORKSHEET
STRENGTH WORKSHEET
COORDINATE REGISTER
When personnel and time are available, the brigade and battalion BICCs
maintain a coordinate register. The coordinate register provides the
lower echelon intelligence officer with a workable counterpart to the
extensive intelligence files and workbooks that are maintained at higher
echelons. It graphically illustrates the situation over a small
geographical area. It is compact enough to be carried with ease for ready
access.
The coordinate register contains two types of pages. One type is for
written entries which describe enemy activities, locations, weapons, and
similar items. The DTG and map coordinates precede these entries. The S2
adds personal comments or notations to any entry. Figure 3-11 shows a
coordinate register page with written entries.
3-22
3-23
Figure 3-9. Organization worksheet motorized rifle regiment.
3-24
.
0
Determine enemy dispositions and routes of movement.
0
Predict enemy intentions and main effort.
0
Plan reconnaissance and surveiIlance (R&S) operations.
0
Brief and debrief patrols.
3-26
Figure 3-12. Coordinate register with schematic entry.
0
Plans FS.
0
Brief the commander and staff.
0
Assist in IPB.
0
Reveal enemy perceptions of how the terrain wilI sup port maneuver
against them.
3-27
or larger is desirable. By plotting selected OB information on the photo,
an analysis of the terrain is conducted simultaneously with a correlation
of information on the enemy. The photo provides an excellent means of
briefing commanders down to platoon level on the AO and the enemy
situation. Targeting is accomplished in a more precise manner by using a
photo instead of the traditional 1:50,000 map. While not common in mid-
to high-intentsity conflict these photos are especially useful in LIC.
The coordinate register is reviewed when the unit moves to a new area,
when new data is added, and when obsolete data is deleted. Timely
maintenance of the coordinate register is not practical in fast-moving
high-intensity situations like pursuit, delay, and exploitation. The
coordinate register would, however, b e v e r y v a l u a b l e i n a r e l a t i v e l y
static situation or in a low-intensity conflict (LIC).
3-28
0
Formations which are well known except for their actual title.
0
Formations seen on the battlefield whose history, background, and
title are unknown.
0
The 1st British Corps uses lUK.
0
The 2d German Corps uses 2GE.
0
The 7th US Corps uses 7US.
Each national corps allocates blocks of numbers between 000 and 999 to
the r own headquarters and subordinate formations. Similarly, divisions
may if they wish, suballocate numbers to their subordinate formations.
Al I formations of a corps and corps headquarters, however, use the same
pre i x .
0
The nationality of the enemy formation.
0
The type of formation.
0
Accept one of the already allotted AUDs, but replace the prefix
with its own.
0
Allocate a new AUD.
3-29
SHAPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .SH
AFNORTH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AN
COMNON . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .NN
LANDSOUTHEAST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SE
AMF(L) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AM
of the intercorps boundary and each gives it an AUD using the block of
numbers al located to them by their own corps (2GE369 UR MRD and 1UK473 UR
MRD, respectively). Each corps adopts the AUD allocated by its division.
The corps HQ knows from which division the AUD originated by the
number appl ied. HQ NORTHAG agrees that an UI UR MRD is present and
decides to retain the German (GE) number but allocates it a NORTHAG
prefix. From then on, u n t i l p o s i t i v e l y i d e n t i f i e d o r c h a n g e d b y A l l i e d
Forces, Central Europe (AFCENT), or SHAPE, the unidentified formation is
known as NG369 UR MRD. If for some reason it is changed by AFCENT or
SHAPE, apply an AFCENT or SHAPE prefix.
3-30
CHAPTER 4
IPB is a tool to aid the commander and staff in determining where and
when to use Iimited resources to achieve decisive results. IPB applies to
a l l p h a s e s o f t h e A i r L a n d B a t t l e f i e l d ; c l o s e - i n , deep, and rear operations
synchronization are all supported by the IPB process.
IPB is especially useful as a tool for planning and fighting the deep
operations. T h r o u g h t h r e a t e v a l u a t i o n , enemy critical nodes and HVTS are
identified readily. Event templating determines the optimum time and
place to interdict the enemy to achieve maximum delay, disruption,
d e s t r u c t i o n , and when and where to achieve decisive exploitation of
identified weakness. it facilitates the identification and location of
deep targets in time to strike them at the optimum time and place in a
manner which constrains and causes the collapse of close-in enemy actions.
AirLand Battle concepts were introduced in Chapter 1 of this manual, and
an application of IPB and coIIection in deep operations and maneuver plans
is further explained in FM 34-130.
4-1
graphics which are understood easily, analyzed, and appl ied to the
planning process.
0
Where to look.
0
When to look.
0
What to look for.
0
What to look with.
0
What to expect to see.
0
Where to maneuver, shoot, jam, and communicate.
0
When to maneuver, shoot, jam, and communicate.
0
What friendly resources to maneuver, shoot, jam, and Communicate
with.
0
What enemy assets to maneuver, shoot, and jam.
0
What results to expect.
4-2
battlefield deception elements, and USAF weather teams. Other sections,
such as the G5 and G4 or S4 become involved in rear area IPB. Each of
these sections and others have data which are vital to IPB. Each of these
sections also has requirements which are filled by IPB. Use of this
manual and FM 34-130 helps the analyst succeed in supporting the commander
effectively.
Conducting IPB and knowing how to apply its products, are two
different processes. This chapter explains how the intelligence analyst
utilizes IPB to assist the commander and staff in the successful planning
and execution of AirLand Battle. A more detailed description of the IPB
process is available in FM 34-130.
. The ana yst’s objective when applying the IPB process is to reduce
b a t t l e f i e l d uncertainties as they relate to terrain, weather, and enemy.
During the PB process, the graphics produced aid the commander and staff
in planning and synchronizing more effective operations. IPB focuses the
S 2 ’ s i n t e l l gence collection effort where it is most effective. IPB also
a s s i s t s t h e commander in the decision-making process. For a d e t a i l e d
d e s c r i p t i o n of how IPB assists in decision making read Chapter 4,
FM 101-5. IPB helps the commander control the battle by describing what
the enemy’s most likely course of action is, including when and where it
will occur and how the enemy’s follow-on forces affect the battle.
4-3
4-4
DEVELOPMENT AND USE OF INTELLIGENCE PREPARATION
OF THE BATTLEFIELD PRODUCTS
The graphics produced during the IPB process have numerous purposes
a n d f u n c t i o n s . A good analyst knows what to accomplish from each.
Terrain and weather factor overlays, for example, help depict the effects
of terrain and weather on potential friendly and enemy courses of action.
The IPB process begins with the mission. Upon receipt of a mission,
the commander analyzes the situation and has the staff present a situation
update. F r o m t h i s i n i t i a l i n f o r m a t i o n , the commander conducts mission
analysis and restates the mission. The commander then sets the staff
planning process in motion by providing planning guidance and intent. The
commander also determines initial PIRs.
4-5
As a minimum, the analyst prepares a modified combined obstacle
overlay (MCOO), a situation template depicting how the enemy looks at the
most critical moment on the battlefield, an event template from which to
develop the R&S plan, and a DST.
4-6
BATTLEFIELD AREA EVALUATION
Battlefield area evaluation (BAE) as the first step in the IPB process
sets the stage for the rest of the process.
METT-T and the commander’s concept of the operation determine the Al.
Once the Al is established, the analyst informs higher command of the area
it covers so they can assist in colIection.
During the BAE phase the analyst studies the battlefield to determine
significant areas and considerations to be studied in more depth during
the remaining IPB phases.
Terrain Analysis
0
Terrain which impedes or hinders maneuver and mobility.
0
Terrain which does not restrict maneuver and mobility.
0
Avenues of approach (AAs) and mobility corridors (MCs).
The lower the level at which the analyst works, the less time the
analyst may have to prepare terrain factor overlays. The analyst must
prepare those overlays which support the commander’s mission and intent.
This requires the G2 or S2 to prioritize and set time lines as to what the
analyst should accomplish.
4-7
Modified Combined Obstacle Overlays
Another important factor is how the friendly force looks from the
enemy’s perspective. This principal applies to all other OCOKA factors as
well. The distinction is made clear to the commander by providing details
versus generalities.
Observation also influences the capability for R&S and TA. In the IPB
context, this refers to optical and electronic line of sight (LOS). Many
battlefield systems require LOS to function effectively. These include
radios, radar, intercept and direction finders, jammers, direct fire
weapons, human vision, and binoculars.
Air defense (AD) TA and weapons require LOS from their positions to
air targets. The analyst considers the anticipated flight altitude
relative to the elevation of adjacent terrain.
4-8
The effects of terrain and weather on these systems influence the
commander’s view of the battlefield. What is important for the analyst to
consider when studying the terrain is to study it based on the battlefield
systems avaiIable to the commander and the threat. Again, because time is
limited, the analyst prioritizes those battlefield systems most critical
to the mission.
4-9
The analyst decides the type forces which concealment may or may not
impact; for example, concealment may be good for soldiers on foot, yet
poor if riding in tracked vehicles.
The analyst addresses cover from direct and indirect fires. The
analyst identifies (particularly important at battalion level) points
within the AO where concealment and cover are critical to successful
mission accomplishment.
Key Terrain. Key terrain is any point or area on the ground whose control
or seizure provides an important tactical advantage. Any terrain which
increases a unit’s abil ity to apply combat power or decreases the
opponent’s abil ity to apply theirs is considered key terrain.
0
It is not an obstacle to movement because it is narrower and much
easier to cross.
0
Maneuver support potential .
0
Access to key terrain and adjacent AAs.
0
Degree of canalization.
0
Concealment and cover.
0
Observation and FofF.
4-1o
0
Obstacles.
MCS are subsets of AAs. MCS are areas within the AA which permit
movement and maneuver. They permit friendly and enemy forces to advance
or withdraw in doctrinal configuration, and to capital ize on the
principles of mass, momentum, shock, and speed.
When determining AAs and MCs, the analyst uses the one-up, two-down
rule. The analyst determines AAs for enemy forces one echelon above and
MCS for forces two echelons below the level of command conducting the
analysis.
In determining AAs and MCS, the analyst keeps in mind the type force
for which they are developed, the unit mission, and the potential enemy
force mission. If an air threat exists the analyst develops air AAs. If
t i m e i s s h o r t , the analyst seeks assistance from higher commands. The
analyst may even involve the unit air defense artillery (ADA) officer.
0
Current intelIigence estimate and analysis of the AO from higher
headquarters.
0
Special terrain studies and products prepared by US or
host-country agencies, special maps, charts, and geodetic studies.
0
Current photography.
0
Actual terrain reconnaissance.
The terrain factor matrix provides a guide for terrain analysis. The
matrix develops from an analysis process whereby terrain factors are
4-11
identified and correlated with specific types of combat operations and
battlefield functions. The terrain factor matrix assists the intelligence
analyst in identifying the types of terrain products needed. Figure 4-4
shows the terrain factor matrix.
4-12
The combined obstacle overlay incorporates all pertinent terrain
factors which assist the analyst in identifying mobility areas and
deducing trafficability rates for AA analysis.
Hydrology (rivers)
Cloud cover (CC) prolongs the drying period. Normal SLOW-GO traffic
conditions may convert to NO-GO conditions which impact on both friendly
and enemy force movements. The intelligence analyst prepares combined
obstacles overlays that reflect at least normal weather effects on
mobility. Based on a review of historic weather patterns, the analyst
associates specific weather factors with specific time periods.
0
Obstacles with dry soil.
4-13
0
Obstacles created by wet soil.
0
Combined obstacles w ith wet soil.
The combined obstacles overlay usually reveals one or more MC. Since
regiments normalIy advance along separate MCS, each division AA should
contain regimental MCS. The start point of an attack begins at enemy
assembly areas and terminates at their objective.
4-14
The analyst moves the template along the avenue from projected enemy
assembly areas to the objective. An AA is never completely free of
obstacles. but it provides for relatively free movament. Obstacles
generally parallel the direction of movement.
In terrain and weather analysis, the terrain team determines LOS for
weapons, communications, TA, intelIigence colIection, and R&S systems.
Direct fire weapon systems like the antitank guided missile (ATGM), the
s e l f - p r o p e l l e d a n t i a i r c r a f t g u n , and the tank need good FofF to
successfulIy engage the enemy forces at maximum range. FM radio
communications, forward observers, TA and surveillance radar systems, and
SIGINT need optical or electronic LOS to the target. Terrain and weather
factor overlays assist in analyzing LOS limitations. LOS analysis helps
determine where ground forces can best shoot and communicate and the most
likely low altitude air approaches into the AO. In LOS analysis, the
analyst considers the following factors:
0
Terrain elevation.
4-15
Figure 4-8. Combined obstacles with wet soil.
0
Height of buiIt-up areas.
0
Density of ground vegetation at fulI growth.
0
T e r r a i n f a c t o r s , s u c h a s d e f i l e s , which are not apparent because
of contour spacing.
4-16
0
E f f e c t s o f w e a t h e r , such as fog or precipitation that obscure
observation.
4-17
Figure 4-11 is a horizontal LOS overlay depicting FofF. Areas of maximum
LOS are color-coded to aid analysis. Other range parameters are colored
for easy identification. Heavily forested areas would not necessarily
obscure LOS. Depending on the density of vegetation, LOS might penetrate
100 m or might penetrate 100 m or more of the forest. The height of
ground vegetation and the seasonal density (taller than 1 m) might degrade
LOS . This illustrates why an analyst must know the terrain of each
battlefield system that is being analyzed.
4-18
each MC. Having done this, the analyst compares each and makes some
initial determinations as to which is most favorable. LOS information
also is essential to electronic deception since this operation requires
knowledge of where friendly signatures are observed. Figure 4-12 shows
terrain masking and horizontal LOS.
RANGE
3000
2000
1000
4-19
AVENUES OF APPROACH ANALYSIS
In AA analysis, the intelligence analyst selects the AAs and AAAs that
best support the capabilities to move, shoot, and communicate. The
analyst considers each avenue in relation to each friendly or enemy
capabiIity, and then Iists and compares the advantages and disadvantages
of each. This is not merely a matter of counting advantages and
disadvantages, but requires detai lad analysis and sound judgment.
This analysis is not to determine which AAs the enemy selects, but
rather to determine which best supports the capability to move, shoot, and
communicate. Figure 4-13 shows how an analyst depicts AAs on an overlay.
Once the most viable AAs are selected, the analyst prepares an overlay
depicting each AA and MC. MCS are subsets of AAs and both are shown
t o g e t h e r . When weather is a consideration, the analyst prepares an
overlay for each season.
4-20
APPLICATION OF WEATHER FACTORS OVERLAYS TO ANALYSIS
The analyst should not generalize weather effects. The analyst should
seek details which are useful . The best way to be successful at this is
to track weather effects on unit operations during training exercises,
catalog these for future reference, and discuss with subordinate
commanders what critical weather effects are needed to operate
successfulIy. By doing this, the weather analysis supports operations and
the ana yst m a x i m i z e s w h a t I i t t l e t i m e e x i s t s f o r o t h e r I P B r e q u i r e m e n t s .
WEATHER ANALYSIS
4-21
weather effects with specific combat operations. Examples of weather
subfactor overlays produced by the weather analysis team include fog,
cloud coverage (summer or winter), rain and snow, and weather effects on
slopes. The overlays, along with the combined obstacle overlay, identify
where forces maneuver on the battlefield.
4-22
they improve trafficability by helping dry the soil. A windchill index is
available in FM 34-81.
The type and amount of CC, as well as the height of cloud bases and
tops, influence both friendly and enemy aviation operations. Extensive CC
reduces the effectiveness of air support. This effect becomes more
pronounced as CC increases, as cloud bases lower, and as conditions that
are frequently associated with clouds, such as icing, turbulence, and poor
visibility aloft increase. In relatively unstable air, clouds are
associated with strong vertical currents, turbulence, and restricted
visibility aloft. Generally, close air support (CAS) and aerial resupply
operations require a ceiIing of 1,000 feet (305 m) or more.
4-23
A combination of temperature and wind speed produces a windchill
factor . A windchill factor of -26°F (-32°C) is considered the
critical value for personnel and equipment operating in cold weather, The
opposite extreme, 120°F (49°C), i s c o n s i d e r e d t h e c r i t i c a l v a l u e f o r
personnel and equipment operating in hot weather, Similar restrictions
occur in the desert where temperature difference of over 50°F (lO°C)
occur between night and day in shelters without air conditioning or
heaters.
The analyst uses the weather data base as the foundation for analyzing
the effects of weather on combat operations. This analysis begins with an
evaluation of the mission, threat, Al, and friendly capabilities. While
the analyst considers the effects of the weather on personnel and
equipment, t h e p r i m a r y c o n c e r n i s w i t h t h e i r impact on mobility and LOS.
THREAT EVALUATION
The S2 and staff develop an HVT list by imagining how the enemy would
fight, relative to the friendly force mission. The S2’s or analyst’s goal
is to identify enemy assets an enemy commander would consider valuable or
critical for the accomplishment of the mission. In thinking through the
enemy plan an analyst considers how the friendly element’s mission and
intent affects the enemy mission.
4-24
For example, if an analyst is thinking through an enemy attack and
knows that the friendly force is in prepared positions with extensive
obstacles and barriers throughout the perimeter, it is a logical
assumption that the enemy commander will want substantial engineer support
to breach friendly obstacles. The enemy commander may not be aware of the
obstacles, yet engineer assets in fact are critical to the enemy battle
plan. Enemy engineer units therefore become HVTS. The G2 or S2 provides
this and other HVTS in the form of a HVT list to the G3 or S3 and the FSE
so target priorities are established and planned for.
o
River crossing (hasty, deliberate) .
0
Breakthrough.
0
Envelopment.
0
Exploitation.
0
Pursuit.
4-25
Figure 4-14. Operations or unit matrlx.
THREAT INTEGRATION
SITUATION TEMPLATE
4-26
Figure 4-15. Battlefield functional systems matrix.
During this phase the analyst takes doctrinal templates and visualizes
where the enemy force will place assets on a particular point on the
ground. By doing this, MCS within each AA become apparent.
As enemy forces move along AAs and MCs, they do so sequentially. The
analyst follows the enemy by sequentialIy and situationally templating
their movement.
4-27
While PIRs are general in nature, they must be specific enough to
identify the critical information required. For example if the brigade is
preparing defensive positions in anticipation of an attack, then a PIR
could be: When will the enemy attack? A more specific PIR would be:
When will the enemy attack and where is the main effort? This PIR, if
answered, helps the commander prepare a more effective defense
particularly if time is short. Knowing where the main effort is helps the
commander prioritize defensive preparations.
EVENT TEMPLATE
The event template and its NAIs are the basis for intelligence
collection, R&S, and analysis because they--
o
Focus attention on areas where the enemy force must appear if it
uses a particular MC.
4-28
o Frame militarily significant events by time and ocation within
an NAI.
The analyst prepares an EAM for the primary AA and each MC within it.
Figure 4-16 shows a sample EAM. Due to time limitations and staff size,
most EAMs are prepared at division level or higher.
Before combat, the EAM and event template illustrate possible enemy
courses of action as a basis for comparing friendly courses of action.
During combat operations, they focus on enemy probable courses of action.
0
Where and when to shoot, jam, and maneuver.
0
What to shoot, jam, and maneuver against.
4-29
is not the sole responsibility of the G2 or S2. Production of the DST and
synchronization matrix is a shared responsibility, involving the entire
staff or their representatives. The G2 or S2 provides information about
the enemy. The G3 or S3 guides the effort and ensures that it supports
the commander’s intent.
COORDINATES
AVENUE OF APPROACH II
4-30
Target Areas of Interest
Areas along each AA and MC where the comnander influences the enemy
through fire and maneuver are TAIs. The TAIs are normally areas which
were earl ier identified as NAI. They are areas where we delay, disrupt,
destroy, or manipulate the enemy force. They are also areas suitable for
attacking HVTS.
o
Key bridges.
0
Road junctions.
0
Choke points.
0
DZS and LZS.
o
Known fording sites.
4-31
An analyst must have an in-depth knowledge of enemy doctrine to
determine potential HVTS, CPS, missile units, and logistics points on
situation and event templates. This knowledge helps in cueing collection
assets to possible HVT locations designated as TAI for the DST.
Decision Points
The DST depicts the TAI and DPs. Figure 4-17 shows a sample offensive
DST with synchronization matrix.
4-32
time and space factors known to be of interest to the commander. The DST
is the vital Iink between the conmmander’s intelIigence needs and the
resultant actions the commander and staff require.
This chapter has emphasized the vital role that IPB plays in preparing
for the next battle. During peacetime, IPB builds an extensive data base
for each potential area in which a unit is required to operate. It
a n a l y z e s this intelligence data base in detail to determine the impact of
the enemy, weather, and terrain on operations and presents this
information graphically. IPB is initiated any time the commander faces a
new enemy or receives a new mission. It is a continuous process which
supports planning and execution for all operations.
4-34
CHAPTER 5
ANALYSIS IN DEPTH
Analysts face daily problems. These challenges vary from the simple,
such as finding information, to the complex, such as predicting specific
enemy courses of action. The analyst makes decisions regarding what, how,
and when the commander can use information to support the battle. This
information often means the difference between winning and losing on the
battlefield, so it is vital that analysis be both accurate and timely.
This information and analysis influences decision making. Although the
analyst does not make decisions for the commander, the commander cannot
make qual ity decisions without’ the information that analysts provide.
In the tactical environment, the analyst and the user see the mission
as fighting the same enemy in a specific geographic area. From the
k n o w l e d g e e a c h h a s a b o u t t h e t a c t i c a l s i t u a t i o n , both develop conceptual
mode Is, The analyst and the user create some type of theoretical
5-1
Figure 5-1. Developing an intelligence product.
5-2
DETERMINING THE RISK FACTOR
HIGH
RISK
5-3
accepts is driven by the degree of risk the commander accepts. The
commander is unable to properly plan for battle knowing only that friendly
forces face “between one and three enemy tank divisions”. The same
commander is not concerned about facing 10 or 12 enemy tank battal ions;
the commander employs the same plan regardless, in facing 10, 11, or 12
battalions. The analyst does not waste time reducing the level of
u n c e r t a i n t y b e y o n d r e p o r t i n g “1O to 12 tank battalions" because the
commander is satisfied with the given degree of risk.
0
Enemy force lethality increases.
0
Warning time decreases. (Crises occur when warning time s less
t h a n t h e r e q u i r e d p r e p a r a t i o n t i m e ; t h e w o r s t - c a s e s i t u a t on is
when there is total surprise and no warning.)
0
The number of enemy options increases. ( I f t h e enemy’s p ans
are ambiguous, then friendly forces might not p a n e f f e c t i v e
responses to all of the enemy opt ions.)
*
0
The number of friendly options decreases. ( I f ewer options are
a v a i l a b l e f o r c o u n t e r i n g t h e t h r e a t , t h e r e i s a greater chance
that the available options will not work.)
0
The enemy’s knowledge of the battlefield environment, including
friendly forces increases.
0
The enemy force lethal ity decreases.
0
There is greater warning time.
0
The enemy has fewer options.
0
The number of friendly force options increases.
0
The friendly force knowledge of the battlefield environment,
including enemy forces, increases. Knowing how the environment
affects combat operations allows the commander to exclude
unworkable courses of action and to gain maximum effectiveness
from others.
5-4
reasons. F i r s t , there is uncertainty about the enemy’s intent: “What is
the enemy’s real objective? What are the various means of achieving this
objective?”’ Second, there is uncertainty in evaluating the capabilities
of the enemy force to achieve these objectives. Third, there is
uncertainty in other factors (lethal ity, warning time, enemy and friendly
options, and environmental conditions). Fourth, there is uncertainty that
the method of response will produce the desired outcome.
0
Physical objects such as weapons, vehicles, and radar.
0
Organizational structures of enemy and friendly forces.
0
Battlefield environment, including terrain, hydrology, and
weather.
Once developed the model is refined and maintained, or t will lose its
validity.
T h r e a t m o d e l s i n c o r p o r a t e w h i t e e l e m e n t s ( b a t t l e f i e d geography and
environment conditions) , red elements (the enemy force ( r t h r e a t ) , a n d
blue elements (the friendly force). The three elements o f w h i t e , r e d , a n d
blue form an organizational structure from which the analyst can mentally
picture the battlefield. Figure 5-3 illustrates elements of the threat
model .
The map is a model of the real world. The topographic map contains a
wealth of information about the battlefield environment, including
descriptions of terrain, roads, and population centers. The highly
detailed military map contributes more information to the threat model.
5-5
Figure 5-3. Elements of the threat model.
Thinking red is seeing the battle from the enemy’s viewpoint. The red
element of the threat model is anchored in the real world. Enemy forces
use the political and military policies of the foreign nations involved.
The enemy combat force is an extension of political policies that are the
source of the conflict that creates the battlefield situation.
5-6
c THINK
WHITE f
5-7
Figure 5-5. Red elements three techniques.
5-8
Figure 5-7. Checklist of white questions.
How does the enemy prepare war plans? How does the enemy train?
What are the enemy’s operational plans? How is the enemy force structured?
5-9
Figure 5-9. Checklist of blue questions.
5-1o
When selecting an hypothesis as “most likely” or rejecting it out of
hand, all of the above issues come into play. These errors in thinking
may lead to false alarms or rejecting perfectly good ideas. Other errors
also exist which affect analysis. They are called biases.
B I ASES.
—
CULTURAL BIASES
ORGANIZATIONAL BIASES
PERSONAL BIASES
5-11
Even if the situations have nothing in common, the tendency to follow the
methods that were successful in the past is very strong.
COGNITIVE BIASES
The cognitive biases that cause analysts the most problems are
v i v i d n e s s , absence of evidence, o v e r s e n s i t i v i t y t o c o n s i s t e n c y ,
persistence of impressions based on discredited evidence, and
availability.
Vividness
Absence of Evidence
0
Identify areas where information is lacking and consider
alternative hypotheses.
o
Adapt and adjust judgments as more information comes in.
0
C o n s i d e r w h e t h e r a l a c k o f informs” ion is normal in those areas
or whether the absence of nformat o n i s i t s e l f a n i n d i c a t o r .
Oversensit v i t y t o Consistency
5-12
Persistence of Impressions Based on Discredited Evidence
Availability
5-13
CHAPTER 6
SITUATION DEVELOPMENT
ENEMY CAPABILITIES
Enemy capabilities are courses of action which the enemy can take to
influence the accomplishment of the friendly mission. They indicate--
0
What the enemy can do.
6-1
0
When the enemy can do it.
0
Where the enemy can do it.
0
In what strength the enemy can do it.
Generally, there are four tactical courses of action open to the enemy
in conventional operations: attack, defend, reinforce, or conduct a
retrograde movement. These are divided into a variety of more specific
courses of action. For example, an attack may be a penetration, an
envelopment, o r o t h e r v a r i a t i o n s o f a n a t t a c k . A retrograde movement may
be a delaying action, a withdrawal, or a retirement.
0
EW.
The analyst considers when the enemy can implement a capability. Time
is a critical factor in the Air Land Battle; the friendly commander relies
on time to defeat enemy first-echelon forces before follow-on echelon
forces are committed to the battle. The friendly commander needs an
accurate estimate of when enemy forces are employed to decide how to fight
the battle. The analyst considers the following factors in estimating
when an enemy force will be employed:
0
Mobility capabilities.
0
Disposition.
0
Doctrinal rates of movement.
6-2
0
Characteristics of the terrain, LOC, trafficabiIity, and
obstacles.
0
Time required for displacement, assembly, emplacement, and closing
on the battle area.
6-3
activities. As indicators are detected and confirmed, PIRs are answered.
Appendix C lists common indicators.
0
Evaluate, compare, and integrate information and intelIigence from
all sources.
0
Identify indicators.
0
Wargame opposing courses of action.
0 Identify uncertainties.
6-4
m
m
Figure 6-1. Doctrinal template tank regiment main attack (div slice).
6-5
The working SITMAP makes it easier to evaluate and compare informat on
from different sources. The analyst compares incoming information with
the information previously posted to the working SITMAP for compatibili Y
with existing data. This comparison also helps to integrate new
information with existing information and to determine its significance
The IPB templates are important analytical tools when used with the
working SITMAP. Comparison of templates and the working SITMAP
systematizes analysis and increases the accuracy of the estimate.
Situation and event templates depict projected enemy activities while the
working SITMAP depicts the actual observed enemy activities. By comparing
and integrating the two, t h e a n a l y s t p r e d i c t s f u t u r e e n e m y a c tivities with
greater accuracy.
6-6
FACTORS OF ANALYSIS
The analyst understands the enemy’s tactical doctrine and the other
forces that impact on the execution of that doctrine. The following
suggestions are some techniques for developing enemy capabilities and the
relative probability of their adoption. These techniques help the analyst
use available information effectively to find the right answers to
critical uncertainties.
The analyst considers the enemy’s use of mass and economy of force.
The enemy commander, Iike the friendly commander, has Iimited combat
resources. The enemy commander uses mass and economy of force at the
optimum times and places to accomplish the mission. Rather than dissipate
t h e f o r c e s a c r o s s t h e e n t i r e b a t t l e f i e l d , the enemy commander weights the
main effort to ensure combat superiority at the decisive time and place.
Once the analyst determines how the enemy commander uses mass and economy
of force on the battlefield, the enemy’s most probable course of action
becomes more apparent. The enemy uses follow-on echelons to mass combat
power at decisive times and places on the battlefield. In the AirLand
Battle, the analyst locates and tracks these enemy follow-on echelons and
predicts where and when they will be committed. Situation and event
templates used with the working SITMAP help the analyst predict where the
enemy wiIl mass.
6-7
artillery is displacing forward, an indicator of attack. However, if the
composition of the enemy force indicates a total of 40 available
b a t t e r i e s , the analyst must recognize that the judgment is based on only
10 percent of the picture. Ninety percent is still uncertain. It is
vital that analysts be conscious of the degree of uncertainty remaining in
the situation.
Consider how the weather and terrain affect enemy capabilities and the
enemy commander’s choice of a course of action. Weather and terrain are
physical constraints which facilitate or alleviate the adoption of
specific courses of action. These constraints have a major impact on how
the enemy commander allocates resources. Weather and terrain force enemy
commanders to apply special methods of operations. They may require
changes in weapons and equipment or in the way they are used. The weather
and terrain may give rise to new force structures and organizations.
6-8
To relate enemy dispositions and physical constraints of the weather
and terrain, there are four specific techniques used to determine how the
enemy appl ies mass and economy of force.
TECHNIQUES OF ANALYSIS
PATTERN ANALYSIS
6-9
WEIGHTING INDICATORS
0 D e l i b e r a t e d e c e p t on.
0
Bad execution.
0
Temporary indecis on.
0 Random activity.
0
Ambiguity of the indicator itself.
6-10
imagination and creativity in its application, indicators based on
doctrine and training are generally reliable.
6-11
Analysts identify the enemy’s capability to concentrate fires of potential
nuclear del ivery systems.
Other Indicators
Analyze the Time Sequence of Events. It takes time for an enemy force to
prepare, move, and execute an operation. Time, mass, and space
relationships are a major tool in exposing deception. Since deception is
often conducted with the least outlay of combat resources, close analysis
of information from different sources which report on the same location,
at the same time, or concerning the same enemy unit may reveal significant
discrepancies.
Avoid preconcert ons. The analyst must remember that the objective is
not to prove a prior judgment. Experience suggests that preconceptions
a r e t h e a n a l y s t ’ s p r ncipal nemesis. Even if the techniques recontnended
6-12
above are creatively employed, there is a danger that the analyst who has
reached and expressed a preliminary judgment unconsciously begins to seek
and weigh evidence which confirms the initial estimate and dismisses or
passes over i n c o n s i s t e n t o r c o n f l i c t i n g i n f o r m a t i o n . The analyst should
not be concerned about the answer, a s l o n g a s i t i s t h e r i g h t a n s w e r . The
analyst reserves judgment, maintains objectivity, remains aware of
u n c e r t a i n t i e s , t o l e r a t e s d i s s e n t , and constantly tests working theory
a g a i n s t a v a i l a b l e e v i d e n c e . W h e r e p r a c t i c a l , the analyst considers
-
establishing a “devil’s advocate’ system to test, challenge, and think the
unthinkable.
6-13
CHAPTER 7
TARGET DEVELOPMENT
7-1
Figure 7-1. The targeting process checklist.
7-2
Figure 7-2. Targeting process.
The DECIDE function is the planning associated with a successful
targeting effort. It requires close interaction between the commander,
i n t e l l i g e n c e a n d o p e r a t i n g s t a f f s , F S p e r s o n n e l , and various other CS
agencies. The staffs must have a clear understanding of the unit’s
m i s s i o n , the commander’s concept of the operation and intent, and the
commander’s initial planning guidance with respect to target priorities.
With this information, the staff officers prepare their respective
estimates. From the standpoint of targeting, the FS, intelligence, and
maneuver estimates are interrelated and require close coordination between
the respective elements. The DECIDE function provides a clear picture of
the targeting priorities applicable to the tasking of TA assets,
information processing, the selection of an attack means, and the
requirement for post attack assessment. S p e c i f i c a l l y , the DECIDE function
is designed to answer the questions:
0
Will target damage assessment (TDA) be required or possible?
7-3
agency. The information gathered is processed to produce valid targets.
Not all the information reported benefits the targeting effort, but it may
be valuable to the development of the overall situation. The target
priorities developed in the DECIDE function help to expedite the
processing of targets. As these targets are developed, appropriate attack
systems are tasked in accordance with the commander’s guidance and
requirements of the attack system managers.
DECIDE
The decisions that are made are reflected in visual products. The
decisions made are what targets should be acquired and attacked, where and
when wiII the targets Iikely be found and who can locate them, how the
targets should be attacked, and is TDA required. The products are the HPT
matrix (what targets should be acquired and attacked), target selection
standards (TSS) (what assets can produce targets), the collection plan
(where and when should targets be found and who can find them), and the
attack guidance matrix (how targets should be attacked). The collection
plan is a G2 or S2 product that is important to the targeting process but
is not discussed in detail in this chapter. See FM 34-2 for discussion of
collection plans.
The commander and staff plan for future operations by projecting one
or more alternative courses of action based upon a mission analysis, the
current and projected battle situation, and anticipated opportunities. IPB
is an important process that assists the commander and staff in developing
courses of action.
7-4
The process begins with the receipt of a mission, which higher
headquarters assigns or the commander deduces. The mission statement
directs the focus toward a course of action, in a particular area, against
a specific enemy. The commander then, e i t h e r w i t h o r w i t h o u t i n p u t f r o m
the staff, performs mission analysis. This analysis considers tasks that
are performed, the purpose behind the tasks, and the constraints on the
u n i t , resulting in a restated mission.
The restated mission provides the basis from which to start the staff
estimate process. The intelligence estimate provides key support to
target development. Target development is one of the four IEW tasks:
situation development, target development, EW, and Cl.
T h e i n i t i a l I P B e f f o r t p r o d u c e s d o c t r i n a l t e m p l a t e s w h i c h convert
enemy OB into graphics and aids in the initial identification of potential
HVTS . HVTS are those assets that the enemy commander feels a e c r i t i c a l
to the successful accomplishment of the mission.
7-5
TARGET VALUE ANALYSIS
I P B a n a l y s i s c o n s i d e r s t e r r a i n , w e a t h e r , e n e m y d o c t r i n e , and current
enemy actions to arrive at conclusions of what the enemy wi I do; the
courses of action. Target value analysis (TVA) is a methodo ogy which
i d e n t i f i e s p o t e n t i a l H V T s e t s w i t h i n a g i v e n t a c t i c a l s i t u a t on. If
successfully countered, they provide a tactical opportunity. This
methodology provides a relative ranking of worth of target sets. TVA
begins when the analyst adopts the place of the enemy commander. The
a n a l y s t , in coordination with the G3 or S3, FSO, and other staff members,
wargames the operation. The purpose of wargaming is to finalize
individual staff estimates and to develop a friendly and enemy DST. A
by-product of this is the determination of the enemy assets that are
critical to the success of the enemy mission --HVTS. Target spread sheets
and target sheets are tools used in identifying HVTS. The information
found on these documents is produced during the IPB and wargaming
process. More information on the development and use of these targeting
tools is available in Annex A of FM 6-20-10.
The FSO uses target sheets and the knowledge of friendly weapons
systems to determine if there exists a capability to attack the HVT with
lethal assets. The EW officer and others assist the FSO with regard to
non-lethal systems. Availability of a weapon system should not affect the
attack since HPTs have precedence over other targets. Using the
capabilities of the systems to attack the targets, the G2 or S2 analyzes
7-6
and predicts the enemy’s response to each. This analysis determines if
the attack of the HVT is necessary to ensure the success of friendly
operations. The commander uses it in developing attack guidance. The
HVTs that meet the criteria of being acquirable, attachable, and capable
of ensuring friendly success are designated HPTs. In most instances, the
analyst chooses to target enemy elements that have been designated
“critical nodes.”’ A critical node is an element, position, or
corrrnunications entity whose disruption or destruction immediately degrades
t h e a b i l i t y o f a f o r c e t o c o m m a n d , c o n t r o l , or effectively conduct combat
operations. HPTs are formatted for easy reference in an HPT matrix. The
G3 or FSO prepares this matrix and gives it to the commander for
approval . The s e l e c t i o n o f H P T s , w h i c h a l s o a r e c r i t i c a l n o d e s , a r e
facilitated by a number of already existing enemy studies. Selection of
t h e s e c r i t i c a l nodes, coupled with other TVA efforts, al lows friendly
forces to best determine those enemy elements which are HVTS or HPTs.
TSS do not determine that the information that the sensor receives is,
in fact, a target. The analyst determines that. TSS reflect the system’s
capabilities to produce targets. TSS are dynamic. The effects of weather
and terrain on both the ColIection assets and enemy equipment are taken
into account. TSS are keyed to the tactical situation. Great care is
taken to deal with potential enemy deception, and to ensure the
reliability of the source or agency that is reporting. TSS are designed
t o a l l o w t a r g e t i n g p e r s o n n e l in the TOC to readiIy distinguish between
targets and suspect reports. TSS are developed for all TA systems
available.
Target location errors (TLEs) are the accuracies to which the assets
can locate various targets. The source’s TLE and the timeliness of
information are considered. It is an inherent responsibility for the FSE
to decide which systems have acceptable TLEs for targeting purposes in a
specific tactical situation.
ATTACK OPTIONS
Knowing target vulnerabil ities and the effect an attack on them has on
an enemy operation al lows a staff to propose the most efficient available
attack option. A primary decision here is whether to disrupt, delay, or
limit the enemy.
7-7
Once the staff decides whether a target is best disrupted, delayed, or
limited, they select attack options. Utilizing the situation template and
MCOO, the risk to an asset versus its effectiveness is assessed. The
decision on what attack option to use is made at the same time as the
decision when to acquire and attack the target. Coordination is required
when an attack with two different means, for example, EW and CAS, is
decided upon. These decisions are recorded on the DST and are made during
the wargaming process. This requires that the proper coordination be
performed in a timely manner.
ATTACK GUIDANCE
DETECT
7-8
Figure 7-3. Sample attack guidance matrix.
(OPs) . They are the grass roots of the FA’s TA effort. They observe the
b a t t l e f i e l d t o d e t e c t , i d e n t i f y , l o c a t e , and laser designate targets for
suppression, neutralization, or destruction. They report both target ing
data and combat in formation to the maneuver battalion FSO and S2 using
either organic or supporting communications means. The capability of the
F1ST to provide real time combat information cannot be emphasized enough.
The battalion FSO receives in formation from and passes information to the
FIST. The FSO continualIy exchanges targeting data and combat information
with the brigade FSO and elements from the DS FA battalion. The FSO
coordinates with the battalion S2 and S3 to identify and verify targeting
data and combat information derived from the overall collection effort.
The FSO is both a producer and a consumer of combat information.
7-9
Radar Assets. FA TA assets are the principle means for locating active
indirect fire weapons.
Combat Observation Laser Teams (COLTS). COLTS organic to each heavy and
light division provide a TA capability previously not available on the
battlefield. They are equipped to direct the engagement of targets.
The forward area alerting radar (FAAR) of the AD units provides a deep
look capability that can detect the location and movement of enemy air
assets. The integration of corps and theater AD efforts enable friendly
forces to obtain an air picture that can potentially cover the entire area
of interest for the echelon in question. Future concepts allow input
directly from theater AD assets into division air situation updates.
Collation of this AD information with other combat information enables us
t o l o c a t e m a j o r e n e m y a i r a s s e t s , a i r f i e l d s , and refuel ing and rearming
points. Many of these become HPTs in support of the friendly scheme of
maneuver.
DETECTION PROCEDURES
7-1o
To detect the desired HPTs in a timely, accurate manner, clear and
concise taskings are given to those TA systems capable of detecting a
given target. The FS personnel provide the G2 or S2 with the degree of
accuracy that the targets must be located with to be eligible for attack.
The G2 or S2 matches accuracy requirements to the TLEs of the collection
systems. This matching allows the G2 or S2 to develop a more detailed set
of TSS based not only on the acquisition system but also upon the HPTs’
acceptable TLEs that the G2 or S2 gives. These acceptable TLEs cannot be
placed in an SOP as they depend on the situation. Collection efforts
focus on those NAI and TAI that the IPB process identifies during the
DECIDE phase. Knowledge of the target type and its associated signatures
( e l e c t r o n i c , v i s u a l , thermal) enable friendly forces to direct the most
capable coIIection asset to be tasked for coIIection against a given
target. The asset is positioned in the most advantageous location based
on friendly estimates of when and where the enemy target is located.
7-11
The passing of targets and suspect targets to the staff is
accomplished by a number of means. It is important that essential.
Information that is passed for proper analysis and attack takes place. As
a minimum, the target report includes:
0
Date-time group (DTG) of acquisition by the sensor.
0
Description of the target.
0
Size of the target.
0
Target location.
0
TLE.
The spec fic forms and formats for passing target informat on are
s p e c i f i e d i n the unit SOP.
The DTG s i m p o r t a n t a s t h e t a r g e t ’ s p e r i s h a b i I i t y o r v u l n e r a b i l i t y
window is analyzed. This impacts on the urgency of the attack or the
denial of attack based upon the likelihood of the target having moved.
DELIVER
The attack of the targets satisfies the attack guidance that was
developed in the DECIDE portion of the targeting process. The attack of
targets requires a number of decisions and actions. The decisions are
described as a set of tactical and technical decisions. Determining the
t i m e f o r t h e a t t a c k , t h e a t t a c k s y s t e m , and the required effects on the
target are the tactical decisions to make. Based upon these tactical
d e c i s i o n s , the technical decisions describe the precise attack means, the
unit to conduct the attack, the time of the attack, and in the case of FS
a s s e t s , the number and type of munition. The actions in the attack of the
targets are the actual physical attack of the targets by lethal or
non-lethal means. The time of attack of the target is planned or by
opportunity.
Planned Targets
Targets of Opportun t y
DESIRED EFFECTS
7-13
cessation of fires from an area. If an assessment is to be made of an
a t t a c k , the key personnel ensure that the intelligence or acquisition
systems must receive adequate warning so the necessary sensors are
directed at the target at the appropriate time. The assessment results
cause battle plans and earl ier decisions to be changed. If necessary, the
decisions made during the DECIDE portion of the process are reexamined.
IPB products, the HPT matrix, the TSS, the attack guidance matrix, and the
entire battle plan are updated. Assessment allows friendly forces to tune
our efforts to achieve the greatest result with the least amount of
expenditure or risk.
7-14
CHAPTER 8
8-1
T h i s i n f o r m a t on permits complex node analysis and parametric analysis of
intercepted s g n a l s . This type analysis contributes to SIGINT support of
EW .
Since SIG N T d e a l s d i r e c t l y w i t h i n f o r m a t i o n o b t a i n e d f r o m i n t e r c e p t e d
enemy signals it provides the greatest volume of intelIigence support to
EW operations. SIGINT include the same functions as ESM. The D r i m a r y
difference between ESM and SIGINT is how the information is used’,
Generally, ESM produces combat information that can be used for target
development (jamming and FS), maneuver, o r t h r e a t a v o i d a n c e w i t h I i t t l e
systematic analysis or processing. SIGINT requires more extensive
processing to produce intelligence. ESM and SIGINT are mutually
supporting. Information collected through ESM is processed to produce
SIGINT, which is essential to support EW. See FM 34-40, Electronic
Warfare Operations, for a complete discussion on conducting EW operations.
8-2
ECM assets. However, indiscriminate jamming of target receivers is not
the most efficient use of ECM assets. The most effective jamming
requires information on the enemy’s C 3 system so that the effects of
disrupting a particular communications link is anticipated. This expected
effect then is integrated into the commander’s scheme of fire and
maneuver.
ECCM is divided into those measures designed to counter both ESM and
ECM . The anti-ESM effort requires much of the same intelligence support
required by manipulative and simulative electronic deception. The primary
intelIigence required concerns the enemy SIGINT and ESM capability
evaluated in terms of the assessed vulnerabilities of friendly systems to
such efforts. The counter-SIGINT effort requires technical information
on the capabilities of enemy jammers and any intelIigence on the
capabiIity of opposing forces to accomplish electronic deception.
FM 34-60 provides detailed doctrine on counter-SIGINT operations. Threat
doctrine on deception and information on the availability of the equipment
necessary for Threat forces to implement deception activities is
important. Multidiscipline intelligence efforts to obtain information on
enemy ECM equipment before it is deployed is necessary if effective
counter-countermeasures are to be established.
8-3
CHAPTER !3
COUNTERINTELLIGENCE ANALYSIS
0
T h e C l a n a l y s i s s e c t i o n ( C I A S ) a t d i v i s on and corps,
0
T h e C l a n a l y s t s w i t h i n E A C I C a t t h e a t e r Armv commands.
0
The intelligence and threat analysis center (ITAC) at DA.
The Cl analyst uses the tools and skills identified in this chapter
and Chapter 4, and as described in detail in FM 34-60. The intelligence
analyst focuses on “how we see the enemy”; the Cl analyst focuses on this
and “how the enemy sees us.” The Cl analyst must also focus on how to
c o u n t e r t h e e n e m y ’ s c o I I e c t i o n e f f o r t s . Where the intelligence analyst is
a subject matter expert on the enemy, the Cl analyst, i n a d d i t i o n t o
having an in-depth understanding and expertise on foreign intelligence
c o l l e c t i o n c a p a b i l i t i e s , must have a good working knowledge of the
friendly force.
9-1
0
Analyzes the multidiscipline intelligence collection threat
targeted against friendly forces.
0
Assesses enemy intelIigence colIection threat vulnerabiIities and
susceptibiIity to friendly deception efforts.
0
Supports friendly vulnerability assessment.
0
Along with the G3 OPSEC staff element, develops, evaluates, and
recommends countermeasures to the commander. These countermeasures
reduce. e l i m i n a t e , o r t a k e a d v a n t a g e o f f r i e n d l y f o r c e
vulnerabilties.
0
Supports rear operations by identifying coIIection threats to rear
area units and instalIations, to include low level agents
responsible for sabotage and subversion.
0
Nominates targets for exploitation, neutralization, or
d e s t r u c t on.
0
D e v e l o p s and maintains a comprehensive and current MDCI data base.
0
T a s k s f r end y intelligence c o l l e c t i o n resources through the CM&D
section.
0
Analyzing level I (enemy controlled agents or partisan collection)
and level II (diversionary and sabotage operations conducted by
unconventional forces) threats.
0
Recommending countermeasures and deception.
0
N o m i n a t i n g t a r g e t s f o r e x p l o i t a t on, neutralization, or
elimination.
9-2
COUNTER SIGNALS INTELLIGENCE COLLECTION
0
Analyzing and assessing enemy SIGINT coI Iect on capabilities and
activities.
0
Comparing enemy colIection systems c a p a b i l i e s a g a i n s t f r i e n d l y
targets.
0
I d e n t i f y i n g , a n a yzing, and assess ng friendly electronic patterns
and signatures.
0
Analyzing f r i e n d y vulnerabilities against enemy SIGINT collection
efforts.
0
Subsequently recommending countermeasures and deception.
0
Nominating enemy SIGINT targets for exploitation, neutral ization,
or destruction.
0
Measuring enemy co Iection systems against friendly targets.
0
Identifying, analyzing, and assessing friendly patterns,
s i g n a t u r e s , and vulnerabiIities for subsequent development and
recommendation of countermeasures and deception.
0
Nominating enemy IMINT systems for exploitation, neutralization,
o destruction.
MDC c a n n o t b e c o n d u c t e d w i t h o u t t h e s u p p o r t o f a l I t h r e e i n t e l I i g e n c e
d i s c i p l nes--SlGlNT, HUMINT, and IMINT. These disciplines are used to
c o l I e c t critical information on enemy collection, analysis, and
dissemination systems. Analysts extract the information from the
al l-source data base within the CIAS to determine enemy coIIection
capabilities and operations. These systems, c o i n c i d e n t a l l y , c o l l e c t a
great deal of intelligence on friendly forces. This intelligence is vital
9-3
in evaluating friendly profiles and thereby determining their
vulnerabilities. If the situation warrants, Cl analysts can task friendly
coIIection systems to specificalIy collect intelIigence on friendly forces
for the CIAS through the CM section.
The Cl mission mandates a wide range of functions and tasks that are
accomplished in peace and at all intensities of conflict. Cl operat ona I
activities perform such functions as investigations, operations, and
collection. Their products are of great value to the MDCI analyst. To
get the Cl operational reports, the CIAS closely interfaces with the CM&D
section to identify those items of Cl interest coming into the CM&D r om
operational Cl personnel . The CIAS must task and receive answers to those
taskings through the CM&D section.
ANALYTICAL PRODUCTS
0
Association matrixes.
0
Activities matrixes.
0
Time event charting.
0
HUMINT communication diagrams.
0
L i n k agrams.
0
HUMINT s i t u a t i o n o v e r l a y s .
0
HUMINT-related portions of the threat assessment.
0
Black, gray, and white lists.
9-4
There are three basic techniques (tools.) used as aids in analyzing
HUMINT-re ated problems. They are time event charting, matrix
manipulat on, a n d l i n k d i a g r a m i n g . Used together, these techniques are
c r i t i c a l o the process of transforming diverse and incomplete bits of
seemingly unrelated data into an understandable overview of an exceedingly
complex s t u a t i o n . See FM 34-60 for detailed discussion on these
techniques.
C-SIGINT analysts maintain the C-SIG NT data base. Using this data
base, they produce:
0
Threat fixed-base SIGINT matrixes. These are developed from the
enemy coIIector characteristics data base and the threat fixed
station data record.
0
Mobile SIGINT matrixes. These are developed from enemy collector
characteristics data base and threat OB and location data records.
0
A system quick-reference matrix, providing a quick-reference of
capabilities and Iimitations of those SIGINT systems which will most
likely threaten that portion of the friendly command for which the
analyst is responsible. This matrix is developed through
manipulation of the data base to gain quick access to information
concerning those systems which are the most Iikely threats to the
corrrnand.
0
SIGINT direction charts, portraying areas or targets of threat
SIGINT concentrations. This is accomplished through integrating the
EEOB overlay with the friendly electromagnetic overlay to determine
areas susceptible to coIIection.
0
SIGINT situation overlays. These are a continuous graphic update
of the EEOB which depicts known or suspected threat SIGINT or REC
positions. These overlays are continuously compared with the
friendly electromagnetic overlay to identify susceptibility to
collection.
0
SIGINT-related portions of the threat assessment.
C-IMINT analysts maintain the C-IMINT data base. Using his data base
they produce:
0
Threat SATRAN matrixes. (The definition for SATRAN is c l a s s i f i e d .
See FM 34-60A for explanation.) These are designed to identify when
and where a system is active and also show the coIIect on
characteristics of the system.
9-5
0
Threat intelIigence coIIection flight matrixes. These are similar
to the SATRAN matrix, but are concerned “with other platforms used by
the threat. Tracking these collection systems continuously allows
the analyst to analyze threat IMINT collection patterns.
0
System component quick-reference matrixes, i n c l u d i n g t h r e a t
system’s capabiIities and processing times. This file is a part of
the data base which equates to an OB file on threat IMINT systems.
0
IMINT situation overlays. These overlays are the paths from the
SATRAN and threat intelligence collection flight matrixes depicted
on the friendly operations graphics. This identifies areas
susceptible to collection.
0
lMINT-related portions of the threat assessment.
0
Rear operations IPB (ROIPB) products.
0
MDCI graphic summaries (MDCISUM).
0
MDCI threat assessments.
0
MDCI situation overlays.
0
MDCI estimate.
9-6
the impact of enemy, weather, a n d t e r r a i n o n o p e r a t i o n s a n d p r e s e n t s i t i n
graphic form. It has the added ingredient of assisting in the assessment
of friendly courses of action from the enemy’s perspective.
9-7
9-8
Figure 9-2. MDCl threat assessment.
9-9
.
9-1o
Figure 9-3. MDCl estimate (continued).
9-11
t e r r o r i s t , paramilitary, or other unconventional threats, discuss such
pertinent information as leadership (key personalities), equipment,
finances, and relations with the local populace.
MULTIDISCIPLINE COUNTERINTELLIGENCE
The C A S i d e n t i f i e s t h e m u l t i t u d e o f i n t e l l i g e n c e c o l l e c t i o n
c a p a b i l i t es of adversaries on the battlefield. it then narrows the
c a p a b i I i t es as accurately as possible to the actual coIIectors within an
area, the r targets, and the coIIectors technical characteristics. The
CIAS also p r o v i d e s i n f o r m a t i o n t o t h e b a t t l e f i e l d d e c e p t i o n ( B A T - D ) s t a f f
on the characteristics of friendly equipment so that an “as close as
possible”’ r e p l i c a t i o n o f a f r i e n d l y f o r c e i s d i s p l a y e d t o e n e m y
coIIectors. This is done during the development of the deception story in
the planning process.
BAT-D elements become one of the main consumers of the integrated MDCl
products. They use the MDCI estimate and graphic summary to determine
where best to execute deception based on the coIIection effort.
9-13
through investigation, operation, and intelligence collection directed at
terrorist groups and activities. The CIAS has an additional analytical
r o l e , using C-HUMINT techniques in this manual and fully explained in
FM 34-60.
9-14
CHAPTER 10
1o-1
SUPPORT OF COUNTERINSURGENCY OPERATIONS
For example, a s i n a c o n v e n t i o n a l c o n f l i c t , I P B i s c o n d u c t e d b e f o r e
and continues throughout a LIC. IPB not only helps identify patterns of
insurgent activity, but helps use these patterns to predict future
a c t i o n s . Appendix E, FM 34-130 fully addresses IPB in support of LIC.
0
Where can we expect to find the enemy?
0
Where can we expect not to find the enemy?
INTELLIGENCE ESTIMATE
IPB provides a basis for the intelligence estimate. As with mid- and
h i g h - i n t e n s i t y o p e r a t i o n s , IPB products are used extensively in the
estimate. There are, however, s o m e s i g n i f i c a n t d i f f e r e n c e s f r o m t h e s e t o
estimates that support LIC in general and counterinsurgency specifically:
10-2
0
Emphasis is placed on different parts of the estimate. The
mission statement, for example, may be more difficult to compose
because of the wide scope of low-intensity operations and their
relationships with the internal defense program.
0
E m p h a s i s is accorded nontactical considerations, such as
psychological, political, sociological, and economic factors.
0
Factors are to be compared during the deliberative process.
Advantages and disadvantages of various courses of action may be
more complicated than when terrain, weather, and a visible, tangible
enemy are the chief factors to be considered.
PROCESSING INFORMATION
10-3
RECORDING
As in mid- a n d h i g h - i n t e n s t y s i t u a t i o n s , L I C r e q u i r e s l a r g e a m o u n t s
of information on a continuous basis which are promptly compared with
existing information and intel igence to determine their significance. To
a large-degree, the extent of the recording effort depends upon the
insurgent activity in the area and the analysts available to maintain and
a n a l y z e t h e r e c o r d e d i n f o r m a t i o n . All of the recording aids mentioned
below, however, serve a unique and useful purpose in the overalI
intelligence production effort. Chapter 2 provides a detailed description
of the journal, journal file, intelligence files, and intelligence
workbook. Variations in recording devices which are unique to LIC occur
in the use of annotated overlays and working fiIes.
Annotated Maps
0
Insurgent names or codes for local terrain features, such as
villages, areas, and trails.
0
Insurgent assassination or resource colIection attempts.
0
Other significant activity.
10-4
Judgments concerning insurgent operations also require knowledge of
terrain factors and insurgent limitations.
Trap Map. The trap map or overlay is used if the insurgent has a
capability for sabotage or terrorist action. Data is directly annotated
on the map on which the situation overlay is placed, or it can be kept
separately. This map portrays particularly attractive target locations
f o r i n s u r g e n t s a b o t a g e o r t e r r o r i s m , such as road and railroad bridges,
communications centers, theaters and assembly halls, and places where the
terrain favors ambushes and raids. Such areas are identified and analyzed
as part of the area study. They are plainly marked on this map with
attention directed to possible insurgent access and escape routes.
Photographs which are keyed to the map also supplement this effort.
Working Files
10-5
procedures and tactics, therefore, are unique, and familiarization
requires the intelligence officer to study personal ities and incident
analysis. E x t e n s i v e w o r k i n g f i l e s , such as the insurgency analysis
worksheet, hot files, current propaganda and psychological operations
(PSYOP) file, personality and organization files, area study files,
c i v i l - m i l i t a r y o p e r a t i o n s f i l e , and resource reference fiIes are
established and maintained. Figure 10-1 shows an insurgency analysis
worksheet.
10-6
Insurgency Analysis Worksheet. The insurgency analysis worksheet helps
identify information and intelligence needed to satisfy the PIR and IR. It
also provides a guide for analysis of a LIC environment.
Hot File. The hot file is the most important working file. It includes
all available material pertaining to an incident or groups of possibly
related incidents that are of current interest. This file contains
material on persons or places Iikely to be involved in insurgent activity,
together with material on agents or suspects who may be involved. A
reported sabotage plot, for example, could initiate a hot file. The hot
file remains active until the report is refuted, the incident occurs, the
attention of the insurgent is diverted elsewhere, or friendly interest
priorities change.
Area Study Files. Area study files contain up-to-date and pertinent data
in the geographic, political, sociological, economic, and cultural fields.
I n l o w - i n t e n s i t y o p e r a t i o n s , even the lower echelon tactical commander,
particularly when operating in the same general operational
area over extended periods of time, has a definite requirement for such
information. The intelligence staff officer should, therefore, have ready
access to such data. The topical breakdown of such files concerns events
and activities of continuing significance. Thus, for example, if rice is
the basic staple in an economy, the topical breakdown includes files on
rice production, distribution and marketing, price levels, and black
marketeering and pilferage activities. Since this key economic indicator
has continuing influence on friendly military operations as well as on the
insurgent forces who depend on this staple for survival, careful analysis
of this data over a period of time provides patterns based on which
insurgent actions are anticipated and their capabilities predicted.
10-7
10-8
Reference Material. A Iibrary is maintained of reference publications,
such as manuals on doctrine, tactics, and methods; books on the area and
o n t h e i n s u r g e n t t h r e a t ; files of newspaper and magazine clippings; and
any other material which is of use. This material is kept at a central
library serving the entire staff or located at an area coordination
center.
10-9
EVALUATION
INTEGRATION
The incident file reveals a series of murders that have been linked
with the insurgent, with the primary victims being government officials,
prosperous merchants, and large landholders who opposed insurgent
objectives.
The organization file indicates that the union has recently begun to
disseminate antigovernment leaflets and has threatened to call a strike
if demands for representation in the current government are not met. The
other primary contender for union leadership is a relatively unknown
newcomer.
1o-1o
Once all related items of information from the intelligence files are
obtained, the intelligence analyst begins to assemble the available
information to form as many logical pictures or hypotheses as possible.
Alternative methods of assembly are an essential prerequisite to any valid
interpretation.
INTERPRETATION
For example, in the case mentioned above, if the labor leader was
loyal to the government and was murdered for opposing insurgent control of
the union, i t r e a s o n a b l y i s e x p e c t e d t h a t f u r t h e r c o n s o l i d a t i o n o f
insurgent control over the union, increased antigovernment agitation by
the union, a n d p o s s i b l y , a n e x t e n s i o n o f i n s u r g e n t t e r r o r i s t a c t i v i t i e s
will take place.
10-11
DISSEMINATION
Local SOP and guidance from higher headquarters dictate the amount and
type of information that is given to civilian agencies and host
national miIitary forces. This question of releasability is resolved
before effective dissemination can exist.
ORDER OF BATTLE
10-12
Phase II of an insurgency begins when the insurgent has gained
sufficient local or external support to initiate organized guerrilla
warfare against the government.
A phase Ill insurgency occurs when the insurgent has transitioned from
a guerriIla-oriented force to a primariIy conventional-oriented force.
FM 100-20 describes, in detail, the goals and activities of insurgent
forces during all three phases. An important point to remember is that
the insurgent may be operating from areas outside the host country during
alI three phases. Therefore, geographic boundaries cannot limit
intelligence collection and analysis.
COMPOSITION
Phase I Considerations
Phase II Considerations
10-13
POLITICAL STRUCTURE
COMBAT FORCES
0
Number.
0
Commander’s name.
0
Nickname.
0
Code designation.
0
Name of the area in which it operates.
DISPOSITION
10-14
t h e i n s u r g e n t s p o l i t i c a l l y c o n t r o l , thereby providing an early warning
system. By plotting insurgent sightings and combining this information
with weather conditions, time factors, detailed investigation of insurgent
incidents, and after action reports, the analyst best selects possible
enemy dispositions as well as possible areas of tactical deployment.
Consideration should also be given to areas where no insurgent activity is
reported. These areas, while appearing to be under the control of
internal defense forces, may be under the political control of the
insurgents.
Phase I Considerations
Phase II Considerations
How the insurgent forces are deployed indicates whether the enemy is
making a widespread show of strength, with units scattered about the
country, or is concentrating forces around a few key targets. It also
shows whether the enemy s going to concentrate on such activities as
i n t e r d i c t i n g t r a n s p o r t a t on or actively seeking battle with government
forces.
STRENGTH
10-15
percentage of an area under government control, as opposed to the
percentage under insurgent control, with both viewed together in terms of
population density. A useful indicator of the extent of insurgent
political control is the willingness of the populace to report information
concerning the insurgents.
Phase I Considerations
The cadre who organize and activate the movement usually are h ghly
t r a i n e d , aggressive professionals who exercise an influence
disproportionate to their actual numbers. The analyst also is concerned
with the number of enemy units in existence, which in phase I means
identifying and evaluating new groups and organizations which have either
appeared in the host nation or in neighboring countries and any changes in
the size of existent groups. Other types of equipment, besides weapons,
are of paramount interest. A printing press in phase I is a deadlier
weapon than a battalion of artillery in phase Ill.
Phase II Considerations
TACT I CS
Phase I Considerations
Phase I insurgency s c h a r a c t e r i z e d b y a r e l a t i v e a b s e n c e o f s t r c t l y
military operations and an emphasis on subversion and organizational
development. Although nstances of terrorism begin to occur in the later
10-16
stages of phase 1, m i l i t a r y a c t i v i t y i s u s u a l l y l i m i t e d t o r e c r u i t i n g a n d
establishment of military cadres.
Phase II Considerations
TRAINING
Phase I Considerations
During phase I, t h e i n s u r g e n t t r a i n s a n d i n d o c t r i n a t e s e x i s t i n g c a d r e
as welI as newly accepted or recruited indigenous personnel. Training
consists of a great deal of political indoctrination along with techniques
. of propaganda, communications, a n d i n t e l l i g e n c e c o l l e c t i o n . Training and
effectiveness go hand in hand; the type, amount, and val idity of training
received by the insurgents is determined, to some degree, by any observed
increase in the effectiveness or size of the insurgent movement. Some
training normally is conducted in another country and is indicated by a
change in number and type of personnel travel ing to that country.
Phase II Considerations
LOGISTICS
10-17
Phase I Considerations
Phase II Considerations
EFFECTIVENESS
Phase I Considerations
10-18
Phase II Considerations
PERSONALITIES
Phase I Considerations
In phase I, p e r s o n a l i t i e s a r e a n e x t r e m e l y i m p o r t a n t f a c t o r . During
this phase, when the insurgency is just beginning to organize, function,
a n d a t t e m p t t o s p r e a d i t s i n f l u e n c e , the loss of a comparatively small
number of personnel practicalIy destroys it or at least sets back its
progress. Unfavorable publicity attached to the movement, as a result of
exposure, renders its success less Iikely. The apprehension, compromise,
or exposure of its leaders destroy the insurgency completely. Knowing who
the insurgent leaders are also furnishes a valuable indication of how
tactics and training are conducted and how effective the overall effort
is.
Phase II Considerations
As in phase I, p e r s o n a l i t i e s r e m a i n a c r i t i c a l c o n c e r n . Many
insurgent units are cat led by their commander’s name, rather than having a
conventional designation.
Phase I Considerations
10-19
operations. L a t e r , there is some increased use of VHF transmissions and
more organized communications procedures. The standardization of
communications practices reflects the level of communications training
expertise.
Phase II Considerations
MISCELLANEOUS
Phase I Considerations
Phase II Considerations
OB FACTORS SUMMARY
0
When an insurgency escalates from a phase I to a phase II
s i t u a t i o n , the OB effort is expanded considerably. The enemy combat
units must now be considered in addition to the various
phase I organizations and activities, which still are active.
o
When al insurgency escalates from a phase II to a p h a s e I I I
s i t u a t on, t h e a p p l i c a t i o n o f t h e O B f a c t o r s t o t h e i n s u r g e n t ’ s
combat units is the same as for other conventional forces.
10-20
APPENDIX A
REPORT FORMATS
SPOT REPORT
o
Mission.
o
Area of operations.
A-1
o
Enemy situation.
o
Enemy capabilities.
0
Conclusions.
MISSION
AREA OF OPERATIONS
Weather and terrain analysis derived from IPB are always included in
the characteristics of the AO. Other characteristics are included if they
are important to either force in selecting courses of action to carry out
their assigned or assumed mission. These other characteristics are of
greater importance In AO S w h i c h h a v e l a r g e c i v i l i a n p o p u l a t i o n s a n d t o
commands with extensive territorial or CSS responsibilities. Detailed or
s u p p o r t i n g t e r r a i n a n d w e a t h e r i n f o r m a t i o n is included in an appendix to
the intelligence estimate. .,
Weather
Terrain
A-2
influence on selected courses of action by either force. For example, in
a CSS unit, the discussion of concealment and cover is oriented toward
influence on CSS courses of action, i n c l u d i n g i n s t a l l a t i o n l o c a t i o n s
required to accomplish the CSS mission and on enemy forces which
interfere with the accomplishment of the mission. In CSS unit
intelligence estimates, key terrain features are omitted unless the enemy
has the capability to seize or control terrain features which materially
affect the accomplishment of the mission.
Other Considerations
ENEMY SITUATION
0
Disposition,
0
Composition.
0
Strength.
0
Recent and present s g n i f i c a n t activities.
0
Peculiarities and weaknesses.
Disposition
A-3
Composition
Compos t i o n IS 0 6 d a t a t h a t i s u s e d t o d e t e r m i n e t h e s t r e n g t h t h e
enemy uses to prevent the accomplishment of the mission. List all the
u n i t s , i nc u d i n g i n s u r g e n t a n d g u e r r i l l a - t y p e f o r c e s t h a t c o n t r i b u t e t o
this. I nc ude such supporting units as air, nuclear delivery, and REC
u n i t s t h a t also affect the accomplishment of the mission. In determining
which enemy units affect mission accomplishment, time and space factors
are also considered.
Strength
Committed Forces, Committed forces are those enemy ground maneuver units
currently in contact and those ground maneuver units with which imminent
contact is expected, regardless of the specific friendly course of action
implemented. Designation of enemy forces as committed forces depends on
disposition, location, controlIing headquarters, and doctrine. For more
information on computing enemy strength, see Appendix D.
.
Reinforcements. Reinforcements are those enemy maneuver u n i t s t h a t a r e
not committed in or out of the friendly sector, but reac to the friendly
course of action in time to influence the accomplishment of the mission.
Contact with these units is not expected. Disposition, ocation, level of
control , or other factors are considered in determining which enemy forces
are reinforcements.
Enemy Air Capability. The enemy air capability is based upon numbers of
enemy aircraft within operational radius, maintenance facilities, expected
attrition, ground tactical situation, and other factors. The supporting
tactical air force furnishes intelligence on the number of sorties, by
type, which the enemy is expected to make within the field army or
comparable areas. The estimate is not usually prorated below the
field army level. Also, no attempt is made to calculate the number of
sorties the enemy can or may make against a subordinate command of the
field army or the communications zone (COMMZ). Corps, division, and COMMZ
command intelIigence officers usually quote the estimate furnished by the
higher headquarters in stating enemy air capabilities. For example, a
corps or division G2 might state: “30th Army estimates that the enemy can
be expected to attack within the army area with as many as 150 fighter,
100 attack, and 75 bomber sorties daily. By massing all aircraft within
operational radius, the enemy can make a maximum of 250 fighter, 300
a t t a c k , and 250 bomber sorties daily.”
A-4
Nuclear Weapons and Chemical and Biological Agents. Estimates of enemy
NBC capabilities usually are prepared at field army and hlglner
headquarters. Units below field army level usually lack the means to
gather the information to make such estimates. They use the estimates of
the higher headquarters and modify them with available information.
R e c e n t a n d P r e s e n t S i g n i f i c a n t A c t i v i t es
A-5
vulnerability to a flank attack is carried forward to conclusions of the
intelIigence estimate. In the second statement, the open flank apparently
is not a vulnerability and is not carried any further. Another example:
If the guerrilla forces are poorly equipped with antitank means of all
t y p e s , t h e f a c t i s s t a t e d u n d e r l o g i s t i c s , and the extent ‘to which this is
an exploitable vulnerability is discussed briefly. The intelligence
o f f i c e r m i g h t s t a t e : “The guerrilla forces in our area are poorly equipped
with antitank means. They cannot effectively defend against armored
vehicles” The inability to defend against armored vehicles is carried
forward as a vulnerability to conclusions of the intelligence estimate.
Figure A-2 shows some examples of enemy peculiarities and weaknesses.
PERSONNEL
INTELLIGENCE
OPERATIONS
A-6
- - I n a d e q u a t e a i r o r a r t i l l e r y s u p p o r t , or nuclear weapon del ivery
systems.
LOGISTICS
CIVIL-MILITARY OPERATIONS
PERSONALITIES
Paragraph 4. List the enemy courses of action which tha enemy adopts
and which influences the accomplishment of the friendly mission, either
favorably or unfavorably. A properly stated enemy capability indicates
what the enemy can do, when and where the enemy can do it, and in what
strength. For example, “Attack (what) now (when) along our front (where)
with five motorized battalions supported by alI available nuclear weapons,
a r t i l l e r y a n d a i r ( s t r e n g t h ) . ” Another example: “Conduct harassing
operations (what) at any time (when) in our area (where) with about 200
guerrillas equipped only with small arms (strength).”’
A-7
The evidence considered in the analysis and discussion of enemy
capabiIities includes characteristics of the AO and positive or negative
evidence of enemy activity, listed under recent and present significant
activities. A major obstacle across part of the friendly area is evidence
that attack elsewhere is more likely. Low ceilings and Iow visibility are
evidence that the enemy is not using all available aircraft. Open, flat
areas without any appreciable cover are evidence that the enemy does not
use guerrilla or infiltration forces.
CONCLUSIONS
0
Total effects of the AO on friendly courses of action.
0
Courses of action most Iikely to be adopted by the enemy,
including their relative probability of adoption.
0
Effects of enemy vulnerabil ities that can be exploited.
A-8
include the enemy doctrine and practices, a s w e l l a s p o s i t i v e o r n e g a t i v e
enemy activity, If enemy activity is not definitive enough to justify
selection of the enemy’s most probable course of action, the officer
determines the most probable one based on the characteristics of the AO,
e n e m y d o c t r i n e , p r a c t i c e s , and previous experiences.
If more than one enemy course of action is stated, they are Iisted in
the order of their probability of adoption.
A-9
(Classification)
b. Terrain.
(Classification)
(Classification)
A-n
(Classification)
(Classification)
Figure A-3. Annotated intelligence estimate (continued).
A-12
(Classification)
(Classification)
Figure A-3. Annotated inteiiigence estimate (continued).
A-13
(Classification)
(Classification)
A-14
(Classification)
OFFICIAL:
G2’s Signature Block
(Classification)
A-15
(Classification)
1. MISSION. 52d Div defends along Dry Creek and prepares to attack on
order.
2. AREA OF OPERATIONS.
a. Weather.
(a) P r e c i p i t a t i o n w i l l n o t h i n d e r c r o s s c o u n t r y m o v e m e n t
except in the low drainage areas of Minertown.
(Classification)
A-16
(Classification)
b. Terrain.
(c) Obstacles.
(e) AAs.
(Classification)
c. Other Characteristics.
3. ENEMY SITUATION.
--27th MRR.
--30th MRR.
--31st MRR.
--121st Tk Regt (unlocated).
--23d MRR.
--37th Tk Regt.
(Classification)
—. . —... . . . . . . ..
Figure A-4. Sample division inteiilgence estimate (Continued).
A-18
(Classification)
c. Strength.
(2) Enemy’s aerial recon and tactical air flights have increased
in the last 36 hours, particularly along the I ine of contact.
(4) Artillery fire from the enemy has become more intensive in
the last 24 hours.
(Classification)
A-19
(Classification)
(6) Enemy has begun to employ smoke along the forward slope of
Hill 702.
(3) Operations.
4. ENEMY CAPABILITIES.
a. Enumeration:
(2) Attack at any time along AA 2 with four MRBs and one tank
battalion supported by normal divisional and regimental artillery groups.
(Classification)
A-20
(Classification)
(9) The enemy can attack our area with an undetermined number of
fighter, ground attack, and bomb sorties daily. The maximum number of
daily sorties mounted in our area has been 60.
(Classification)
(Classification)
A-22
(Classification)
5. CONCLUSIONS.
b. Weather and Terrain. The weather and terrain favors our defense.
The beat defensive area is the high ground east of Dry Creek. The best AA
into our defensive sector is AA 1.
(Classification)
A-23
(Classification)
d. Enemy Vulnerabilities.
KROOK
BG
OFFICIAL:
/s/ Bagger
BAGGER
GS
Annex: A - - S i t u a t i on Overlay ( o m i t t e d )
Distribution: A
(Classification)
INTELLIGENCE ESTIMATE NO _.
References: maps, charts, or other documents.
Time Zone Used Throughout the Estimate: Zulu
(Classification)
(1) Nonmilitary.
(2) Military.
(Classification)
A-26
(Classification)
(5) Communications.
(2 Supporting capabilities.
(Classification)
A-27
(Classification)
/s/
G2 or S2
(Commander if distributed
outside headquarters)
ANNEXES:
Distribution: (If distributed only.)
Authentication: (G2 or S2 authenticates if commander signs estimate.)
(Classification)
A-28
INTELLIGENCE ANNEX TO THE OPORD OR OPLAN
(Classification)
Copy no — of —Copies
Issuing headquarters
Place of issue (may be in code)
Date-time group of signature
Message reference number
(Classification)
6. COUNTERINTELLIGENCE.
(Classification)
A-30
(Classification)
Acknowledge
Authentication:
Appendixes:
Distribution:
(Classification)
A-31
(Classification)
Copy 4 of 5 Copies
20th Inf Div
Zelle (4671), Buttano
1019OOZ Sep 45
BQ 13
2. INTELLIGENCE REQUIREMENTS.
a. PIR.
(1) Will enemy reinforce the forces along the Flood River before
the time of attack? If so, when, where, and with what forces? Special
attention to the mechanized regiment and the medium tank regiment in
vicinity of Burg.
.
(2) Will enemy employ nuclear weapons against us? If so, when,
where, how many, of what yields, and by what delivery means?
b. IR.
(3) Will enemy use CB agents? If so, what agents, when, how, and
where?
(Classification)
A-32
(CLASSIFICATION)
(2) 2d Bale.
activity.
(3) 3d Bale.
(Classification)
A-33
(Classification)
(Classification)
A-34
(Classification)
(6) 20 Avn.
Classification
A-35
(Classification)
3 Location, size, a n d t y p e o f u n i t i n v i c i n i t y o f H i l l
536 (north of Burg) .
b West on Highway 2.
c West on Highway 4.
(a) S t a t u s o f c o n s t r u c t i o n o f d e f e n s i v e p o s i t i o n s a n d
m i n e f i elds on and to the east of Flood River.
(Classification)
A-36
(Classification)
(a) A s obtained--
3 Troop concentrations, i n c l u d i n g t y p e s o f v e h i c l e s , e a s t
of Highway 25 within the divisional area of interest.
a Hill 503--CR9847.
(Classification)
A-37
(Classification)
b West on Highway 2.
c West on Highway 4.
6 Command p o s t s , s u p p l y p o i n t s , a n d m e d i c a l f a c i l i t i e s
east of Highway 25.
(a) As obtained--
1 Troop concentrations, i n c l u d i n g t y p e s o f v e h i c l e s , e a s t
of Highway 25 within the divisional area of interest.
(Classification)
A-38
(Classification)
b West on Highway 2.
c West on Highway 4.
(Classification)
A-39
(Classification)
(Classification)
A-40
(Classification)
6. COUNTERINTELLIGENCE .
a. Appendix 2, Cl.
None.
Acknowledge.
POWERS
MG
OFFICIAL:
/s/AUSTIN
AUSTIN
G2
(Classification)
ENEMY .
Figure A-10 shows the Joint Chiefs of Staff (JCS) INTREP format.
MESSAGE HEADING
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
SECURITY CLASSIFICATION AND CODE WORD OR NICKNAME
INTREP (number) AS OF DATE-TIME GROUP (GMT)/MO/YR
BODY Installation, Event, and Sighting Format
Reference to previous message, if any.
Source reliability evaluation.
Concise narrative description.
REMARKS: Any other information not covered in
the body of the report.
A-43
INTELLIGENCE SUMMRY
A-44
NOTE: In joint service operations, use the format in Figure A-12.
HEAD I NG
PRECEDENCE
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
A-45
(1) Operations Involving Ground Forces. For unified or joint
operations in which ground forces are directly participating, not
specifically provided for in the subparagraph below, the UTM system
prescribed for the area concerned is used to the maximum extent
practicable in communications between ground forces and other forces
j o i n t l y e n g a g e d . When the use of the UTM system is impractical, latitude
and longitude is used.
(3) For Close Air Support of Ground Forces. When air forces
(including naval aviation) are acting in close air support of ground
f o r c e s , the UTM system prescribed for use by ground forces in the area
concerned is used.
f . AIR ACTIVITY. All enemy air activity that has occurred during the
p e r i o d ( C A S , a i r i n t e r d i c t i o n , AD, and reconnaissance affecting the
-
Figure A-12. Intelligence summary for joint service operations (continued).
A-46
operation is summarized, including location, date and time (Zulu), and
type of aircraft involved.
3. NEW OBSTACLES AND BARRIERS. List those identified during the period
by type and location.
5. NEW IDENTIFICATIONS.
A-47
9. BRIEF DESCRIPTION OF GAPABILITIES AND VULNERABILITIES. (Always
included.) State courses of action which the enemy most probably will
adopt.
A-48
(Classification)
copy No
Unit
Location
Date-time group
Message reference number
PERINTREP NO
Period Covered: (date and time to date and time).
References: Maps or charts.
Disposal instructions: (if any).
c. Airborne.
d. Irregular.
e. NBC operations.
f. EW.
(Classification)
A-49
g. O t h e r . (Normally includes other than combat arms; includes
appropriate comments not covered in other subparagraphs on reserves,
r e i n f o r c e m e n t s , new tactics, weapons and equipment, administrative
installations, combat service support, and technical intelligence.)
(1) Losses.
c. Tactics,
d. Training.
e. Css .
f. Combat Effectiveness.
g. Miscellaneous Data.
b. Espionage.
c. Sabotage.
d. Subversion.
f. MiscelIaneous.
(Classification)
A-50
(Classification)
a. Enemy Capabilities.
b. Enemy Vulnerabilities.
c. Conclusions.
Authentication:
DISTRIBUTION:
..
(Classification)
A-51
HEAD I NG
PRECEDENCE
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
BODY
c. CLIMATE AND WEATHER. Discuss weather during the period which will
affect operations.
A-52
g. ECONOMICS. Include only that specific economic information which
may be necessary for conduct of the current operation.
a. GROUND FORCES.
(6) New Tactics, Weapons, and Equipment. List new tactics and
equipment which may affect the mission and enemy capabilities.
b. AIR FORCES.
f. AIRBORNE UNITS.
A-54
(3) New Tactics Weapons, and Equipment. List new tactics,
weapons, and equipment which may affect the mission and enemy
capabilities.
(a) KIA.
1 Body count.
2 Estimates.
(c) Captured.
..
Figure A-14. Sample periodic intelligence summary (continued).
A-55
b. IDENTIFICATION OF AIR FORCES.
(a) Aircraft.
3 Confirmed damaged in t h e a i r .
5 Probable destroyed.
6 Probable damaged.
1 Destroyed.
2 Damaged.
(c) Personnel.
1 KIA.
a Confirmed.
b Estimated.
2 WIA (estimated).
3 Captured.
A-56
(6) Nuclear Capability. Report nuclear weapons observed,
i n c l u d i n g t y p e , y i e l d , numbers, method of del ivery, and enemy doctrine
concerning their use.
1 Confirmed sunk.
2 Probable sunk.
3 Damaged.
1 Destroyed.
2 Damaged.
(c) Personnel .
1 KIA.
a Confirmed.
b Estimated.
2 WIA (estimated).
3 Captured.
5. COUNTERINTELLIGENCE.
A-58
Table A-1. Sample reconnassance exploitation report annotated format.
A-59
The SUPIR reports on all significant targets covered by the mission
and not included in other reports or when supplemental information is
required. The SUPIR is completed at higher headquarters only if they
decide it is necessary.
Table A-2 shows the format used for both the IPIR and the SUPIR. This
format also is used for joint service operations.
A-60
INTERROGATION AND TRANSLATION REPORTS
A-61
(Classification)
REPORT NO CY NO _ DATE-TIME(Zulu)
(Numbered sequentially)
LANGUAGE USED
DOB BIRTHPLACE
(day, mo, yr) (city, county, or country)
NATIONALITY RACE
LANGUAGES UNIT
(list and include (interrogees’ parent unit listed
proficiency) completely to highest headquarters)
CIVILIAN CAREER
(summarize prisoner’s premilitary career)
MILITARY CAREER
(summarize)
ASSESSMENT
(intelligence, experience, cooperation, and reliability of the
i n t e r r o g e e , NOT the information)
SPECIALIST KNOWLEDGE
(knowledge of technical subjects or equipment)
DOCUMENTS
(carried at time of capture; include money or valuables)
EQUIPMENT
(of intelligence interest) (personal equipment or weapons)
(Classification)
A-62
(CLASSIFICATION)
INTG TEAM
UNIT
(place and coordinates)
Maps
(list all maps used and indicate sheet name, number, and scale)
PART I
CIRCUMSTANCES OF CAPTURE
(summary of details of capture, including
date and time, location or coordinates, and
capturing unit)
ASSESSMENT
( i n t e l l i g e n c e , e x p e r i e n c e , reliabiIity) (Concise statement
of the interrogator’s assessment of the prisoner--not of
the information acquired)
CATEGORY: A B C D
(circle one to describe prisoner’s intelligence potential, as
indicated) :
(CLASSIFICATION)
A-63
(CLASSIFICATION)
B Prisoner who has enough information about the enemy or any subject of
value to intelligence, in addition to information of tactical value,
to warrant a second interrogation.
DOCU MENTS
(list documents of intelligence value taken from the prisoner)
EQUI PMENT
(list equipment of intelligence value taken from the prisoner)
PART II
a. Organ ization
(summarize the enemy organization as stated by the
p r i s o n e r , including equipment authorized and on hand)
i). Strength
(personnel strength, o f f i c e r a n d e n l i s t e d , a u t h o r i z e d a n d
assigned!
c. Disposition
(location of enemy units known to the prisoner)
3. MISSION
(statement of enemy missions, beginning with the lowest unit)
a. supply
(information concerning status of SUPPI ies, known shortages
and deficiencies)
(CLASSIFICATION)
A-64
(CLASSIFICATION)
b. Losses
(statement of personnel and equipment losses known to
prisoner)
c. Replacements
(number and date received, sufficiency, and so forth)
6. PERSONALITIES
(list by name, rank, organization, duties, and
characteristics)
7. MISCELLANEOUS .
a. Morale
b. Tact i cs
(new or unusual tactics)
c. Obstacles
(location, coordinates, type)
d. Other Information
( o t h e r information of intelIigence value not
covered above)
8. REMARKS
NAME
(of Interrogator)
GRADE
TRANSLATOR
(if used)
A-65
(CLASSIFICATION)
DATE :
-0:
1. CONTROL DATA.
1. DOCUMENT NUMBER,
5. DATE AND TIME OF CAPTURE: (date and time (Zulu) and place,
including coordinates; i f o b t a i n e d f r o m a n i n d i v i d u a l , i d e n t i f y ) .
6, PLACE OF CAPTURE.
8. CIRCUMSTANCES OF CAPTURE.
9. TRANSLATOR.
(CLASSIFICATION)
A-66
(CLASSIFICATION)
DATE : 231500ZAug88
TO: G2, X Corps
My dear Serzhen’ka:
.
It has been a long time since I received a letter from you. How are
and where are you? The last time you wrote that fighting was going on
around you all the time, and this worries me a lot. Take care of
yourself. There have been many changes at home. Your mother, despite her
age, had to go to work in the factory. They make tanks there, but the
sign over the entrance says this is a sugar plant. I don’t know why they
do this. At the school where I work, we were also told to go and work at
the same plant. They are going to close the school. Everyone has either
to go to the front or work in the war industry. This is necessary in
order to speed up the victory over the enemy of our country. I would be
more at ease if I knew that you are alive and well. Please write as soon
as you can.
Your KATHY.
(CLASSIFICATION)
A-67
(CLASSIFICATION)
WORKING PAPERS
B. CAPTURE INFORMATION:
2 . CAPTURING UNIT:
3 . DATE-TIME OF CAPTURE:
4 . PLACE OF CAPTURE:
7. Circumstances of Capture:
c. BIOGRAPHICAL INFORMATION:
(CLASSIFICATION)
WORKING PAPERS
A-68
(CLASSIFICATION;
WORKING PAPERS
5. Duty Position:
D.
.! .
Physical Condition of Captive:
‘7
.-. Uniform, !nsignia (type and condition):
4 . Assessment of Knowledgeability:
A. SCREENER’S RECOMMENDATIONS:
2 . Place of Screening:
3. Screening Code:
2. Interrogate:
3. A c t i o n :
(CLASSIFICATION)
WORKING PAPERS
3. CAPTURE INFORMATION:
C. BIOGRAPHICAL INFORMATION:
(CLASSIFICATION)
WORKING PAPERS
D. OBSERVATIONS
A. SCREENER’S RECOMMENDATIONS:
2. Place of Screening: IPW See, 123d Ml Bn Ml, 23d Inf Div (Mech
2. Interrogate: YES
3. Action: None
(CLASSIFICATION)
WORKING PAPERS
A-71
Figure A-21. Sample blank tactical interrogation report.
A-72
(CLASSIFICATION)
Working Papers Date
1. . List of documents:
-’l
L . Details of money and valuables:
1. Personal Equipment:
2. Weapons:
A. SUMMARY:
B. TEXT:
i. MISSIONS
(i) TOC:
(2) Fut:
(3) Past:
b. Unit:
(1) Pres:
(2) Fut:
(3) Past:
(CLASSIFICATION)
Working Papers
A-73
(CLASSIFICATION)
Working Papers Date
c. Unit:
(1) Pres:
(2) Fut:
(3) Past:
2. COMPOSITION:
a.
b.
c.
d.
e.
3. STRENGTH:
a. Personnel :
.
(1)
(2)
(3)
(a)
(b)
(a)
(b)
(CLASSIFICATION)
Working Papers
A-74
(CLASSIFICATION)
Working Papers Date
(CLASSIFICATION)
I Working Papers
A-75
(CLASSIFICATION)
Working Papers Date
4. DISPOSITIONS
b.
5. TACTICS:
a. Offensive:
b. Defensive:
c. Special Operations:
6 TRAINING:
a. Individual:
b. Unit:
c. Specialized:
7 COMBAT EFFECTIVENESS:
a. Losses:
(1) Personnel :
(2) Equipment:
b) Replacements:
(1) Personne!:
(2) Equipment:
c Reinforcements:
(1) Personnel:
(2) Equipment:
(CLASSIFICATION)
Working Papers
A-76
(CLASSIFICATION)
Working Papers Date
d. Combat Experience:
e. Morale:
8. LOGISTICS:
(1) Weapons:
(2) Ammunition:
(1) Vehicles:
(2) POL:
(1) Food:
(2) Water :
d. Communications Equipment:
e. Medical:
(3) Personnel:
(4) Facilities:
f. NBC Equipment:
(1) Individual:
(2) Vehicular:
(CLASSIFICATION)
Working Papers
A-77
(CLASSIF!CATION)
Working Papers Date
3 MISCELLANEOUS :
a. Personal ities:
d. Passwords:
ChalIenge: Countersign:
(NOTE: If more than one password is known, use the following chart.!
e. Obstacles:
(1) Enemy:
(2) NATO:
f. PSYOPS :
(1) Enemy:
(2) NATO:
(CLASSIFICATION)’
Working Papers
TACTICAL
INTERROGATION REPORT
A. PERSONAL PARTICULARS:
B. CAREER :
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report.
A-79
(CLASSIFICATION)
WORKING PAPERS
A. SUMMARY:
B. TEXT :
1. MISSIONS
a. EPW
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report (continued).
A-80
(CLASSIFICATION)
WORKING PAPERS
(2) FUT : At 181330 AUG 99, was to drive PO, 61MRR, 56MRD and
PO , 1MRB, 61MRR, 56MRD to a U/l unit 61MRR, 56MRD.
(Hearsay: PO, 61MRR, 56MRD. DOI: 181130 AUG 99).
a. 61MRR had one HQ; three MRBs, dsg 1,2,3; one tk bn; one 122mm how
bn; one engr co; one recon co; one supply and svc pit; one med co;
one signal co
(Classification)
WORKING PAPERS
-.
Figure A-22. Sample completed tactical interrogation report (continued).
A-81
(CLASSIFICATION)
WORKING PAPERS
b. Each MRB, 61MRR had one HQ; three MRC dsg 1,2,3; one mortar btry;
one commo pit
(a) UNK No x 9mm PM pistols (at least one ea off, HQ, 61MRR)
( a ) 3 x R - 1 3 0 t r a n s c e i v e r ( t r a n s ) ( o n e e a U A Z - 4 6 9 , HQ, 61MRR)
(cLASSIFICATION)
wORKING PAPERS
A-82
(cLAsSIFICATION)
WORKING PAPERS
4. DISPOSITIONS
b. Assembly area, 61MRR, 56MRD Ioc vic NB696163 (center of mass, and
measures lkm N to S and E to W) SW of Kranlucken (NB7017).
Collocated units: None. Scty measures: UNK No x perimeter
guards (FUD UNK). DOI: 172330 AUG 99.
5. TACTICS: UNK
c. Specialized: UNK
(CLASSIFICATION)
WORKING PAPERS
A-83
(CLASSIFICATION)
WORKING PAPERS
a. Losses : (61MRR)
c. Reinforcements: UNK
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical Interrogation report (continued).
A-84
(CLASSIFICATION)
WORKING PAPERS
(1) Vehicles: (HQ, 61MRR) - All vehicles are in good condition,
Drivers are constantly working on vehicles. Spare parts are
available from chief of Motor Transport, HQ, 61MRR on an as
needed basis, but all drivers steal parts from each other
occasionalIy. Tool kits are stored in each vehicle.
(2) Water-: (HQ, 61MRR) - U/l Water trailer (FUD UNK) at HQ,
61MRR supplies water as needed.
f. NBC Equipment: (HQ, 61MRR) - All NBC equip was in good condition
due to inspection by technical officer, 61MRR first week of
Aug 99.
(CLASSIFICATION)
WORKING PAPERS
a. Personalities: (61MRR)
e. Obstacles UNK
f. PSYOPS : UNK
(CLASSIFICATION)
WORKING PAPERS
A-86
BOMBING. SHELLING. AND MORTARING REPORTS
A-87
(CLASSIFICATION)
A. UNIT OF ORIGIN. (use current call sign, address group or code name) .
D- . TIME FROM.
E. TIME TO.
(CLASSIFICATION)
A-88
NBC ATTACK REPORTS
0 NBC-6 . R e p o r t u s e d t o d e t a i l i n f o r m a t i o n o n c h e m i c a l o r b i o l o g i c a l
attacks.
NBC-1 and -4 reports are prepared by the unit under attack or a unit
observing an attack. These reports are submitted through cormmand,
i n t e l I i g e n c e , or FA communications channels to the designated headquarters
TOC by the fastest means available. Initial enemy use of NBC weapons is
always reported to the theater commander, through the chain of command, by
the fastest means with a FLASH message precedence.
0
An initial NBC-1 nuclear report to the unit’s next higher
headquarters with a FLASH message precedence.
0
Subsequent NBC-1 nuclear reports, which are transmitted to the
unit’s next higher headquarters, with an IMMEDIATE message
precedence, giving follow-up data.
A-89
0
An initial NBC-1 chemical or biological report, to its next higher
headquarters, with a FLASH message precedence. The next higher
headquarters forwards the initial NBC-1 chemical or biological
report through command channels, to the NBC coIIection center, with
the same message precedence.
0
Subsequent NBC-1 chemical or biological reports, to the unit’s
next higher headquarters, with an IMMEDIATE message precedence,
giving follow-up data. The next higher headquarters forwards
subsequent NBC-1 chemical or biological reports through command
channels, to the NBC collection center, with the same message
precedence.
The NBC control center is normally the NBCE of the tactical operations
center at field army. It consolidates and evaluates NBC reports received
from subordinate commands and USAF, Marine Corps, and civilian
instalIations and agencies. It directs reconnaissance and survey efforts;
transmits evaluated NBC data to subordinate commands and adjacent area
commands; and submits appropriate reports to higher headquarters, adjacent
commands, and national agencies. If there is no NBCE, the G3 assumes
these responsibilities.
NBC-1 REPORTS
NBC-1 reports follow the same format as SHELLREPs, MORTREPS, and
BOMBREPs. The words “Type of Report,” and the letters “B,” “’D,” “’H,” or
either “C or “F" always are reported. Other items are optional. Tab I e
A-3 shows the letter explanation for NBC-1 reports. Table A-21 shows the
master Iist of available letters.
A-90
A-91
Table A-4. Initial nuclear report example.
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
A-92
Table A-6. Subsequent NBC-1 nuclear report example.
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION) ..
(CLASSIFICATION)
A-93
NBC-2 REPORTS
NBC-2 reports are used for passing evaluated data of an NBC attack.
They are normally based on two or more NBC-1 reports and include an attack
location and in the case of a nuclear detonation, an evaluated yield.
Tables A-8 and A-9 show examples of NBC-2 (nuclear) and NBC-2 (chemical)
report messages.
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
NBC-2 reports include the attack time, location, and, in the case of a
nuclear detonation, an evaluated yield. Letters “A,’” “D,”’ “F,” “H,” and
“N”” are repeated as often as necessary to produce a summary report. Other
letters may be added; however, the letters mentioned must be included in
the report. Table A-10 shows the letter explanation for NBC-2 reports.
A-94
Table A-10. Letter explanation for NBC-2 report.
LETTER MEAN I NG EXAMPLE EXAMPLE
NUCLEAR CHEMICAL AND BIOLOGICAL
Precedence
Date-time (local or Zulu
t i m e , state which)
Security Classification
From
To
Type of Report NBC-2 (NUCLEAR) NBC-2 (CHEMICAL)
A-95
NBC-3 REPORTS
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
A-96
Table A-13 explains the letters in the NBC-3 nuclear and chemical
report examples, Other letters from the master list, are added at the
users’ discretion.
NOTE: When the effective windspeed is less than 8 kph, the NBC-3 report
consists of the letters “D,’” “F,’ and “Z.” “Z” contains three digits
only, (the radial distance of zone l).
A-97
NBC-4 REPORTS
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
A-98
Table A-16 explains the items in the examples for NBC-4 nuclear and
chemical report formats. The letters “Q,”’ “R,” and “S” are repeated as
often as necessary. Users of NBC-4 reports are not confined solely to the
use of the letters shown in the examples; other letters from the master
list, (see table A-21), are added at the users’ discretion.
NOTE: Radiation dose-rates are measured in the open, one meter above the
ground. Other conditions are specified in the message as part of line
ROMEO .
Precedence
Date-time (local or Zulu time, state
which)
Security Classification
From
To
Type of Report NBC-4 (NUCLEAR)
R. Dose-rate (cGy/hr)
(this is NOT normalized
to H + 1 hour). The words
“ i n i t i a l , ’ ” ‘ increasing, ”
“peak,”’ or “decreasing,”
may be added (correlation
factor information is
included if shielded dose-
rate readings are reported).
A-99
NBC-5 REPORTS
N B C - 5 r e p o r t s i d e n t i f y t h e area of contamination or hazard. Tab I es
A-17 and A-18 show examples of an NBC-5 report messages.
(CLASSIFICATION)
(CLASSIFICATION)
(CLASSIFICATION)
A-1OO
The NBC-5 report is most useful when sent as a map trace or overlay
( i f t i m e a n d d i s t a n c e p e r m i t ) . When the contamination arises from a
single threat or unidentified nuclear burst, the dose-rate always refers
to H+1 hour, and the letter “’T” is used. When there have been several
nuclear detonations at different times or on different days and no single
H+1 hour is possible, the dose rates are reported as a specified item
using the letter “’O.” Letters “O” and “T” are, therefore, alternatives;
both cannot be used in the same report. Table A-19 explains the letter
designations used in NBC-5 reports.
NOTE : When requested decay rates are to be transmitted, use the letter
“R. “
Precedence
Date-time (local or
Zulu time, state
w h i c h )
Security Classification
From
To
Type of Report NBC-5 (NUCLEAR) NBC-5 (CHEMICAL and
BIOLOGICAL)
A. Strike serial A. 24 A. 1
numbers causing
contamination
(if known)
o. Reference date-time
for estimated contours
(see note (2) above)
when not H+1 hour
A-101
Table A-19. Letter explanation for NBC-5 reports (continued).
u. 1,000 cGy/hr
contour I ine coordinates
0
Red for 1 ,000 cGy/hr.
0
Green for 300 cGy/hr.
0
Blue for 100 cGy/hr.
0
Black for 20 cGy/hr,
A-102
Yellow is used for chemical and biological contamination or hazardous
a r e a s . A d d i t i o n a l l e t t e r s , including those shown in the examples in Table
A-19, are used. Letters from the master list in Table A-21 are added at
the users’ discretion.
72
A-103
NBC-6 REPORT
ALFA coo I
DELTA 200430Z
ECHO 200435Z
FOXTROT LBZO0300 to LB208304 Actual
GOLF Aerial spray
HOTEL Toxin
INDIA 2 Aircraft
KILO Rolling hills, mostly open
MIKE Enemy broke contact just before the
a t t a c k , then bypassed on right
f I ank
QUEBEC Soil sample taken at LB200300
YANKEE Downwind direction 270 degrees, wind
speed 015 kph
ZULU BRAVO This is the only biological attack
in our area
A- 104
MASTER LIST
A-105
Table A-21. Master list of letters (continued).
LETTER MEAN I NG MEAN I NG
A- 106
Table A-21. Master list of letters (continued).
A-107
ANALYSIS OF AREA OF OPERATIONS
The BMNT and the EENT are the beginning and end, respectively, of
enough light for limited visibility. The BMCT and the EECT are the
beginning and end, r e s p e c t i v e l y , o f a d e q u a t e I i g h t f o r l a r g e - s c a l e
operations.
Moon phases and other phenomena, like atmospheric conditions and star
b r i l l i a n c e , also influence night operations. During full moonlight,
conditions of visibility sometimes approach those of daylight. Such
conditions need to be anticipated as they influence friendly and enemy
courses of action such as attacks, p a t r o l l i n g , a n d c h a n g e s i n
dispositions.
b. Terrain.
(1) Relief and Drainage System, Drainage and ridge lines are
b a s i c e l e m e n t s i n s t u d y i n g t e r r a i n , as t h e y c l e a r l y i n d i c a t e t h e g e n e r a l
shape of the ground. A complete study of relief and drainage includes
detailed information about slope, configuration, elevation of ground
forms; and depth, width, tide data, and conditions of banks and bottoms of
streams and rivers. These items are portrayed graphically on maps.
A-108
(3) Surface Materials. Surface materials are best presented on
colored or marked overlays. Soil maps made by the agricultural services
of various countries are particularly valuable. The information contained
in soil maps frequently is translated into a trafficability map and a map
of areas susceptible to high levels of induced radioactivity. A
trafficability map based on weather forecasts are colored or marked to
indicate degrees of trafficability effectively shows areas suitable for
cross-country movement.
a. Tactical Aspects.
A-109
(b) F i r e , as used in the analysis of the battlefield area,
includes the FofFs of all weapons and characteristics of weapons del ivery
systems affected by weather and terrain. For example, gusty surface winds
affect the use of projectiles. High, irregular terrain features or the
absence of overhead mass clearance limit FofFs. A FofF is an area that
weapons can cover effectively with fire from given positions. Although
observation is essential to effective control of fire, the best
observation does not always guarantee the best FofF. An ideal FofF for
flat-trajectory weapons is an open area in which the enemy can both be
seen and has no protection weapons fire.
(c) Concealment and cover are desirable for both the attack
and the defense. If troops move forward under the concealment of woods,
fog, or a moonless night, the chances of achieving surprise are greater.
If troops move protected from the enemy’s fire by ditches, embankments, or
walls, the attack is more effective. In a defensive situation, friendly
forces seek to defend in an area which offers both concealment and cover
but does not provide covered approaches for the enemy.
A-11O
(3) Obstacles.
A-III
(b) Key terrain varies with the level of command. For
example, to an army commander, a large city affords marked advantages as a
communications center. To a division commander, the high ground which
dominates the city is more important, a n d t h e c i t y i t s e l f i s a n o b s t a c l e ,
In the defense, key terrain is usually within the assigned sector and
within or behind the selected defensive area. Some examples of key
terrain are--
0
T e r r a i n w h i c h gives good observation over AAs to and into the
defensive P O S t i o n .
0
Terrain w h i c h permits the defender to cover an obstacle by fire.
A-112
o
Important communication centers which affect command
communications and the use of reserves.
K e y t e r r a i n a l s o i s f o r w a r d o f t h e d e f e n s i v e a r e a or i n a d j a c e n t
sectors. For example, a terrain feature along the FLOT or in an adjacent
sector which gives the enemy good observation over defended localities,
corrrnunication routes, or enemy AAs is key terrain when active measures are
taken to reduce the enemy advantage. The defender moves positions forward
to include the feature or take action to minimize the enemy advantage by
the use of fire, chemicals, smoke, concealment, and cover.
The use of a ridge approach depends upon the width and shape of the
ridge, the size and deployment of the units involved, and the distance to
t h e e l e v a t i o n o f a d j a c e n t r i d g e s . A ridge approach usually has the
advantage of good observation; however, t h e r e i s l i t t l e p r o t e c t i o n f r o m
enemy fire on the ridge. The best AA on a ridge is often slightly below
the topographical crest, with sufficient force on the crest to control it.
A-113
° EaaiIy recognized terrain features.
0
Length of flight paths.
A-114
In studying the influence of the area, consideration is given to
effects cm matters such as availability of adequate routes for LOC,
facilities for maintenance and storage, construction resources, public
health situation, required shelter for administrative facilities,
a v a i l a b i l i t y o f l a b o r , m a i n t e n a n c e o f d i s c i p l i n e , law a n d o r d e r , a n d
control of refugees.
A-115
*
Date-time roup when the analysis is signed followed by the message reference number
(example: SB2) used when the analy sis is distributed outside the adquarters for the purpose
of acknowledgment in the clear. All appended material analysis having the suns
distribution bears the sane reference number.
The title Iine identifies the analyses by number (consecutive throughout the calendar year).
Reference I ist maps, charts, or other documents requ i red to understand the analy s is.
References to maps inc I ude the map series number (country or geograph ic area, ifrequired),
sheet number (and name, if required, edition and scale (if required).
Paragraph 1b states the mission and any other I imi t ing considerat ions such as t ime
limitations, the commander’s plan of action, and enemy capabilities.
Paragraph 2 is Iisting of pertinent facts for use as a basis for the succeeding paragraphs.
Paragraph 2a lists or.refers tO other docunments containing (for the period under study)
meteorlogical conditions to, Include precipitation, fog, cloud condltlons, temperature,
relative humidity, surface winds, effective winds (or winds aloft), atmospheric pressure,
I ight data to inc Iude moon phases, moonrise and moonset, and other geodetIC data as
appropriate. When appropriate, include magnetic phenomena.
Paragraph 2b(l ) describes conf igurat ion of the ground, including slopes, for personnel and
vehicles and critical relief for equipmnt dependent on configuration and conditions of
streams, including depth, slope, and condition of banks and bottom, and location of crossing
sites. Named localities are located by grid coordinates the first time they appear in the
anal ysis. Grid coordinates are repeated onIy if requ i red for ease of reference.
Paragraph 2b(l) also makes maximum use of special colored maps or overlays. Under each
characteristic include facts to assist in subsequent determination of the effects of the
character ist i c on the use of nuc I ear weapons, chemical agents, and important devices and
equipment used implement ing courses of action (do not include here the interpretation of
these effect on friendly or enemy possible courses of action).
Paragraph 2b(2) indicates wooded areas, including type, location, size, and shape of trees,
diameter of trunks, density, crown cover, and undergrowth incIude types of natural and
cuItivated vegatation of norwooded areas.
A-117
Figure A-25. Example and explanation of analysis of the AO (continued).
A-116
Paragraph 2b(3) indicates the type and distribution of soils and subsoils in the area and
soil trafficability. Include soiI content as it affects induced radiation, Use overlay if
material is extensive.
Paragraph 2b(4) indicates roads, raiIroads, bridges, tunnels, mines, towns, industial areas,
fortifications, and other features of miIitary significance; include type of construction.
Paragraph 3 anal yzea the facts in the previous paragraph to determine their infIuence on
factors affecting tactical and activities that are considered in the development of specific
courses of action. The axtent of the analysis depends on the mission, the means available to
accomplish the mission, and the possible means the enemy can use to prevent the
accomplishment of the mission. {n considering the factors under each aspect, include the
affects, as appropriate, of and on nuclear fires, chemical and enemy biological agents, and
important devices and equipment used in implement ing courses of action.
Paragraph 3a considers the effect that the .aerea wiII have on observation, fire, concealment
and obstacles; and deterimines key tarrain features and AAs.
A-119
Figure A-25. Example and explanation of analysis of the AO (continued).
A- 120
A-121
(CLASSIFICATION)
(e) HilI 326 (1199), This hilI dominates favorable terrain leading directly to tha eastarn
part of the division object iva.
(f) Hi I Is 305 (0490) and 322 (1394). This terrain system constitutes the division objactive.
‘he mission cannot be eccompl ishad without securing it. Control of this ridge is also neceeaary to
iont inuat ion of the attack to the south,
(5) Avenues of Approach. Annax N (Avenues of Approach Overlay).
(a) Availabla to anwny into our position.
!. Axis Hill 351 (9607)-Hill 361 (9709),
2. Axis Hill 339 (9206)-Hill 356 (9310).
3. Axis Hill 230 (0010)-Paris (9811)-Hill 364 (9613).
(b) Available to us into the enwey’s position.
1. Axis Hill 356 (9310)-Hill 339 (9206)-Hill 334 (9400)-Hill 306 (9997)-Hill 305
0490)-r idgs east thereof (Avenue A).
2. Axis Hi I I 361 (9709)-Hi I I 351 (9607)-Hi I I 359 (0004)-Auburn (0495)-ridge Hi I I 305
10460) to Hi I I 322 (1394) (Avenua B).
3. AXiS Hil I 361 (9709)-Hill 351 (9807)-Hill 359 (0004)-Hil I 271 (0702)-Hill 326
[1199)- Hi i i 322 (1394)-ridge west thereof (Avenue C).
4, Axis Hill 280 (0010)-Hill 262 (0803)-Hill 326 (1199)-Hill 322 (1394)-ridge west
[hereof (Avenue 9).
b. Conbat services Support Aspects.
(1) Personnal. Character ietisa of the aociaty are such that only unskilled civil ian labor wil I be
wai Iabla at any tisw. E@oymmt of civi I ian labor to mat ehort-tarw objactivas mst be balanced careful Iy
]ga inat the long-term needs of harvesting rams in ing crops.
(2) Logistics. Lack of civilian food and SUPPI ias may impose added logistic burdana on our forces.
hw pi I ferage can be axpected. FM resources beyond basic natural resources ara avai I able for mi I i tary use.
(3) Civil-mii itary operationa. Displscmmnt of civil ians through the impressing of civil ian labor
II the enemy and lack of food and supplies wil I creete problwna which, if not sontrol lad, can impact on
III I i tar operations. The existence of civil agencies capable of aaawsing the functions of gcvermwnt wi I I
help alf aviate the problsm. Hcwsver, these aganciaa wil I raquira guidanoe.
4. EFFECTS OF CHARACTERISTICS OF THE AREA.
a. Ef feet on Enemy Couraaa of Action.
(1) Effect on enemy defense.
(a) Tarrain now held by the enemy favors defanaa in depth from praasnt positions to the
division objective. The anwsy has axcal lent observation over al I Ms, and tha anwny’s f Ianke ara protected
by the rivers and canal on the west and artificial obeteclaa on the asst. The enwny’s beet dafenaa araae are
the enamy%cupiad forward PCS i t ions.
(b) The excel lent weather cond it ions favor anamy dafensa and parwi t tha enary to use
supporting firea with waximen effectiveness.
(2) Effects on anamy attack.
(a) The anawy’s beat M is the axis Hill 260 (0100) -Peris (BBll)-Hill 364 (9613),
(b) Uaathar cond it ions are such that the enuay wi I I not k able to maneuver tmrd our
poe it ions without being observed axcept during tha hours of darkness. Tha lack of prec ipitat ion favors
cross-country awbi I itv. (CIASSIFICATlfM)
Figurs A-25. Example and explanation of analysis of the AO (continued).
A-122
.
A-123
(CLASSIFICATION)
(3) Effect on enemy air,
(a) Weather and terrain favor enemy employment of air in the division AO.
(b) Terrain favors enemy delivery of nuclear weapons by Iow-level air attack.
(4) Effect on enemy use of nucIear weapons. Weather cond i t ions are favorable for enemy use of
nucIear weapons. Ef fect ive winds do not favor use of fallout. Rol I ing terrain, numerous folds in the
ground, and foliage wiII reduce thermal effects. Obstacles wiII be created by forest and tree blowdown.
(5) Effect on enemy chemical operations. Weather does not favor enemy use of chemicals. Terrain
favors use of persistent chemicals in the valIey forward of the enemy’s present defensive positions.
b. Effect on Own Courses of Action.
(1) The best natural AA into the enemy area is axis HiII 280 (0010)-Hill 232 (0803)-HiII 326
(1199)-HiII 322 (1394)-ridge west thereof (Avenue D). It is blocked by extensive minefields.
(2) The second best AA is axis Hill 361 (97091-Hill 351 (9607)-Hill 359 (0004)-HilI 271
(0702)- Hi I I 326 (1199)-Hi I I 322 (1394)-ridge west thereof (Avenue A).
(3) Weather and terrain do not favor our attack. We wiII not be able to maneuver toward enemy
posit i one without being observed except during the hours of darkness. The lack of precipitation wiII favor
cross-country mobi I ity except beIow 200 meters eIevation. Forest f ires end tree blowdown caused by use of
nuclear weapons in Nationel Forest will restrict mobiIity, observation, and FofFs.
(4) Effect on nuclear weapons. Weather conditions are favorable for the employment of nuclear
weapon. The rolIing nature of the terrain, numerous folds in the round, and foliage wiII reduce effects on
nuclear bursts. The wooded areas are dry and subject to extensive burning. Soil composition does not favor
the production of high intensities of radioactivity. Winds generally favor employment by our forces of
radiation effects of fallout from nuclear weapons.
(5) Effect of chemical agents. Weather conditions are favorable for our use of chemicals.
Ackncwledge.
MANN
OFFICIAL:
/s/ Foster
FOSTER
G2
Distribution: A
(CLASSIFICATION)
Figure A-25. Example and explanation of analysis of the AO (continued).
A-124
A-125
PATROL REPORT
(DESIGNATION OF PATROL)
TO:
MAPS :
B. Mission.
c. Time of departure.
D. Time of return.
1. (Not used.)
A-126
N. Additional remarks by interrogator.
o. Distribution.
FRAGOs are extracts from more detailed orders or are issued to change
previous orders. Like warning orders, these are usually brief oral or
written messages. Mission orders are a form of FRAGOs which provide
experienced commanders with the essentials of an order (such as a new
mission or change to a peavious mission).
0 Requests acknowledgment.
A-127
(CLASS IF I CAT ION)
COPY NO OF COP I ES
52d Mech Div
Xrayville (6271), Missouri
141300 5 January 1980
Frag Order YZ55
Reference. OPORD 7
Map, Series V661, Sheet 7061,
Edition 1, Scale 1:50,000
TASK ORGANIZATION. C/52 Avn OPCON 3d Bde
Eff 141400 5 Jan
1. SITUATION. Estimated enemy tank regt
delaying advance of 1st Ode
2 . MISSION. No change.
3. EXECUTION:
a. Div continues attack, 3d Bde bypasses
1st Bde in north and attacks in zone to
secure division objective. tst Bde becomes
reserve, follows 3d Bale. Priority of fires
to 3d Bale.
b. 1-42 FA 0S 3d Bale.
c. 1-40 FA GSR 1-42 FA.
4. SERVICE SUPPORT. No change.
5. COMMAND AND SIGNAL.
Tac CP currently at 3067.
ACKNOWLEDGE.
VON STEUBEN
MG
OFFICIAL:
YOUNG
G3
DISTRIBUTION: C
(Classification)
A-128
The MISREP is used by all a i r u n i t s - - s t r i k e o r a t t a c k , r e c o n n a i s s a n c e
o r s u r v e i l l a n c e , airlift, observation, and helicopter--to report the
results of all missions and significant sightings along the route of the
flight. The MISREP amplifies the inflight report and is normally
submitted within 30 minutes after aircraft landing to the tasking agency,
the requesting unit or agency, and to other interested organizations.
Upon completion of a tactical EW air task or mission, a debriefing is
conducted by intelligence personnel, and a MISREP is submitted.
Figure A-28 shows the MISREP format.
HEAD I NG
PRECEDENCE
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
BODY
.-. . . - .
Figure A-28. Mission report format.
A-129
ORDER OF BATTLE ANNEX TO THE PERIODIC INTELLIGENCE REPORT
Figure A-29 showa the format for an OB annex to the PERINTREP. Omit
items not applicable and renumber the remaining paragraphs.
(CLASSIFICATION)
ORDER OF BATTLE
Annex _ ( O B ) t o P E R I N T R E P N O _ _ _ Corps,
(CLASSIFICATION)
A-130
(CLASSIFICATION)
Acknowledge.
(SIGNATURE)
Appendixes:
Distribution:
OFFICIAL
(NAME OF G2)
A-131
Annex B (OB) to PERINTREP 29, 3 Corps, 201800 August 1985
ORDER OF BATTLE
a . All EPW captured during period are from the enemy 2d Combined Arms
Army. Unit identification include--(C-l)
2. STRENGTH.
(CLASSIFICATION)
A-132
(CLASSIFICATION)
3. TACTICS.
a. EPW from 16 MRD and 30 MRD state they have been instructed, in the
event their units are cut off, to continue fighting as guerilla units or
in small groups, live off the land, and destroy as much US Army property
as possible before gradually infiltrating back to friendly lines. (C-6) .
COMMENT . Considering enemy doctrine that tanks are the decisive arm,
the above tactic is possible, particular y in review of reports of
probable employment of 40 Tk Div (para 1 .
4. TRAINING.
5. LOGISTICS.
(CLASSIFICATION)
A-133
(CLASSIFICATION)
6. COMBAT EFFECTIVENESS.
a. EPW from 16 MRD and 30 MRD state morale is high but senior officers
are disgruntled because their units always receive difficult missions while
the 32 MRD and 56 Tk Div have, until recently, been assigned lass hazardous
missions. (F-6) .
7. MISCELLANEOUS DATA.
(CLASSIFICATION)
A- 134
(CLASSIFICATION)
COMMENT . Confirms p r e v i o u s l y o b t a i n e d i n f o r m a t i o n .
b. Unit history. Officer EPW stated that unit (32 MRR) trained
extensively in special tactics for assault of river lines. (F-6) .
Acknowledge.
LEE
LTG
OFFICIAL
GRANT
G2
(CLASSIFICATION)
A-135
STANDARD COLLECTION ASSET REQUEST FORMAT
0
The information needed.
0
Where to look for the movers, shooters, sitters, and emitters.
0
When to look.
0
When the information is needed.
0
What to look with, in some cases.
A- 136
A. Requester number.
B. Originator priority.
unit)).
F. Ouration--
0
Start date-time.
0
Frequency.
0
Stop date-time.
0
Latest acceptable date-time for information utility.
G. Location accuracy--
0
Required.
0
Acceptable.
1. Justification.
A-137
AERIAL RECONNAISSANCE AND SURVEILLANCE REQUEST
Any echelon initiates the request. It is used for both immediate and
preplanned mission requirements. The requester oompletes section I of the
request for each s p e c i f i c m i s s i o n . Normally, these requests a r e
transmitted by electrical means. The headquarters receiving the request
adds information required to val idate or complete the request.
Figure A-32 shows the aerial R&S request form. This format is the same as
the format used for joint service operations.
A- 138
Figure A-32. Aerial reconnaissance and surveillance request form.
A-139
Figure A-33 shows an air reconnaissance request and task format that
A- 140
Explanation of letter designators.
A-141
T. DATE AND TIME LIMITATIONS. Specify any time constraints on the
mission and follow-up actions. I n p a r t i c u l a r , specify the date and time
after which the information will no longer be of value. If the task
cannot be accomplished by this date, i t w i l l b e c a n c e l l e d a u t o m a t i c a l l y .
u. SPECiAL INSTRUCTIONS. G i v e i n s t r u c t i o n s o r i n f o r m a t i o n n o t p r o v i d e d
elsewhere that will aid in the planning or accomplishing of the mission.
This includes control arrangements, communications, security instructions,
details of own forces, or other pertinent entries.
A- 142
MEACONING, INTRUSION, JAMMING, AND INTERFERENCE REPORT
control station (in the case of FM voice), to the unit’s C-E officer. The
C-E off i c e r c o o r d i n a t e s t h i s r e p o r t w i t h t h e E W o f f i c e r , t h e i n t e l l i g e n c e
nonsecure equipment, reports are encrypted using the brevity Iist. See
FM 34-40 for additional information about MIJI reports and brevity lists.
LINE 11 - Remarks
A-143
ORAL REPORTS
0
I n f o r m a t o n b r i e f ng.
0
Decision briefing
0
Staff b r efing.
0
Mission briefing.
INFORMATION BRIEFING
DECISION BRIEFING
A- 144
1. INTRODUCTION.
2. BODY .
3. CLOSE .
b. Concluding statement.
.
c. Announce the next briefer, if any.
A- 145
1. INTRODUCTION,
2. BODY .
a. Assumptions. M u s t b e v a l i d , r e l e v a n t , a n d e s s e n t i a l t o a s o l u t i o n
to the problem. Omit i f t h e r e a r e n o n e .
3. CLOSE.
b. Request a Decision.
A- 146
APPENDIX B
0
Discuss two current tactical semiautomated systems: MICROFIX and
Intelligence Data Processing Set.
Using ADP systems, the analyst not only stores more information in
less space but the information is consolidated with other information and
with previously produced intelIigence. With this additional storage
capacity, the analyst accesses data bases such as IPB or ground OB data
from the same system. Consolidating this data onto one system lets the
B-1
analyst quickly and easily retrieve and manipulate the data and
information needed to support the intelIigence analysis process. W i h
more information to work from, the analyst develops a better picture o f
the battlefield environment. This reduces risk and uncertainty.
These tasks are continuous and require time and the ability to
assimilate large amounts of data quickly and accurately. The use of ADP
enhances the analyst’s abil ity to perform these tasks. It is a tool which
provides the analyst with the ability to access and use more information
and resources than manual processes provide.
B-2
Hardware
computer. Normally, the keyboard contains the same letters, numbers, and
punctuation keys as a standard typewriter. The computer keyboard also
contains special function keys which are used to initiate various computer
functions.
B-3
Processor. The processor is the component that executes the commands from
the programs. It controls the flow of information into, within, and out of
the computer. It also contains a limited amount of the computer’s memory.
Peripherals
Other components are integrated into the basic ADP system to provide
s p e c i a l i z e d o r e x p a n d e d c a p a b i l i t i e s . Whether or not components are added
to a system depends upon several factors. First, the original system is
designed so that it can be expanded. Second, expansion modules, add-on
components, o r p e r i p h e r a l s a r e c o m p a t i b l e w i t h t h e e x i s t i n g s y s t e m . Third,
software Iimitations and design constraints are considered. Depending upon
t h e s e f a c t o r s , some of the following components are integrated into a
tactical ADP system:
0
Video disk players (VDPs). VDPS al low map, text, photographs, or
any information that can be stored on video disks to be displayed on
a monitor.
0
Modems and communications networks. This equipment allows
information to be passed directly from one computer to another. The
modem connects directly to the telephone jack and transmits and
receives data through telephone Iines. Provides interface between
data processing systems over communications lines. Paper tape
reader/punch (PTR/P) devices provide the capability to generate and
read tactical RATT messages via paper tape.
0
Video cassette recorders (VCRs). Identical to VCRs used for home
e n t e r t a i n m e n t , some systems have programs that al low a VCR to be
connected to the processor for use as a back-up and restore device.
B-4
Software
Data Base Management Systems (DBMS) Software. DBMS software turns the
computer into a high-powered, automated filing cabinet. This data base
file is sorted on nearly any variable in the file’s structure. The
computer also extracts records in the file that match a very exacting
c r i t e r i a , or extract just selected bits of information (fields) about all
the records in the file. This allows the analyst to manipulate data in
varying ways to get a clearer picture of the battlefield and perhaps
identify previously unrecognized patterns.
Advantages
B-5
computers being more accurate than humans working in a purely manual
mode. Humans respond almost instantly to questions requiring a
judgmental response: “’What are the 10 most significant actions in the
last 12 hours?”’ The computer cannot make such a response. To a computer,
a report about the movement of the independent tank battalion carries the
same weight as a report about three wheeled vehicles moving along an
unidentified road.
Report Generation. When ADP systems are equipped with word processing
c a p a b i l i t y , t h e a n a l y s t c r e a t e s r e p o r t s , messages, summaries, or other
intelIigence-related documents quickly and easily.
Disadvantages
Computers perform only those functions they are explicitly told to do.
They do not learn from mistakes, n o r w i l l t h e y c o r r e c t i m p r o p e r i n p u t .
Therefore, the data stored in the computer is only as accurate as the data
t h a t i s e n t e r e d . Computers also have a finite capacity to store data.
Design parameters establish this capacity. While additional storage
capacity is provided by add-on component storage equipment, when maximum
storage Iimits are reached, old data is deleted to make room for new
input. Dual record-keeping procedures, both manual and automated, are
established and kept in an updated status. If ADP capabilities are
interrupted or lost, this ensures that intelIigence production continues.
B-6
T e m p e r a t u r e e x t r e m e s , like alternating very hot and very cold weather
cause condensation. Condensation inhibits the read and write ability of
the system. Extreme temperatures also result in partial or complete loss
of previously input data. For example, rain, fog, and high or low
humidity cause partial or even complete system failure.
Terrain also is a factor in ADP system survivabi I ity and use. Each
time the system is moved, leveling is requ red before the system is
operational . Crossing rough terrain under highly mobile conditions
partially damages or completely destroys the ADP system. Also, while
mobile, current systems are inoperative. Data accumulated while the
computer system is down or inoperative must be saved and input when
circumstances permit. This means that when the system initially returns
t o a n o p e r a t i o n a l s t a t u s , it does not provide data for irrrnediate analysis
until the data base has been updated. If the accumulation of data is such
that input requires a substantial amount of time, the analyst finds that
manual systems and data bases support the commander’s intelIigence needs
more efficiently.
B-7
only by storage capability, the data bases available for review, and the
information or data the analyst elects to input into the system during the
course of the battle.
Since the TCAC system is found only in USAREUR and XVIII Airborne
Corps, (and is a non-TOE--table of organization and equipment--item) this
manual does not address it in detail.
MICROFIX
Figure B-4 shows further details regarding the eight basic components
of the MICROFIX system. The MICROFIX is mounted in an AN/TYQ-5 data
analysis center or in any shelter, tent, or building the G2 considers
appropriate. Since both power boxes, the power conditioner, and the
standby power supply, have surge protectors, the system is powered by
either commercial power or a filed generator. Both styles of VDP and
power box are shown, but only one VDP and one power box comes with each
system.
B-8
View with Front-Loading Video Disk Player
and Standby Power Supply
B-9
1. HARD DISK SYSTEM. The Corvus 20 megabyte hard disk drive assembly stores and
mantains system software and the master data base.
3. COLOR MONITOR. The amdck color monitor displays color graphic data. This includes
video disk maps and military symbology.
4. PRINTING. The Apple Dot Matrix Printer operates at 120 characters per second (CPS) and has
graphics capability.
5. VIDEO DISK PLAYER. The VDP reads photos or map sheets from a laser disk, using the same
technology as used on a compact disk player. The photos of the map sheets are displayed on
the color monitor.
7. KEYBOARD. The keyboard assembly uses a full 128 ASCI character set, joystick and
enhancer board. This equipment provides upper and lower case letter and number capability, in
addition to auto-repeat keying.
8. POWER BOX. The older grey power conditioner has eight outlets on its top, assure protector
and the capability to work with 110 or 220 volts. The newer green standby power supply has six
outlets in the rear panel, a surge protector, a built-in battery pack capable of providing 20-25
minutes of uninterrupted power but works only with 110 volts.
9. VIDEO CASSETTE RECORDER. (Not shown in Figure B-2.) The VCR is used to initialize
the system (hard disk) and acts as a backup or restore device for the hard disk drive assembly.
This expands the potential data base capability of MICRO FIX. The VCR initiatea hard disks and
backups which are quicker and easier to use than floppy disks. VCRs are issued with every three
to four systems, or one per installation.
10. PAPER TAPE READER/PUNCH. (Not shown in Figure B-2.) The paper tape reader/punch
(PTR/P) punches a paper tape coPy of messages prepared on the MICROFIX for transmission
over tactical RATT systems. It also reads paper tape. PTR/P equipment is issued with every
three to four systems, or one per installation.
8-10
Figure B-4. Eight components of MICROFIX.
B-II
MICROFIX SOFTWARE
I DATABASEAPPLICATIONS
B-12
The primary advantage of the MICROFIX system is that it provides the
tools to manipulate and retrieve data quickly and accurately. It gives
the analyst the ability to access a much larger collection of data with
more speed than manual systems provide. New information is added to
e x i s t i n g d a t a b a s e s , new data bases are created, and old or inaccurate
data are deleted. Graphic overlays allow the analyst to visually test
theories and develop or discard hypotheses. Hard-copy printouts of text
i n f o r m a t i o n , produced at each developmental stage of the analysis process,
provide verification of the logic used to develop the final intelligence
products and also serve as source documents for historical record-keeping
purposes.
Figure B-6 shows all the applications that constitute the software
package known as the all-source production system (ASPS). The baseline
software package forms the foundation for alI the other configurations.
The additional software packages are explained in the order in which they
were released.
Topographic Workstation
SIGINT analysts use the TCAE workstation. TCAE software has all the
applications of baseline so t w a r e P I U S f i v e S I G I N T - s p e c i f i c a p p l i c a t ens:
0
Fix. Allows the user to input and plot lines of bear ng and s t e
locations. The program will calculate and plot the e I i p s e o f the
intercepts.
0
Place. The automated gazetteer.
0
COMINT working aid. A collection of four data bases (frequency,
call sign, code word, and case notation) that al lows correlation
across each other.
0
ELINT working aid. An automated ELINT parameters list (EPL).
0
DATEXT. The data extract (DATEXT) program allows the user to
create a subset from a fiIe of messages. DATEXT allows the user to
identify several key words, phrases, and numbers to cuII the entire
file down to a subset of messages which deal with the topic of
interest.
B-13
Counterintelligence Workstation
0
F r i e n d y and enemy antenna systems.
0
F r i e n d y and enemy SIGINT and REC unit OB.
0
F r i e n d y and enemy SIGINT and REC unit location.
0
Friendly and enemy SIGINT and REC organization by doctrine.
0
Friendly and enemy emitter and coIIector’s characteristics.
0
Enemy fixed station location.
OPSEC Workstation
Tables B-1 and B-2 depict the number of systems at each echelon. Also
shown is a recommended distribution of the various workstation
configurations.
B-14
Table B-2. Workstation distribution (low- to mid-intensity conflict).
UT ILIZATION OF MICROFIX
Methods of using the MICROFIX system are limited only by the user’s
imagination. Several units are innovators in their use of the system.
Some examples are--
0 Printing the entire OB file (or selected enemy units) for use as
an OB book. Updating the OB book is easier by doing the additions,
deletions, or changes on the computer and then printing the updated
or added records.
0 Printing the unit hierarchy report for the enemy units your unit
is facing. This report includes unit name, parent unit name,
l o c a t i o n , and DTG of Iast ’siting. Gaps in your intelligence
holdings become very evident since the computer prints a blank space
for missing data. This report provides guidance to CM&D, provides a
quick reference for RlIs from adjacent and higher units and, by
posting a copy beside the SITMAP, acts as a quick reference guide
for locating enemy units.
0
Using the location history function to plot the location histories
of key enemy units (that is, independent tank battal ions, RAGs,
DAGs, BMP-equipped MRRs) on the color map screen. Plotting the
movement history of these units provides an indication or
confirmation of enemy commander’s intent. Location history also
indicates variances to doctrinal rates of march. This alone
provides key indications to the enemy commander’s intent or the
terrain and weather influenced limitations not previously identified
in the IPB.
B-15
APPENDIX C
INTELLIGENCE INDICATORS
c-1
Table C-1. Enemy offensive Indicators (continued).
ACTIVITY EXPLANAT10N
c-2
Table C-1. Enemy offensive Indicators (continued).
FROG, SS-21, SS-23, and SCUD Enemy offensive operations also occur
units located forward. in-depth. Forward movement of SSMS puts
friendly airfields and depots in
jeopardy.
c-3
Table C-1. Enemy offensive indicators (continued).
ACTIVITY EXPLANAT 10N
c-4
Table C-1. Enemy offensive indicators (continua).
c-5
Table C-1. Enemy offensive indicators (continued).
ACTIVITY EXPLANAT 10N
SIGINT and jamming assets SIGINT and jamming assets will move well
located forward. forward to within 2-4 km of the FEBA
before attack.
C-6
Table C-2. Enemy defensive indicators.
Large tank heavy units located Tank units are held in assembly areas
in assembly areas to the rear. for employment in counterattacks.
c-7
Table C-2. Enemy defensive indicators (continued).
ACTIVITY EXPLANATION
Early warning sites hardened. When early warning sites are hardened,
it indicates the intention of those
forces to remain in place and to
protect an important facility.
C-8
Table C-2. Enemy defensive indicators (continued).
ACTIVITY EXPLANATION
c-9
Table C-4. Reinforcement indicators.
ACTIVITY EXPLANATION
Movement of additional troops This action increases enemy’s present
toward the front. strength.
C-l0
Table C-6. Withdrawal indicators.
Indications for withdrawal are generalIy the same as those for delaying
action with the addition of the following indicators,
ACTIVITY EXPLANATION
Presence of rear guard and Minimizes losses and permits main body
covering force. more freedom of movement.
C-II
Table C-6. Withdrawal Indicators (continued).
ACTIVITY EXPLANAT 10N
Stockpiling of explosives at Wit h d r a w i n g f o r c e s w i l l a t t e m p t t o
central points. Distribution of, de a y p u r s u i t w i t h o b s t a c l e s ,
and the establishment of, smalI
dumps of explosives and Iandmines
near bridges, possible abatis
s i t e s , and other demolition target
sites.
C-12
Table C-7. Nuclear weapons indicators.
Movement of small, heavily guarded Nuclear warheads are moved under heavy
convoys, including closed vans, security, usualIy in closed vans.
with a high percentage of Escort vehicles are equipped with
automatic weapons. machine guns.
C-13
Table C-7. Nuclear weapons indicators (continued).
ACTIVITY EXPLANAT 10N
Presence of meteorological radars. An END TRAY radar is part of the
organic equipment of both the free
rocket over ground (FROG) and SS-1c
SCUD systems, as wel 1 as other
nuclear-capable systems. (END TRAYS
also are found with conventional
artillery and AF units.)
C-14
Table C-7. Nuclear weapons indicators (continued).
C-15
Table C-7. Nuclear weapons indicators (continued).
Location of missile and free Missile and free rocket units are
rocket units within striking located within one third of the
distances. maximum range from the I ine of contact
on the offense, and one half of the
maximum range on the defense.
C-16
Table C-7. Nuclear weapons Indicator (continued).
ACTIVITY EXPLANATION
Presence of heavy artillery, 203 mm SP gun, 240 mm SP mortar, and
towed 203 and 240 have nuclear
delivery capabilities, as do 152 mm SP
guns.
C-17
INSURGENT ACTIVITY INDICATORS
C-18
During the development of a subversive insurgency, some of the first
indicators of latent or incipient insurgency appear in the rural areas.
While some of these indicators are rather obvious, some are not. For the
sake of simplicity, these indicators of insurgency are placed into four
categories: population, propaganda, commodity, and environmental.
Population
0
Identification of insurgents, their supporters, and sympathizers
who suddenly appear in, or move out of, an area.
0
New faces in the community.
0
Unusual gatherings among the population.
0
Disruption of normal social patterns.
0
R e f u s a l o f p e a s a n t s t o p a y r e n t , taxes, or loan payments or
unusual difficulty in the collection of same.
0
Trends of demonstrated hosti I ity on the part of the local
population toward government forces.
0
Occurrence of actions previously considered taboo by the POPU ace.
0
Disappearance of the population from or avoidance by the peep e of
certain areas.
0
Unexplained disappearance or dislocation of young people.
0
Strangers attempting to join local security forces.
0
Reports of the people being approached for purposes of
intelIigence recruitment.
0
Unusual short absences of government employees.
0
Failure of police and informant nets to report properly.
0
Growth of general hostiIity toward the government.
C-19
0
U n e x p l a i n e d d e s t r u c t i o n or l o s s o f g o v e r n m e n t i d e n t i f i c a t i o n
papers or passports and increased forgeries thereof,
o
Murder and kidnapping of local government officials.
Propaganda
0
Dissident propaganda from unidentified sources.
0
Increase in the number of entertainers with a political message.
0
Increasing religious unrest.
0
Increased agitation on issues for which there is no identified
movement or organization.
0
Renewed activity by insurgent organizations thought to be dormant.
0
Circulation of petitions advocating usual insurgent demands.
0
Reports from other countries that the country is ready for
revolution.
0
Attempts to discredit and ridicule national or public officials.
0
Attempts to discredit the judicial system and POI ice
organizations.
0
Characterization of government leaders as puppets and tools of a
foreign government.
0
Movement to remove strong anti insurgency leaders.
0
A g i t a t i o n a g a i n s t g o v e r n m e n t p r o j e c t s a n d p ans.
0
Rumors designed to gain public acceptance o’ untruths about the
government or governmental leaders.
0
Advocacy of popular front government.
C-20
Directed Against the National Military Forces. This includes--
0
Attacks which embarrass or ridicule military officials.
0
Propaganda directed toward youth to refrain them from joining the
military service or propaganda directed at soldiers to desert.
0
Characterization of the armed forces as the enemy of the people.
0
Civilian avoidance of and reluctance to cooperate with the
military.
0
Appearance of questionable doctrine in the educational system.
0
Charges by students and others that the educational system is not
adequate and is only training the youth of the nation to do the
government’s bidding.
Commodity
. Commodity indicators are broken down further into crops, animals, arms
and ammunition, clothing, drugs and medicine, and communication activity
subcategories.
0
Diversion of animals or meat from the market.
c-2 1
0
Reports of loss of hides or diversion of hides from the market.
o
Disappearance of wild game from an area in which it was previously
plentiful.
o
Disappearance of pack animals or the appearance of unusual numbers
of pack animals in certain areas.
0
increased loss of weapons by miIitary and poIice forces.
0
Increased thefts of weapons.
0
Discovery of arms caches.
0
Attacks on patrols resulting in loss of weapons and ammunition.
The above factors could be applied not only to weapons but also to any
similarly essential military goods.
0
Unusual scarcity of any type of material that could be used for
footwear. This could include such items as hides of animals and old
tires, in addition to manufactured footwear.
0
Discovery of caches of clothing or of materials which may be used
in the manufacture of clothing or uniforms.
0
Scarcity of herbs and plants used in or for drugs and medicine.
0
Large-scale purchasing or theft of drugs and medicine and of the
herbs used in their manufacture.
0
increases in purchase and use of radios.
0
D i s c o v e r y of caches of communications equipment.
0
Unusual increase in communications traffic in amateur radio
operations.
Environmental
0
Evidence of increased foot traffic in the a r e a .
0
Increased travel within and into remote or isolated areas.
c-22
0
U n e x p l a i n e d t r a i l s a n d c o l d campsites.
e
Establishment of new, unexp a i n e d agricultural areas, or recently
cleared fields.
0
Unusual smoke, possibly indicating the presence of a campsite or
a form of communication.
0
Concentration of dead foliage in an area, possibly indicating use
of camouflage.
0
P r e s e n c e o f f o o t t r a p s , s p kes, and the ke.
0
P r e s e n c e o f o b s t a c l e s s u c h as those used n roadblocks and canal
blocks.
I nd caters of urban n s u r g e n t a c t i v i t y a l s o a r e p l a c e d i n t h e f o u r
categor es of population propaganda, commodity, and environmental
indicato r s . Many of the same or simiIar indicators appear for both rural
and urban areas.
Popu ation
0
Increase in staff and activities in pro insurgency-oriented
embassies or consulates in neighboring countries, including unusual
patterns in nature and volume of external communications (both
in-country and out-of-country).
0
I n c r e a s e d t r a v e l b y s u s p e c t e d subversives to
pro insurgency-oriented countr es or to countr es notably under
insurgent influence.
0
Influx of insurgent eaders, both foreign and domestic, into the
urban area.
0
R e p o r t s o f l o c a l s b e ng trained in pro insurgency-oriented
countries.
0
Increase in visitors from pro insurgency-oriented countries
(tourists, technicians, businessmen, and officials).
C-23
0
C l o s e c o n n e c t i o n s b e t w e e n t h e d i p l o m a t i c r e p r e s e n t a t ves of
pro insurgency-oriented countries and the insurgents.
0
Disappearance of known or suspected insurgents and d ss ident
elements.
0
Increase in insurgent youth gatherings.
0
H o s t i n g o f t r a d e f a i r s o r s i m i l a r a c t i v i t es by pro insurgency-
oriented countries.
0
Return of nationals from travel or study n pro insurgency-oriented
countries.
0
I n c r e a s e i n v sits t o u r b a n c e n t e r s b y r u r a l o f f i c i a l s a n d l e a d e r s
from areas of u n r e s t .
0
E s t a b l i s h m e n t of organizations (even very smal ) of unexplained
o r i g i n a n d o f unclear or nebulous aims.
0
E s t a b l i s h m e n t of a new organization to replace an exist ng
organizationa structure with identical aims.
0
A p p e a r a n c e o f many new members in established organizat ons I ke
labor unions,
o
Attempts by new groups to obtain control of established
organizations.
0
InfiItration of student organizations and unions by known
agitators.
0
Appearance of new organizations with titles stressing patriotism,
grievances, or interests of underprivileged or minority groups.
0
Reports of large donations to new or revamped organizations.
0
Reports of payments to locals for engaging in subversive
activities.
0
Reports of the formation of subversive paramilitary
organizations.
0
Use of grenades or other explosives in terrorist acts.
0
R e p o r t s o f i n s u r g e n t I i s t s of t a r g e t s f o r p l a n n e d t e r r o r i s t i c
acts.
0
Appearance of professional agitators in demonstrations that result
in violence.
0
E v i d e n c e o f t h e p a r t i c i p a n t on of paid and armed demonstrators in
riots.
C-24
Insurgent-Promoted Activities. This includes--
0
Reported incidents of attempted recruitment of people to join new
movements or underground organizations.
0
Unexplained unavailabiIity or disappearance of doctors, printers,
and other special ists who may be working with and for the
insurgents.
0
Habitual criminals and unruly youths who seem to be acting with
and for the insurgents.
0
Increased unrest and agitation among laborers.
0
Inability or refusal of people to pay taxes.
0
Reports of extortion and other coercion by the insurgents to
obtain financial “donations” from the people.
0
Disappearance of young men from the city.
0
Failure of pol ice and informant nets to repor properly,
i n d i c a t i n g sources a r e s u p p o r t i n g t h e i n s u r g e n t s o r a r e a f r a i d o f
them.
0
Decreasing success of government agents in infiItrating subversive
organizations.
0
Assessination or disappearance of government agents.
0
Reports of increased attempts by insurgent representatives or
suspected subversives to make contact with local leaders or
government officials.
0
Reports of attempts to bribe or blackmail government and law
enforcement employees.
0
Reports of attempts to get classified information from government
officials or documents from government offices.
0
Leakage of classified information to news media.
0
Sudden improvement in financial status of certain government and
law enforcement employees.
0
Fai lure of government raids on suspected subversive meetings or
headquarters apparently because of forewarning.
0
Increased activity against the government and ts police, m nor ity
groups, foreigners, or similar groups.
C-25
0
Demonstrate ons against government forces, scapegoat minority
g r o u p s , o r foreigners, designed to goad government forces into
a c t i n g a g a nst crowds.
Propaganda
0
Worldwide propaganda by proinsurgency-or iented countries
denouncing conditions and blaming the government of the targeted
country.
0
Appearance in-country of antigovernment slogans and pronouncements
by word of mouth, wall scribbling, posters, and leaflets.
o
Letter writing campaigns to newspapers and government officials
deploring undesirable conditions and blaming individuals in power.
0
Increased use of slogans pinpointing specific grievances.
0
Increased use of petitions demanding government redress of
grievances.
C-26
o Circulation of petitions and pamphlets which appear to follow the
beliefs and policies of a foreign power.
0 More agitation and unrest within the urban population for which
there is no logical explanation,
0
Mass demonstrations where participants voice standard Communist
demands.
0
Announcements by foreign countries that the concerned country is
r i p e f o r “war of national iiteration, ” or words to that effect,
0
Radio propaganda from foreign countries, aimed at the target
country, accusing its government of failure to meet the needs and
desires of its people.
C-27
0
Propaganda from foreign countries, aimed at the target country,
denouncing imperialism.
0
Demonstrations and violence in foreign countries against
e m b a s s i e s , o f f i c e s , and consulates of the target country or
countries which support its government.
0
Spreading accusations that the government is corrupt and
completely out of touch with the people.
0
Agitation against existing or proposed government projects and
plans.
0
Accusations that the government is a pawn of a foreign government.
0
C a l l s f o r a p o p u l a r f r o n t g o v e r n m e n t , i n c l u d ng new parties.
0
Character assassinations of top government o f i c i a l s .
0
Movement to remove strong anti insurgency leaders from office.
0
Strikes or work stoppages called to protect government actions.
0
S p r e a d i n g a c c u s a t i o n s t h a t t h e m i I i t a r y a n d p o l ce are corrupt and
completely out of touch with the people.
0
Character assassinations of miIitary and police o f f i c i a l s .
0
Movement to remove strong anti insurgency mi i ta y and police
leaders from the office.
0
Calling on the people to stop cooperating w th the military and
police.
0
D e l i b e r a t e a c t s t o p r o v o k e p o l i c e r e p r i s a l s during demonstrations
or strikes.
0
Accusations of police brutality or ineffectiveness or claims that
government forces initiated violence when demonstrations end in
riots.
0
Publication of photographs purporting to show repressive pol ice
practices.
0
Student unrest manifested by new organizations, proclamations,
demonstrations, and strikes against authority.
0
Charges by students and others that the educational system is not
adequate and is only training youth to do the government’s bidding.
C-28
‘ \
\.\
0
A p p e a r a n c e o f q u e s t enable doctrine in the educational system.
0
Clamor for personne changes in the educat onal system.
Commodity
Foods .
— This includes--
0
Scarce food supplies when there is no report of natural
impediments to agriculture
0
D e c l i n e o f f o o d s t u f f s i n a country or province where there is a
tolerated black market, wh ch indicates that the food is being
diverted.
0
Sudden shortages of preserved foods or items of food requiring
minimal storage facilities.
0
Failure of farmers to transport their products to the city,
indicating a fear of travel on the highways.
0
Large-scale purchasing of foodstuffs which may be by purchasing
agents for an insurgent movement.
0
Increase in assaults on police and miIitary personnel which
results in thefts of weapons.
0
Increase in thefts and purchases of arms, ammunition, and
explosives.
0
Discovery of arms, ammunition, and explosives being c andest nely
manufactured, transported, or cached.
0
Increased purchase and theft from salvage yards of metal products
like pipe, casings, wire, spikes, snd nails.
0
Increased purchase of surplus miIitary goods.
0
Increase in demand for smalI arms and ammunition on the open
market.
0
Reports of large-scale purchasing of weapons, ammunition, and
material used in their manufacture.
0
Increase in piIfering of arms and ammunition from the government.
0
Increase in the number of armed robberies.
C-29
0
Reports of theft or sudden shortages of chemicals which could be
used in the clandestine manufacture of explosives.
0
Appearance of arms manufactured in pro insurgency-oriented
countries.
o
Unusual systematic purchase of clothing materials which could be
used for the manufacture of insurgent uniforms or footwear.
0
Unusual scarcity of clothing or material used in the manufacture
of clothing and footwear.
0
Distribution of clothing to underprivileged classes by
organizations of recent or suspect origin.
9
Discovery of caches of uniform clothing.
o
Scarcity of drugs and medical supplies on the market or black
market.
0
Large-scale purchase or theft of drugs and other medical supplies,
0
Diversion of shipments of drugs.
Environmental
0
Apartments and housing being rented, but not Iived in as homes.
0
Slogans written on walIs, bridges, and streets.
0
Defacement of government and police information signs.
0
Disappearance of electrical Iines. Pollution of the urban area’s
water supply.
0
Terror ist acts against physical targets Iike bridges, dams,
airports, or buildings.
0
Changes in residence of suspected subversives.
0
Discovery of message drops.
0
A p a r t m e n t s and houses being used for purchases other than
residences.
0
Increased smuggling of currency, gold, gems, narcotics, medical
supplies, and arms into urban centers.
C-30
o
Reports that local currency is being bought up in world markets by
pro insurgency-oriented countries.
0
Appearance of abnormal amounts of counterfeit currency.
0
Increase in bank robberies.
0
Work stoppages or slowdowns in essential industries.
0
Marked decline in product quality in essential industries.
0
Marked increases in equipment f a i l u r e s i n e s s e n t i a l i n d u s t r i e s .
0
Mass strikes and sympathy str k e s i n e s s e n t i a l i n d u s t r i e s .
0
A p p e a r a n c e o f k n o w n a g i t a t o r s or suspected subversives in picket
lines.
0
Escalation of peaceful strikes to violence against property and
nonstriking personnel.
0
Explosions in essential utilities and industries,
0
Roadblocks and mines on main lines of communication.
0
Malicious damage to ndustrial products or factory math nery.
C-31
APPENDIX D
Once these enemy forces are determined, individual enemy units can be
identified or located and enemy strength computed. Personnel and
equipment strengths are described as percentages of known TOE-type
strengths, based upon reported enemy personnel and equipment losses and
known or estimated rates of replacement.
D-1
estimates of the higher headquarters and modify them with available
information.
The commander and the operations officer use the information the G2 or
S2 provides on enemy comnitted forces and reinforcements for planning and
conducting tactical operations. Accurate information is particularly
important during the commander’s analysis of opposing courses of action.
For example, i n p l a n n i n g f o r a n a t t a c k , an overestimation of committed
enemy forces and an underestimation of enemy reinforcements could cause
the friendly commander to attack with a small reserve. The intelligence
officer’s error in computing committed and reinforcing forces could al low
the enemy to counterattack with an unexpectedly strong force, inflicting
unacceptable casualties upon the friendly force.
..
All uncommitted enemy forces are considered as reinforcements if they
are committed in time to affect the accomplishment of the mission. If
there is doubt as to whether an enemy unit is committed or reinforcing, it
is considered as a reinforcement. This reduces the risk of surprise.
D-2
example, “The committed forces facing this army group consist of one army
group (3 combined arms armies with a total of 11 MRDs and 3 tank
d i v i s i o n s ) . . . . “ When committed forces, such as guerrillas, do not have
a known organization, t h e i r s t r e n g t h i s s t a t e d i n t o t a l n u m b e r s . All FS
weapons systems avai table to the guerriIIas, including tanks, infantry
f i g h t i n g v e h i c l e s ( I F V s ) , a n d a r t i l l e r y , also are Iisted and expressed in
terms of total numbers.
When an enemy unit of the size used in accounting for committed forces
is in contact with two adjacent friendly units, the entire enemy unit is
considered to be committed by the G2 or S2 of both friendly units. For
example, if an enemy battalion is in contact with elements of two adjacent
US divisions, both division G2s consider the entire battalion as committed
against their respective divisions. This points up the need for correct
identification and accurate strength computation at each echelon.
All ground FS weapons organic to the enemy MRB or MRR are usually
referred to as normal regimental artilIery and are always considered to be
in support of committed forces. T h a t i s , each committed unit is assumed
to have available to it its normal proportion of the available supporting
weapons organic to the regiment. These weapons, therefore, need not be
enumerated unless desired. FS weapons not organic to enemy motorized
battalions or regiments which are identified as within supporting range
are enumerated as if in support of committed forces. In the event that
the forces committed against the brigade or battalion have no known TOE
(that is, volunteer or irregular-type units), all FS weapons which are
identified are enumerated.
D-3
Table D-1. Counting committed forces in the defense and offense.
When the US is in the defense,
LOOKS FOR
THE LOOKS AT MR TK RECON
LOOKS FOR
THE LOOKS MR TK RECON
D-4
In addition to determining the enemy’s ground combat unit strength in
terms of committed forces and reinforcements, the G2 or S2 also considers
the enemy’s air and nuclear weapons strength, However, as estimates of
enemy air NBC warfare strength are usually prepared only at field army
l e v e l a n d h i g h e r , t h e G 2 o r S 2 s i m p l y r e s t a t e s t h e s e c a p a b i l i t i e s in the
estimate.
When only two elements of a unit are located, they are counted as they
appear. By templating, it is possible to determine the approximate
location of the third element. Although this unit should not be counted,
the commander is advised as to its possible location. An exception to
t h i s r u l e o c c u r s , h o w e v e r , in situations where enemy doctrine normalIy
precludes elements of a unit operating independently of each other. For
example, if a US brigade S2 detects the presence of one MR company of a
Soviet MRB, then the remain ng elements of the MRB are counted as
committed, a l b e i t u n l o c a t e d enemy forces. This is because Soviet
d o c t r i n e n o r m a l l y p r e c l u d e s the MR companies of an MRB from operating
independently of each other
To determine the time when the enemy employ an uncommitted unit, the
travel time from the unit location to a logical point where the unit can
be committed is calculated. To the travel time, add the closing time
(pass time of a column). Except when observation of enemy units is
continuous, it is assumed that any unit could have started to move
immediately after its last reported location. T h e r e f o r e , to determine the
earl iest time at which the enemy can reinforce, add the travel plus
closing time to the time last observed. For example, if an enemy
reinforcement was last observed at 0800 hours, and it can deploy to
envelop the northern flank in one hour, it is assumed that the attack can
be launched as early as 0900 hours (0800 plus one hour). In the
exceptional case involving piecemeal commitment of enemy reinforcements,
consider only travel time. Forces which are committed piecemeal do not
close into an assembly area or attack position.
D-5
Because observation of reinforcements is rarely continuous, statements
of enemy reinforcing capabilities should include both the earliest time
and that time after starting movement when the reinforcement is
accomplished. For example, “’the enemy reinforces the attack with the 45th
MRR at 0900 hours, or one hour after starting movement. ” When the time
since the last report is greater than the time after starting movement,
only the time after starting movement is given. For example, “the enemy
reinforces the attack with the 45th MRR now or one hour after starting
movement. “ When the number of reinforcements is large or the enemy is
capable of reinforcing in several areas, reinforcing capabilities are
presented in tabular form. Table D-2 is an example of this. It shows the
enemy reinforcing the attack or defense with all or part of the following
units at the places and times indicated.
D-6
o Compute foot marching time for all appropriate reinforcements.
Compute motor movement time only for distances greater than 10
kilometers (6 miles). If a unit is observed in trucks, compute only
the motor movement time.
0
Consider a foot march of more than 32 kilometers (20 miles) as a
forced march. Consider a motor movement of more than 280 kilometers
(175 miles) as a forced march for motorized units and a movement of
more than 224 kiIometers (140 miIes) as a forced march for tank
units.
0
Move and close the entire unit to move an enemy infantry
battalion. To move a unit of regimental or larger size, move and
close two-thirds of the combat elements; that is, two battal ions of
an infantry regiment, two regiments of an infantry division.
SITUATION 1
The four battalions of the 8th and 12th MRRs in contact with the 20th
Infantry Division are considered as committed forces by the 20th Infantry
Division G2. Regardless of the specific courses of action selected by the
commander of the 20th Infantry Division to continue the advance, the area
of employment of these four battalions in contact does not change
appreciably. The second echelon battalions of the 8th and 12th MRRs are
not considered committed since they are not in contact and are employed in
other areas. The 96th MRR is considered committed and mentioned in the
composition subparagraph of the OPORD, but only its second echelon
battalion is listed as a reinforcement by the 20th Division.
The other two battalions are committed against the 72d Division and are
not avaiIable as reinforcements against the 20th Division. The 43d and
75th MRRs of the 12th MRD are considered as reinforcements because these
units are not committed against the friendly force and are committed in
D-7
t i m e t o a f f e c t t h e m i s s i o n o f t h e 2 0 t h I n f a n t r y D i v i s i o n . Although the
two MRRs of the 12th MRD are digging field fortifications in the vicinity
o f t h e d i v i s i o n o b j e c t i v e , the enemy commander employs these units against
either the 20th Infantry Division or adjacent divisions. Figure D-1 shows
this situation in a schematic sketch.
SITUATION 2
D-8
reinforcements. From their locations and dispositions, it is apparent
that they are the 2d echelon regiments of the divisions committed against
the 20th Infantry Division. Depending on the course of action selected by
the commander of the 20th Infantry Division and plans of the enemy
commander, all or part of these enemy elements are employed against the
20th Infantry Division, at various times and places, in time to affect the
accomplishment of the division mission. Figure D-2 depicts this
situation.
25
xx
20
SITUATION 3
Figure D-3 shows the Ist Brigade, 21st Infantry Division, with the 1st
Battalion, 69th Infantry, and the Ist Battalion, 70th Infantry forward
defending positions as indicated in a schematic sketch. Reports from the
D-9
Figure D-3. Schematic sketch, situation 3.
21st Infantry Division indicate the enemy has an unknown number of air and
nuclear weapons available.
The S2, 1st Brigade, determines enemy strength as follows:
0
Committed Forces: Ist Brigade is opposed by elements of three
MR companies, one reconnaissance platoon, and one medium tank
company (13 tanks) supported by normal regimental artiIIery, plus
six 120mm mortars, six 122mm howitzers, six loom AT guns, and all
available air and nuclear weapons.
0
Reinforcements: Enemy reinforcements available for commitment in
the sector of 1st Brigade are an unidentified MRB located in the
vicinity of Hill 250.
D-10
contact with, and committed against, t h e 1 s t B r i g a d e a n d i t s r e s p e c t i v e
b a t t a l i o n s . All three platoons of the company northeast of the Highway 82
bridge are considered as one company committed against 1st Brigade, since
brigades account for committed forces in terms of companies. The MR
company south of Chigger Woods is located so that it is, logicalIy, the
reserve company of an enemy battalion in contact with 1st Brigade and is
therefore considered committed. The MR companies of the 25th and 23d
Regiments, located to the east and west of the 1st Brigade sector, are
totally committed against adjacent brigades and are, therefore, neither
committed nor available as reinforcements against 1st Brigade, 21st
Infantry Division. Twelve medium tanks are located in the vicinity of the
MR companies committed against 1st Brigade and are, therefore, also
committed. The S2, 1st Brigade is equally correct to account for these
committed medium tanks as three medium tank platoons or one medium tank
company. In addition to the 120mm mortars (organic) and the 100mm AT guns
and 122mm howitzer battery (both attached), the enemy MRB is supported by
the artillery group of its parent regiment. The enemy also has an unknown
number of air and nuclear weapons, which are employed in support of
committed forces.
The S2, 1-69 Infantry, determines enemy strength now opposing the
battalion as follows:
0
C o m m i t t e d F o r c e s : 1-69 Infantry is opposed by two MR platoons, one
reconnaissance platoon, and one medium tank platoon, supported by
n o r m a l r e g i m e n t a l a r t i l l e r y plus six 120mm mortars, six 122mm
h o w i t z e r s , six loom AT guns a n d a l l a v a i l a b l e a i r a n d n u c l e a r
weapons.
.
0
Reinforcements: Enemy rein orcements avaiIable for commitment in
t h e s e c t o r o f 1 - 6 9 I n f a n t r y are an unidentified MRB located in the
v i c i n i t y o f H i l l 2 5 0 a n d a n unidentified MR company and medium tank
platoon located in the vicinity of Chigger Woods.
The S2, 1-70 Infantry, determines enemy strength now opposing the
battalion as follows:
D-II
0
Committed Forces: 1-70 Infantry is opposed by four MR platoons and
two medium tank platoons supported by normal regimental artilIery,
plus six 120mm mortars, six 122mm howitzers, six 100mm AT guns and
all available air and nuclear weapons.
0
Reinforcements: Enemy reinforcements available for commitment in
the sector of 1-70 Infantry are an unidentified MRB located in the
vicinity of Hill 250 and an unidentified MR company and medium tank
platoon located vicinity Chigger Woods.
D-12
APPENDIX E
The funct o n o f t e r r a i n a n a l y s i s i s t o r e d u c e t h e u n c e r t a i n t i e s
regarding the e f f e c t s o f t e r r a i n o n c o m b a t o p e r a t i o n s . It allows the
commander to s e e t h e b a t t l e f i e l d ” a n d t h e e f f e c t s o f w e a t h e r o n t h e
terrain in the AO. In order to accomplish terrain analysis, the
intelIigence staff receives support from the engineer terrain teams or
detachments. To effectively use the terrain information developed by the
t e r r a i n t e a m , intelIigence personnel must understand basic terrain
analysis and its applications to the IPB process. In units where terrain
analyst assets are not available, the intelligence staff collects,
a n a l y z e s , and integrates terrain information into the commander’s
decision-making process.
0
Surface configuration (slope).
0
Surface drainage.
0
Vegetation.
0
Surface materials (soils).
0
Concealment from aerial detection (summer and winter seasons) .
0
Obstacles (microrelief).
0
Bui It-up areas.
0
Transportation.
0
Key terrain.
0
Cross-country movement (wet and dry conditions) .
E-1
These products have a wide dissemination, b u t a r e p r i m a r i l y i n t e n d e d
for u s e b y t h e t e r r a i n t e a m s i n s u p p o r t o f t h e I P B p r o c e s s .
The terrain factor matrix and terrain analysis support guide are tools
f o r t h e a n a l y s t . They were developed through an analysis process whereby
terrain factors that impact on combat operations are identified and
correlated with specific types of combat operations and battlefield
functions. Figure E-1 shows a terrain analysis support guide. The
terrain factor matrix was introduced in Chapter 4 (see Figure 4-4).
The process begins with the analyses of the basic terrain factors
( s u r f a c e c o n f i g u r a t i o n , surface drainage, vegetation and surface
materials, built-up areas, and transportation nets). These products are
used to assess the existing situation and further used in combination to
develop the factors of OCOKA and other special purpose graphics. The
analyst produces overlays depicting terrain factors not found on
topographic maps. These factors include, but are not limited to, fording
s i t e s , t r e e h e i g h t , stem spacing, stem diameter and canopy closure,
m i c r o - r e l i e f , and the effects of weather on soil . This information is
necessary in the development of the OCOKA graphics. The information is
gathered through on-site collection, aerial reconnaissance, photographic
interpretation and analysis, and other coIlateral sources.
Surface Configuration
0
P l a i n s ( l e s s t h a n 1 5 0 m d i f f e r e n c e i n e evation between the high
point and the low point and having more t h a t 5 0 p e r c e n t o f t h e a r e a
with slope less than 4 p e r c e n t ) .
0
H i l l s ( 1 5 0 t o 6 0 0 m - - w th low hills of 150 to 300 m and high hills
of 300 to 600 m).
E-2
0
Mountains (greater than 600 m with low mountains of 600 to 1500 m
and h igh mountains greater than 1500 m) .
E-3
Relief is the difference i n e l e v a t i o n s r e p r e s e n t e d b y c o n t o u r l i n e s ,
hypsometric tints, shading, or spot elevations. Slope is the inclined
surface of a hill, mountain, or any other part of the earth’s surface.
Slope is shown in three basic categories:
0
Map unit A equals 0-30 percent slope, where the distances between
contour Iines can be as narrow as the Iines for 30 percent or
wider. Movement and maneuverability are generally unrestricted
except in local areas.
0
Map unit B equals 30-45 percent slope, where the distances can be
as narrow as 30 percent or narrower to 45 percent. Movement for
vehicles in these areas is very slow. Maneuverability is difficult
for tracks and large-wheeled vehicles.
0
Map unit C equals greater than 45 percent slope, where the
distances between contour lines are narrower than those for 45
p e r c e n t . Movement is generally precluded and maneuverability is
extremely I imited. These areas are usually designated as NO-GO
areas for most vehicles.
Figure E-2 shows the three basic categories of slope on a terrain and
weather factor combined overlay. These categories may be further divided
to obtain a more descriptive analysis.
E-4
Slope can be expressed in three ways: first as a slope ratio (sometimes
called gradient) represented as a fraction; second, as a degree of slope
labeled in degrees; and third, as percent of slope. The best method of
representation is the percent of slope. Figure E-3 shows how to calculate
percent of slope.
E-5
Percent of slope is represented in the three categories described.
Use a slope template or slope calculator to assist in determining slope
categories.
Surface Drainage
0
Greater than .09 mm-less than .36 mm gap width.
o
Greater than .36 mm gap width.
E-6
Figure E-4. Slope calculator examples.
E-7
■
7
!
Figure E-7. Trellis drainage pattern.
E-9
Figure E-8. Radial drainage pattern.
E-10
Figure E-10. Rectangular drainage pattern.
E-II
An important consideration of streams and rivers are crossing sites
for fording, swimming, and bridging, and bank conditions. Most trucks can
ford depths up to three feet, most tanks up to four feet. Velocity should
be less than five feet per second. Vertical banks greater than one foot
stop trucks and greater than four feet stop tanks. Figure E-13 shows a
sample surface drainage overlay. See terrain matrix (Figure 4-4) for
surface drainage applicability.
..
Precipitation has a tremendous effect on hydrologic features and
adjacent areas. It affects watercourse depths, velocities, and bank slope
conditions. Evaluate flood plains and areas subject to inundation. The
lack of precipitation also plays an important role in the evaluation of
rivers and streams. The absence of water in various channels and flats
provides concealed movement routes, however, use caution and give
attention to weather forecasting when considering these routes. Wind
affects velocity and surface turbulence on the larger watercourses.
Vegetation
E-12
/
0
Trees are greater than 3.05 m talI, perennial wood plants, single
sterrrned, with a definite crown shape. They are either of the
deciduous or coniferous variety.
0
Scrub and shrub. Scrub is vegetation noted by its stunted growth
d u e t o p o o r s o i l o r c l i m a t i c c o n d i t i o n s . Shrub is the undergrowth
of the forested areas, normalIy the dominant vegetation. It is
either deciduous or coniferous.
0
Grasses are alI non-woody plants (grasses and forbs) . hey are
classified as tall or short grasses depending on height (less t h a n
one meter is short, greater than one meter is tall).
0
Crops are defined as cultivated vegetation (vineyards, arms,
plantations, orchards, and fields).
E-13
essential to accurate analysis of vegetation. The best altitude for
photography for this analysis is less than 12,500 feet for accuracy within
10 percent. Altitude should not exceed 16,000 feet.
0
Category 1 - 0-25 percent closure (poorest concealment).
0
Category 2 - 25-50 percent closure.
0
C a t e g o r y 3 - 50-75 percent closure.
0
C a t e g o r y 4 - 75-100 percent closure (best concealment)
Surface Materials
E-14
operations, specifically, trafficability. Surface material s are i m p o r t a n t
because of their influence on drainage, vegetation, field f o r t i f i c a t i o n s ,
and trafficability.
Surface materials are broken down into two groups, soi s and r o c k s .
Soils are of unconsolidated parent materials and are often c a l l e d d e p o s i t s
or materials. Rocks are from consolidated parent material.
E-15
Figure E-15. Terrain factor overlay Vegetation Height.
E-16
characteristics needed to produce a surface materials (soils) overlay.
The analyst identifies soil composition as either fine-grained,
coarse-grained, or organic soils. Figure E-16 shows a sample soil
classification chart. Figure E-17 shows a surface material overlay that
further explains the classification designations. The first digit is the
predominant soil, the second digit is a characteristic description.
S u r f a c e r o u g h n e s s i s d e p i c t e d i n t h e t h i r d d i g i t . T h e f o l l o w ng example
further depicts the classification system.
GW1 : W e l l - g r a d e d g r a v e l s , g r a v e l - s a n d m i x t u r e s w i t h I t t l e
or no fines. S o i l h a s n o r o u g h n e s s e f f e c t . T h i s s o i l is
generally free of moisture. Soil depth is less than 5 meters.
0
Class 1 - 0 - .5 meters deep,
0
Class 2 - .5 - 1.5 meters deep.
0
C l a s s 4 - more than 3.0 meters deep.
A surface materials overlay breaks down the most probable soil types,
characteristics, and distribution. Depicted on a soils overlay (surface
configuration) are comrnon soil types along with exposed rock outcrops (R),
peat (PT), evaporates (E) and permanent snowfields (PS).
SOIL TRAFFICABILITY
E-17
Figure E-16. Unified soil classification chart.
E-18
GC1
SOIL 11’PE
MAP UNil
w / fl ST TwO O IG ITS )
GW
DESCRIPTION
GP
SPO
E-19
of soil trafficability is used in determining cross-country movement and
vehicle maneuverability. (See Figures 4-5 and 4-6 for examples of
over lays.)
FofF is the effect that the terrain has on weapons and weapons systems
effectiveness. LOS is considered for LOS direct fire weapons. Indirect
fire should consider surface configuration at the target site. It is
important to indicate distance and direction of observation. For FofF
indicate direction, trajectory angle for indirect fire to clear vegetation
(or other obstructions) from a specific point, and the extent of the
firing fan. (See Figure 4-11.)
E-20
concealment is described as O-25 percent chance of detection Concealment
is evaluated for summer and winter seasons.
Obstacles
Key Terrain
E-21
Avenues of Approach and Mobility Corridors
AAs and MCS are routes by which a force may reach key terrain or an
objective. AAs and MCs address maneuver support potential, degree of
canal ization, concealment and cover, observation and FofFs, obstacles, and
the access to key terrain and adjacent avenues or corridors. There are
three types of AAs: g r o u n d , a i r , and rear area AAs.
Air Avenues of Approach. These are much the same as ground avenues. They
should be free of obstructions or have adjacent corridors to permit bypass
of obstructions. It is important to consider avenues and corridors in
layers as to reflect different altitudes of approach. This considerate on
would depend on the level and size of the operation.
Rear Area Avenues of Approach. These are avenues that provide the rap d
movement of rear threat elements and the additional service support
elements to the front I ines.
Note: I t i s e x t r e m e l y i m p o r t a n t t o i n d i c a t e t h e w i d t h o f t h e a v e n u e s nd
corridors and what size element can pass through. Note any major choke
points that canalize movement along the AA into designated MCs as key
terrain. (See Figure 4-13 for examples of AAs and MCs.)
The MCOO is the graphic terrain analysis on which all other IPB
products are based. It is one of the two templates (the other being the
DST) that is always prepared at all echelons. At echelons where the IPB
process is more formal, the terrain analyst produces detailed combined
obstacles overlays and AA overlays that may be combined or modified to
form the basis of the MCOO. At lower echelons however, the MCOO is
normalIy prepared by the intelligence staff as a single graphic.
A MCOO is produced for the IPB process when key terrain features, AAs
and MCs for air and ground forces, and a friendly operations graphic are
added to the combined obstacles overlay. Detail depends on the level and
type of operation. The MCOO contains at a minimum registration marks,
classification, titling data, and a legend. As a general rule the
following information is depicted:
E-22
Weather and terrain have more impact on the battle than any other
p h y s i c a l f a c t o r , including weapons, equipment, or supplies. The terrain
on which battles are fought presents opportunities to both sides. Most
battles are won by the forces that use the terrain and weather to their
advantage in both offensive and defensive operations. The resurgence of
terrain analysis in today’s Army and the recognition of terrain as a
potent multiplier of combat power makes each of us responsible for terrain
information.
E-23
GLOSSARY
Glossary-1
BMP designation of a type of Soviet armored personnel carrier
bn battalion
BOMREP bombing report
BTF battalion task force
btrv battery
c2 coniferous
C3 command and control
c command, control , and communications
C3=CM command, control , and cormnunications countermeasures
CAA combined arms army
ca I caliber
CARVE criticality, accessibility, recuperability, vulnerability,
and effect
CAS close air support
cav cavalry
CB chemical biological
cc cloud cover
CDP company distributing point
cd r commander
C-E Communications-Electron ics
CEW I combat electronic warfare and ntell gence
CFA covering force area
CG commanding general
cGy/hr centiGray hour
C-HUMINT counter human intelligence
cl counter inte I I igence
CIA Central Intelligence Agency ..
CIAS counterintelligence analysis section
CID Criminal Investigation Division
C-IMINT counter imagery inteligence
centimeter
cm countermeasures
CM&D colIection management and dissemination
CML chemical
COA course of action
co company
COL colonel
COLT combat observation and laser team
comd command
COM I NT communications intelligence
COMMZ communications zone
COMSEC communications security
COMZEALAND Commander, Allied Land Forces, Zealand
CONUS Continental United States
coord coordinate
COP command observation post
COSCOM corps support command
CP command post
CPA collection planning aid
CPFL Contingency Planning Facilities List
CPS characters per second
Glossary-2
CPT capta i n
CRT cathode-ray tube
CRTA commander rocket troop artillery
CS combat support
CSA corps support activity
CSG corps support group
C-SIGINT counter signals intelligence
Css combat service support
CTL critical task list
CTOC corps tactical operations center
CTOCSE corps tactical operations center support element
CTT commander’s tactical terminal
CUBIC Commnon Users Baseline for the Intelligence Commnunity
CUCV commercial utility cargo vehicle
CW continuous wave
D deciduous
DA Department of the Army
DAG division artillery group
DATEXT data extract
DBMS data base management system
DCS Defense Communications System
def defense
deg degrees
DF direction finding
DIA Defense Intelligence Agency
div division
D 1 VARTY division artillery
DMA Defense Mapping Agency
DMz demilitarized zone
DOD Department of Defense
DO I date of information
DP decision points
DS direct support
DST decision support template
DTG date-time group
DTOC division tactical operations center
DTOCSE division tactical operations center support element
DZ drop zone
Glossary-3
EENT end of evening nautical twilight
EEOB enemy electronic order of battle
elm e I ement
EMCON emission control orders
en enemy
engr engineer
EOB electronic order of battle
EPL ELINT parameters list
EPW enemy prisoner of war
ESM electronic warfare support measures
est estimated
EW electronic warfare
F Fahrenheit
FA field artillery
FAC forward air controller
FAIO field artillery intelligence officer
FBI Federal Bureau of Investigation
FEBA forward edge of the battle area
FIST fire support team
FLOT forward line of own troops
FM field manual
FO forward observer
Fof F field of fire
FP field post
FPN field post number
FRAGO fragmentary order
FRG Federal Republic of Germany
FROG free rocket over ground
FS fire support
FSCOORD fire support coordinator
FSE fire support element
FSO fire support officer
ft feet
FVD full unit designation
fvdfwd forward
Glossary-4
HB high burst
HD horizontal ground distance
HF high frequency
HHC headquarters and headquarters company
HOTPHOTOREP hot (high priority) photographic report
how howitzer
HPT high payoff target
HQ headquarters
hr hour
HUMINT human intelligence
hv heavy
HVT high value target
hwy h i ghway
1A imagery analysis
ID identification
I DAD internal defense and development
I ED imitative electronic deception
I EW intelIigence and electronic warfare
I FV infantry fighting vehicles
IIR intelIigence information report
IMINT imagery intelIigence
inf infantry
I NSCOM Intelligence and Security Command
i nst I installation
intg interrogation
I NTREP intelligence report
I NTSUM intelligence summary
I PB intelligence preparation of the battlefield
IPIR initial programmad interpretation report
IR information requirements
I TAC Intelligence and Threat Analysis Center
Glossary-5
m meter
maint maintenance
MAJ major
MAS [ NT measurement and signature intelIigence
ma x max i mum
MBA main battle area
MC mobility corridor
MCOO modified combined obstacles overlay
MD map distance
MDC I multidiscipline counterintelligence
MDC I SUM multidiscipline counterintelligence summary
mech mechanized
MED manipulative electronic deception
METT-T mission, enemy, terrain, troops, and time available
MG machinegun; major general
Ml military intelligence
MIJI m e a c o n i n g , i n t r u s i o n , jamming, and interference
MIJIFEEDER meaconing, intrusion, jamming, and interference report
feeder
min minute or minimum
MISREP mission report
mm miIIimeter
MOD mobile obstacle detachment
mort mor tar
MOPP mission oriented protective posture
MORTREP mortar bombing report
MOV military owned vehicle
MP military police
MR motorized rifle
MRB motorized rifle battalion
MRC motorized rifle company
MRD motorized rifle division
MRR motorized rifle regiment
m/s meters per second
msg message
mat missile
MSR main supply route
MTLR moving target-locating radar
mtr motor
maneuver
Glossary-6
06 order of battle
obj object
OCOKA observation and fields of fire, concealment and cover,
obstacles, key terrain, avenues of approach, and mobility
corridors
off officer
OlC officer in charge
OMG operational maneuver group
OP observation post
OPLAN operations plan
OPORD operations order
OPSEC operations security
org o r g a n i z a t on
R rock outcrops
R&D research and development
R&S reconnaissance and surveiIlance
RAG regimental artilIery group
RATT radio teletypewriter
RC reserve component
RD road
REC radioelectronic combat (not a US term)
RECCEXREP reconnaissance exploitation report
recon reconnaissar ce
regt regiment
res reserve
RF representat ve fraction
Rll r e q u e s t f o r intelIigence information
RO I PB rear operat ons intelligence preparation of the battlefield
rpt report
RRII response to r e q u e s t f o r i n t e l I i g e n c e i n f o r m a t i o n
RSTA reconnaissance, surveiIlance, and target acquisition
Glossary-7
/s/ signature
S2 Intelligence Officer (US Army)
S3 Operations and Training Officer (US Army)
SA special agent
SALUTE s i z e , a c t i v i t y , location, unit, time, equipment
(spot report format)
SAM surface-to-air-missiIe
SATRAN definition is classified (see FM34-60A (S-NFD))
SCARF standard coIIection asset request format
Sc I sensitive compartmented information
SCUD nickname of a missile system
SEAD suppression of enemy air defenses
SED simulated electronic deception
SHAPE Supreme Headquarters Allied Powers Europe
SHELREP shell report
sig signal
SIGINT signals intelligence
S I GSEC signal security
SIR specific information requirements
S I TDEV situation development
S I TMAP situation map
S I TREP situation report
SLAR side-looking airborne radar
SOP standing operating procedures
SP self-propel led
SSM surface-to-surface missile
STANAG standardization agreement
str strength
SUPINTREP supplementary intelligence report
SUPIR supplemental programed interpretation report
Swo Staff Weather Officer
TA target acquisition
TAC-D tactical deception
TACREP tactical report
TA I target areas of interest
TARDEV target development
TCAC technical control and analysis center
TCAE technical control and analysis element
TDA target damage assessment
TD I target data inventory
TEL transporter-erector- launcher
TEMPEST an unclassified name for studies and investigations of
compromising emanations
TF task force
tgt target
TI technical intelligence
tk tank
TLE target location error
tng training
TOC tactical operations center
Glossary-8
TOE table of organization and equipment
TPL time phase line
trp troops
TSS target selection standards
TTADB tactical terrain analysis data base
TTY teletypewriter
TVA target value analysis
yr year
Glossary-9
References
REQUIRED PUBLICATIONS
FM 100-5 Operations
RELATED PUBLICATIONS
21-26 Map R e a d i n g a n d L a n d N a v i g a t i o n
34-10 Div s i o n I n t e l I i g e n c e a n d E l e c t r o n i c W a r f a r e
Operations
References-1
34-81 Weather Support for Army Tactical Operations
F i e i d C rcular (FC)
References-2
2029 Method of Describing Ground Locations, Areas and
Boundaries
References-3
Al. See area of interest
ADP. See automatic data processing
aerial fire support officers (FSO), 7-10
AirLand Battle, 1-1
area of operation (AO), 1 - 1
deep attack, sample of, 1-2
HVT, 1-2
IPT, 1-2
intelligence support to
close operations, 1-3
daep operations, 1-3
rear operations, 1-3
all-source production section (ASPS), 2-2
analysis, 2-4, 2-17
area of operations, A-108
pattern, 6-9
annotated jntelljgence estimate, A-10
for stability operations, 1-4, A-26
applications programs, B-6
arbitrary unit designators, 3-28, 3-30
area of jnterest (Al), 1-4, 4-7
area of operations, 1-1, 1-4, A-108
area study files, 10-7
ASPS. See all-source production section
assessment, 2-17
attack options, 7-7
delay, 7-7
disrupt, 7-7
limit, 7-7
automatic data processing (ADP), B-1
automation support to intelligence analysis, B-1, B-4
current automated support systems, B-7
MICROFIX, B-7
TCAC, B-7
hardware, B-2
keyboard, B-3
modems, B-4
monitor, B-4
peripherals, B-4
printer, B-4
processor, B-4
storage device, B-4
video cassette recorders, B-4
video disk players, B-4
software, B-2
applications program, B-S
data base management system, B-6
operating system, B-5
word processing, B-S
avenues of approach and mobility corridors, 4-10, 4-16, E-22
Index- 1
BAE. See battlefield area evaluation
battlefield area, 1-4
Al, 1-4
AO, 1-4
cl, 1-4
Ew, 1-4
ECCM, 1-6
ECM, 1-6
ESM, 1-6
lEW mission, 1-4
one-up and two-down formula, 1-4
situation development, 1-4
make sound tactical decisions, 1-4
target development, 1-4
battlefield area evaluation (BAE), 1-4, 4-7, 7-6
battlefield information coordination center (BICC), 1-8, 1-9
biases, S-11
BICC. See battlefield information coordination center
blue element, 5-7
bombing, shelling, and mortaring report, A-87
Index-2
coordinate register, 3-22, 10-9
counter-human intelligence (C-HUMiNT), 9-2
counter-imagery intelligence (C-IMINT), 9-3
counterinsurgency, 10-1
counterintelligence (Cl), 1-4
analysis, 9-1
a n a l y s i s s e c t on (CIAS), 9-1
C-HUMINT CO I e c t i o n , 9 - 2
C-IMINT coi l e c t i o n , 9 - 3
C-SiGINT co l e c t i o n , 9 - 2
EACIC, 9-1
ITAC, 9-1
rear operations, 9-2
counter-signals intelligence (C-SIGINT), 9-2
workstation, B-14
course of action (COA), 6-3
credibility, 2-14
of information, 2-15
critical nodes, 7-7
CRT. See cathode ray tube
current automated support systems, B-7
current propaganda and PSYOP file, 10-7
ndex-3
target selection standards (TSS), 7-11
directing, 2-1
disposition, 3-1, 3-2, 10-14
dissemination, 2-18, 10-12
disrupt, 1-1, 7-1, 7-7
doctrinal, 4-7, 4-11, 4-24, 4-32
templates, 4-5, 4-14, 4-25, 4-27, 6-4
OP. See decision point
Index-4
intelligence annex, A-29
intelligence estimate, A-1
intelligence report, A-43
intelligence summary, A-44
interrogation and translation report, A-61
meaconing, intrusion, jamming, and interference report, A-143
mlsslon report, A-129
NBC attack reports, A-09
oral reports, A-144
decislon briefing, A-144
information briefing, A-144
patrol report, A-126
periodic intelligence report, A-48
periodic intelligence summary, A-51
reconnaissance exploitation report, A-68
SIGINT tactical report, A-142
situation report, A-42
spot report, A-1
standard collection asset request format, A-136
forward area alerting radar, 7-10
fragmentary order, A-127
FSO. See aerial fire support officer
G2/S2, 1-8
G3/S3, 1-8
Index-5
intelIigence
analysis, B-1
ADP, B-1
automation support to, B-1
CRT, B-4
hardware, B-2
keyboard, B-3
modems, B-4
monitor, B-4
peripherals, B-4
printer, B-4
processor, B-4
software, B-2
applications program, B-5
DBMS, B-6
operating system, B-6
word processing, B-5
storage device, B-4
video cassette recorders, B-4
video disk players, B-4
annex, A-29
director, coordinators, and producers, 1-8
estimate, 10-2
dissemination, 1o-I2
evaluation, 1 0 - 1 0
integration, 1O-10
interpretation, 10-11
recording, 10-4
area study files, 10-7
civil-military operations file, 10-9
coordinate register, 10-9
current propaganda and PSYOP file, 10-7
hot file, 10-7
incident map, 10-4
insurgency analysis worksheet, 10-7
insurgent SITMAP, 10-4
personalities and contracts map, 10-5
personality and organization file, 10-7
population status map, 10-5
r e s o u r c e file, 10-7
trap map, 10-6
file, 2-7
journal, 2-6
report, A-43
required for ECCM, 8-3
required for E(X, 8-2
required for ESM, 8-2
support to
combatting terrorism, 9-14
counterinsurgency, 10-1
Index-6
summary, A-44
workbook, 2-12
intelligence analysis system, !-6
BICC, 1-9
duties of, 1-8
commander, 1-8
coordinator, 1-8
director, 1-8
producers, 1-8
staffs, 1-8
G2/S2, 1-8
G3/S3, 1-8
TCAE, 1-9
TOC support element, 1-9
Intelligence cycle, 2-1
collecting, 2-2
CM&D section, 2-2
directing, 2-1
ASPS, 2-2
IR, 2-2
PIR, 2-2
dissemination, 2-18
processing, 2-3
analysis, 2-4
assessment, 2-17
deduction, 2-18
integration, 2-17
evaluation, 2-4, 2-13
credibility, 2-14, 2-16
pertinence, 2-14
reliability, 2-14
of source and agency, 2-1S
recording, 2-3, 2-6
intelligence journal, 2-6, 2-8
intelligence file, 2-7
intelligence workbook, 2-12
OB SITMAP, 2-10
working SITMAP, 2-9
intelligence preparation of the battlefield (IPB), 4-3, 4-34
application of, 4-5
commander’s intent, 4-6, 4-27, 4-30
event template, 4-6, 4-28, 4-32
MCOO, 4-6, 4-8
template, 4-6
battlefield area evaluation (BAE), 4-7
Al, 4 - 7
METT-T, 4-7
MCOO, 4-6, 4-8
avenues of approach and mobility corridors, 4-16
one-down, two-down rule, 4-11
Index-7
one-up, two-down rule 4-11
concealment and cover, 4 - 8
key terrain, 4-8, 4-28
decisive, 4-10
observation and fields o f f i r e , 4 - 8
obstacle, 4-6, 4-8, 4- 0, 4-22, 4-25
OCOKA, 4-8
combined obstacle overlay, 4-6, 4-8, 4-12, 4-22
effects of weather on mobility, 4-13
in support of LIC, 10-2
line of sight analysis, 4-15
process, 4-1, 4-11, 4-24, 4-26, 4-34
decision support, 4-1, 4-5, 4-26, 4-29
doctrinal template, 4-14, 4-25, 4-27
event, 4-3, 4-29, 4-32
situation, 4-3, 4-5, 4-26, 4-32
products, 4-2, 4-5, 4-7, 4-11, 4-21
templates
decision support, 4-1, 4-26, 4-32
doctrinal, 4-14, 4-25, 4-27
event, 4-6, 4-28, 4-32
situation, 4-6, 4-26
terrain factor matrix, 4-11
threat evaluation, 4-1, 4-24
doctrinal template, 4-25
threat integration, 4-3, 4-21, 4-26
decision support template, 4-1, 4-26, 4-29, 4-32
decision points, 4-30, 4-32
decision support matrix, 4-32
TAI, 4-31
time phase lines, 4 - 3 0
event analysis matrix, 4-29
event template, 4-6, 4-28, 4-32
PIR, 4-27, 4-32
situation templates, 4-26
weather analysis, 4-1, 4-15, 4-21, 4-26
cloud cover (CC), 4-13, 4-22
precipitation, 4-13, 4-17, 4-23
visibility, 4-9, 4-13, 4-18
wind speed and direction, 4-22
weather factor analysis matrix, 4-24
intelligence support
of close operations, 1-3
of rear operations, 1-3
to combatting terrorism, 9-14
to deep operations, 1-3
interpretation, 10-11
interrogation and translation report, A-61
ITAC. See intelligence and threat analysis c e n t e r
Index-8
keyboard, B-3
Key terra n, 4-8, 4-28, E-21
l i m i t , 7 -< , 7-7
line of s ght analysis, 4-16
logistics, 3-1, 3-4, 10-17
Index-9
oral r e p o r t , B - 1 4 4
decision briefing, A-144
information briefing, A-144
order of battle, 10-12
combat forces, 10-14
composition, 10-13
disposition, 10-14
effectiveness, 10-18
electronic technical data, 10-19
factors, 3-1
combat effectiveness, 3-1, 3-6
composition, 3-1, 3-2
disposition, 3-1, 3-2
electronic technical data, 3-1, 3-5
logistics, 3-1, 3-4
miscellaneous data, 3-1, 3-6
personality file, 3-6
unit history, 3-6
strength, 3-1, 3-3
tactics, 3-1, 3-3
training, 3-1, 3-4
historical studies, 10-20
logistics, 10-17
personalities, 10-19
Phase I of an insurgency, 10-12
Phase II of an insurgency, 10-13
Phase Ill of an insurgency, 10-13
political structure, 10-14
records, 3-11
card, 3-17
coordinate register, 3-22”
military installation file, 3-22
organizational worksheet, 3-22
p e r s o n a l i t y file, 3-18
SITMAP, 2-10, 3-14
strength worksheet, 3-22
unit workbook, 3-12
workbook, 3-12
references, 3-6
book, structure of, 3-7, 3-8
handbook of military forces, 3-8, 3-9
Installation handbooks, 3-10
miscellaneous, 3-10
STANAG 2077, 3-6
strength, 10-15
tactics, 10-16
training, 10-17
patrol report, A-126
pattern analysis, 6-9
patterns and signatures, 9-3
index-10
periodic
intelligence report, A-48
intelligence summary, A-51
peripherals, B-4
personalities, 10-19
and contacts map, 10-5
fries, 3-6, 3-18
pertinence, 2-14
Phase I of an insurgency, 10-12
Phase Il of an insurgency, 10-13
Phase Ill of an insurgency, 10-13
PIR. See priority intelligence requirements
planned targets, 7-12
planning terrain analysis data base, 7-12
population status map, 10-5
precipitation, 4-13, 4-17, 4-23, E-12
printer, B-4
priority intelligence requirements (PIR), 2-2, 4-27, 4-32
processing, 2-3, 10-3
processor, B-4
index-n
S2/G2, 1-8
S3/G3, 1-8
SIGINT. See signals intelligence
signals intelligence (SIGINT) tactical report, A-142
situation
development, 1-4, 6-1
capabilities, 6-1
courses of action, 6-3
indicators, 6-3
pattern analysis, 6-9
weighting indicators, 6-10
working SITMAP, 6-4
doctrinal templata, 6-4
report, A-42
template, 4-6, 4-26, 4-32, 7-5
software, B-2
spot report, A-1
staffs, 1-8
STANAG 2077, 3-6
standard collection asset request format, A-136
storage devices, B-4
strength, 3-1, 3-3, 10-15
computations, D-1
worksheet, 3-22
structure of an OB book, 3-8
suppress, 7-1
surface materials, E-14
tactical
operations center (TOC) support elements, 1-8, 1-9
terrain analysis data base, E-1
tactics, 3-1, 3-3, 10-16
target
damage assessment, 7-13
development, 1-4, 1-5, 7-1
attack options, 7-7
delay or limit, 7-7
disrupt, 7-7
decide function, 7-3
HPT matrix, 7-4
target selection standards, 7-4
detect function, 7-3, 7-8
aerial fire support officers, 7-10
combat observation laser teams (COLT), 7-10
first support teams (FIST), 7-8
forward area alerting radar (FAAR), 7-10
moving target locating radar (MTLR), 7-10
target location errors ( T L E ) , 7 - 1 1
target selection standards (TSS), 7-11
index-12
deliver function, 7-4
IPB, 7-5
and BAE, 7-5
decision point, 7-5
situation template, 7-5
TAI, 7-5
terrain evaluation, 7-5
weather analysis, 7-5
location errors (TLE), 7-7
of opportunity, 7-12, 7-13
planned, 7-12
selection standards (TSS), 7-4, 7-7
value analysis, 7-6
critical nodes, 7-7
HPT, 7-6
HVT, 7-6
target areas of interest (TAI), 4-30, 7-5
targeting process, 7-1
functions, 7-1
decide, 7-3
HPT matrix, 7-4
target selection standards (TSS), 7-4
deliver, 7-4
detect, 7-3
objective of, 7-1
delay, 7-1
disrupt, 7-1
limit, 7-1
. destroy, 7-1
neutralize, 7-1
suppress, 7-1
target location error (TLE), 7-11
target selection standards (TSS), 7-7, 7-11
TCAC. See technical control and analysis center
TCAE. See technical control and analysis element
technical
control and analysis center (TCAC), B-7
control and analysis element (TCAE), 1-8, 1-9
workstation, B-13
templates, 4-5
decision support, 4-1, 4-26, 4-20, 4-32
doctrinal, 4-14, 4-25, 4-27, 6-4
event, 4-6, 4-28, 4-32
situation, 4-6, 4-26, 7-5
terrain
analysis, E-1
avenues of approach and mobility corridors, E-22
combined obstacles overlay, E-22
concealment and cover, E-20
effects of weather, D-1
lndex-13
key terrain, E-21
modified combined obstacles overlay (MCOO), E-22
observation and fields of fire, E-2o
observation and fields of fire, concealment and cover, obstacles,
key terrain, avenues of approach, and mobility corridors (OCOKA), E-1
obstacles, E-21
p l a n n i n g t e r r a i n d a t a b a s al E - 1
precipitation, E-12
tactical terrain data base, E-1
vegetation, E-12
evaluation, 7-5
factor matrix, 4-11
masking, E-20
military aspects of, E-20
avenues of approach and mobility corridors, E-22
concealment and cover, E-20
key terrain, E-21
observation and fields of fire, E-20
terrain masking, E-20
obstacles, E-21
threat
evaluation, 4-1, 4-24
doctrinal templates, 4-25, 4-27
integration, 4-3, 4-21, 4-26
decision support matrix, 4-32
event analysis matrix, 4-29
PIR, 4-27, 4-32
templates
decision support, 4-1, 4-26, 4-29, 4-32
decision points, 4-30, 4-32
TAI, 4-31
HPT, 4-3, 4-31
HVT, 4-1, 4-24, 4-31
time phase lines, 4-30
event, 4-6, 4-28, 4-32
NAI, 4-28, 4-32
situation, 4-26
model, 5-5
checkist of white, red, and blue questions, 5-8
blue element, 5-7
red element, 5-6
white elements, 5-5
time phase lines, 4-30
TLE. See target location error
TOC. See tactical operations center
topographic workstatlon, B-13
training, 3-1, 3-4, 10-17
trap map, 10-5
TSS. See target selection standard
index-14
unit workbook, 3~-12
unit history, 3-6
user of intelligence, 5-1
vegetation, E-12
video cassette recorders, B-4
video disk players, B-4
visibility, 4-9, 4-13, 4-18, 4-22
index-15
FM 34-3
15 MARCH 1990
CARL E. VUONO
General, United States Army
Chief of Staff
Official:
WILLIAM J. MEEHAN II
Brigadier General, United States Armv
The Adjutant General
DISTRIBUTION: