-
FM 41-10
Chapter 6
Intelo
l i g e n c e A s p e c t sf CA Operations
The nature of CA operations and the need for CA personnel
todevelop and maintain a close relationship with the
civilianpopulace puts them in a favorable position to collect
information.CA personnel in their daily operations deal with
people, equipment,and documents that are prime sources of
Information. ThisInformation can supplement the intelligence
effort. U.S. forces needtimely and accurate intelligence and
information to plan missions,secure the element of surprise,
identify and develop targets, andprotect U.S. interests across the
operational continuum.
CA operations are closely tied to the intelligence functions
andoperations associated with the overall tactical mission. CA
person-nel have an intricate and important intelligence role during
boththe Intelligence cycle and the operational planning
sequence.
INTELLIGENCE CYCLEAll intelligence operations follow a four-step
process does intelligence planning. Requirements forknown as the
intelligence cycle (Figure 6-l). (Forfurther details, see FMs 34-3
and 34-36). The mission ofthe unit, whether CA or other SOF, drives
theintelligence cycle. As operational planning begins, so
INFORMATION COLLECTIONInformation is unevaluated material of
everydescription including that derived from
observation,communications, reports, rumors, imagery, and
othersources from which intelligence is produced.
operational planning are normally for finishedintelligence
studies, estimates, or briefings. CA plannersprepare their CMO
estimates from basic intelligencedocuments that are not primarily
written for CA use.
Information itself may be true or false, accurate orinaccurate,
positive or negative. Intelligence is theproduct resulting from the
collection, evaluation, andprocessing of information.
6-1
-
FM 41-10
CA Collection ActivitiesPersonnel engaged in CA operations are
(by their dailyactivity) in a position to obtain first-hand
informationfrom many local sources. CA personnel are able tocollect
information that is often important to otherunits’ staff sections
or agencies and supports the CCIR.
Overall, CA elements collect information that the S2and/or G2
turns into intelligence. Although valuable tothe overall
intelligence process, the role of soldiersengaged in CA operations
must be passive. CA unitscollect and report information; however,
CA personnelare not and must avoid appearing to be
intelligenceagents. Title 10 of the U.S. Code prohibits
intelligencecollection by military personnel unless authorized
bycompetent legal authority. CA information collectionactivities
encompass the complete spectrum of cultural,social, political, and
economic issues within the presentor potential AO. A coordinated
effort of CA and MIallows CA operations with their wide range
of
6-2
activities and contacts to provide the commanderinformation for
mission accomplishment.
Sources of InformationCA units should be included in the
informationcollection plan of the supported unit. While they
shouldnot go looking for information at the risk of
missionaccomplishment, they should report information thatmeets the
criteria of the supported unit’s collectionplan. Prime sources of
information available to CAunits include—
Civilians who were housed with, catered to, orassociated with
enemy personnel.DCs and other personnel participating inmovement
control, relief, or other assistance(normally referred to
appropriate intelligencepersonnel).Government documents, libraries,
or archives.Files of newspapers or periodicals.
-
FM 41-10
Industrial and commercial records.Technical equipment,
blueprints, plans, orinformation of interest related to
transportation,signal, engineer, and medical fields.
Collection MethodsDuring an operation, CA elements can provide
directsupport to intelligence collection agencies in theprocurement
of essential facilities and equipment,referral of HUMINT sources,
and informationgathering.Procurement.Aside from such normal
procurement as civilian realproperty, CA personnel support the
intelligence effortby procuring—
Maps.Civilian clothing and items of normal
personalpossessions.Biographical data or other
informationalbackground material.Civilian equipment such as
binoculars, cameras,radios, and other items.Documents including
passports, visas, vehicleoperator licenses, birth or marriage
records, orother similar documents.Foodstuffs, tobacco products, or
alcoholicbeverages peculiar to the area.Barter items.Civilian motor
vehicles, bicycles, or domesticanimals.
Referral.Through contact with civilian organizations,
leaders,and political enemies of hostile governments, CApersonnel
can assist in developing personnel databases. These data bases
identify potential recruits forscreening by intelligence, SF, or
PSYOP personnel.Individuals who pass the screening process may
thenbe recruited by appropriate agencies—
For various operations.As interpreters.As specialized craftsmen,
technicians, orlaborers.
Information Gathering.CA forces, if used correctly, can
complement theintelligence collection process, especially
HUMINT.HUMINT is the category of intelligence derived
frominformation collected and provided by human sources.In some
cases, CA elements can also enhance thecapabilities of TECHINT or
intelligence concerningforeign technological developments that may
haveeventual application for military use. All soldiers mustbe
sensitive to the types of information that would beof potential
interest to the intelligence community.They should be cognizant of
what they observe and ofits military significance.Automated Data
Processing Systems.Today, most information is processed
manually.Emerging ADP systems help the intelligence analystprocess
greater volumes of information faster and moreaccurately.
Developing, maintaining, and accessing theintelligence data base
are essential to processing.Baseline data base information and
intelligence tosupport CA operations is established by
researchingdata bases maintained by various agencies and
sources,including the following:
CIA.DIA.
NSA.
USAIA.AFMIC.
Unified and specified commands.Theater commands.
SOCRATES is a USSOCOM-sponsored systemdesigned to provide access
to intelligence databasesmost commonly used by SOF and
intelligencepersonnel. It is SOF-unique and dedicated to
fulfillingSOF intelligence requirements. USSOCOM updatesdata bases
quarterly. This system—
Provides up to and including TS/SCI and currentintelligence data
for SOF mission planning andexecution.Provides on-line access to
time-sensitiveintelligence.
Develops and integrates SOF-unique databases.
6-3
-
FM 41-10
Provides stand-alone basic intelligence capabilityfor RC SOF
elements.
The USASOC program has three components to itssystem. The
SOCRATES components include thefollowing:
SOCRATES LAN consists of on-line computers,work stations,
printers, and phones. A combina-tion of wire and fiber optic cable
is the com-munications carrier for information transfer insupport
of this system.
SOCRATES EXT extends on-line capabilities toall AC major
subordinate commands.SOCRATES can access national intelligence
data
CA INTELLIGENCE PLANNINGBefore moving into any AO, whether by
friendlyagreement, as part of a liberating force, or in
anoccupational role, CA staff sections and units draft andimplement
an intelligence collection plan. This plan isnecessary to develop
maximum information on the areaand its people and on source
material and agenciesessential for the collection of the data. The
CAfunctional specialties and their tasks provide broadguidelines as
to the general nature of CA intelligencerequirements for planning
and operational purposes.The intelligence collection plan will
include but not belimited to the following:
Topography, hydrography, climate, weather, andterrain including
land forms, drainage,vegetation, and soils.
Census, location, ethnic composition, and healthfactors of the
population.
Attitude of the population including ideological,religious, and
cultural aspects.
Government structure including forms,personalities, laws in
being, and politicalheritage.
Educational standards and facilities andimportant cultural
activities and repositories.
Communication, transportation, utility, power,and natural
resources.
bases, PSYOP, and other SOF-peculiar databases.SOCRATES SAC is a
collateral stand-alonecomputer application using existing
SOCRATESsoftware and allowing access to regionalintelligence data.
This stand-alone system hasbeen fielded to RC and NG units.
POADS is a data base used to store BPSs, SPSs, andspecial
assessments. POADS is a collateral data baseaccessible to all AC
SOF. USAR PSYOP units areon-line and are currently training CA RC
elements. TheCIA, DOS, and Foreign Broadcast Information
Serviceprocess information into POADS. Some data bases inPOADS are
being accessed by SOCRATES.
Labor potential including availability by type andskill,
practices, and organizations.Economic development including
principalindustries, scientific and technical
capabilities,commercial processes, banking structure,monetary
system, price, and commodity controls.Extent and nature of
agricultural production andaccustomed population dietary
habits.Cores of resistance movements.Organization and operation of
guerrilla forces inrear areas and the extent and degree of
volitioninvolved in local support.Hostile activities including
espionage, sabotage,and other factors of subversion and
disaffection.
CA Collection PlanThe CA collection plan is predicated on PIR
designatedby the commander in support of operations,
normallythrough his staff. It provides a systematic analysis
ofinformation required and determines the assignment ofassets or
resources (assets are organic to the unitresources are not) with
the ability to procure therequired information. Once the staff
analyzes thecommander’s PIR, the G2 or his collection
managerprepares the collection plan for integration into theoverall
plan for the command.The CA intelligence officer will normally
direct andsupervise the collection effort as the collection
6-4
-
FM 41-10
manager. He prepares collection plan(s), usually inconjunction
with the intelligence officer (S2 or G2) orcollection manager of
the tactical command or higherheadquarters. In addition, he
prepares an intelligencecollection plan for his own headquarters.A
sound collection plan that effectively uses collectionassets
results in a heavy volume of information. Theextent to which the
intelligence officer of a CAheadquarters processes the information
depends on—
The size of his staff.His other duties.Proximity and
availability of other intelligenceprocessing agencies.The desires
of his commander.
The intelligence officer maintains files, a journal,worksheets,
and a situation map with overlays asrequired by the mission.CA
Intelligence Collection RequirementsCA intelligence planning
identifies which collectionassets or resources will collect
intelligence to satisfyCA requirements. The CA intelligence officer
forwardsthose requirements that organic CA assets cannotanswer to
the supported command’s G2 and/or S2.Channeling intelligence
requirements through the G2and/or S2 ensures-
They are tasked to proper agencies.All sources are
considered.The requirements receive proper commandemphasis.
During intelligence planning, the CA staff analyzesPIR and the
CCIR to determine what information isneeded and the priority of
need for each intelligenceitem. PIR are those critical items of
information the
commander needs at a particular time to reach a logicaldecision
on what COA to adopt to best accomplish hismission. IR are those
items of information regardingthe enemy and his environment that
may affect missionaccomplishment. The CA staff also determines—
What indicators answer the intelligencerequirement.What sources
and agencies can best answer eachintelligence item.The proper
dissemination of information.
Figure 6-2, page 6-6, gives the format and instructionsfor
completing a CA collection plan. Figure 6-3, pages6-7 through 6-14,
is a sample CA collection plan. Formore information, refer to FM
34-36.Protected Target ListWhether CMO support SOF or GP forces,
the OPLANwill usually annotate command guidance duringpre-mission
planning and preparation. Supporting plansfocus on minimizing
civilian interference and reducingcollateral damage to the civilian
populace and economy.CA planners and units play an invaluable
support role inthe development of the command’s “protected
targets”list. The difference between the tactical and the CA listis
that CA planners consider the cultural, economic,political, and
informational aspects of the operation, toinclude restoration. For
an example, with someexplanation of protected target list
development by CAplanners, see Figure 6-4, page 6-15. Submission of
theirlist dces not constitute approval but begins a
staffingprocess. CA elements must understand that
tacticaloperational missions have priority, but a
well-presentedlist is a first step in assisting the commander in
meetingmoral considerations and legal obligations to the public.For
a more detailed discussion of planning andpreparation, see Chapter
8.
6-5
-
FM 41-10
6-6
-
FM 41-10
6-7
-
FM 41-10
6-8
-
FM 41-10
6-9
-
FM 41-10
6-10
-
FM 41-10
6-11
-
FM 41-10
6-12
-
FM 41-10
6-13
-
FM 41-10
6-14
-
FM 41-10
6-15
-
FM 41-10
INTELLIGENCE PREPARATION OF THE OPERATIONAL AREAThe CA commander
is the ultimate director of the and COAs. This analysis must be
considered from theIPOA effort through his CCIR. The CCIR are
critical CA point of view; for example, terrain considerationsin
developing the collection plan. The collection plan that contribute
to the control of DCs. (See Figure 6-5.)supports the DST process of
IPOA. It is not sufficientto simply identify PIR and IR. The
commander must IPOA Productdevelop his own CCIR pertinent and
critical to the The IPOA product must be predictive. The
CAaccomplishment of his specific mission. See AppendixC for the
CCIR relationship to CA functional intelligence officer uses the
IPOA to provide answers
specialties. to the CCIR. The IPOA product gives the commandand
staff a continuous picture and other operationalIPOA Process
factors as they apply. It is continually updated andIPOA is a
cyclical process of intelligence analysis and briefed to the
commander, who uses the informationevaluation. It results in a
graphic and written estimate when making decisions. For more
information on howthat portrays probable hostile, friendly, and the
TTP of IPOA support CMO and other SOF,nonbelligerent third party
capabilities, vulnerabilities, see FM 34-36, Chapter 10.
6-16