badl.army.mil.bd · contents page title page i amendment record sheet iii foreword ix contents xi...

195
INTELLIGENCE AND ELECTRONIC WARFARE By order of the Chief of Army Staff Major General Chief of General Staff Bangladesh Army May 2007 Ltr No. 1595/28/MT-7(R&D) The information given in this document is not to be communicated, either directly or indirectly, to the press or to any person not authorized to receive it. Code No. GSTP-0107

Upload: others

Post on 05-Apr-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

.

INTELLIGENCE AND ELECTRONIC

WARFARE

By order of the Chief of Army Staff

Major General

Chief of General Staff

Bangladesh Army

May 2007

Ltr No. 1595/28/MT-7(R&D)

The information given in this document

is not to be communicated, either

directly or indirectly, to the press or to

any person not authorized to receive it.

Code No.

GSTP-0107

AMENDMENT RECORD SHEET

Amendment List By whom Amended Date of Insertion Initials

Number Date

(a) (b) (c) (d) (e)

CONTENTS

Page

Title Page i

Amendment Record Sheet iii

Foreword ix

Contents xi

CHAPTER – I

FUNDAMENTALS OF INTELLIGENCE

Section Title

1. Introduction to Intelligence 1-1

Intelligence Mission 1-1

Primary Intelligence Tasks 1-2

Classification of Intelligence 1-7

Intelligence Challenges for Bangladesh Army 1-10

2. Doctrinal Fundamentals and Intelligence 2-1

Principles of War 2-1

Tenets of Army Operations and Intelligence 2-4

Battle Field Imperatives and Intelligence 2-5

Principles and Limitations of Intelligence 2-7

3. Intelligence in Various Levels of War 3-1

Levels of Offensive Intelligence 3-1

Strategic Intelligence 3-7

Operational Intelligence 3-9

Tactical Intelligence 3-11

4. Intelligence Architectures at Tactical Level 4-1

Company Level 4-1

Battalion Level 4-2

Brigade Level 4-4

Division Level 4-6

Common Sources and Agencies 4-9

Section Title Page

5. The Intelligence Process 5-1

Fundamental of Intelligence Process 5-1

Direction Stage 5-4

Collection Management Stage 5-6

Processing Stage 5-8

Dissemination Stage 5-16

6. Intelligence Disciplines 6-1

Open Source Intelligence 6-2

Human Intelligence 6-3

Imagery Intelligence 6-5

Signal Intelligence 6-7

Measurement and Signatures Intelligence (MASINT) 6-9

Scientifics and Technical Intelligence 6-11

Counter Intelligence 6-11

CHAPTER – 1I

SITUATION AND TARGET DEVELOPMENT PROCESS

7. Situation Development Stage 7-1

8. Collection Management Stage 8-1

9. Processing and Target Development Stage 9-1

Processing 9-1

Target Development 9-12

10. Dissemination of Intelligence Stage 10-1

Fundamental Aspects 10-1

Means of Dissemination 10-2

Section Title Page

CHAPTER – III

INTELLIGENCE SUPPORT FOR OPERATIONS OF WAR

11. Intelligence in Operation Planning 11-1

General 11-1

Intelligence in Defensive Operations 11-1

Intelligence in Offensive Operation 11-4

Clandestine Intelligence Operations for War 11-5

12. Enemy Order of Battle Analysis 12-1

13. Military Capability Analysis 13-1

Strategic Military Capability Analysis 13-1

Operational and Tactical Capability Analysis 13-4

14. Combat Effectiveness Analysis of Enemy Strength 14-1

15. Reconnaissance and Surveillance 15-1

16. Combat Indications for Various Operations of War 16-1

Combat Indication Attack – Various Types 16-3

Combat Indicators Advance 16-6

Conventional Defence 16-7

CHAPTER – IV

ELECTRONIC WARFARE AND INFORMATION OPERATION

17. Intelligence and Electronic Warfare System 17-1

System Elements for IEW 17-10

18. Electronic Warfare and Intelligence 18-1

Electronic Support Measures (ESM) 18-3

Electronic Counter Measures 18-4

Electronic Counter Counter Measures 18-8

EW in Bangladesh Army 18-9

Section Title Page

19. Intelligence in Information Operation 19-1

General 19-1

The Information Environment 19-1

Intelligence Support to Information Operations 19-6

20. Intelligence Support for Psychological Operation 20-1

Fundamentals 20-1

Planning Process and Intelligence 20-3

21. Deception and Denial 21-1

General 21-1

Deception and Military Operation 21-1

Denial 21-6

CHAPTER – V

UNCONVENTIONAL WAR AND TOTAL PEOPLE’S WAR

22. Intelligence Function 22-1

Fundamentals 22-1

Intelligence Function in Unconventional War and Total

People's War

22-5

DISTRIBUTION

All Arms / Services .... .... Scale ‘D’

BMA .... .... 50 Copies.

SI&T .... .... 50 Copies.

DSCSC .... .... 50 Copies.

All Arms / Services School .... .... 50 Copies.

Note:

1. All concerned will demand this GSTP to : AHQ, GS Branch, SD Dte, SD-4 (CAO‘s Wg) as per the

above mentioned scale. Any additional requirement, if demanded by any establishment may be fulfilled

by the said authority on the basis of its availability.

2. Surplus copies will be returned to the above address.

FOREWORD

1. Sound decisions during war depend upon timely, accurate, adequate, and usable intelligence.

Therefore, intelligence is a subject which is relevant for everyone regardless of arms and services.

Consequently, it behoves us to have a GSTP on the subject. The GSTP provides the essence of most of

the combat intelligence aspects which have been expounded in other précis and pamphlets on the issue.

2. It is the job of the intelligence officers at all levels to request or direct the acquisition of

information; to collate and evaluate it rapidly; and then to disseminate timely, accurate, adequate, and

usable military intelligence to all planners and decision makers. Such intelligence should permit sound

decisions concerning combat operations, war plans, and peace plans. But more often than not intelligence

staffs are found to have not undertaken any formal training on intelligence. This is where the book will

appear handy.

3. The book has been organized into a number of progressive sections, where the rudimentary

aspects are covered initially and thereafter other conceptual issues are delineated. The readers will learn

gradually the affairs of combat intelligence in a sequential manner which includes various processes of

intelligence functioning. A number of charts and tables have been incorporated to enable the readers to

comprehend the subject and thereafter implement it in their respective level. Matters of security

intelligence have not been included here, since a separate GSTP on the subject may be written.

CHAPTER - I

FUNDAMENTALS OF INTELLIGENCE

SECTION - 1

INTRODUCTION TO INTELLIGENCE

INTELLIGENCE MISSION

General

0101. In a world of sovereign nations, information is a prime element of national power. Intelligence, which

is best defined as evaluated information, is the vital and often pivotal foundation for national decisions. Not only

national decision, every aspect of modern days life is virtually dependent on information. Thus the present age is

known as ‗Information Age‘ where intelligence plays a very significant role. History is full of examples of the

vital role intelligence plays in battles and operations. There have been many instances in which victorious over

much larger opposing armies, commanders who have possessed detailed knowledge of the enemy, weather, and

terrain and used that knowledge in their application of fire and manoeuvre have usually been the victors.

[Information and Intelligence

0102. Tactical information is the unevaluated material of every description including that derived from

observations, communications, reports, rumours, imageries and from other sources from which intelligence is

produced. Information in itself may be true or false, accurate or inaccurate, confirmed or unconfirmed, pertinent

or impertinent, positive or negative.

0103. Intelligence is the product resulting from the collection, evaluation and interpretation of information

which concerns one or more aspects of foreign nations or of functional geographic areas and which is

immediately or potentially significant to the development and execution of plans, policies and operations.

0104. A report of enemy tanks seen moving in a certain direction at a particular time is only a ‗Tactical

Information‘ but the significance of the presence and activity of these tanks are intelligence. The significance of

a piece of information may also vary as it passes through intelligence staff up the chain of command and it is

essential that at each level evaluation and interpretation be carried out by the intelligence staff, in close co-

operation with the operational staff, against the background of the commander's mission and intentions. In other

words, any piece of intelligence received from a subordinate formation or unit should be regarded as

information until the recipient has processed it. In common usage the term intelligence can have three

applications:

a. The product resulting from evaluated information.

b. All activities, which are designed to produce intelligence.

c. The organisations, units or staffs whose functions are primarily the collection of information, its

conversion into intelligence and the dissemination of this product to those who need it.

0105. The armed forces need military intelligence, a space or earth satellite needs scientific intelligence, a

foreign office needs political or biographic intelligence and head of state needs an amalgam of these and many

more. Consequently, intelligence activity has become a vast industry, most of which goes forward in secrecy.

While the public see the intelligence operative as a cloak-and-dagger secret agent, in fact the largest amount of

intelligence work is a non-dramatic search of public sources. This includes the monitoring of foreign radio

broadcasts, the analysis of the contents of foreign publication of all kinds, and the sifting of reports from

diplomats, businessmen, accredited military attaches and other observers.

0106. Commanders require intelligence about the enemy and the battle space prior to engaging in operations

in order to execute battles, engagement and operations. Intelligence assists commanders in visualizing the battle

space, organizing his forces and achieving objectives. Intelligence also support other related functions such as

counter intelligence which helps a commander in using intelligence as a force multiplier by dealing with

enemy‘s overt and covert threat and assist operational staff in conducting warfare both in offensive and

defensive manner.

Electronic Warfare

0107. While there are no simple formulas for winning, there are certain key factors for success on the modern

battlefield. One key factor is the support provided to the various commanders through Electronic Warfare (EW)

operations. EW operations, in both peace and war, support the winning of conventional and unconventional

battles and campaigns. The mission of EW operations is to provide the manoeuvre commander with three key

forms of support i.e. intelligence, electronic warfare and counter intelligence.

PRIMARY INTELLIGENCE TASKS

General

0108. The personnel and organizations within the intelligence battle field operating system conduct four

primary intelligence tasks that facilitate the commander‘s visualization and understanding of the threat and the

battle space. These tasks are interactive and often take place simultaneously. These tasks tailored to the

commander‘s needs are shown below :

INTELLIGENCE TAILORED TO THE COMMANDER'S NEED

INTELLIGENCE TASKS COMMANDER‟S FOCUS COMMANDER‟S

DECISIONS

1. Support to Situational

Understanding:

a. Perform Intelligence

Preparation of Battlefield

b. Perform situation

development.

c. Provide intelligence

support to force protection.

d. Conduct police intelligence

operations.

Plan a mission.

Execute the operation.

Secure the force.

Which course of action will I

implement?

Which enemy actions are

expected?

INTELLIGENCE TASKS COMMANDER‟S FOCUS COMMANDER‟S

DECISIONS

2. Support to Strategic

Responsiveness:

a. Perform Indication and

Warring.

b. Ensure intelligence

readiness.

c. Conduct area studies of

foreign countries.

d. Support sensitive site

exploitation.

Orient on contingencies. Should I increase the unit‘s

level of readiness?

Should I implement the

operational plan?

3. Conduct Intelligence,

Surveillance, and Reconnaissance

(ISR):

a. Perform intelligence

synchronization.

b. Perform ISR integration.

c. Conduct tactical

reconnaissance.

d. Conduct surveillance.

Plan the mission.

Prepare.

Execute.

Assess.

Which decision point and

target, etc., are linked to the

enemy actions?

Are the assets available and

in position to collect on the

decision point, High Pay Off

Target etc.?

Have the assets been

repositioned for contingency mission?

4. Provide Intelligence Support to

Effects:

a. Provide intelligence

support to targeting.

b. Provide intelligence

support to information

operation.

c. Provide intelligence support to tactical assessment.

Destroy/suppress/

Neutralize targets.

Reposition intelligence or

Attack assets.

Is my fire and manoeuvre

effective?

Should I re-fire the same

targets?

Support to Situational Understanding

0109. General. This task centres on providing information and intelligence to the commander, which

facilitates his understanding of the enemy and the environment. It supports the commander‘s ability to make

sound decisions. Support to situational understanding comprises four subtasks: perform intelligence preparation

of the battlefield, perform situation development, provide intelligence support to force protection, and conduct

police intelligence operations.

0110. Perform Intelligence Preparation of the Battlefield. The intelligence staff proactively undertakes

Intelligence Preparation of the Battlefield (IPB) by analyzing the enemy and the battle space including the

options it presents to friendly and threat forces. IPB includes input from the whole staff. There is only one IPB

in each headquarters with inputs from all affected staff cells. It is a systematic process of analyzing and

visualizing the threat and battle space in a specific geographic area for a specific mission or in anticipation of a

specific mission. By applying IPB, the commander and staff gain the information necessary to selectively apply

and maximize tactical power at critical points in time and space. IPB is most effective when it integrates each

staff element‘s expertise into the final products.

0111. Perform Situation Development. Situation development is a process of analyzing information and

producing current intelligence about the enemy and environment during operations. The process helps the

intelligence officer recognize and interpret the indicators of enemy intentions, objectives, tactical effectiveness,

and potential enemy course of action (COAs). Situation development :

a. Confirms or denies enemy COAs.

b. Provides enemy locations.

c. Explains what the enemy is doing in relation to the friendly force operations.

d. Provides an estimate of enemy tactical effectiveness.

0112. Provide Intelligence Support to Force Protection. Provide intelligence in support of protecting the

tactical force‘s fighting potential so that it can be applied at the appropriate time and place. This task includes

the measures the force takes to remain viable and functional by protecting itself from the effects of or recovery

from enemy activities.

0113. Conduct Police Intelligence Operations. Police intelligence operations (PIO) are a military police

(MP) function that supports, enhances, and contributes to the commander‘s force protection programme and

situational understanding. The PIO function ensures that information collected during the conduct of other MP

functions-manoeuvre and mobility support, rear area security, law and order, and internment and resettlement-is

provided as input to the intelligence collection effort and turned into action or reports.

Support to Strategic Responsiveness

0114. General. Intelligence support to strategic responsiveness supports staff planning and preparation by

defining the full spectrum of threats, forecasting future threats, and forewarning the commander of enemy

actions and intentions. Support to strategic responsiveness consists of four sub-tasks: perform indication and

warning, ensure intelligence readiness, conduct area studies of foreign countries, and support sensitive site

exploitation.

0115. Perform Indications and Warnings (I&W). This activity provides the commander with forewarning

of enemy actions or intentions; the imminence of threat actions. The intelligence officer develops I&W in order

to rapidly alert the commander of events or activities that would change the basic nature of the operations. It

enables the commander to quickly reorient the force to unexpected contingencies and shape the battlefield.

0116. Ensure Intelligence Readiness. Intelligence readiness operations support contingency planning and

preparation by developing baseline knowledge of multiple potential threats and operational environments. These

operations and related intelligence training activities engage the Intelligence battle field operating system (BOS)

to respond effectively to the commander‘s contingency planning intelligence requirements.

0117. Conduct Area Studies of Foreign Countries. Intelligence staffs study and understand the cultural,

social, political, religious, and moral beliefs and attitudes of neighbouring countries, allies and allied indigenous

forces in order to assist in accomplishing goals and objectives.

0118. Support Sensitive Site Exploitation. Sensitive site exploitation consists of a related series of

activities inside a sensitive site captured from an adversary. A sensitive site is a designated, geographically

limited area with special military, diplomatic, economic, or information sensitivity for the state.

Conduct Intelligence, Surveillance and Reconnaissance (ISR)

0119. General. With staff participation, the intelligence officer synchronizes the support to the ISR effort

by focusing the collection, processing, analysis, and intelligence products on the critical needs of the

commander. The operations officer, in coordination with the intelligence officer, tasks and directs the available

ISR assets to answer the commander‘s essential element of information (EEI). Through various detection

methods and systematic observation, reconnaissance and surveillance he obtains the required information.

0120. Perform Intelligence Synchronization. The intelligence officer, with staff participation,

synchronizes the entire collection effort to include all assets the commander controls, assets of lateral units and

higher echelon units and organizations, to answer the commander‘s essential element of information (EEI),

priority intelligence requirements (PIRs) and information requirements (IRs).

0121. Conduct Tactical Reconnaissance. To obtain, by visual observation or other detection methods, such

as signals, imagery, measurement of signature or other technical characteristics, human interaction and other

detection methods about the activities and resources of an enemy or potential enemy, or to secure data

concerning the meteorological, hydrographical, or geographic characteristics and the indigenous population of a

particular area.

0122. Conduct Surveillance. Surveillance is the systematic observation of airspace, surface, or subsurface

areas, places, persons, or things in the area of operation by visual, aural (audio), electronic, photographic, or

other means. Other means may include but are not limited to space-based systems, artillery, engineer, special

operation force, and air defence equipment.

Support Commander’s

Decision

Mission Analysis

Essential Element of

Information (EEI)

Intelligence

Requirements (IR)

Priority Intelligence

Requirements

(PIR)

COA Analysis

Indicators

Specific Information

Requirements

(SIR)

ISR Tasks

Intelligence Tasks Surveillance Tasks Reconnaissance Tasks

• Production Requirements

• Requests for Information (RFI)

• Intelligence Reach

Threat

and

Environment

Intelligence Battlefield Operating System (BOS)

0123. The Intelligence Battlefield Operating System (BOS) is one of seven battlefield operating systems.

Intelligence, manoeuvre, fire support (FS), air defence, mobility/counter mobility/survivability, combat service

support (CSS), and command and control (C2) that enable commanders to build, employ, direct, and sustain

combat power. The Intelligence BOS is a flexible force of personnel, organizations, and equipment that,

individually or collectively, provide commanders with the timely, relevant, and accurate intelligence required to

visualize the battlefield, assess the situation, and direct military actions.

0124. The Intelligence BOS not only includes assets within the military intelligence unit but also includes the

assets of all branches or BOS that conduct Intelligence BOS tasks. Every soldier, as a part of a small unit, is a

potential information collector and an essential component to help reach situational understanding. Each soldier

develops a special level of awareness simply due to exposure to events occurring in the area of operation (AO)

and has the opportunity to collect information by observation and interaction with the population.

0125. Planning and executing of military operations will require intelligence regarding the enemy and the

battlefield environment. The Intelligence BOS generates intelligence and intelligence products that portray the

enemy and aspects of the battle space. These intelligence products enable the commander to identify potential

COAs, plan operations, employ forces effectively, employ effective tactics and techniques, and take appropriate

security measures.

0126. The Intelligence BOS is always engaged in supporting the commander in offensive, defensive and

special operations. We must posture the Army for success through hard training, planning, meticulous

preparation, and aggressive execution. We can no longer allow a ‗crawl, walk, run‘ cycle in preparation for

operations. In our current environment we must maintain intelligence readiness to support operations on ‗no

notice‘. This support is comprehensive and reaches across all types of operations and levels of war to produce

the intelligence required to win on the battlefield. A combination of space, aerial, seaborne, and ground based

systems provide the most comprehensive intelligence possible.

0127. The Intelligence BOS architecture provides specific intelligence and communications structures at each

echelon from the national level through the tactical level. These structures include intelligence organizations,

systems, and procedures for collecting, processing, analyzing, and delivering intelligence and other critical

information in a useable form to those who need it and when they need it. Effective communications

connectivity and automation are essential components of this architecture.

CLASSIFICATION OF INTELLIGENCE

General

0128. The various categories of intelligence are virtually endless. The scores of different types of intelligence

that are used commonly compound the problem further, which must be broadly understood. The varieties of

headings under which these types of intelligence are classified are also enormous. Some types of intelligence are

source-oriented (such as human intelligence or signal intelligence), some form-oriented (as in raw or unfinished

intelligence), some system-oriented (electronic or telemetric), some subject-oriented (medical, economic), some

use-oriented (military, tactical) and a probable host of others.

Basic Classification

0129. Basic Intelligence. Comprises general reference material of factual nature, which results from a

collection of encyclopaedic information relating to the political, economic, geographic, and military structures,

resources, capabilities, and vulnerabilities of foreign nations.

0130. Current Intelligence. Current intelligence is the intelligence of all types and forms of immediate

interest to the users; which may be disseminated without delays to complete collation, evaluation, interpretation

and analysis.

Figure 1.1: Intelligence Process

Nature Based Classification

0131. Offensive Intelligence. Offensive intelligence means acquisitions of intelligence or conduct of

clandestine activity against a target country. This is divided into three categories basing on the levels of

intelligence such as strategic, operational and tactical intelligence.

0132. Defensive Intelligence. Defensive intelligence is that form of intelligence activities that protect

information, person, material and government from espionage, subversion, sabotage, covert action and terrorism

through detective and preventive measures. Defensive intelligence are of two types :

a. Detective or Counter Intelligence. It includes Counter Espionage, Counter Sabotage, Counter

Subversion, and Counter Covert Action. This is basically the responsibility of counter intelligence

organizations. It also encompasses all three levels such as strategic, operational and tactical.

b. Preventive or Protective Security. It includes preventive or security measures, based on the

results of detective efforts to ensure security of information, security of materials and security of

personnel. This is the responsibility of respective commanders and all ranks under them. It also

encompasses all three levels.

0133. Classification Chart. Details of the nature based classification are shown below :

Figure 1.2 : Classification of Intelligence

STRATEGIC OPERATIONAL TACTICAL

INTELLIGENCE

BASIC

CURRENT

OFFENSIVE DEFENSIVE

DETECTIVE OR

COUNTER

INTELLIGENCE

PREVENTIVE

OR PROTECTIVE

SECURITY

STRATEGIC OPERATIONAL TACTICAL

STRATEGIC OPERATIONAL TACTICAL

Classification of Clandestine Intelligence Operations

0134. Offensive Clandestine Intelligence. Offensive Clandestine Intelligence is the execution and

termination of an intelligence task, which is performed, in utmost secrecy in the face of the opposition, against a

target country. The entire operation is conceived in such a way that if compromised, its sponsorship is not

revealed and the originator can disclaim all knowledge of any such activity. Clandestine Intelligence is directed

purely against a target country in order to acquire strategic, operational and tactical intelligence as well as

dealing with all those levels through Sabotage, Subversion and Covert action. It has four components:

a. Espionage. Espionage deals with information about target country.

b. Sabotage. Sabotage deals with material or physical damage to target country‘s war and economic

programme.

c. Subversion. Subversion deals with loyalty of the citizen, politician and armed forces of target

country.

d. Covert Action. Covert action deals with the government of the target country in order to subjugate

it or replace with another suitable one for meeting own interest.

0135. Defensive Clandestine Intelligence. Defensive Clandestine Intelligence is the execution and

termination of an intelligence task, which is performed, in utmost secrecy in the face of the opposition, against a

target Hostile Intelligence Services and Subversive Organizations operating against own country or own

organization. Its main purpose is to detect and neutralize such organizations. This is also known as Counter

Intelligence and it has got four components:

a. Counter Espionage. Counter Espionage deals with detecting and neutralizing Hostile Intelligence

Services and Subversive Organizations who are involved with espionage.

b. Counter Sabotage. Counter Sabotage deals with detecting and neutralizing Hostile Intelligence

Services and Subversive Organizations who are involved with sabotage.

c. Counter Subversion. Counter Subversion deals with detecting and neutralizing Hostile

Intelligence Services and Subversive Organizations who are involved with destroying the loyalty of the

citizens, politicians and armed forces of own country.

0136. Chart - Clandestine Intelligence Operation. A chart showing branches of Clandestine Intelligence

operation is projected below :

Figure 1.3 : Classification of Clandestine Intelligence

INTELLIGENCE CHALLENGES FOR BANGLADESH ARMY

Intelligence as an Element of National Power

0137. History of Mankind is the history of conflict. In such a situation effective and efficient intelligence

organization can go a long way in maintaining sovereignty and independence of any state. During peacetime,

the silent conflict prevails in the domain of intelligence. The country who spends more on intelligence and

organizes intelligence community in most effective manner, is better protected and can also progress faster.

There is no country in the world who does not have intelligence organization. The more powerful a country is,

its intelligence organization also possess capability commensurate to its power. On the other hand poor and

weaker nations also maintain a number of intelligence organizations to ensure own sovereignty and

independence. Bangladesh is also not an exception.

0138. Importance of intelligence in national affairs or for a field commander cannot be over- emphasised. A

statesman's day often begins and ends with the reading of intelligence report or with intelligence briefing while

a field commander cannot go for a plan without the facts/figures provided by the intelligence staff. Accurate

information is essential but does not guarantee optimal decisions, while inadequate information has

demonstrably led to disaster. The need for information must be recognised and it must be collected efficiently,

interpreted with sophistication, communicated with speed to precisely where it is most needed and acted on with

skill and courage. Professional intelligence organizations at national, inter service and service level is the right

answer for this very important issue.

Types of Conflict

0139. Peace time. The peacetime goal of the Army is to train for war and all operations executed during this

time falls within the category of ‗Operations Other Than War‘. Intelligence is going to play not only a vital role

during these operations but also the only option in many situations. Historically Bangladesh Army was called

for such operations ‗In Aid of Civil Power‘ many a times. The focus of intelligence support in such operations is

concentrated on real time situation awareness and basic background information. However, intelligence

readiness and providing indication and warning are very vital for success.

0140. Near War. Bangladesh Army has gained vast experiences of Counter Insurgency and Peace Support

Operations. Army was also called for Counter Terrorism Operations in the recent past. Resolving conflict being

the major goal in a near war situation, intelligence focuses on ‗Current Intelligence‘ with the strategy of

marginalizing the opposing forces for creating a suitable environment for the political process to start.

0141. War.

CLANDESTINE INTELLIGENCE

BASIC

CURRENT

OFFENSIVE

CLANDESTINE

INTELLIGENCE

DEFENSIVE OR

COUNTER

INTELLIGENCE

ESPIONAGE

SUBVERSION

SABOTAGE

COVERT

ACTION

COUNTER

ESPIONAGE

COUNTER

SUBVERSION

COUNTER

SABOTAGE

a. Conventional. The extreme use of basic and current intelligence will be evidenced during the

period of military hostility. In fact, for Bangladesh Army, intelligence should not only be taken as a

Battle Field Operating System (BOS), but also as a Force Multiplier.

b. Unconventional. In order to strike a balance of power with a much superior adversary, Bangladesh

Army is prepared to use the unconventional warfare along-with conventional warfare where the need

for timely and effective collection, analysis and dissemination of intelligence at all levels will be

increased manifold. This needs the understanding of the whole gamut of intelligence even at grass root

level.

Intelligence Challenges for Bangladesh Army

0142. General. Bangladesh Army is to face very sophisticated adversaries both from outside and within the

country in any future tactical and non-tactical situation. In a chaotic, intense and destructive environment of the

future war, intelligence organizations of Bangladesh Army are likely to face numerous odds as challenges, some

of which are discussed subsequently.

0143. External Challenge from Conventional Adversary. In any future conventional conflict Bangladesh

Army is likely to face adversaries who are mobile, use sophisticated technology for gathering and protecting

intelligence. Their air superiority will compel Bangladesh Army to avoid using heavy signature for intelligence

gathering. The communication system for intelligence purpose is likely to face wide-scale jamming and

interception loosing vital intelligence and operational security (OPSEC) both at a time. Often unconventional

forces and means will provide solution if well catered for and integrated in the overall intelligence plan.

0144. Terrorist, Insurgent and Hostile Forces. Bangladesh Army is well experienced in fighting counter

Insurgency and conducting successful peace support operation. However, many failures in those operations are

attributed to poor handling of intelligence. Terrorists, insurgents and hostile forces in peace support operation

are seen equipped with sophisticated technology, high motivation and at times even better trained. They

maintain trans-national link and are also supported by hostile intelligence services of other countries. Terrorism

of neighbouring countries is likely to have spill over effects on Bangladesh and also likely to pose a great

challenge for the Bangladesh Army.

0145. Environmental Challenges. Present day military operations are not confined within own territory. It

is spread over all continents of the world under semi normal to highly complex environment. Primary

environmental challenges come from ethno-religious, cultural and linguistic diversity, unpredictable behaviour

pattern of opposing forces, use of sophisticated technology in an unsophisticated manner, etc. Thus

environmental diversity and cultural barriers put a huge challenge on intelligence function.

0146. Organizational Challenges. Internal challenges being faced by the intelligence organizations of

Bangladesh Army revolve around resources, training and management. Centralized control of the available

resources both manpower and assets is a feasible solution. However, better training and management of the

whole community can ensure joint-ness of the intelligence community both during peace and war. In order to

bring professionalism in the rank and file and ensure continuous development of the intelligence effort, the

Army must make professionally competent intelligence analysts, experts and operatives at all levels supported

by well equipped intelligence unit.

0147 – 0200. Reserved.

SECTION - 2

DOCTRINAL FUNDAMENTALS AND INTELLIGENCE

PRINCIPLES OF WAR

General

0201. Principles of war are broad precepts based on past experience where their application with judgment

has led to victory. Bangladesh Army has accepted a list of twelve such principles of war delineated in the GSTP

0032, Operations of War, Volume 1. These principles have more or less analogous importance in the

functioning of intelligence as well. Decision makers, their intelligence staffs at all levels and commanders of

intelligence organizations, therefore need to understand the importance of principles of war in the context of

modern day intelligence functioning.

Aim

0202. The selection of aim provides the focus for all military activities. The military planner plans his

operations to satisfy the aim being duly supported by intelligence staff/organisations. Therefore, the intelligence

staff and unit/subunit commanders must bear in mind the objectives set in the collection plan while tasking

sources and agencies. The collection effort must be directed towards satisfying the Essential Element of

Information (EEI) set at the higher level and should seldom focus on unimportant details. They should have

required inquisitiveness for comprehending the essence of their commander‘s aim. When a commander is

preparing for an operation, the intelligence organizations must not divert their attention from the primary aim of

the commander. At the same time they should also look for subsequent operations that can be envisioned. Aim

once selected must be vigorously pursued. Commanders of intelligence organizations however should not

become over influenced by the aim, since it may jeopardise his collection effort.

Morale

0203. Intelligence operatives need to work not only under complex, fast moving and fluid battlefield but

many a times also without any formal logistics and support of the parent unit. A long range penetration group, a

stay behind agent or an under cover roving agent needs to live off the land. Lack of sleep, continuous alertness

for survival, working without relieves and in isolation, put tremendous burden on someone‘s morale. In such a

situation comradeship, fellow feelings, taking care by own superiors, hard training during peacetime pay a lot. It

is hard to keep the same morale at all times but commanders of intelligence organizations must keep the tempo

and maintain the morale of own sources and agencies at all times.

Concentration

0204. This is regarded as the master principle by many military theorists and it equally applies to intelligence

assets as well. As intelligence resources are always scarce compared to what is actually needed, the commanders

should economize in certain areas in order to achieve concentration of sources and agencies at the decisive

points. In the intelligence functioning, concentration will also imply the optimum utilization of the same

resources sequentially at various decision points. However, without making a priority of decision point,

resources will never be sufficient enough for meeting the collection plan. Concentration must not create a gap in

less threatened decision point and thus intelligence commanders and staffs will often find this principle

conflicting with economy of effort.

Economy of Effort

0205. Intelligence resources should not be made inadequate in one sector in order to make concentration in

other sectors. There is no question of resorting to gambling with supported commander‘s ears and eyes. A sound

intelligence appreciation and conduct of methodical ‗Intelligence Preparations of Battle Field‘ can help

intelligence staff and commanders to achieve ‗Concentration‘ and ‗Economy of Effort‘ simultaneously. As it is

not possible to be strong everywhere, it is wise to economize the intelligence resources in one sector in order to

release resources elsewhere. It however does not advocate that the efforts to be so weak that have the chance of

being not getting enough intelligence about the enemy.

Security

0206. The commanders of intelligence organizations should adopt adequate measures to protect their sources

and agencies as their disclosure may jeopardise the success of the entire operational plan. Security, although a

very important principle of war, but also a discipline of defensive intelligence. An intelligence commander in

the field must strive to conserve his collection capabilities by taking all necessarily precautions against the

counter intelligence activities of the enemy. The counter intelligence organizations are primarily meant to detect

any overt or covert threat of the enemy, which may disrupt the whole operation. Here lies the importance of

planning an aggressive and extensive ‗Counter Intelligence‘ and ‗Operational Security‘ policy at all levels.

Surprise

0207. The commanders of intelligence units and subunits should be mindful of achieving surprise by

employing novel and ingenuous methods of employing sources and agencies to prevent detection by the counter

intelligence effort of the adversary. It is not essential that the enemy be taken unaware, rather the objective

would be achieved if he identifies our effort late enough to be useful. However, while surprising, they

themselves may remain vulnerable to enemy‘s surprise. More often than not it is at the tactical level that the

surprise comes to the fore as a battle-winning factor and has decisive impact on the outcome of the battles and

engagements. Intelligence organizations are primarily meant to analyse the product of all sources of intelligence

and provide timely and accurate warning of impending threat. It can not be materialised unless a very effective

intelligence set up is available at various levels. In the context of Bangladesh the most effective means to predict

an impending threat is by employing human sources deep inside enemy held territory and near to the command

and control system of the enemy.

Aggressive Action

0208. Although aggressive actions may jeopardise the security, but commanders of intelligence units and sub

units must be aggressive in employing their sources and agencies. Aggressive action implies boldness in

determining and executing an intelligence collection plan for the intelligence organizations. It helps them to take

appropriate initiative, enjoy greater freedom of actions and dictate the terms of battle when actual fighting

occurs. It also implies taking calculated risk in deciding and executing intelligence collection task. However,

aggressive action in case of intelligence organizations will differ greatly with that of manoeuvre or fire support

elements. In latter case aggressiveness implies exposing own-self with high physical risk, but in case of

intelligence organizations it is nothing but tenacity and boldness without compromising security.

Fluidity

0209. The best way for an inferior force to survive is to create a fluid condition in the battlefield and it has

similar implications for intelligence assets as well. Fluidity increases the fog and friction and compels the enemy

intelligence commander to lose track of events. This in turn prevents him from employing his intelligence

collection resources. The idea should be to detect enemy sources and agencies wherever one can reach out

irrespective of their locations. An integrated employment of intelligence personnel with the unconventional

forces can really create a fluid tactical or operational situation. Long range penetration group of the intelligence

organization, if employed along-with stay behind agents or sleeper agents can also help respective commanders

in creating fluid situation.

Synchronization

0210. Synchronization (Sync) means fine turning of all assets employed for a common goal. In intelligence

use, the word sync would imply well orchestration of all intelligence assets for finding out information

concerning EEI or ‗Other Information Requirement (OIR). Sync does not only imply own sync but also

disrupting enemy‘s sync. In doing so, an intelligence staff can play a pivotal role in selecting the essential EEI

and OIR. The effect of intelligence sync will multiply if concentration and coordination are made during sync.

For example 'Electronic Intelligence' effort may not be coordinated with the 'Human Intelligence', but sync of

these efforts will produce more valuable and timely intelligence than if it is not done. Similarly, sync of

different sources and agencies of different intelligence organisations will produce concentration at the desired

time and place.

Flexibility

0211. Enemy intelligence sources and agencies will always be on the lookout for our attempts to collect

intelligence about them. They will also have their counter intelligence measures to thwart our collection efforts.

There may also be numerous fleeting opportunities of getting valuable intelligence about the enemy. The

commanders of intelligence units or sub units in such cases should make quick readjustment of their collection

plan and put it into execution without losing prior coordination. The best way to deal with this is to make such

readjustments, which would turn the situational disadvantage into a collection advantage. Flexibility does not

imply only flexibility in planning. The intelligence organization must also be capable of responding to changes

wished by the tactical commanders. For this, the sources and agencies must be physically agile, capable of

making quick alteration of collection method and act rapidly. Flexibility also encompasses organizational

capability to switch into a different collection plan altogether, if need arises for any intelligence organization.

Administration and Logistics

0212. Sound logistics is also essential towards an effective intelligence collection effort. It‘s a cardinal

principle of war which if ignored will result in serious consequences as far as the intelligence aspect of the

battlefield is concerned. The logistic state often dictates the practicability of an intelligence collection plan and

the time required to accumulate logistics determines the time at which the collection effort can be launched.

Many a times, unorthodox approach and thinking out of the box proved very effective in comparison to

conventional administration and logistics for the intelligence collection sources and agencies. Apart from that,

many intelligence personnel will work under cover inside enemy or enemy held territory without formal logistic

support. Therefore, advance planning and flexibility in execution can solve all such issues related to effective

intelligence functioning.

TENETS OF ARMY OPERATIONS AND INTELLIGENCE

Initiative

0213. Initiative assists a commander of an intelligence unit or sub unit to dominate the efforts of the

adversary. It demands the acumen of the intelligence commander and competent sources and agencies to outwit

the counterintelligence effort of the enemy. A commander of an intelligence unit faces not only his enemy

counter-part but also a level higher enemy formation which would challenge him. An intelligent commander,

who can take right initiative in right time and in right place, can out-match challenges posed by technically and

numerically superior enemy intelligence forces. Initiative emanates from an urge for winning the challenges

posed by the adversary and to vanquish him in the battle of wits.

Tenacity

0214. Tenacity is the staying power of the intelligence sources and agencies under overwhelming odds for a

prolonged period. As the war goes on, the spirit of the collection force tends to diminish by a host of

contributory factors, such as capture by enemy, fatigue, frequent reversals, continual physical discomfort, and an

unremitting strain on the instinct of self preservation. Keeping these situations in mind commander of an

intelligence unit should be tenacious not to fall prey to such situation. He than adopt every measures to reverse

the situation in his favour at the earliest. Initiative and tenacity goes side by side in making the situation

favourable for collecting the EEI and OIR.

Unorthodox Approach

0215. An unorthodox approach to the conduct of intelligence collection and management means departing

from traditional method and adopting original and creative methods to achieve decisive result. The commanders

of intelligence units and sub units must employ unorthodox methods, to defeat enemy counter intelligence effort

thereby executing his collection plan effectively. The best effect is achieved when the deception story portrays

the traditional course of action in conformity with enemy expectation and the actual operation is conducted on

non-traditional line. Such action when adopted completely surprises the enemy and makes the enemy

intelligence commander‘s thought-process incoherent. Deviation from the doctrinal norms leaves the enemy

intelligence staff bewildered as they find the unfolding events are contrary to what they expected. However,

there also lies an inherent danger, which must be recognized by a commander of intelligence unit employing

unorthodox method. Therefore, to employ non-traditional methods of collection of intelligence, the sources and

agencies must be prepared to carry out such undertakings by means of extensive training, competent leadership

and by awarding timely rewards.

Non Linear Engagement

0216. The sources and agencies must be employed throughout the length and breadth of the battlefield. This

helps the commanders of intelligence units to multiply his opposing intelligence commanders‘ difficulties of

counter intelligence effort and by forcing him to dissipate his effort for which he may not be well prepared. This

is going to lead to a situation, which clogs his intelligence channel, overstretches staff system and collapses his

decision cycle. Simultaneous employment of well trained and motivated unconventional sources and agencies

along with conventional intelligence operatives can bring the decisive result quickly if tenacity and initiative can

be maintained throughout. It is understood that non-linear employment of intelligence effort is nothing but

thwarting the counter intelligence effort of enemy and rendering their intelligence collection method ineffective.

A balance employment of both human intelligence and technical acquisition assets having mutual support

between them is going to ensure success all over the theatre and battlefield.

BATTLE FIELD IMPERATIVES AND INTELLIGENCE

General

0217. Battlefield imperatives have also got various intelligence implications, like that of the principles of war

and the tenets of army operation. These imperatives can not be achieved until and unless a sound system for

direction, collection, procession and dissemination of intelligence is in place. For any imperatives to be

implemented, anticipation as to how enemy course of action will unfold, identifying enemy vulnerabilities, etc

are vital. On the other hand for blending conventional and unconventional warfare; for using terrain, weather,

deception and operational security; for minimizing battlefield stress, for acting faster than the enemy, and for

maintaining balance of force for undertaking various assignments also need sound intelligence system in place.

Ensure Unity of Effort

0218. Unified actions by various intelligence organizations under a single commander, call for common

focus; standardized modus operandi, collection techniques; standard operating procedure; and a well–

established coordination and control system. Besides, the commander of the intelligence unit should also ensure

support from the sister services intelligence organisations for strengthening his effort. Appropriate

organizational climate amongst the intelligence organisations is created by fostering the spirit of mutual trust,

sharing of intelligence gathered, and supporting each other on a given assignment at all level. Sound training

also contributes a great deal to developing harmony between various units and sub units of intelligence

community by rehearsing methods and procedures and commonly understood systems. For successful

accomplishment of the intelligence objectives, the collection plan should be simple and control mechanism

should allow for decentralized execution of the collection efforts.

Dominate Events

0219. Commander of intelligence units and sub units should be able to anticipate how the situation will

unfold during the course of the campaign or battle. Only then they will be able to dominate the events by pre-

empting the intelligence effort of the adversary. This requires thoughtful anticipation of the problems that might

occur in the days, weeks or months to come in the collection effort and preparation of contingency plans to

tackle them. Though the intelligence gathering efforts may not take place as anticipated, exploring possibilities

of likely eventualities will minimize battlefield uncertainties to a significant degree. Anticipation of enemy

courses of actions requires an intelligence commander to possess acumen of high order, a thorough knowledge

of enemy forces and their doctrine and a sound judgement. To be near accurate in his forecasting of how the

enemy might act, he has to get into enemy‘s decision cycle and read the battlefield through enemy commander‘s

mind. While doing so, he should also conceive how the enemy commanders might anticipate the events so that

he can make a collection plan that will employ resources unanticipated by the enemy commanders.

Expose and Concentrate Against Enemy Vulnerabilities

0220. Thorough knowledge of enemy intelligence capabilities and his doctrine is necessary to identify enemy

counter intelligence weaknesses. Much success in collection effort will occur by concentrating own intelligence

resources against enemy‘s vulnerabilities instead of wasting resources against his strength. Enemy‘s intelligence

gathering effort can be weakened if own counter intelligence elements succeed in denying enemy to identify and

exploit own intelligence weaknesses. On the contrary, the intelligence staff should do their utmost to identify

enemy vulnerabilities and recommend to the commander the one that promises the greatest dividend if

exploited. When the enemy commander prudently shield his vulnerabilities against own exploitation, the

intelligence commander should prepare his intelligence collection plan in such a way so that during the course

of the campaign or battle, he is able to identify enemy‘s most critical vulnerabilities at the earliest and to

disseminate this intelligence to the tactical commander to enable him exploit the situation with utmost vigour.

However, while collecting information about enemy vulnerabilities, the intelligence commander must not forget

about his own weaknesses, which if exploited by the enemy counter intelligence effort, will seriously jeopardize

the accomplishment of his objectives.

Designate, Sustain and if Required Shift the Main Effort

0221. The intelligence unit and sub unit commanders must not loose his focus from the EEI which is

otherwise his main effort. He concentrates his major intelligence resources against this main effort. The sources

and agencies assigned against the main effort receive greater attention in terms of resource allocation and the

support provided by other intelligence organisations within the command. The other information required are

generally linked to the EEI so that all these information together give a complete picture about enemy

organisation and anticipated course of action. As the collection effort progresses, the commander must not

swerve from the main effort to ensure success of the collection plan. However, unanticipated events might cause

the main intelligence gathering effort to stall and the subsidiary efforts designed to collect OIR to achieve

unexpected successes. In such cases, the intelligence commander may revise the collection plan to modify the

EEI and allied OIR under the changed circumstances. In offensive operations the intelligence commander

continually seeks to circumvent the enemy counter intelligence effort in order to identify enemy weak points to

enable own force to attack them. In defensive operation, the commanders of intelligence units deny enemy to

identify our weaknesses.

Blend Conventional and Unconventional Warfare

0222. Unconventional intelligence gathering effort behind the enemy lines using the unconventional sources

and agencies should also continue together with the conventional efforts to accomplish the objectives. It must be

borne in mind that unconventional methods of intelligence collection may at times be more effective than the

conventional means. However the efforts of unconventional elements must be examined in the light of their

capability and likelihood of being implanted by the adversary against us. The unconventional sources and

agencies may be able to provide useful information about enemy forces in the rear, location of enemy‘s

command and control centres, indirect weapon systems, air defence installations, logistic bases, troop‘s

concentrations and lines of communication. To integrate the unconventional intelligence effort with the

conventional ones, two things are essential. Firstly, there must be an organizational framework within which the

unconventional sources and agencies must operate. Secondly, a well- established coordination mechanism must

exist between the conventional and unconventional efforts of intelligence gathering. However, more often than

not there is a necessity to confirm the intelligence provided by the unconventional sources and agencies before

acting on them. When unconventional sources and agencies are collecting intelligence behind the enemy lines,

they must have an effective coordination system to achieve a synergistic result. Apart from intelligence, in many

instances, the unconventional intelligence elements can provide valuable assistance in the form of providing

guide, acting as path finder etc.

Use Terrain, Weather, Deception and Operational Security

0223. The commanders of intelligence units and sub units must learn how to maximize the advantages

offered by terrain and weather and minimize their negative impact on the collection plan. Generally the side

who does it better, establishes an edge over his opponent with regards to collection of intelligence. As terrain

and weather are the medium over which the sources and agencies operate, every effort must be made to enhance

and reduce the opportunities and limitations offered by them. The effect of weather and terrain determines the

interrelationship between our intelligence gathering effort and enemy‘s counter intelligence capabilities. On the

other hand, operational security denies fore knowledge of friendly intelligence efforts to the enemy, while

deception tricks him to gather deliberately fed information. When these two are manipulated to the maximum,

they provide greater security to own sources and agencies allowing them to operate in an environment of

minimum risk and maximum effect.

PRINCIPLES AND LIMITATIONS OF INTELLIGENCE

Principles of Intelligence

0224. It is not only the principles of war that are applicable for intelligence function; over a period of time

intelligence functioning has developed own principles. By knowing the enemy and forecasting what he is likely

to do, intelligence saves lives and enables the best use to be made of the forces available. If intelligence

functioning is not guided by own principle, then lapses may occur resulting wastages of valuable resources.

0225. The conduct of the intelligence operation in the Bangladesh Army varies with the requirements posed

by the operational environments. The acquisition of intelligence in the field will pose some problems for the

intelligence personnel, which may be termed as the limitations. However, the efforts will have to be made to

produce the necessary intelligence accurately and to disseminate it in time to all concerned.

0226. Centralized Control. Intelligence is undividable and must be centrally controlled at each level to

avoid unwarranted duplication of effort, provide mutual support and ensure the efficient and economic use of all

intelligence resources. It will also ensure co-ordination among various intelligence agencies. In conventional

war, normally centralization should occur at the highest practicable level to ensure the widest possible use of the

resources available. In unconventional war the centralisation should occur at every level possible. It does not

however, mean rigidity and non-sharing of information among various agencies.

0227. Objectivity. Once collected, information must be processed with conscious objectivity. There is often

a temptation to distort information to fit preconceived ideas or previous assessments. This must be avoided at all

costs.

0228. Systematic Exploitation of Sources and Agencies. Sources and agencies must be exploited

systematically and logically. They should be methodically tasked based on a thorough knowledge of their

capabilities and limitations.

0229. Accessibility. Relevant information and intelligence must be readily available to intelligence staffs

and users. Intelligence staffs must process all information and intelligence very deliberately and this includes

continuous comparison with previously acquired data. Intelligence is of no value if not disseminated nor

accessible to those who need it.

0230. Continuous Review. Intelligence must be reviewed continuously and where necessary revised taking

into account all new information, which should be compared with that already known. All new information as

soon as it is received should be examined against the question 'does this alter the current assessment?'

0231. Timeliness. The most accurate and reliable information or intelligence is useless unless it reaches the

user in time to serve as a basis for appropriate action. Changes in a situation must be detected and reported to

user in sufficient time for due action to be taken by them. This requires a speed of communications between

policy-makers, commanders, their intelligence staffs and the collection agencies, which is sufficient to react to

change as it occurs.

0232. Vision. Intelligence operations require imagination and foresights. All intelligence resources must

be focused on the EEI of the time but the staff must always be ready to recommend others, which may have

been overlooked. They must also be alert to seize upon any unsolicited and apparently dissociated item which

may provide a vital lead to a hitherto unrecognised but crucial intelligence problem. Officers having this ability

are rightly described as having a flair for intelligence.

0233. Source Protection. Sources must be given protection commensurate with their value and their

vulnerability to detection. It is critical that intelligence staff have sufficient knowledge of sources and agencies

in order to task them effectively and with due regard to the threat they face.

0234. Co-operation. One can rarely be self-sufficient in collection of intelligence whether in peace or war.

Besides, there may be the requirement of crosscheck of a particular piece of information. That is why co-

operation is essential amongst the intelligence staffs, branches, agencies and services.

0235. Security. Unauthorised personnel must be denied information about operations of intelligence

agencies, sources of information and the intelligence product. Mere security verification or the rank does not

entitle a person to have access to all the information. It demands that information should only be passed to those

who need to know it. One should not be given classified information until one‘s need to know has been

established. In the same way one should hold some classified document or material only when his need to hold

the same has been fully confirmed.

Limitations of Intelligence

0236. Security Measures. The enemy will take defensive (security) measures to deny the information

collection by own personnel concerning his true intentions by the measures like night movements, dummy

positions, feint attacks, ruses, rumours, camouflage and concealment. This posses a serious limitation on

intelligence.

0237. Resources. Limitation of resources in the field may force to derive the conclusion from a single piece

of information that may not provide conclusive evidence as to the situation, capabilities and intention of the

enemy. Other sources will have to be created to acquire the information to form the conclusive evidence of

enemy‘s intentions.

0238. Time The time factor may also limit the accuracy and utility of the information. The time that the

information may take to reach a headquarters, where appropriate action can be taken may render it out of date or

may preclude the possibility of any action being taken at all.

0239. Change in Enemy‟s Plan. The information concerning the enemy will probably never entirely be

conclusive, complete or up to date. The enemy is free to choose his course of action and to vary the course of

action when he so desires. Therefore, an estimate can only be made regarding the enemy‘s situation, capabilities

and intentions.

0240. Training of Personnel. The performance of the intelligence staff is likely to vary due to their

aptitude, training and individual characteristics. The intelligence staff cannot categorically state what course of

action the enemy is most likely to adopt and what resources and methods he will employ. Quality of training and

a visionary mind can help an intelligence staff to have sound assumptions of enemy courses of action.

However, they must preserve a balance between the assumptions and possible alternatives. They must also

remember that providing so many alternatives may render the intelligence appreciation and intelligence

preparation of the battle field (IPB) valueless.

Remedial Measures

0241. Employment of Modern Techniques. All discipline of intelligence like Human Intelligence

(HUMINT), Imagery Intelligence (IMINT), Signals Intelligence (SIGINT) and others should be used to break

the security measures adopted by the enemy as well as to integrate all the resources for the acquisition of

information.

0242. Transmission of Information/Intelligence. Extensive and thorough arrangements for the

transmission of information and dissemination of intelligence must be made. This can be ensured by the

availability of good communication system and set procedures for passing the information and disseminating the

intelligence.

0243. Selection of Personnel. The intelligence personnel who are employed to carry out the interpretation

of the information must be selected carefully, keeping in mind, their aptitude and individual characteristics.

They should not have pre-conceived ideas regarding the capabilities and vulnerabilities of the enemy. Otherwise

they will not be able to produce vital intelligence concerning their commander's mission correctly.

0244. Training of Personnel. The intelligence personnel must be trained thoroughly so that they can carry

out skilful and enthusiastic interpretation of the information that will help them to carry out the intelligence

tasks thoroughly, completely, accurately and with increased utility.

0245. Access to Commander. The intelligence staff must have a direct access to the commander so that all

information can be passed speedily and decisions obtained promptly. This will also help the commander in

knowing the limitations of intelligence staff at a particular time so as to guide the staff in the most appropriate

moment in the most appropriate manner.

0246 – 0300. Reserved.

SECTION - 3

INTELLIGENCE IN VARIOUS LEVELS OF WAR

LEVELS OF OFFENSIVE INTELLIGENCE

Levels of Intelligence

0301. Strategic Intelligence is required for formulation of policy and military plans at national and

international levels. Oriented on national objectives, it assists in determining feasible national objectives and in

providing a basis for planning the methods of achieving them. Factors, which influence the military capabilities,

vulnerabilities and probable courses of action of the nation are considered as major concern of strategic

intelligence. The term national intelligence has the same meaning and the term is often used interchangeably.

The components of strategic intelligence are biographic, geographic, transportation, and other communication

means, sociological, political, economic, scientific, and armed forces intelligence.

0302. Operational intelligence serves the planning within a theatre of war or on a front as a whole.

Intelligence at the operational level is concerned with the nature of enemy military forces, their structure, their,

command, control and communications, their leadership etc. Such question as: what freedom of actions does the

enemy command has? how aggressively is he likely to exercise it? how effective is his command, control and

communication system, are more critical at the operational level than at the tactical level.

0303. At the lowest tier that is at the tactical level, intelligence, would be concerned with the topography and

climate of an area of operation, the organization for battle and strength of the enemy, his dispositions and likely

courses of actions etc. The tactical intelligence is also referred to as battle intelligence. It may be obtained from

within commander's own command or from higher or adjacent headquarters. It is also derived from the

interpretation of information on the enemy (both his capabilities and his vulnerabilities) and the environments

(terrain and weather). It is also obtained through interrogation of agents, ground and aerial surveillance,

reconnaissance, terrain intelligence, signals intelligence, counter intelligence, technical intelligence, imagery

interpretation, sensory data obtained from target acquisition and night observation devices. The ultimate

objective of tactical intelligence is to minimise uncertainty concerning the effects of terrain, weather and enemy

on the accomplishment of the mission. The commander employs tactical intelligence to determine how best the

available resources can be used in accomplishing the mission and maintaining the security of his command.

Differences of the Levels of Intelligence

0304. Strategic intelligence differs from operational and tactical intelligence in both scope and level of detail.

The former includes not only military elements, but also economic, political, social, geographic and biographic

elements. In any campaign, operations are constrained by time and space, both of which are outside the control

of military planners. Time and distance factors often are neutral phenomena, affecting both friendly and hostile

forces equally. Logistic limitations, while not strictly neutral, and often be calculated as such, since they occur

so frequently that their impact on military campaigns can be anticipated.

0305. Strategic military planning requires intelligence analysts to anticipate foreign movements more than

six-months in advance, to alert friendly commanders before sufficient time to support the movement of large

military forces over the vast spaces involved in strategic operations. Time and distance make actions appear to

be sluggish, because of the delays caused by neutral and logistic conditions outside the control of operational

planners. The engagement in the battle to achieve the end-state of the war, must therefore give an aim to the

whole military action, which must be in accordance with the object of the war. In other words, strategy forms

the plan of the war; and to this end it links together the series of acts which are to lead to the final decision, that

is to say, it makes the plans for the separate campaigns and regulates the tactical battle to be fought in each

decision.

0306. All levels of war are concerned with knowledge of foreign nations and with geographical or functional

areas of actual or potential military operations. All are produced by the application of the same fundamental

collection and processing techniques. Tactical and operational intelligence are usually, generated by units and

formations and service headquarter committed to theatres of operation while strategic intelligence is generated

and used primarily at National Committee on Security Affairs (NCSA), Joint Command Centre (JCC) and

services headquarters. Tactical intelligence is used throughout the command channel while operational

intelligence contributes to planning and conduct of campaigns and major operations. Tactical intelligence

reported to successively higher levels forms part of the input needed to satisfy operational intelligence and

specific aspects of strategic intelligence.

0307. As can be visualized from the foregoing, none of these levels are exclusive; levels and fields crossover

and overlap in numerous instances. This is shown in a chart in GSTP 0032 and the same is shown below with

some modification :

LEVELS OF INTELLIGENCE AND THEIR RELATION TO MILITARY OPERATIONS

FIELD TACTICAL

LEVEL

OPERATIONAL

LEVEL

STRATEGIC

LEVEL

(a) (b) (c) (d)

MAJOR SOURCES

OF INFORMATION

1. Tactical

Reconnaissance

2. Direct

Contact with

Enemy.

3. Interrogation

of enemy

prisoner.

4. Radio

Transmissions.

5. RADAR.

6. Radio

Direction

Finder.

1. Reconnaissance.

2. Direct contact

with enemy.

3. Interrogation of

enemy prisoner.

4. Air photo

reconnaissance (PR).

5. Coded Signal

Intelligence

(SIGINT) intercepts

decoded in the field

and in the rear.

6. RPV; Drones.

7. Human

Intelligence.

1. Human

Intelligence.

2. Satellite.

3. Cooperation

with Allies.

4. Open sources.

(a) (b) (c) (d)

DEGREE OF

RELIABILITY

AND LIFE SPAN

OF INFORMATION

1. Very short

life span.

2. Mostly for

immediate

action.

3. Reliability of

Information for

action very low

to medium.

1. Short to medium

time span.

2. Pressure for action

is high to very high.

3. Reliability of

information in action

very low to medium

1. Medium to

long range life

span.

2. Less pressure

for immediate

action.

3. Medium to

very High

reliability.

FOCUS OF INTELLIGENCE

TASKING AND

CAPABILITIES

1. Primarily

enemy‘s

capabilities to

be engaged.

2. Enemy‘s

immediate

intentions.

1. Analysis and

information of both

capabilities and

intentions.

2. Enemy‘s doctrine

style of fighting.

3. Enemy‘s

operational

intelligence.

1. Both military

and civilian long

range political

economic and

formal

capabilities.

2. Enemy‘s

national

objectives and

intentions.

3. Enemy‘s

allies support.

4. Enemy‘s

national

intelligence

QUALITY OF

COMMUNICATION

Very difficult to

good

Very difficult to good

Good to very

good

REQUIREMENTS FOR

INTELLIGENCE

COORDINATION

Generality low

High or very high

Very high

(a) (b) (c) (d)

CONSEQUENCE

OF FAILURE

IN ACTION

1. Defeats.

2. Setbacks can

be retrieved.

3. Sensitivity to

a single failure

is normally low.

1. A setback can

have very serious

impact even on the

strategic Level.

2. Difficult to

retrieve failure

1. Critical or

disastrous.

2. Very difficult

to retrieve.

Overlapping Interest of the Various Levels of Intelligence

0308. Regardless of form, intelligence seeks to answer a single question ‗what is the threat‘? Everything else

is a matter of degree, time and space. Strategic intelligence is a time insensitive endeavour subjected to dramatic

changes. Operational and tactical intelligence on the other hand are time sensitive and subjected to incremental

change. However, these are produced by the application of the same fundamentals and intelligence collection

techniques.

0309. Tactical level commanders may have to depend upon strategic intelligence for their initial knowledge

of the enemy and the area of operations. In this instance, the distinction between the two looses its effect.

However, information gathered and intelligence produced for strategic purposes are also useful in the conduct of

tactical operations. The description and the studies of many things are included in this category. These are,

Scientific Development, Rivers/Drainage System and Hydrograph, towns/ villages, terrain features and

trafficability, road, railway, air, sea, transportation and communications system, top personalities both civil and

military, weather and climate, political and foreign policy, sociological, cultural, linguistic and religious issues,

economic, trade and commerce, order of battle (Army, Navy and Air force) and military development, mineral

resource, power and electricity, etc.

0310. Information collected by units in the field also assists in the production of strategic intelligence. The

information may be obtained by various means. Interrogation of prisoners of war and other individuals of

intelligence interest provide strategic information on political, sociological, and industrial, transportation/

communication, technological developments, and economic conditions within the denied area. Technical and

physical characteristics of newly encountered enemy weapons or other items of equipment in addition to

providing valuable tactical intelligence may be used in producing strategic intelligence to aid in determining the

industrial or manufacturing centres and their capabilities. A diagrammatic explanation of overlapping interest is

shown below :

Figure 3.1: Use of Levels of Intelligence

0311. Understanding the interdependent relationship of all three levels of war helps commanders visualise a

logical flow of operations, allocate resources and assign tasks. Actions within the three levels are not associated

with a particular command level, unit size, equipment type, or force or component type. The concept facilitates

allocating required collection, analysis, productions, and dissemination of recourses; and facilitates the

assignment of appropriate intelligence tasks to op tactical and supporting intelligence elements.

OPERATIONAL-LEVEL

OF WAR

INTELLIGENCE

NATIONAL

JOINT FORCE HQ

ARMY HQ

DIVISION

BRIGADE

BATTALION

COMPANY

TACTICAL

INTELLIGENCE

STRATEGIC

INTELLIGENCE

LEVELS OF WAR

Figure 3.2: Level of War

0312. Certainly the demands on the strategic intelligence community in a time of war will limit the ability of

national service level staffs to access these systems. National-level intelligence systems will be maintained by

the NCSA intelligence centre once raised. However, the bulk of the all source intelligence level functions to

satisfy the requirements of national and service staffs and commanders will be performed by their intelligence

staff. However, since the focus of intelligence at the tactical level of war –evolving battles and engagements and

the rapid dissemination and exploitation of tactical information and tactical intelligence, intelligence produced at

this level, if not properly screened, could will overwhelm theatre and services level and distract them from their

necessary operational-level perspective.

STRATEGIC INTELLIGENCE

General

0313. Strategic intelligence is an intelligence designed for use in developing strategic- level policies,

programs, capabilities, and decisions. This is a simple definition, but to fully understand it requires an

understanding of each of its three major parts. Intelligence is usually defined as either a ‗process‘ or a ‗product.‘

or an ‗activities‘. As a process, intelligence generally is described as the targeting, collecting, analyzing and

disseminating of information on foreign entities such as nations, ultra-national organizations, and national or

international outlaws. As a product, intelligence is generally described as ‗‘product information‘‘ on those same

national threat-that is information about threat has been carefully evaluated by professional intelligence analysts.

As regards to activity, this must also be directed against those national threats.

0314. The importance of the phrase designed for use in developing strategic level policies in the introductory

definition cannot be overemphasized. The purpose of strategic intelligence is to help nation at decision makers

National Policy

Restore the lost territory

using military and

unconventional force.

Theater Strategy

Destroy the enemy

forces east of the

River Meghna.

Campaigns Operation

Iron Shield

Major Operations Attack and

destroy 33 Corps

Engagements 11 Armoured Brigade

engages enemy 66

Cavalry

Small Unit and

Crew Action

Bengal Lancer

destroy 6 x T-72 Tank.

Battles 99 Division attacks the

33 Armoured Brigade

Strategic Level

Operational Level

Tactical Level

to make decisions. If it is not used for that purpose, then the intelligence and the effort expended in its

development are wasted. Strategic intelligence help national and allied decision makers for the formulation of

national foreign and defence policy. The intelligence requirements at the national level always focus at the

reflecting the complexities of a continuously evolving national interest and international context. The strategic

intelligence community will collect, analyse, and disseminate intelligence which satisfies the constantly

changing requirements of national level decision makers. The military strategy, force structure, and intelligence

requirements of each theatre of war are distinct. The nature of alliances, adversary‘s military capabilities, and

political and military objective may be different in each theatre of war. In case of Bangladesh each services

requires access to the assets of the strategic intelligence community to support peacetime or wartime campaign

planning.

Strategic Intelligence - Components

0315. Intelligence, much like truth, can be thought of as a spiral staircase. What appears adequate in one

level, such as supporting tactical commanders, may not be satisfactory on the next higher level. While views

from the each level of the staircase might be the accurate, climbing to higher (more-long-range) perspectives

brings into view new factors, which change Judgments. In the words of British military historian B.H Liddell

Hart, ―... a complete strategic vision must extend vertically, as well as horizontally - only seeing the parts in

relation to one level may not be true on the next higher level.''

0316. National-level decision makers while, marshalling the resources of an entire nation in a war,

necessarily consider political, economic, historical, and psychological factors, along with strictly military

information. In his classic study, Sherman Kent characterized strategic intelligence as a combination of many

elements mentioned below :

a. Political character of the country

b. People

c. Economy

d. Transportation

e. Military Geography

f. Military Forces

g. Biographies of Key Leaders

0317. The components of strategic intelligence delimit a nation‘s military strength, both in terms of what

presently exist (current military capabilities) and what may exist in the future (potential capabilities), its current

trends continue. For example a country‘s industrial potential and financial wealth directly limits how much can

be spent on its military forces. Of course, not every armed conflict involves all components of strategic

intelligence. For example, the operational factors in a very short war (such as the 6-day Arab-Israeli War of

1967) involved the armed forces already formed, trained and equipped. However, all components influence the

peacetime build-up of armies, and these components determine the outcome of long wars, both insurgence wars

and more conventional territorial wars.

Purposes

0318. Strategic intelligence has two main purposes: the first has a mid to long-term nature, while the second

is more immediate. From a mid to long-term perspective, strategic intelligence assists national security decision

makers to properly prepare over the long term to defeat potential enemies or those who establish capabilities to

interfere with or resist one‘s own national goals and objective. The emphasis here is on long-range forecasts. For

example, a strategic intelligence report could indicate that an enemy will probably begin a program to double its

tank fleet over the next decade. Such intelligence might cause a defence minister to seek increased funding to

improve his nation‘s anti-tank capabilities. From a more immediate perspective, strategic intelligence assists

decision maker‘s involved in crises or situations requiring immediate or near-term action to quickly defeat real

or potential enemies. In this instance, the intelligence emphasis is on the enemy‘s present capabilities and

intentions. For example, a strategic intelligence report may indicate that foreign naval forces are about to block

an internationally important waterway. Such intelligence might cause a nation‘s leader to take immediate

unilateral measures or seek near-term international cooperation to prevent such a hostile act.

0319. Strategic intelligence is not always reactive to foreign initiatives. It may be developed at the request, or

at the anticipation of a request or need, of national policymakers. For example, a nation‘s leader who wants to

negotiate a trade agreement with a foreign power might request both his commerce and defence ministry to

provide assessments of expected responses from the foreign power‘s civil and military leaders. Both these

assessments, one from a civilian organization and one from a defence organization, would qualify as examples

of strategic intelligence. Strategic intelligence is usually 'all source' intelligence. The analysts producing the

intelligence evaluate data from many different sources, such as imagery satellites, spies, newspapers, and

embassy cables, These data‘s may come from national level collection assets such as satellites, or from factional

level assets such as frontline infantry patrols. Strategic intelligence should not be equated or confused with

information that comes only from strategic-level collection assets. A satellite picture, for example, could just as

well be part of data obtained by many different kinds of collection assets located at various levels of intelligence

operations. The 'all source' aspect is an important characteristic of strategic intelligence. It is not essential, but it

is highly desirable.

Intelligence Direction and Function

0320. At strategic level it is the NCSA who is going to roll the wheel for tasking and processing of strategic

intelligence to subordinate national agencies and inter service intelligence organization. During peace and war

Armed Forces Division (AFD) of the Prime Minister Office is going to provide staffing for functioning of

NCSA till a complete establishment is raised. NCSA should have a joint intelligence committee which is going

to decide essential elements of information (EEI), priority of intelligence task and process the collected

information by various organizations at national level. Joint Command Centre (JCC) when formed, will act as

the coordinating headquarters for intelligence functioning at joint level. Bangladesh has following agencies for

intelligence collection and processing at national level :

a. National Security Intelligence (NSI).

b. Directorate General of Forces Intelligence (DGFI).

c. Survey of Bangladesh (SOB).

d. Space Research and Remote Sensing Organization (SPARRSO).

e. Ministry of Foreign Affairs (MOFA).

f. Metrological Department

0321. Strategic intelligence seeks to answer the fundamental questions of what a foreign country‘s armed

forces can do and what it intends to do. By ascertaining a foreign country‘s strategic planning factors, we can

begin to anticipate the size and movement of military forces that state will use to reach its political goals. A

review of time and distance refines the magnitude and timing of that foreign power‘s possible military actions in

effect partially determine a foreign state‘s military capabilities. The magnitude is suggested by how large a force

can be logistically sustained, given time and distance criteria.

OPERATIONAL INTELLIGENCE

General

0322. An operational level of war, a different intelligence perspective is necessary if the peacetime and

wartime campaign planning objectives of the operational-level commanders are to be realized. This is due to the

demands on the strategic intelligence community and the focus of tactical intelligence. Operation level of war

intelligence is defined as that intelligence which is required for the planning and conduct of campaigns within a

theatre of war. At the operational level of war, intelligence concentrates on the collection, identification,

location, and analysis of strategic and operational centres of gravity. If successfully attacked, they will achieve

friendly political and military strategic objective within a theatre of war.

0323. Operational level of war intelligence focuses on the intelligence requirements of NCSA, AFD Service

Headquarters and JCC. The echelon focus at the operational level is situation dependent. It reflects the nature of

the theatre of war itself. It shows the political and military objectives of the operational level.

0324. Joint and single service military forces are employed to realize the political objectives set forth by the

NCSA. Realization of political objectives within theatre requires the defeat of those strategic and operational

centres of gravity. Identification, targeting, and defeat of these centres of gravity is contingent upon an

intelligence perspective and system which takes account of the peacetime and wartime planning imperatives of

an operational level commander.

Intelligence and Electronic Warfare (IEW) Task

0325. Five IEW tasks are performed at the operational -level of war: situation development, target

developments, electronic warfare (EW), security and deception, and indications and warning. Situation

developments at the operational level of war involve focus functions: theatre areas evaluation, analysis of the

characteristics of the operational area of operation. This includes (geographical, political, economic, industrial,

communications analysis of the entire theatre of war to discern the operational impact of significant regional

feature on the conduct of both the friendly and adversary's campaign effort threat evaluation, and threat

integration. The national inter service and service intelligence staff will discern the political and military designs

of the adversary and specific objectives within theatre. They will determine time requirement to realize these

objectives and target areas of interest (TAIs) keyed to strategic and operational centre of gravity. He follows this

enemy activity by continuously developing and refining situation, event, and decision support templates.

0326. Target development at the operational level involves the identification of those high-payoff targets

(HPTs) as part of the service command, control and communication counter measures strategy or operational

engagement scenario that, if attacked, will lead to the defeat of enemy centre of gravity. EW or joint and

combined EW at the operational level will interface with other joint and combined destructive systems in the

context of the service strategy. Operational security measures and the service deception strategy will be

incorporated in the campaign plan.

0327. The fifth IEW task, involves the continuous development and refinement of regional or theatre based

indicator lists. These allow operational-level intelligence staffs to determine changes in the political, military,

economic, and diplomatic behaviour of an adversary. This allows the theatre commander to better anticipate and

under stand NCSA actions, which may lead to the decision for military involvement.

0328. Theatre-based all source intelligence analysis is necessary for a theatre commander and the NCSA to

avoid strategic surprise. The national level indications and monitoring system in place makes this possible at the

earliest.

0329. High-intensity conflict in a theatre of war follows when the powers involved fail to adhere to long-

standing rules of behaviour. A theatre intelligence staff learns the adversary‘s political designs. The information

is gleaned during the performance of the second and third analysis of the nature of the theatre of war and threat

evaluation. This yields a broad picture of how adversary and its alliance could be expected to fight and for what

objectives.

TACTICAL INTELLIGENCE

General

0330. In tactical situations, modern field commanders must have a clear understanding of both the enemy and

the environment. It is the task of tactical intelligence to collect such crucial information through techniques that

include ground and aerial surveillance; espionage (or human intelligence) and reconnaissance; technical

intelligence of various types (e.g., signals intelligence or SIGINT; imagery intelligence, or IMINT); sensory

data obtained from target acquisition and night observation devices, etc. Tactical intelligence also comprises the

analysis and effective dissemination of information and decisions based on that information throughout the

command structure.

0331. The distinctive purviews of strategic, operational and tactical intelligence do not prevent them from

overlapping. For example tools that are used primarily in strategic contexts are often employed selectively in

tactical situations: maps and charts of terrain, climate, or infrastructure; data on capabilities of enemy systems;

political and cultural information; and so on. This is particularly so in peace time and near war conflicts,

because such conflicts are frequently motivated and constrained by complex political and cultural

considerations. Although tactical intelligence is the beneficiary of substantial amounts of strategic intelligence

(i.e. it receives data from other levels), it also provides information used to make strategic estimates.

0332. The purpose of tactical intelligence operations is to obtain and provide decision makers reliable

information about the enemy, weather, and terrain as quickly and completely as possible. The results are an

essential basis for estimating enemy capabilities, courses of action and intentions, and for planning friendly

operations. Intelligence seeks to discover the type, strength, location, organization, and behaviour of enemy

forces; their direction and speed of movement; and their intentions. It includes information about the weather

and terrain within the operational area and their effects on friendly and enemy operations.

Division of Areas

0333. Modern battle tends to be multidimensional; hence, commanders often must consider its ground, air,

and sea aspects concurrently. For example, at a minimum, a battle and ground commanders must consider the

ground and air aspects. As one way of managing the multidimensionality of battle, tactical intelligence divides

the tactical area into three distinctive zones.

a. Area of Operation. The first is the area of operations (AO), which is the portion of the battle

area necessary for the actual military operations of the command involved.

b. Area of Influence. The second is the area of influence, which is the geographic area in which

the commander directly influences operations by manoeuvre or fire support.

c. Area of Interest. Finally, the area of interest comprises the two other areas as well as adjacent

territory that extend the objectives of current or planned operations into enemy territory and up to the

resources of enemy command minimum one level up of own command.

Each of the areas is viewed in terms of width, depth, airspace, and time. The areas may vary in size depending

mainly on the size of the command and whether the force is in the attack or defence mode.

Area of interest

Area of influence

Area of Operations

Frontline Phase3

(FEBA) lines

Role of Intelligence

0334. The tactical level commander requires intelligence about the enemy and the battle space prior to

engaging in operations in order to effectively execute battles, engagements and other missions across the full

spectrum of operations, Intelligence assists the tactical commander in visualizing his battle space, organizing his

forces, and controlling operations to achieve the desired tactical objectives or end-state. Intelligences supports

force protection by alerting the commander to emerging threats and assisting in security operations.

0335. The unit may need to deal with multiple threats. The commander must understand how best the current

and potential enemies can organize, equip, train, employ, and control their forces. Intelligence provides an

understanding of the enemy, which assists in planning, preparing and executing military operations. The

commander must also understand his operational environment and its a effects on both his own and enemy

operations. The commander receives mission oriented intelligence on enemy forces and the area of operations

from the intelligence staff. He depends upon the intelligence, surveillance, and reconnaissance (ISR) effort to

collect and provide information on the enemy and battle space.

0336. One of the most significant contributions that intelligence personnel can accomplish is to accurately

predict future enemy events. Although this is an extremely difficult task, predictive intelligence enables the

commander and staff to anticipate key enemy events or reactions and develop corresponding plans or

Unit or Command

Figure 3.3: Battle Field Areas.

counteractions. The most important purpose of intelligence is to help decision making by commander.

Commanders must receive the intelligence, understand it, believe it and act on it. Through this doctrinal

concept, intelligence drives operations.

0337. Tactical information‘s encompasses those unevaluated data, gathered by or provided directly to the

tactical commander which, due to its highly perishable nature or the criticality of the situation, cannot be

processed into tactical intelligence in time and satisfy the user‘s tactical intelligence requirement. Once raw data

is validated, integrated, compared, and analysed, it becomes intelligence. In other words, the distinction between

intelligence and tactical information is in how the information must be processed and analysed, especially if

integration with other data is required to produce usable data. Information may be both tactical information and

intelligence.

0338. Terrain and weather Intelligence is the analysis of terrain of a condition in light of current and

projected weather conditions and the consequences for friendly and enemy movement and communication.

Terrain intelligence results from an analysis of the effects of the terrain on friendly and enemy operations. It

orients on the capability to move, shoot, and communicate. The terrain is analysed in terms of its military

aspects. Terrain conditions have a profound effect on both friendly and enemy operations. The terrain within

specific battlefield areas is analysed in terms of the military significance. Terrain analysis is performed to

determine the specific terrain conditions, based on current and projected weather conditions, under which enemy

and friendly forces must move, shoot, and communicate. Weather intelligence results from the analysis of the

effects of weather on both friendly and enemy operations .It is used by almost every element of a tactical force.

Commanders must be prepared to exploit favourable weather conditions and minimise the adverse effects.

0339. Order of Battle (ORBAT) Intelligence is the identification, strength, command structure, disposition of

personnel, units, and equipment of a military force. The training, tactics, logistics, electronic OBRAT and

miscellaneous data are also included in it. It is an integral part of intelligence concerning the enemy. Complete

ORBAT data is seldom provided to commanders. Instead, commanders are provided estimates and analyses on

collected ORBAT information and other intelligence data. It is significant at both strategic and tactical levels. At

the tactical level, it is used to determine enemy capabilities, weaknesses, courses of action, and intentions.

Weather and terrain information and intelligence are vital to making these determinations.

0340. Target Intelligence is the detection, identification and location of target with sufficient accuracy and

detail to permit the effective employment of weapons electronic devices and forces. The target intelligence fall

into general subcategories: movers, or moving elements; emitters, such as communications systems; sitters or

stationary targets, such as command posts or logistical installations, and shooters which shoot or fire at a long

range. Most information is used in the development of intelligence. Much of this information, however, can be

used immediately for fire, manoeuvre, or electronic counter measures. If raw data can be used for fire,

manoeuvre, or electronic counter measures as received, other data, it is called tactical information. Targeting

data is a subset of tactical information. Dissemination of tactical information must be expedited and, at some

echelons, a separate channel for routing tactical information is established.

Development of Tactical Intelligence in the Battlefield

0341. Intelligence Preparation of the Battlefield (IPB) is a systematic approach used by the Armed Forces to

develop intelligence at any level. Bangladesh Army uses IPB as logical and systematic processes to develop

tactical intelligence. IPB is a continual, systematic process of analyzing the enemy, weather, and terrain of a

specific geographic area. IPB analysis is based on graphics such as annotated military maps, multi-layered

overlays, griddled photomaps, microfilm, and large-scale map substitutes, all capable of display on a computer

terminal.

0342. In IPB battlefield area analysis and intelligence estimates are not replaced by graphics but are

converted to them whenever possible. IPB, according to Bangladesh Army doctrine, entails four functions such

as battlefield area evaluation, terrain and weather analysis, threat evaluation and Integration of enemy doctrine

with weather and terrain data. The data developed by these functions are reduced to templates, one for each of

the functions. The process orients on the area of operation and area of interest of the command concerned.

0343 – 0400. Reserved.

SECTION- 4

INTELLIGENCE ARCHITECTURES AT TACTICAL LEVEL

COMPANY LEVEL

General

0401. The intelligence architecture includes the director, coordinator, producers and executors at each

echelons of command. Armour and infantry companies close with and destroy the enemy and through direct

contact, collect significant quantities of timely and accurate information of value to themselves and higher

echelons. They, in turn, are supported by their parent battalions, brigades and divisions.

0402. Many of the information needs at this level are satisfied by resources assigned to the companies.

Company commanders are concerned most about the enemy, weather, and terrain in their immediate areas –

most of which they obtain through visual reconnaissance performed personally or by their subordinates. Targets

are acquired and immediately informed to battalion headquarters. Enemy moves to the right or left is noted, and

higher and adjacent units are notified.

0403. In the course of collecting information for their own use, companies also collect information and

capture exploitable sources of information of significant value to higher commands. This information may

include indications of enemy morale, trainings, and combat effectiveness; the appearance of new weapons; and

changes in tactics. Such information is passed to battalion for use and for processing and reporting to higher

echelons. Captured enemy soldiers, equipment, and documents are evaluated for exploitation. The results of

such actions may prove to be the significant value as either tactical or strategic intelligence.

Company Commander the Main Architect

0404. Company commanders are the directors, coordinators, producers, and executors of company

intelligence operations. They direct and coordinate company resources to satisfy company intelligence

requirements and those asked by the battalion. They request additional support from the battalion when required.

They need, almost exclusively, tactical information which requires no processing or analysis. Any analysis

required is done as a mental process by the company commanders and subordinate leaders. More detailed

processing requirements are satisfied by battalion and higher echelon staffs. Companies deploy patrols,

observation post and listening post and also task subordinate platoons to collect the information needed. Counter

intelligence support for company operational security is provided as part of the support provided to the brigade

and battalion. The fire support team located with the company is critical collector of information of intelligence

value. As they observe the battlefield and develop targeting data, this information is forwarded and analyzed to

produce intelligence. The resources available to the company commanders for the execution of intelligence

requirements are depicted in the following illustration :

Figure 4.1: Company Resources

10 km

RESOURCES NOMINAL RANGE

2 km 5 km ORGANIC REOURCES

Troops Patrols

SUPPORITNG RESOURCES

Vehicles Personnel

Sensors

FIRE SUPPORT

Ground

Surveillance

Radar (GSR

if available)

BATTALION LEVEL

General

0405. The battalion, like the company, relies primarily on tactical information for the execution of the battle.

However, its intelligence requirements exceed those of companies. The battalion receives information form the

companies and other available collection resources which must be processed to limited degree and passed to the

battalion commander and brigade intelligence staffs. The battalion, in turn, provides support to its subordinate

companies. For these reasons, the battalion should be provided with larger intelligence capability than the

companies.

Coordinators

0406. The coordinator of battalion intelligence operations is the battalion second in command supported by

respective intelligence officer and operational staff (adjutant). The intelligence officer has staff responsibilities

for intelligence to include tactical information, security, and counter intelligence. The operational staff

(adjutant) is responsible for operation and operational security. However, responsibilities for operations and

operational security are relatively limited, and counter intelligence requirements are normally submitted to, and

satisfied by, the brigade or higher headquarters through intelligence officer.

0407. At battalion level, the intelligence officer is concerned primarily with coordinating tactical information

and reconnaissance and surveillance operations. He plans and coordinates the operations of resources organic to

the battalion the field artillery support and division intelligence resources supporting the battalion. Requirements

which exceed the capabilities of these resources are passed to the brigade intelligence staff.

Producers

0408. The battalion intelligence office is the primary producer of intelligence at battalion level. It consists of

one officer and one intelligence sergeant with a section. They prepare the reconnaissance and surveillance plan,

an informal collection plan, and other plans as necessary, It uses the companies, platoons, fire support teams,

ground surveillance radar (GSR) if available and other supporting units to collect information needed by the

battalion. It forwards requests for information support that are beyond the capability of battalion assets to the

brigade or adjacent battalion intelligence office.

0409. The intelligence office provides the battalion with a limited analysis capability. It maintains a small

intelligence data base and analyses and integrates information to produce target data and intelligence. It

promptly disseminates tactical information to the battalion staff and to higher, lower, and adjacent units. The

battalion intelligence office is a key link in the intelligence system. It is the first processing element to receive

front-line information about the enemy. It is a key element in expediting the flow of that information.

Executors

0410. The executors at battalion level are the commanders of the companies and other units organic to, or

supporting, the battalion. Tasking for reconnaissance patrols, GSR or Remotely Employed Sensors (if available)

and observation mission are passed to the companies, mortar platoon, or fire support unit. Intelligence unit

resources if attached to, or supporting the battalion may be allocated to the companies or held under battalion

control.

0411. Out of the organic resources listed above, the primary importance to the intelligence officer is the

battalion screen. Although the operational staff has the responsibility for planning and directing the overall

operations of the screen platoon, the intelligence officer must recommend aggressive reconnaissance missions

for it. The intelligence officer must ensure that collection missions are integrated into the operations of the

screen. These require constant active coordination on the part of intelligence officer with the operational staff

and the screen commander. The battalion resources for intelligence operations are shown in the chart below :

RESOURCES NOMINAL RANGE

5 km 20 km 10 km BATTALION

SCREEN

FIRE SUPPORT

COMPANIES

FRONT LINE TROOPS ATTACHED ASSETS

TROOPS

VEHICLES

SENSORS

SUPPORTING AVIATION

VISUAL OBSERVATION

3 km

GROUND

SURVEILLANCE

RADAR (GSR)

Figure 4.2: Battalion Resources

Figure 4.2: Battalion Resources

BRIGADE LEVEL

General

0412. Brigades within a division have no organic Intelligence and Electronic Warfare (EW) resources other

than the intelligence staff section. Still, the scope of brigade intelligence operations is much greater than that of

the battalion. To meet requirements, the brigade commander relies on subordinate battalions and support

provided by element attached from the division intelligence unit and other division elements in the bridge‘s area.

These normally include a filed artillery regiment and a field engineers company. Intelligence support will also

include intelligence assets deemed appropriate which may be attached (such as a surveillance squad), placed in

direct support or organised into an intelligence team. An intelligence team may be in direct support to the

brigades deployed forward areas.

0413. The intelligence requirements of the brigade still emphasize tactical information; however the need for

intelligence, EW, and counter intelligence support is of nearly equal importance, tactical information is required

for the operation in progress. Intelligence is required for planning operations for the next 12 to 48 hours. EW is

essential to reinforce fire and manoeuvre in disrupting the command and control of enemy first and second

echelon brigades. Additionally, the brigade is the focal point for counter intelligence support for itself and its

subordinate battalions.

Coordinators

0414. The operation and intelligence staff are the coordinators of EW and intelligence operations at brigade

level. Working closely, these two staff officers identify their requirements and coordinate actions to satisfy

them.

0415. At brigade the intelligence staff is responsible for intelligence, protective security, and counter

intelligence. Generally the intelligence staffs identified counter intelligence requirements and requests support

through the support elements. He is also responsible for supervising the brigade command post and for staff

supervision of intelligence and counter intelligence operations supporting the brigade.

0416. Brigade operational staffs are responsible for EW operation and operational security which far

outweigh those at the battalion level. Most importantly, they integrate EW with fire and manoeuvre to maximize

its effectiveness.

Producers

0417. The producers at brigade include the under command combat, combat support and combat service

support unit and team of the supporting intelligence unit. The functions of the brigade intelligence office are

similar to that of the battalion. However intelligence requirements, particularly analysis and production, are

grater than those of the battalion. The brigade intelligence office coordinates closely with the EW support

element\ to ensure the intelligence effort between organic collection assets and supporting EW assets. The

brigade intelligence office does following :

a. Work out detail intelligence preparation of battle fields (IPB).

b. Develops and coordinates the collection plan.

c. Prepares and transmit tasking messages and requests for information to satisfy collection

requirements.

d. Develops data for the brigade intelligence estimate or final IPB.

e. Processes intelligence.

f. Disseminate tactical information and intelligence.

g. Provides intelligence support to EW and operational security.

Figure 4.3 : Brigade Resources

Figure 4.3: Brigade Resources

Executors

0418. The executors at brigade level include the battalions subordinate to the brigade, the armour, support

battalion, field artillery engineer, elements, and intelligence elements if attached. The battalions perform

reconnaissance, surveillance, and target acquisition operations, and report information to the brigade. These

operations may be a result of normal battalion operations or specific tasking from the brigade.

0419. The non-organic resources operating in support of the brigade, such as artillery, air defence, and

engineer units, also perform above activities as they conduct their operations. Artillery radar locates enemy

indirect fire systems, while their forward observers collect information on enemy units close to the forward

defended localities. Air defence elements observe enemy aircraft and report information. Engineer units observe

the condition of terrain and obstacles, as well as enemy activities.

0420. When diverse intelligence resources are deployed to support a brigade, the intelligence staff may

organize them into a direct support team. This is done to simplify the command and sustainment of these

resources. When this type of team is formed, the team commander exercises command and control of all

intelligence resources in the team.

0421. Division interrogation teams may be placed in direct support of a brigade. These team will concentrate

on screening as many enemy prisoners or detainees as possible. Those prisoners or detainees found to be

knowledgeable and cooperative during the screenings will be given brief interrogations. All tactical information

obtained from these prisoners or detainees will be reported as rapidly as possible. The interrogation team can

also translate documents and act as interpreters, but such activities are not their primary mission. The

interrogation team is tasked by and reports to the brigade intelligence staff.

0422. Ad hoc operational security evaluation teams may be formed by the division operational staff and assist

the brigade commander in evaluating operational security posture. These teams normally consist of unit

personnel with expertise in the areas to be monitored and counter intelligence personnel. The teams advise on

possible compromises and recommend adjustments to current operational security measures. They identify

weaknesses and risks by examining unit function, communications signature and tactical deployment, determine

vulnerabilities to enemy collection systems, and identify compromises of information's.

10KM 20KM 30KM 40KM

NOMINAL RANGE RESOURCES

Organic Battalions

Front Line Troops

Patrols /Scouts Artillery

Visual Observation

CM/CB Radar Air defence

Visual Observation Radar

Intelligence Team Long range surveillance

Counter intelligence

-----------------------------------------------

-----------------------------------------------

Vehicles

Personnel

Interceptor

Jamming

Engineers

Visual Observation

Combat Aviation

Visual Observation

Ground Surveillance

Radar (GSR)

DIVISION LEVEL

General

0423. At the division level Grade-II intelligence staff is the principle coordinator of Intelligence. He is

assisted by a Grade III Intelligence Staff Officer. Intelligence staffs are responsible for:

a. Preparing detail IPB.

b. Developing and coordinating the collection plan;

c. Preparing, transmitting and tasking for and reports and submit these once received.

d. Developing data for the intelligence estimate and final IPB.

e. Developing and maintaining the intelligence data base;

f. Processing intelligence;

g. Disseminating tactical information and intelligence.

h. Providing intelligence support to EW and operational security.

j. Providing intelligence support to psychological operation duties.

k. Providing counter intelligence support to division.

Division Architectures

0424. Subordinate brigade and division units are the producers who coordinate intelligence and EW support

responsive to the commander‘s needs. Analysis at this level will include intelligence preparation of the

battlefield. Executors also include subordinate brigades, battalions, direct support field and air defence artillery,

engineer elements, and direct support field intelligence unit, which also include interrogation teams. The

battalions, supporting artillery, and engineer units all perform reconnaissance, surveillance, and target

acquisition operations. Artillery radar locates enemy direct fire systems, forward observers collect information,

air defence units observe enemy aircraft, and all report information on routes, tactics, types, and numbers.

Engineers provide information on terrain, obstacles, and enemy activities. Operational security is monitored and

evaluated by teams or individuals especially trained in Operational Security and Counter Intelligence.

0425. Division coordinators are the divisional intelligence officer and operations officer Grade-II, supported

by their respective staffs. They direct IPB and target value analysis efforts within the command. The intelligence

staff has the added responsibility of formulating division document and personnel security policy. The

operational staffs have to formulate similar EW and operational security policy and they have to manage these.

Under direction of intelligence staff the division field intelligence unit closely coordinates and supervise

intelligence, counter intelligence, special security, weather reporting, and terrain reporting operations. They also

coordinate with the operations element and fire-support element to ensure that Intelligence and operations are

integrated to support the commander‘s scheme of manoeuvre and fire-support targeting.

0426. Division-level producers include division level intelligence collection processing and dissemination

personnel, intelligence unit as well as operational security, EW, and weather and terrain analysis personnel

brought from under command unit.

05 10 20 30 40 50 60

Km

FRONT LINE TROOPS

PATROLS

TACTICAL AVIATION

GROUND RECONNAISSANCE

AERIAL RECONNAISSANCE

COMMUNICATION INTELLIGENCE

ARTILLERY

VISUAL OBSERVATION

MOVING TGT. INDICATOR RADAR

AERIAL OBSERVERS

AIR DEF. ARTILLERY RADAR

ENGINEERS SERVICE Visual

FIELD INT UNIT

LONG-RANGE SURVEILLANCE

COMMUNICATION INTELLIGENCE

ELECTRONIC INTELLIGENCE

GROUND VEHICLES

SURVEILLANCE PERSONNEL

RADAR

Figure 4.4 : Division Resources.

RESOURCES RANGES

COMMON SOURCES AND AGENCIES

Methods and Techniques For Information Collection

0427. The methods and techniques for collecting information can be grouped into four categories:

a. Reconnaissance and Surveillance. This includes reconnaissance from ground or air, and may

involve managing an observation post, patrolling, tasking drone, or using radar, image intensification

or other technical devices.

b. Interview and Interrogation. This is the questioning of a prisoner of war, defector, refugee, or

other person who is known or thought to possess information.

c. Examination. Examination is the inspection of material used by the enemy, such as documents,

weapons and ammunition, or vehicles and equipment of technical or tactical interest. It also includes

chemical agents‘ detection and identification.

d. Clandestine Operations. These covers clandestine activities involving the use of trained agents

to penetrate enemy control area or zone, establishments and installations, and the employment of

enemy nationals who are willing to act as agents, or the use of civilians as informants, with or without

their knowledge.

0428. Of these four categories reconnaissance‘s and surveillances are the principal concern of intelligence

staffs in field formations and, in conjunction with interrogation to secondary level, will provide most of the

tactical intelligence available to commanders in the field. The remaining categories, including detailed

interrogation, are dealt with by specialist intelligence staffs some of whom may be deployed to field formations,

and the intelligence obtained by them will be disseminated through normal channels.

Types of Sources

0429. Directed Sources. Sources, which can be tasked by an intelligence officer to provide answer to his

questions, are directed sources. Like artillery elements which provide information after examining Duds, Shell

Fragments, Craters and Contaminated Areas is a directed source.

0430. Undirected Sources. Sources which provide information but an intelligence officer has no control

over them are undirected sources. In general, undirected sources consist of written material of all sorts and radio

or television broadcasts, relating to forces and areas of operations, actual or potential, which may contain useful

information. Examples are:

a. Newspapers and Periodicals. These containing details of personalities and current events, or

political and economic developments.

b. Maps, Charts, Town Plan, Guide Books, Directories and Tide Tables. These contain detailed

topographical information.

c. Annual Reports. Annual reports of commercial concerns, state-owned and private commercial

agencies, international enterprises and so on, containing indications of industrial and economic

capabilities, growth and development potential.

d. Scientific and Technical Journals and Papers. These contain detailed studies of activities in

their respective fields.

e. Reference Books. Containing a variety of details, from lists of naval vessels and aircraft types to

the professional, technical and academic qualifications and positions held by individuals.

0431. Casual Sources. Casual sources are those sources, which may or may not be known to exist and

which provide useful information unexpectedly. For example, enemy electromagnetic emissions, Enemy

military personnel like prisoners of war, deserters, wounded and dead enemies, Own returned personnel like

escapee, evader, released and liberated persons etc, civilians like liberated civilians, refugees, displaced persons,

co-operative enemy nationals and captured enemy document are casual sources.

Sources Available in the Field

0432. Enemy Activity. The true source is the enemy or any manifestation that can be directly determined by

sensors. The enemy activity may be observed or may not be observed fully as under:

a. Detectable Activity. Enemy activity such as movements of troops, the presence of armour,

weapon emplacements, stockpiling of supplies/ construction material and the amount and type of

weapon fire will provide valuable battle information. Enemy intelligence collection activities and

surveillance methods also provide valuable information.

b. Lack of Activity. The lack of enemy activity or the fact that the enemy has not engaged in

certain activities is often of great value. For example, the information that the enemy has not moved his

reserves or that he has not displaced certain support units may influence the commander's course of

action.

c. Deception of Activity. The volume and type of information available from enemy activities are

limited by the capabilities of the means to detect/ observe them and the measures taken by the enemy to

mask his activities. For example the enemy may use hills to cover troops movement from radar line of

sight detection or he may use the noise of field artillery fire to cover the sound of vehicular movement.

0433. Enemy Military Personnel. These include prisoners of war deserters, dead and wounded who are

among the valuable sources of information :

a. Prisoners of War. These are a valuable source of information of immediate tactical value.

Maximum information is obtained through skilful handling from the time of capture until the

interrogation is completed. They frequently carry personal or official documents which either alone or

when compared with other known data reveal new information or confirm information, which is

already known. Enemy prisoner of War can provide information about troop dispositions, enemy

identifications, arms and equipment, fortifications, terrain, morale and psychological warfare.

b. Deserters. Enemy deserters are handled as prisoners of war but are segregated from other

prisoners. Since deserters may exhibit ideas and attitudes, which are not typical of the bulk of the

opposing troops and may even include pretending deserters delivered into our hands for deceptive

purposes. The reports of interrogation of deserters are clearly marked as information from deserters.

c. Wounded and Dead. Enemy wounded and deeds are searched for documents and marks of unit

identification. Enemy wounded is frequently more receptive to interrogation than are unwounded

prisoners of war because of the shock and low morale.

0434. Own Military Personnel/ Returned Personnel. Own military personnel who have been in enemy

territory and who evaded capture or escaped can provide limited information concerning roads, railways,

bridges, enemy concentration/ moves. They may not be able to provide accurate data of the proper locations and

exact time of observation.

0435. Civilians. Liberated civilians, refugees, displaced persons and co-operative enemy nationals

ordinarily are not trained military observers. Nevertheless they may have information useful for the production

of strategic value as well. The personnel of these categories are screened carefully in order to detect and

apprehend line crossers or stay behind enemy agents.

0436. Captured Documents. A captured document is any piece of recorded information, which has been in

the hand of the enemy. Great care must be taken while exploiting the documents because these may contain

enemy propaganda or may have been prepared and planted by the enemy to be captured in an effort to confuse

and deceive :

a. Exploitation. Captured documents when classified and examined by qualified persons, furnish

information, which is ordinarily more reliable than the information obtained from the prisoners of war.

This information may include Order of battle, Plans, Logistic support, Technical methods, and Codes

and ciphers.

b. Evacuation. Documents taken from a prisoner of war are evacuated with the prisoner in custody

of the guards, so that the prisoner can be interrogated as to the contents of the document. Documents

from other sources are transmitted through the intelligence channels. Below division the documents are

delayed for a minimum of time only by the unit capturing it for rapid understanding and quick

inspection for such information that can be of immediate tactical value to that unit.

c. Categories of Document. At divisional level the document will be assigned a category

dependent on the type of information contained in the documents. These include the followings :

(1) Category „A‟. Documents of immediate tactical or strategic value.

(2) Category „B‟. Documents contain cryptographic items and information related to enemy

radio systems.

(3) Category „C‟. Documents contain information of lesser value to intelligence staffs.

(4) Category „D‟. Documents contains no information of apparent value to intelligence Staffs.

0437. Enemy Material. Captured material more often is of strategic value. Examination of the captured

material by technically qualified personnel ultimately serves any of the following five principal purposes:

a. Development. Help in the development of effective counter weapons and counter tactics.

b. Exploitation. Help for the exploitation of new ideas for our own tactical and strategic benefit.

c. Deduction. Help in making the deductions as to the state of enemy resources for war.

d. Training. The enemy material may be used by our own forces including the publication of

literature and other aids to assist in the training of troops.

e. Weaknesses. The limitation weaknesses of the material deduced will be exploited to our own

advantage.

0438. Enemy Electromagnetic Emissions. Intercept of enemy radio communications, enemy

electromagnetic emissions are valuable sources of information of enemy plans and orders, unit identification and

locations, locations of fire control surveillance devices, and similar data. Exploitation of these sources extends

the depth of intelligence and contributes significantly to intelligence production (to include the ones used for

target acquisition). Normally the means utilised to exploit these sources are capable of all weather,

day-and-night operations and often may provide unique insight into enemy plans or actions.

0439. Duds, Shell Fragments, Craters and Contaminated Areas. Duds and shell fragments reveal the type

and calibre of the enemy supporting weapons. Analysis of the shell craters by qualified artillery personnel may

lead to the location of the supporting weapons. Examination of the areas contaminated by the nuclear, biological

and chemical agents may lead to the identification of the particular agent employed.

0440. Imageries. Imageries obtained from manned or unmanned flights are particularly useful to the

commanders in operational planning. Properly exploited, it is an excellent means for collecting information to

assist in followings:

a. Enemy Concentrations. Locating enemy concentration of infantry, mechanised infantry,

armoured units, installations, dumps, deployment of weapons etc.

b. Terrain Analysis. Helps analysing the terrain.

c. Intelligence Data. Confirming of denying intelligence data obtained from other sources or

agencies.

d. Damage. Assessing damage caused by own artillery fire and air raids.

e. Mosaics. Preparing mosaics and panoramas for planning purposes.

f. Maps. Correcting existing maps for details, which do not exist on maps.

g. Equipment. Recognition of enemy major pieces of equipment by type and model.

h. Target. Acquisition of target and its exact location.

0441. Ground Surveillance Radar (GSR) and Sensors. GSR and sensors are a source of valuable

information concerning the movement of enemy personnel and equipment within the detection range of the

radar being used. These radars are especially useful during periods of poor visibility. Information originating

from these units is also processed through normal intelligence channels.

0442. Maps. These are a principal source of terrain information. Map accuracy is determined by the data

used in the preparation of the map. Maps are supplemented by aerial or ground photographs, side-looking

airborne radar (SLAR), sketches, visual observation etc.

0443. Weather Forecasts, Studies and Report. The local meteorological data is provided by the locating

batteries/ regiments with divisional/ corps artillery. However, the weather forecast is the responsibility of the

Meteorological Department.

0444. Intelligence Reports. These reports prepared by higher, lower, adjacent formations units and

reference material prepared by or for the intelligence directorates of three services fall under this categories.

Frontline Agencies

0445. Frontline Troops. One of the most important agencies available to the intelligence staff is the

frontlines soldier. The soldier can be one of the best agencies of information, if he has been properly trained. He

must know what to look for and how to report his observations. He must be made to realise the importance of

turning in all scraps of papers and enemy material in order that these items will reach the hands of intelligence

staff in time to be of use to them.

0446. Patrol. Patrol can be of two types :

a. Mounted Patrols. A fighting or reconnaissance patrol may be mounted on a wheel or track

vehicles to collect information about the terrain, enemy strength, location, movements, defences,

minefields, demolitions, location of weapons, command posts, observation posts etc. Their advantage

lies in their mobility, radius of operations and the long range of communication. These patrols,

however, cannot operate effectively at night.

b. Dismounted patrols. These may be reconnaissance or fighting patrols, which operate on foot

and provide the same information as the mounted patrols. However, these patrols are capable to operate

at night under poor visibility, in any type of weather, and over any type of ground. However their rate

of movement is slow, radius of operation is short and the range of communication is also relatively

short.

0447. Special Observers. The primary mission of the frontline soldier is fighting and he is often in no

position to report what he sees. To overcome this deficiency, certain soldiers have the primary mission of

observing and reporting :

a. Observation Posts. There are other personnel located on the front lines who are specially trained

in observing that can assist the intelligence staff in collecting information. They include the

artillery/mortar observers located on the frontline.

b. Listening Posts. At night or when the visibility is poor, listening posts are established to obtain

information regarding the existence of the enemy in the area, his movements and activities. These posts

perform their tasks by listening to the sound produced by the enemy movements. Electronic listening

devices may be employed to improve the range and efficiency of listening.

c. Aerial Observation Posts. The aircraft of the army aviation perform missions such as

reconnaissance, observation, liaison and adjustment of artillery fire.

0448. Reconnaissance in Force. Sometimes the information cannot be gained by stealth. Own troops have to

take the offensive action to force the enemy to disclose his positions. This is known as the reconnaissance in

force, which can reveal the enemy's fighting efficiency and attitude. Such attacks are expensive in terms of

casualties.

0449. Aerial Reconnaissance. It is different from the aerial observation posts as it involves the employment

of the air force. The air force can provide :

a. Visual Reconnaissance. It determines the enemy‘s dispositions, movements, and location of

supply installations, command posts, large troops/ armour concentrations and reserves. However, the

pilot can only have a glimpse of the enemy activities because of the speed of the aircraft.

b. Armed Reconnaissance. It also performs the same tasks in addition to having the capability of

attacking selected targets as well.

c. Photographic Reconnaissance. It provides vertical/ oblique photographic coverage of the

desired area.

0450. Intelligence Agencies. It is the main function of the intelligence staff to collect information about

terrain, weather and enemy. They should obtain most of the information from the reports and messages from the

collecting agencies, specialist teams and from the higher and adjacent headquarters as well as subordinate units.

0451. Specialist Team. These teams may be organic or attached to a formation. They work under the control

of intelligence staff. The various especially teams are :

a. Prisoners of War Interrogation Teams. These teams interrogate enemy prisoners of war and

obtain information of terrain, weather and enemy. These teams will also interrogate civilians who are

also a valuable source of information.

b. Photography Interpretation Teams. The air photographs provided by the air force and satellite

imagery are good source of information. By studying these in detail, these teams can determine the

enemy troop‘s locations, concentrations, fortifications, pattern of deployments etc.

c. Other Agencies. These include all the intelligence units, which employ clandestine means for

procuring information about the enemy. In addition these could also include research workers, analysts

of enemy press and radio etc. They are controlled by the formations/ organisations under which they

work

Capabilities and Limitations

0452. Capabilities and limitations of any particular source/agency are given below :

SOURCES AND AGENCIES - CAPABILITIES AND LIMITATIONS

Ser

No

Sources/ Agencies Capabilities

Limitations

(a) (b) (c) (d)

1. Forward troops in

Contact

(Unit and formation

headquarters)

All enemy activity within

sight and sound range.(This

is extended by the

employment of sensory

surveillance devices such

as infrared, night viewing

aids, radar etc).

Weather conditions, terrain and

degree of enemy camouflage and

the range of sensory devices

themselves.

2. Patrols

a. Short Range by

Forward Troops.

(Unit and

formation

headquarters)

Enemy activity in the

Forward Edge of Battle

Area.

(1) Usually operate by night and

limited degree of night

observations.

(2) Time taken to obtain a report

Detailed.

b. Long Range by

Special Troops . (Formation

headquarters)

Enemy activity in reserve

and rear areas.

(1) Difficulties in positioning

and maintaining patrols.

(2) Difficulties of

communications.

(a) (b) (c) (d)

3. Visual

Reconnaissance.

a. Army Aviation

Squadrons

Enemy held forward

areas

(1) Vulnerability In all cases bad

weather.

(2) Restricted and visibility are

Range major limitation.

b. Air Force

(Liaison Officers).

Enemy activity in forward

and rear areas

(1) Number of Air crafts

available.

(2) Difficulty in accurate

observation and reporting, owing

to limitation speed of modern

aircraft.

(3) Enemy camouflage and

deception.

(4) Enemy counter measures.

4. Imagery

Interpretation.

a. Army Aviation

Squadrons.

Enemy forward areas,

Photos by Polaroid cameras.

(1) Flying confined to forward

edge of battle area.

(2) Size of aircraft limits camera

capacity. (3) Rapid results but

limited copies.

b. Air Force.

(Photo Interpreter)

Enemy forward and rear

areas covered by photo,

infrared RADAR sensors

(1) Enemy air action.

(2) Time required for detailed

interpretation.

c. Drone.

(Photo Interpreter)

Enemy forward and rear

areas covered by photo,

infrared sensors.

(1) Enemy counter measures.

(2) Limited coverage

5. Captured Personnel

Material.

a. Prisoners of War

and Deserters

(Interrogation Teams)

Information concerning

those subjects which the

subjects which the prisoner

of war or deserter has

knowledge.

Information on prisoner of war

and deserters depend on;

(1) Rank, intelligence and

knowledge.

(2) Seniority, training and

knowledge Morale.

(3) Availability of trained

Interrogators with linguistic

ability in the right place.

b. Captured

Documents

(Translators)

Any aspect of enemy

activities and intentions in

particular, order of battle

and technical information is

frequently obtained.

(1) Deception.

(2) Delay in translation.

(3) Documents often captured

too late to be use for current

operations.

c. Captured

Equipment.

Technical Teams)

Can reveal enemy's

readiness for particular

types of operation (e.g.

Intelligence operations

chemical equipment) or

state of development

(1) Evaluation takes time.

(2) A lot can be deduced

(a) (b) (c) (d)

6. Escapers and Evaders.

(Intelligence/

considerable Security

Personnel)

Local enemy activity and

topographical information

(1) Security clearance may be

necessary if escaper or evader has

been in hands for a period.

(2) Ability of escaper or evader

to relate what he has seen to a

map or air photograph.

7. Civilians.

(Intelligence/ Security

Personnel).

Local enemy activity and

topographical information

(1) Lack of military knowledge

and training in accurate reporting.

(2) False information may be

planted by the enemy.

8. Enemy Electronic

Equipment and Signal

Communications.

(Signals Intelligence)

Can reveal locality of

enemy headquarters and

groupings of formation.

Intentions and activities

may be disclosed by

interpreted messages

(1) Enemy signal security, and

wireless silence.

(2) Degrees of signals

intelligence coverage available

(3) Weather conditions.

9. Enemy Artillery/

Missiles

(Artillery Intelligence

Staff)

Location of enemy

missiles, guns and motors,

their re- enforcement and

pattern of fire can give a

knowledge of enemy order

of battle, boundaries and

intentions

(1) Location by sound ranging

and RADAR is dependent on

enemy weapons firing.

(2) Locations by air subject to

normal air photo reading.

limitations.

(3) RADAR needs line of sight.

10. Enemy Engineer

Capabilities.

(Engineer Intelligence

Staff).

Topographical, tactical and

technical intelligence of

engineer nature.

11. Secret Agencies.

(Agents and

Informants)

Enemy locations and

activities.

(1) Depends on skill and

reliability of agent or informant.

(2) Communication difficulties.

0453 – 0500. Reserved.

SECTION - 5

THE INTELLIGENCE PROCESS

FUNDAMENTAL OF INTELLIGENCE PROCESS

Relationship Between Operational and Intelligence Process

0501. Commander‘s operations process includes plan, prepare, execute and assess in order to continuously

design and conduct an operation (see Figure 5:1). They cannot successfully accomplish the activities involved in

the operation process without information and intelligence. The design and structure of intelligence operations

support the commander‘s operations process by providing him with intelligence regarding the enemy, the battle

field environment and the situation.

0502. Intelligence operations consist of the functions that constitute the intelligence process: direction (plan

and prepare), collection, processing and dissemination, just as the activities of the operations process overlap

and recur as circumstances demand. The operations process and the intelligence process are mutually dependant.

The commander, through the operation process, provides the guidance and focus through essential elements of

information (EEI) and other information requirement (OIR) that drives the intelligence process. The intelligence

process provides the continuous intelligence essential to the operations process. Intelligence about the enemy,

the battlefield environment and the situation allows the commander and staffs to develop a plan, seize and retain

the initiative build and maintain momentum and exploit success (Figure 5:2). The intelligence process is just one

of the mechanisms that provides input to build the enemy course of action and facilitate the commander‘s

situational understanding.

Figure 5.1: The Operation Process.

Battle

Command

ASSESS ASSESS

ASSESS

Cyclic Activities of Intelligence Process

0503. The assessment of hostile capabilities and the forecasting of their intentions or possible reactions to our

own plan requires knowledge of a wide range of subjects. At the higher levels these will normally include

history, geography, economics and ethnology as well as diplomatic, commercial and strategic policies. At the

lower levels we need to know the area of operations, the organisation and strength of the hostile country and

elements and their likely courses of action.

0504. All assessments must be constantly reviewed and amended if additional information is received or

changing circumstances lead to the alteration of our own or the hostile plans and operational activities. To meet

this continually changing situation we must have a planned, methodical and logical system to produce

intelligence. The Intelligence process or intelligence cycle meets this requirement at all levels of command. The

process has four cyclic stages, shown below with diagram :

Figure 5.2: The Relationship between the Operation and Intelligence Processes.

Facilitates

Situational

Understanding

Relevant information

(which includes intelligence) COMMANDER

PREPARE EXECUTE

PLAN

Operations Process

Assessment

is a

continuous

function

The Operations Process

provides guidance and

focus which drives the

intelligence Process

DISSE-

MINATE

DIRECT

PROCESS

ANALYSIS

COLLECT

TASK

The intelligence process

provides continuous

intelligence input essential to

the operations process

Commander‘s

Intent

Process,

Analyse and

Disseminate,

are continuous

functions

Intelligence Process

Figure 5.3 : Diagram of the Intelligence Process.

0505. Direction Stage. This stage usually begins with the commander's statement of his intelligence

problem. This statement of problem may be explicit, implied by the commander's general mission or result from

the application of the cycle to a previous or concurrent intelligence problem. Having defined the intelligence

problem this stage continues with :

a. Intelligence Appreciation / Intelligence Estimate or IPB to visualise the hostile course of action

(COA).

b. The determination of information requirements.

0506. Collection Management Stage. Collection stage is defined as the process of tasking and gathering

information from all available sources and agencies.

0507. Processing. Processing is defined as the stage whereby information becomes intelligence through

collation evaluation, integration, interpretation and analysis,. The conversion of information into intelligence

involves the three closely related steps of collation (intelligence data base), evaluation, interpretation and

analysis.

0508. Dissemination. The main function of this stage is the timely distribution of information and

intelligence, in the most suitable form and by any suitable means, to those who need it. This is the product that

the commander has asked for.

Operation of the Intelligence Process

0509. The cycle activity of the intelligence process stems from the constant need to check, confirm or refute

and re-assess every deduction or conclusion. Initially these deductions or conclusions are drawn from IPB and

intelligence appreciation/estimate and subsequently from the information obtained under the collection plan or

from unsolicited information. Comparison, as a mental process, is repeated far more than any other in the mind

of an intelligence officer. He must be constantly thinking back and comparing, thinking forward and planning.

He must relate to what has happened in the past and he must do it automatically when, for example he is trying

to assess the reliability of a source, the accuracy of piece of information or the significance of it. Checking and

revising are inherent in every intelligence function and it is this constant re-thinking that constitutes the cycle

activity, which gives the intelligence process its another name intelligence cycle.

0510. Although the defining or stating of the intelligence problem sets the cycle in motion, and initially the

stages of Direction, Collection, Processing and Dissemination will follow one another in chronological order, as

soon as material begins to flow through the channels, these stages will overlap and coincide so that they are all

going on simultaneously.

0511. The original intelligence appreciation/estimate, whether it is written down or not, and the assessment of

hostile capability and intentions, will be under continuous review and revision. This will lead to further

intelligence problem, amendments to the collection plan, the production of new intelligence and further

re-assessment.

DIRECTION STAGE

General

0512. The key to the operation of the Intelligence process is the commander. He must set the cycle in motion

by deciding what he wants to know about the enemy within the time and space limits set by his mission. This is

called ‗Determination of Intelligence Problem‘ with the object of making sure that the intelligence effort is

properly directed. This statement of intelligence problem may be explicit, implied by the commander‘s mission

or result from the application of the cycle to a previous or concurrent intelligence problem. Having answered the

intelligence problem the stage continues with the determination of information requirements by doing an

intelligence appreciation/ estimate/ IPB.

The Intelligence Problem

0513. The commander will direct his intelligence staff and give them clear instructions on the intelligence he

needs and where necessary, set a time limit, so that the intelligence staff has an exact understanding of the task

facing them. The commander's direction must be as specific as possible and he should state his intelligence

requirement in order of priority and emphasise which of them are critical.

0514. Although the importance of proper direction by the commander has been emphasised, there may be

occasions when he cannot give precise instructions. For instance, particularly in a counter insurgency operations

situation, it may not be possible for a commander to state his mission and requirements so precisely. In these

circumstances the intelligence staff would follow the procedure outlined below :

a. An intelligence staff would first relate his commander's mission, no matter how broadly stated, to

all available basic and current intelligence bearing on the area of operations. From this it would then be

possible to define the main threat.

b. Once the threat has been established the intelligence problem can be stated.

c. This can then be followed by the Intelligence Appreciation/Estimate/ Intelligence Preparation of

the Battle Field (IPB), discussions with the operations staff and the listing of the information

requirements.

d. From these the commander can select those, which are critical to his planning or decision-making

and the remaining procedure of the intelligence process can begin. In all circumstances the commander

must make this selection before the intelligence staff takes any collection action.

0515. A divisional intelligence appreciation may conclude that the enemy will attack in a given strength,

direction and time, with certain objectives. As a result, a brigade of that division may be ordered to prevent

penetration within certain boundaries. The brigade commander must then determine the intelligence problem

involved in his operation. This might be worded as: ‗will the enemy attack in my sector? If so, how, where,

when and in what strength and what are his immediate objectives likely to be?‘ Again at unit and battle group

level the Commander's intelligence problem will normally take the following form :

a. What is the enemy going to do, and if so :

(1) How will he do it ?

(2) When will he do it ?

(3) Where will he do it ?

(4) In what strength ?

b. They will relate these questions to unit and battle group area of interest and the commander‘s

mission.

0516. The question of enemy strength is an important aspect of the intelligence problem and whenever

possible, what is known as the 'level of enemy command' must be determined. This expression merely describes

the size of the opposing enemy force which could affect our commander‘s mission. Thus for instance, for a

battalion in defence, level of enemy command might be a brigade.

Intelligence Appreciation/ Estimate and IPB

0517. The intelligence appreciation is logical and orderly examination of the intelligence factors affecting the

accomplishment of commander's operational mission. Intelligence appreciation is carried out from the enemy

point of view. Intelligence appreciation is carried out at direction stage and re-assessed/ re-appreciated prior to

dissemination stage of intelligence cycle. It is always updated with the receipt of information about enemy. If it

is carried out at the direction stage, then the primary objective of the intelligence appreciation is firstly to meet

the Intelligence problem given by the commander and secondly to list the information requirements, which will

form the basis of a systematic collection plan. But if it is carried out at dissemination stage of intelligence cycle,

the objective is to reassess/revise the previous intelligence appreciation with newly processed

information/intelligence which will serve as a basis for planning operation by the commanders and for

disseminating intelligence to his staff and to other headquarters. It provides the commander with an analysis of

the area of operations, enemy strength and enemy capabilities that can influence his mission.

0518. The IPB is a systematic and continuous system of analysing the enemy, weather and terrain in a

specific geographical area. This approach integrates enemy doctrine with terrain, weather, mission and the

specific battlefield environment which is designed to support military decision making process. It concentrates

on building a database prior to the hostilities and highlights applicable data in support of tactical operations.

This results in an intelligence estimate and a analysis of the battlefield area that show probable COAs and

intentions and indicate targeting opportunities. Graphics are basic to IPB analysis, i.e. intelligence is

communicated with picture, but the analysis of the area of operations and intelligence appreciation is not

replaced. Continuity is maintained not by rewriting volumes of materials, but through graphic renewal or

update.

0519. IPB can be applied to all theatres and types of conflict. All the stages of IPB involve staff work of

preparation of various graphics templates. These templates are nothing but pieces of talc sheets or cellophane

papers placed over the map, preferably of 1: 50,000 scale. These templates are illustrated with various graphics,

based on the data available. These graphic templates are generally prepared manually as such; preparation of the

templates can be both manpower intensive and time consuming. However, use of computers in preparing the

graphic works will make the process faster and more accurate.

0520. It must be remembered that IPB is only an assessment of enemy intentions and not a prediction. In this

context it is important to examine as many possible enemy options as time allows based not on ‗what the enemy

is going to do‘ but on ‗what he is capable of doing‘. This will enable intelligence staffs to present a series of

options in order of probability while ensuring that the possibility of own forces being taken by surprise is

reduced to the minimum.

COLLECTION MANAGEMENT STAGE

General

0521. After the completion of first part of the direction, the second part of intelligence process continues with

:

a. Making a Collection Plan, based on the information requirements.

b. Tasking sources and agencies to collect the necessary information.

c. Keeping a continuous cheek on the productivity of sources and agencies and where necessary re-

tasking them.

d. The delivery of collected information provided by sources and agencies.

0522. Collection planning is a logical plan for determining indications from Essential Elements of

Information (EEI) and Other Information Requirement (OIR) and translating them into orders and requests for

specific information. This provides the staff officer with a convenient aide-memoir, enabling him to record the

various sources and agencies available, their tasks, the time by which their reports are required and confirmation

of their receipt. Area of interest is the area within which the intelligence staff of a formation or unit is

responsible for the collection and subsequent dissemination of all available information or intelligence.

Normally this area will be limited by the rear and flank operational boundaries of the formation or unit

concerned but the distance that it extends into enemy territory will depend upon known or appreciated enemy

positions in the depth which are likely to directly affect the mission of the commander concerned and

Capabilities of the collection agencies available to the formation and to the higher commanders.

Purpose of Collection Plan

0523. The main purpose of making collection plan is to ensure that all the information that the commander

needs are collected. It is therefore, imperative that the intelligence staff should be able to recognise the pertinent

requirements and plan for obtaining the answer well in advance. The efficiency of intelligence functioning in a

unit or formation area of responsibility largely depends upon a well thought out and logical collection plan.

0524. The aims of an intelligence collection plan are :

a. It focuses the attention of intelligence staff to the specific intelligence problem in a given tactical

situation.

b. It helps in systematic and complete coverage of collection effort.

c. It forms the basis for making specific requests or allotting tasks to various sources and agencies

available with a formation or a unit.

d. It assists the intelligence staff in organising the intelligence operations in their area of

responsibility.

e. It avoids omissions, conflicts and unnecessary duplication in the collection effort.

Strategic Collection Plan

0525. The plans made at the national level are focused on strategic issue. These serve broadly two purposes,

first the evaluation of nation‘s foreign policy vis-à-vis other countries and second the planning of strategic

requirements of a future campaign in any theatre of operation.

Operational Collection Plan

0526. At operational level collection plans are evolved for acquiring constant elements of information,

strategic and technical intelligence as well as the tactical intelligence. Moreover the scope and projection of

army operation and the need for simultaneous planning for a number of operations warrant consideration of the

following factors. As it is not possible for subordinate formations to carry out concurrent planning for present

and future operations, the army arrange to procure and disseminate the constant elements of information

concerning these future operations to the subordinates and units.

Tactical Collection Plan

0527. Tactical collection plans are made with a view to collect information of tactical nature in a combat

zone. Obviously, the magnitude of the collection effort at various levels from a sub unit to a division will be

different but essentially the collection will be confined to information on terrain, enemy and weather. In certain

areas of a division‘s area of operations responsibility, there would be a requirement to collect information on

constant elements of information (basic information) as also political, economic and ethnic aspects, which may

affect the accomplishment of the commander‘s mission. The scope of planning at various levels is briefly

discussed as under:

0528. At Division Level. The intelligence staff at this level would receive the basic information from their

higher headquarters. During the period, when hostilities are not yet started, their collection plan will cater for

acquisition of constant elements of information to keep these up-to-date so that just before the formation is taken

to field, the intelligence collection plan for the mission of the commander is executed and information obtained

within the time needed for the planning of operation. The intelligence staff will have to cater for the impending

or projected operation of the units and formation who may be currently assigned to their initial mission :

a. Basic of Plans. Preliminary and initial intelligence planning is based largely on assumptions,

which need constant review.

b. Flexibility. The plan must incorporate flexibility because when there is a large time lag between

planning and execution, there is a likelihood of change in assumptions on which the plan was based

originally. The provisions should therefore be made for all foreseeable eventualities.

0529. At Unit and Brigade Levels. The collection plans at these levels are based on the mission assigned to

them by the superior formation headquarters. There would be occasions when these formations or units would

be employed more than one phase of an operation. Under such circumstances, these units or formation will be

able to plan for acquisition of detailed information in respect of first phase of operation, while depending upon

the superior formation headquarters to provide them with the constant elements of information in respect of the

entire combat area in which they are likely to operate later. The intelligence staff at will have to plan the

collection of information required for subsequent phases of operation assigned to their formations or units. As

soon as the initial phases are over, the intelligence staff at unit and brigade level will employ their sources and

agencies for collection of detailed information in respect of their next assignments.

PROCESSING STAGE

Procedure for Processing

0530. General. Processing is the phase in which information becomes intelligence. The sequence for

processing varies with the nature and urgency of the information. Tactical information or partially developed

intelligence which is needed immediately is disseminated before it is completely processed.

Information that is not of immediate value is processed before it is disseminated. Processing is defined as the

step where information becomes intelligence through collation, evaluation, analysis, integration, interpretation

and analysis. This definition is condensed into four closely related activities :

a. Collation.

b. Evaluation.

c. Interpretation and

d. Intelligence Analysis.

0531. Prompt Action. Information is processed without waiting to collect additional information.

Intelligence derived from incomplete information may be essential. There is always a time lag between the build

up of a target and the time the information is available. Complete information of the target may not be available

until the target has started to dissipate. As time is available, a search is directed for additional information to

complete, confirm or refute the intelligence developed from incomplete information.

0532. Sequence. The sequence of processing depends on the nature and urgency of the information.

Collation is usually the first step; however, on urgent items collation may occur simultaneously with evaluation

and interpretation. Information needed immediately by higher, lower or adjacent headquarters is disseminated

before it is completely processed. Information not of immediate concern, but of possible future value, is

normally processed before being disseminated.

0533. Evaluation and Interpretation. It may occur simultaneously followed by immediate dissemination.

For example, information from a reliable source and believed to be true may state that the enemy is about to

launch a major attack. In this case, collation is of secondary importance and the intelligence report that an attack

is imminent is disseminated as soon as possible.

0534. Reporting. Reporting of information to higher echelons may occur concurrently with processing. For

example, to decrease the production time of intelligence related to nuclear targets, commander may order that all

information concerning specified enemy units, areas or activities are reported concurrently with processing at

lower headquarters.

Collation or Intelligence Data Base

0535. Collation is the system for receiving, registering, sorting and recording all reports or data coming into

an intelligence office, with the primary objective of comparison. Collation is a time consuming phase of

intelligence processing. It is also expensive in manpower and man-hours, but the efficiency of the system, the

accuracy of its contents and the ease with which they can be extracted and related to one another, depends on the

speed and efficiency with which information can be interpreted and converted into intelligence. Proper collation

methods help in organising raw and unprocessed data's into groups that will help its correct interpretation. All

systems, especially at unit level, should be as simple as possible to maintain and operate, using the minimum of

manpower. The maximum use should be made of visual presentations, on maps, traces or overlays which are

easily understood far more quickly from a clearly marked map than from pages of detailed summaries and notes.

0536. Collation is defined as the grouping together of related data's to provide a record of events and to

facilitate further processing. In effect it is the procedure for receiving, sorting and recording all reports data's

arriving in an intelligence office, at any level.

0537. Basic Consideration. The design of a collation system must have the aim of facilitating the recording

of information, the retrieval of individual or related reports and the storage of intelligence for dissemination or

reference. The system must ensure that no pertinent information is lost and no time is wasted considering

irrelevant information. The indexing and categorising of subject matter must be related to the projected area and

scope of operations and must be based on :

a. The stated or anticipated information requirements.

b. The intelligence needs of the operational staff.

c. The anticipated volume of information and frequency of reports at peak periods.

0538. Characteristics. In operation of the collation system must bear the following characteristics :

a. All relevant reports are recorded and indexed to enable swift and easy retrieval.

b. The relationship between separately recorded but related report is immediately apparent.

c. Interpretation can be based on all relevant facts.

d. Pertinent information is highlighted and not obscured by a mass of trivial facts.

e. Gaps in basic or current intelligence are highlighted to assist in collection planning.

f. Information and intelligence are recorded in a manner, which minimizes the need for regrouping

or rephrasing before dissemination.

0539. Standardisation. Time and effort can be saved, particularly at the lower levels, if collation systems

can be standardised throughout a theatre of operations. In particular the use of standardised terminology and

definitions will assist in the clarity, brevity and speed of recording and disseminating intelligence.

0540. Need for Direction. An intelligence officer must ensure that his collation system does not expand by

taking interesting subjects not immediately relevant to the intelligence and operational requirements. The

commander and the operations staff must state their requirement clearly, without this directions it will be

extremely difficult for any intelligence officers to design or operate an effective and economic collation system.

0541. Selection of Subject Headings. In-flowing traffic, information is always in a large volume. As such

the headings under which reports and other material are recorded and filed should also be standardised if

possible. The collation of material which is not relevant to the operational demand will overstrain the system

and prejudice its efficiency. Clear thinking initially helps in placing this information under different subject

headings, in their proper perspective which will accelerate dissemination when time is very important.

0542. Cross Referencing. The cross referencing of related items and connecting reports is essential to

enable rapid retrieval for interpretation or dissemination. The system should be as simple as possible and full

use should be made of such aids as colour coding.

0543. Visual Presentations. The maximum use should be made of graphic means such as maps, overlays,

charts, histograms and graphs to record and illustrate trends, types of activity, dispositions, organisations and

capabilities. Such methods of recording information have the advantage of :

a. Presenting the salient facts fully, without confusing detail.

b. Conveying the maximum amount of information in the minimum amount of time.

0544. Hand-Over of Record. It is essential that, on relief, an incoming unit be given all intelligence records,

files and relevant collated material to ensure maximum continuity for the incoming Intelligence Staff. The

utmost discretion must obviously be exercised in the hand over of sources such as agents and informants,

bearing in mind the vital requirement for protection. Generally speaking sensitive sources can be satisfactorily

handed over to a personal basis, provided adequate time for hand over is allowed. The requirement for

maximum security in the hand over of intelligence records is of paramount importance, specially those that

relate to sources.

0545. Stages of Collation

a. Intelligence Journal or Logging. This is the system of registering of all reports/messages by

keeping of a chronological record of every relevant item of information and intelligence received, using

the normal operational log form. The log is the only central record to which all information can be

referred and must therefore be kept with great care. In order to save time and effort a combined

operation and intelligence log is normally kept at brigade and lower level in conventional war situation.

In counter insurgency situation a separate intelligence journal will often be maintained. At division and

higher levels two separate operation and intelligence logs are maintained by respective staff.

b. Recording. This covers all aspects of map marking, filing and card indexing. The scope, nature

and extent of any intelligence office collation system will always be dictated by the nature of

operations, the time factor, the manpower available and the space available.

Evaluation

0546. General. Evaluation is defined as the appraisal of an item of information in terms of pertinence,

reliability, credibility and accuracy. Evaluation is part of a virtually instantaneous mental reaction to each piece

of information by the trained intelligence officer, i.e. a certain extent it runs concurrently with collection.

0547. Pertinence. The examination of information for pertinence specifically determines whether or not the

information is :

a. Pertinent. With regard to the enemy or to the characteristics of the area of operations.

b. Requirement. Needed immediately and if so, by whom.

c. Value. Possible present or future value and to whom.

0548. Reliability. The source of information and the agency by which it was collected are both evaluated for

reliability. The headquarters closest to the source or agency is ordinarily the best judge of the reliability of the

source or agency. The principal basis for judging the source or an agency is :

a. Previous Experience. Experience with members of some units may have proved them to be

more reliable sources than members of other units.

b. Knowledge of Unit. Knowledge of the training, experience and past performance of units

indicates the reliability of those units as collecting agencies.

c. Test of Reliability. An additional test of the reliability of source and agency is ‗under the

conditions existing at the time, could this information have been obtained‘?

0549. Credibility. There must be degree of probability sufficient to establish confidence in the truth of

information.

0550. Judgment of Accuracy. It means the probable truth of the information. It is based on the answers to

the following questions :

a. Fact. Is it possible for the reported fact or event ?

b. Consistent. Is the report consistent within itself ?

c Confirmation. Is the report confirmed or corroborated by information from different sources or

agencies ?

d. Agree/Disagree. Does the report agree or disagree in any way with other available information?

e. Likely True. If the report does not agree with information from other sources or agencies then

which one is more likely to be true ?

0551. Comparison of Report. The most reliable method of judging the accuracy of a report is by comparing

it with similar information which may already be available under the proper category in the intelligence record.

Whenever possible the intelligence staff obtains confirmation or otherwise of information through different

agencies and sources.

0552. Difference between Higher and Lower Echelons. Remarkable differences in the evaluation of the

accuracy of information may occur between higher and lower echelons. The reason for this difference is the fact

that higher echelons, which have more sources of information and intelligence than lower echelons, have a

correspondingly greater opportunity to confirm, corroborate or refute the accuracy of reported data. Regardless

of the source, the accuracy of incoming information and intelligence is re-evaluated at each echelon.

0553. Evaluation Scale. The evaluation of each item of information is indicated by a standard system. The

evaluation of reliability of source is shown by a letter and the evaluation of accuracy of information by a

numeral. Evaluation grading is made at the lowest headquarters possible. Although both letters and numbers are

used to indicate the evaluation of an item of information, they are independent of each other. A completely

reliable agency may report information obtained from a completely reliable source, which, on the basis of other

information, is judged to be improbable. In such a case, the evaluation of the information is A-5. A source

known to be unreliable may provide raw information that when confirmed by reliable sources are accepted as

accurate information. In such a case, a report is evaluated F-6 may be accurate and should not be arbitrarily

discarded. There will always be differences in the evaluation of information at different levels of command

because higher headquarters will usually have a greater volume of information, which can be used for

comparison. It may sometime assist intelligence staffs to obtain a more accurate interpretation if they regard

intelligence disseminated by lower levels as reliable information and process it in the ordinary way.

0554. Evaluation of Source. The evaluation of source is represented with alphabetic order for example an

‗A‘ evaluation of a source is assigned under only the most unusual circumstances. For example, this evaluation

may be given when it is known that the source has long experience and extensive background with the type of

information reported. A grading of ‗B‘ indicates a source of known integrity. A ‗F‘ grading is assigned when

there is no adequate basis for estimating the reliability of the source. Agencies are ordinarily graded A, B or C.

However, when the source and the collecting/reporting agency are evaluated differently, only the lower degree

of reliability is indicated. The evaluation of reliability of sources is represented as under :

a. Completely reliable - A

b. Usually reliable - B

c. Fairly reliable - C

d. Not usually reliable - D

e. Unreliable - E

f. Reliability cannot be judged - F

0555. Awarding of Grading for Accuracy of Information. The awarding of evaluation of a piece of

information is made as under :

a. Grading–1. If it can be stated with certainty that the reported information originates from a

source other than that for already existing information on the same subject, it will be classified as

‗Confirmed by other sources‘ and will be graded as ‗1‘.

b. Grading–2. If no proof in the above sense can be established and if no reason exists to suspect

that the reported information comes from the same source as the information already available on the

subject, it will be classified as ‗probably true‘ and will be graded as ‗2‘. If the contents of the report are

confirmed in essential parts by information already available, the procedure in (b) will also apply to the

unconfirmed information contained in the report.

c. Grading–3. If the investigation reveals that the reported facts, on which no further information

is yet available and are compatible with the previously observed behaviour of the target, or if the

known background of a person leads to the deduction that he might have acted as reported, the

information received will be classified as ‗possibly true‘ and will be graded ‗3‘.

d. Grading–4. Reported but unconfirmed information, the contents of which contradict the estimate

of the development or the hitherto known behaviour of the target, will be classified as ‗doubtful‘ and

will be graded ‗4‘ as long as this information cannot be disproved by available facts.

e. Grading–5. Reported information which is not confirmed by available data and which

contradicts the experience hitherto assumed to be reliable with regard to the development of a target or

issue is classified as ‗improbable‘ and will be graded in category ‗5‘. The same classification is given

to report information that contradicts existing data on a subject originally graded ‗1‘ or ‗2‘.

f. Grading–6. If the investigation of report reveals that a basis for allocating ratings ‗1‘ or ‗5‘ is

not given, the reported information will be classified as ‗truth cannot be judged‘ and will be graded as

‗6‘.

Interpretation

0556. Interpretation is an objective and impartial mental process based on common sense, service knowledge,

previously obtained information, comparison and deduction. New information is compared with what is already

known and the combination and comparison of the old with the lead to fresh intelligence. The procedure can be

made easier by splitting the mental exercise in three ways :

a. Identification. Who or what is it ?

b. Activity. What is it doing ?

c. Significance. What does it mean ?

0557. Nevertheless, interpretation takes time and requires experience. Lack of time, particularly in fast

moving operations or lack of experience may compel the unit intelligence officer and even perhaps the

intelligence staff at brigade headquarters, to leave interpretation to higher authority and concentrate on the

handling and rapid dissemination of evaluated information.

0558. This is not merely a matter of unit nomenclature. On receiving for example a contact report, the

intelligence officer must try to decide what the enemy force is, because the size or nature of it may be a clue to

enemy intentions. This often involves comparison with previous information in order to assess whether there is

any change or new development.

0559. Having considered identification and activity, any conclusions must be related to any combat indicators

which have been established, but in making his deductions every intelligence officer must take into account the

enemy's need to gain surprise and therefore to employ deception. Deliberately misleading indications may be

'planted' and it is for the intelligence officer to keep an open mind, Particularly, should a single item of

conflicting information appear, he must be constantly on the lookout for reliable confirmation of any apparent

pattern out of the information gathered.

0560. The answers to the questions of identification, activity and significance, fitted into the intelligence

picture, will lead to deductions and conclusions, and it will nearly always be necessary to obtain more

information to confirm or refute them.

0561. Thus, in practice interpretation is the making of deductions from reported facts and deductions may

sometimes be wrong. It is therefore of the greatest importance that when disseminating any intelligence by any

means, an intelligence officer differentiates clearly between reported fact and his deductions. There may be

occasions when several interpretations are equally plausible. When this happens all the options must be stated.

Intelligence Analysis

0562. Analysis is the separation of a whole into its parts to allow an examination and interpretation of the

information. Analysis is the 'working' of collected intelligence/information to explore contexts and anticipated

events in their fullest political, military, economic, diplomatic and cultural implications. Any intelligence can

follow analytical process but intelligence analysis is basically a research work to be done by specialist

intelligence staff. However, the analytical process is a desk job and may be conducted at any level depending

upon the problems and requirement of user. However at different headquarters a special desk can be assigned

with the task of analysis to provide intelligence to the users.

0563. It is the analyst who must make bring of all the data and attempt to put the pieces together and place it

in a wider perspective. Having concluded that the analyst is at the centre of the intelligence process, it seems

appropriate to examine the question, what is analysis? and in particular, what is intelligence analysis? Following

definitions will clarify its position :

a.. Analysis is the testing of the validity of a hypothesis. Its validity is tentatively accepted with

increasing confidence as more and more implications are traced and matched with reality. But as soon

as one falsehood is found, the hypothesis is declared invalid.

b. Analysis is stage in the intelligence processing cycle whereby collected information is reviewed

to identify significant facts. The information is compared and collated with other data and conclusions

are made that also incorporate the memory and judgment of the intelligence analyst.

0564. Analysis typically involves certain methods and techniques, some of which are statistical; others which

are not, which reveal patterns and trends that often reveal the probability of conclusions and some are research

oriented. The basic ingredients of any intelligence analysis include :

a. Hypothesis. It is the possible conclusions or guess that might be drawn at the beginning for a

particular intelligence problem. Generally, hypotheses refer to events or situations that we are presently

unable to observe directly. These events may have happened in past, possibly happening now or may

possibly happen in the future.

b. Evidence. Evidence is any observable sign, indicator or datum which one believes is relevant in

deciding among hypotheses one entertains.

c. Assumption. Assumptions are the bonds which connect facts and pieces of evidence to support

a hypothesis. In essence, analysts are piecing a puzzle together, knowing that some of the puzzle parts

are missing. Assumptions allow filling the gaps caused by the missing puzzle pieces. As time passes,

new evidence will often surface which will allow you to replace assumptions. When comparing

hypotheses, fewer assumptions increase the plausibility of a hypothesis, while many assumptions will

make the hypothesis more doubtful.

Role of Intelligence Analyst

0565. There is no intelligence analysis tasks imaginable in which the analyst begins a task with all possible

hypothesis, evidence and assumptions already provided. If these ingredients were provided, this would simply

mean that some other analyst had already been working at the task for a considerable period of time. The

process of generating new possibilities, evidence and arguments is intimately related to the process of asking

questions. As an intelligence analyst, one must ask questions of what he knows about the events or situations of

interest. The more training and experience he has in the details of intelligence analysis tasks, the better the

questions he can ask.

0566. An analytical problem rarely has just one possible conclusion. Usually several possibilities exist,

especially when facts or evidence are not available. In some cases, hypotheses, which can concern either past,

present or future events, may take the form of guesses, with little evidence (at first) for support. Evidence

usually refers to observable data or items of information that appears relevant to hypotheses. However, in some

cases, missing evidence can also have significance.

0567. Job as an intelligence analyst may have its tedious moments, but no one can ever say that you are doing

mindless work. The major reason is that three ingredients of intelligence analysis, just mentioned, are never

provided for an analyst, one must discover them for each problem he is solving. This is where imagination,

creativity or inventiveness comes in.

0568. At all level the mission of the Intelligence analyst is to convey the truth to commanders and decision

makers. The intelligence analyst‘s job therefore requires knowledge and understanding of the realities of past

and current events and the anticipation of future events. Analysts act as the decision eyes and ears to the country

and the organisations. They report and forecast as objectively as possible. Their job is specialist in nature and

follows all modern research methodology and technical advancement.

0569. To provide commanders and decision makers with accurate and actionable intelligence, analysts

produce a verity of products, ranging from briefings to hard-copy publications to videotapes. Usually these

products support a specific task or request. Often the products respond to ―standing requirements,‖ meaning the

need for the data is constant. Order of battle or organisation analysis for example, would fall under this category.

Other products are, responding to a current development of interest or concern to the decisions-maker. Crisis

situation, like a bomb explosion in the country, often precipitate requirements for rapid intelligence production.

DISSEMINATION STAGE

Considerations

0570. General. Dissemination can be defined as the timely transmission of information and intelligence in an

appropriate form to the units or agencies, which can make timely and effective use of the data. The primary

purpose of dissemination is to enable the commander to make decisions with confidence; a secondary purpose is

to provide knowledge, in the light of which new information may be processed. Intelligence is used in much the

same manner at all echelons. The means of dissemination are likewise the same at all levels, with variations

occurring in the volume, coverage and frequency.

0571. Recipient. The core concept of dissemination as regards to recipient is ‗need to know‘. However, as a

general guideline, intelligence should be disseminated within the producing headquarters, to next higher, next

lower and adjacent units.

0572. Priority. Priority in dissemination is judged by its usefulness to the recipient, means of dissemination

available and the value of information. Though short cut is never suggested in intelligence cycle, but at times the

information may be of such value that time does not permit complete processing before the information is

disseminated. If done so, the recipient must be made aware of this fact.

0573. Means. Dissemination means selected should be those, which ensure timely receipt of

information/intelligence in an appropriate form. The means selected should be consistent with priority and

should not interfere, as far as possible, with the operational messages.

Principles

0574. Timeliness. Speed of dissemination is essential to ensure that intelligence is received in time to be of

use for planning or decision making.

0575. Accuracy. The accuracy is of utmost importance in intelligence work. The two important aspects in

this context are, firstly, the statement of the fact and secondly, the interpretation of these facts into intelligence.

The intelligence staff must, therefore, understand the intricate difference between these two.

0576. Brevity. Reports must be kept as brief as possible, but at the same time include everything that the

recipient needs to know. Commanders seldom have time to wade through lengthy documents or listen to verbose

oral briefings. Full use of traces, annexes and facsimile processes should be made to cover additional detail.

0577. Interpretation. Wherever possible all facts must be correctly evaluated and their significance

interpreted before dissemination. In all intelligence reports, whether oral or written, a clear distinction must be

preserved between established facts and the deductions made from them. In written reports, such interpretation

must be made clear.

0578. Standardisation. Reports are understood more quickly if they are laid out in a logical sequence under

convenient standard headings. The format should be covered in standing operation procedures.

0579. Distribution. Formations and units must not be kept in the dark on a piece of information which is

readily available and of interest to them. The dissemination must, however, be carried out on 'need to know'

basis. Therefore, if the doubt exists as to the usefulness of information to a particular recipient, it will be

disseminated.

0580. Regularity. Items of obvious urgency must be disseminated as they occur and should not be held for

inclusion in routine intelligence summaries, which are originated at regular intervals. Care should be taken to

avoid overloading communication systems and whilst regular routine reporting is necessary, repetition should be

avoided by the use of phrases such as 'No change' referring to previous reports.

0581. Security. Whilst excessive secrecy can render intelligence ineffective, it is important that it be

disseminated on a strictly 'need to know' basis and that, in the case of written intelligence messages, the

appropriate security classification is realistically assessed. As a general rules such messages may be sent in clear

only if the enemy, should he intercept them, has no time to react. Such safeguards will go far towards ensuring

the security of our own operations and preserving the security of our sources. The need to protect the latter is

paramount. The enemy may have no time to redeploy his force to meet a new tactical situation, but he may have

plenty of time to deal with a compromised source, particularly one located within his own area of influence.

Means of Dissemination

0582. Oral. This saves time, allows for on-the-spot questions and discussion and can be illustrated by a

visual display. It can have an immediate impact on commanders. There can be following types of oral

dissemination :

a. Staff Visits. The exchange of information or intelligence among the intelligence staff of the

higher, lower and adjacent formations/units is facilitated by frequent staff visits.

b. Briefings. Briefings are a better means of dissemination because these allow the listeners to use

both sight and hearing senses in absorbing the presentation of the briefer. These will allow the briefer

an opportunity to respond with direct questions. The questions guide the briefer and give them an

opportunity to feel the interest and needs of the listeners. Briefing can be of following two types :

(1) Impromptu. To meet the immediate needs of a commander or visitor who wants to be

brought up to date as rapidly as possible.

(2) Formal. Formal briefings need proper preparation and presentation. In a unit, company or

squadron commanders will normally be given a short, formal intelligence briefing before a

planned operation or before moving into a new area.

c. Telephone Calls. Telephone calls are also a kind of oral dissemination when in the form of

conversation. They are far superior to the exchange of written messages. However, this may pose

security hazards.

0583. Automatic Data Processing (ADP). Automated data base is ideal for handling large amounts of data

using normal written formats. It enables transformation of incoming digital information straight into the

database. Authorise person will have complete access to it via a local area network (LAN). This enables to

transfer incoming digital information straight into the database, thus ensuring instant dissemination within the

command‘s Intelligence section. The LAN also enables to immediately satisfy some intelligence request.

0584. Written. Following standard sequences, which allows for formal recording of intelligence estimates

and written briefs remain available for reference. These are a valuable means of disseminating information and

intelligence because they permit presentation of intelligence to the recipient in an integrated and comprehensive

form designed to meet the anticipated requirements of a variety of users. There are numerous intelligence

documents and each is designed to satisfy a particular dissemination requirement. The type and form of

intelligence documents prepared and disseminated by intelligence staff at each headquarters varies with the

requirement. Details of types of written dissemination are given at GSTP 0101 and also in section 10 of this

GSTP.

0585. Selection of Means of Dissemination. Several factors must be taken into consideration while

selecting the means of dissemination in order to achieve timely and proper dissemination. Selection of means is

influenced by the following :

a. Availability. The means of dissemination available.

b. Security. The most secure means should be chosen, consistent with the need of timely

dissemination.

c. Urgency. The urgency of the information and intelligence.

d. Details. The details of the information or intelligence to be disseminated. For example,

information or intelligence consisting largely of photographs can not be disseminated by radio or

telephone.

e. Pertinence. This is the pertinence of the information or intelligence. For example information or

intelligence of slight use to an agency would not normally be disseminated by the most rapid means.

f. Location. Location means this location of producer and user. For example, if both the producer

and user were in the same building, all information and intelligence could be disseminated by

messenger or personal contact. If, on the other hand, the producer and user were separated by a great

distance and there was no possibility of direct contact, then an indirect method of dissemination, such

as radio or courier would be used.

0586 – 0600. Reserved.

SECTION - 6

INTELLIGENCE DISCIPLINES

General

0601. Intelligence disciplines are categories of intelligence function. The Army‘s intelligence disciplines are

Open Source Intelligence (OSINT), Human Intelligence (HUMINT), Imagery Intelligence (IMINT), Signals

Intelligence (SIGINT), Measurement and Signature Intelligence (MASINT), Technical Intelligence (TECHINT)

and Counter Intelligence (C Int).

0602. When discussing collection method, we refer to these categories as Intelligence Disciplines. Some

similarities exist between the collection methods with the primary difference but the origin of the product or the

method used to interpret the product will vary. For example, radio or television broadcasts fall under public

consumption which are open-source information but encrypted radio or television transmissions fall under

SIGINT. A satellite photograph from a commercial company is like a special open source information, yet

imagery from a U-2 reconnaissance aircraft is IMINT. Both IMINT and MASINT can use spectral imagery in

developing an interpretation of the image. Similarly, obtaining especially selected open source publications may

involve HUMINT resources. This blurring of the discipline is really an academic argument at least from the

analytical perspective. So we conveniently sidestep the issue. How the ‗discipline‘ obtains the data will often

have little impact on assessment itself. The analyst, however, should have a familiarity on the capabilities and

limitations of discipline. Because this will help to identify which collection asset will best satisfy the analyst‘s

needs.

Types of Intelligence Discipline

0603. Open Source Intelligence (OSINT). OSINT is defined as the intelligence products, organisations and

activities that incorporate open sources of information and intelligence in the production of intelligence.

0604. Human Intelligence (HUMINT). HUMINT is the collection of foreign information by a trained

HUMINT collector from people and multimedia to identify elements, intentions, composition, strength,

dispositions, tactics, equipment, personnel and capabilities. It uses human sources as a tool and a variety of

collection methods both passively and actively to collect information.

0605. Imagery Intelligence (IMINT). IMINT is intelligence derived from the exploitation of imagery

collected by visual photography, infrared, lasers, multi-spectral sensors and radars.

0606. Signal Intelligence (SIGINT). SIGINT is a category of intelligence comprising either individually or

in combination of communication intelligence (COMINT), electronic intelligence (ELINT) and foreign

instrumentation signals intelligence (FISINT).

0607. Measurement and Signatures Intelligence (MASINT). MASINT is technically derived intelligence

that detects, locates, tracks, identifies and/or describes the specific characteristics of fixed and dynamic target

objects and sources. MASINT collection system includes but are not limited to radar, spectro-radiometric,

electro-optical, acoustic, radio frequency, nuclear detection and seismic sensors as well as techniques for

gathering chemical, biological, radiological and nuclear (CBRN) and other material samples.

0608. Scientific and Technical Intelligence (S&T). S&T is intelligence derived from the collection and

analysis of threat and foreign military equipment and associated materiel for the purpose of preventing

technological surprise, assessing foreign scientific and technical (S&T) capabilities and developing

countermeasures designed to neutralise an adversary's technological advantages.

0609. Counter Intelligence (C Int). C Int counters or neutralises hostile intelligence collection efforts

sabotage and subversion through collection, counter intelligence investigations, analysis and production,

functional and technical services and finally neutralise those threat through various means.

OPEN SOURCE INTELLIGENCE

Definition and Sources

0610. Any unclassified openly discussed information which has an intelligence value is known as Open

Source Intelligence (OSINT). Most of us are familiar with open-source material like newspapers, books, journal

periodicals, radio and television. OSINT can also include commercial databases, patents, theses, photos and

even commercial satellite images. Another growing component is grey literature which includes symposium

reports, corporate brochures, academic research efforts and 'think-tank' studies. Grey literature can also include

reports free of proprietary or copyright restrictions.

Advantages of OSINT

0611. The main advantages of using OSINT are ease of handling, relatively low expense and timeliness. It

can afford an opportunity to share information with allies. The different types of data available to the public

have also increased worldwide, running from level proceedings to military orders of battle. For years the

Intelligence Community used open source information primarily to assess scientific and technological (S&T)

developments.

0612. Open sources are most valuable when used in conjunction with other intelligence assets. Open source

information can serve as a useful flag if it conforms or contradicts information obtained from other intelligence

collection methods. Areas where open source have made distinct and meaningful contributions include

proliferation issues, terrorism and illegal narcotics movements. In general, open sources can provide insight

especially about an event, including background and focus.

Disadvantages of OSINT

0613. Ironically, the main disadvantage of OSINT is volume. We are truly in an information age and

experiencing information explosion. As noted above, over the last few years we have seen an exponential

growth of its quality of available information and in the topical diversity of that information. In 1982, for

example, only few commercial databases were available. Today we have an estimated 8,000 commercial data

bases produced around the world.

0614. Another disadvantage of OSINT is the supervisor who believes enormously that 'if the information

isn‘t classified, it is worthless. However, even the 'traditional' intelligence discipline can include untrustworthy

data. Camouflage, concealment and deception programmes can have an adverse impact on all collection efforts,

particularly if the analyst does not evaluate the relevance, credibility and strength of the evidence under

consideration. Admittedly, open sources are frequent outlets of biased and misleading information or even the

product of deliberate deception activities. But no analysts worth his assessment solely on one intelligence

discipline and the use of multiple sources should negate the impact of disinformation efforts.

OSINT and the Future

0615. From the Intelligence Community‘s stand point fewer information needed in the future will deal with

strength of military forces. Although we will see increased involvement with arms control issues and the

implementation. Instead, we will focus more foreign economic developments and support of military

peacekeeping operations abroad. In short, the Intelligence Community is facing a fundamental restructure. With

the wide variety to tasks we are asked to do, we must use all the resources available to us both classified and

unclassified to supports the decision-makers and policy makers. Good intelligence analyst requires his emphasis

on timeliness, relevancy, accuracy and completeness. We can no longer accomplish this tasks relying solely on

the tradition which is often expensive and sometimes risky classified collection means. Open source

information, when used properly, act as a flag for identifying new intelligence developments or issues causes us

OPEN SOURCE INTELLIGENCE (OSINT)

Capabilities and Advantages :

- Can use for targets where collection priorities are low.

- Relatively cheap, compared to the other intelligence disciplines.

- Easier to disseminate and share.

- Unlimited coverage of most topics, huge volumes of information.

- Generally very current.

Limitations and Disadvantages :

- Huge volumes of information can overload the analyst or researcher.

- Can require considerable time for researching, not always easy or quick to find the best

source.

- Easy to accept at face value.

- Diversity.

to reassess a previous hypothesis if the information conflicts with other sources or give us confidence if it

confirms data from classified collection means.

HUMAN INTELLIGENCE

General

0616. HUMINT is intelligence collection using human as both collectors and sources of information. In the

traditional collection method, HUMINT is the only non technical intelligence collection discipline. Overt

HUMINT is collected by observation from knowledgeable human source or openly available media. Clandestine

HUMINT is collection under maximum constraints on the basis of possible denial. HUMINT collection does not

involve 'covert actions' which are really operations designed to precipitate of response or reaction by the targets.

However, sources of HUMINT include spies, interrogation of prisoner of war, trade fairs and expositions,

subject-matter experts and attaché exchanges.

0617. The National Security Intelligence (NSI) is the lead agency for HUMINT in Bangladesh. The

Directorate General of Forces Intelligence (DGFI) is the defence HUMINT manager for HUMINT collection

requirements which coordinates with NSI. Field Intelligence Units at division level are the primary HUMINT

agencies.

Analysis of Human Intelligence

0618. Human intelligence includes all information derived through human sources. Tactically it is

represented by interrogation of enemy prisoners of war and civilian detainees, translation of captured enemy

documents, long range surveillance operations, patrols and observation posts, liaison with local military or

paramilitary forces and the local populace are the most importantly reports from friendly troops.

0619. It has the potential to discover the most guarded secrets to include enemy intentions. It generally has an

advantage in the collection of less precise and quantifiable information requiring qualitative and value

judgments. Examples of the most lucrative human intelligence targets are those which involve plans and

intentions, deliberations and decisions, research and development, doctrine, leadership, training, and morale.

0620. Human intelligence sometimes suffers in timeliness of information. However, much overt tactical

human intelligence is immediately exploitable as combat information. The ideal human intelligence sources are

privacy to decisions and intentions before they are widely communicated or acted upon – a requirement most

other sources cannot meet. An analysis of human intelligence is shown below:

IMAGERY INTELLIGENCE

HUMAN INTELLIGENCE (HUMINT)

Capabilities and Advantages :

- Gauge intentions, plans.

- Determine capabilities.

- Crisis contributor; can give appraisals of mode, report perceptions.

- On site verification a person can see, touch and confirm.

- Cost effective; “non artificial” intelligence collector with multiple sensors and multi-

tasking capability.

- Flexible; a person can adapt to changing situations.

Limitations and Disadvantages :

- Lack of timeliness.

- Placement may be difficult and access limited.

- Motivation factors; “Why is he or she telling me this” ? Wants revenge ?

- Source reliability questions; at least partially relates to motivation.

- Human factors; bias, forgetfulness and imperfect memory.

- Legal issues.

IMAGERY INTELLIGENCE

General

0621. Imagery Intelligence (IMINT) involves the exploitation of a permanent and objective record produced

by a camera, scanner or other imaging devices. Commonly, it is simply a picture of something. For many

people, imagery is the only way to really confirm an activity. Types of imagery include visible light, near

infrared, far infrared and radar.

0622. At the strategic intelligence level Space Research and Remote Sensing Organization (SPARRO) and

Survey of Bangladesh provide the lead. In this aspect Army Headquarters reviews and forward requests for

images coming from various formations and finally they request strategic images collection assets and

Bangladesh Air Force to provide the same. Army Headquarters will also maintain and control own indigenous

tactical photo reconnaissance assets for providing the imagery intelligence.

Analysis of Imagery Intelligence

0623. It is derived from radar, photographic, infrared and electro-optic imagery. Imagery are analysed by

imagery analysts to identify and locate enemy activity, installations and land equipment. Side looking airborne

radar has the capability to detect vehicle movement over large areas, has a stand-off capability of considerable

distance and has the capability to be digitally down linked to the ground for in-depth analysis. Photographic

imagery analysis is very accurate and is susceptible only to more sophisticated camouflage, concealment and

deception techniques. Positive identification of equipment can be made from photographic imagery in most

cases. Infrared needs no light to image and best results are obtained at night. The system has the capability to

detect individual in a low-intensity conflict. Electro optic systems are similar to photographic systems but differ

in that the image is a digital recording which can be manipulated to obtain optimum results.

0624. The disadvantages of IMINT depend on the limitations of the various sensors. Weather is a factor to

some extent for all of the sensors. Radar, since it is an emitter, is susceptible to jamming. Photography is limited

for all practical purposes, light hours and has no near-real time capability. Time sensitive requirements may be

missed due to the time required for aircraft return and film downloading and processing. Infrared sensors require

the aircraft to fly at low altitude (less Than 3,000 feet) and directly over the target. Electro optic systems suffer

most of the limitations photography does, though not to the same extent. Some correction can be made to the

image by digital enhancement.

Use of Space for Military and Other Purpose

0625. The earth‘s atmosphere is divided into a number of regions classified according to their temperature

changes. The five major regions are Troposphere, Stratosphere, Mesosphere, Thermosphere and Exosphere. The

exosphere at altitude of 150 km is the lowest altitude that can sustain a circular orbit for one revolution without

propulsion. This has been accepted as the most common definition of where space begins.

0626. A satellite can only see a relatively small area at the same time. For this reason mapping a large area

(or the whole Earth) takes a lot of time and most satellite images are on average several years old. Because

imaging satellites are in low Earth orbits, real-time imaging of a certain area is complicated. However, spy

satellites can do this during wars and other military operations or to provide data for intelligence agencies. Still,

the troops frequently find out that the ground truth is different from the images that were taken some times ago.

0627. Satellite imagery can be combined with Geographical Information System (GIS) data. For example, the

Earth Viewer can combine the images with maps and other information from various sources. In the early 21st

century satellite imagery became widely available when affordable, easy to use software with access to satellite

imagery databases is offered by several companies and organisations.

0628. Toady satellites in the orbit can provide communication links to troops in the field, enabling them to

talk directly to their commanders. Other satellites can provide accurate and timely information regarding the

weather to be found or expected at any location enabling tactics to be adopted to make most of the weather

conditions. There are satellites which allow military commanders to fix his exact location on the globe and

navigate with only a few meters of error confirming unprecedented accuracy to his weapon systems. Military

commanders are also provided with data regarding his enemy by satellite which can look beneath the

camouflage, listen to enemy communications, identify and locate the radars associated with weapon systems and

much more. Meanwhile, watchful satellites keep an eye on the enemy‘s missile sites, ready to give warning of

any impending launch of nuclear missile. It can, therefore, be truly said that warfare has spread from the known

dimensions of land and air to space, the latter being the natural extension of the air environment in the third

dimension.

Air Photography

0629. Air photography is probably the largest single source of information concerning the enemy. This is

especially true in wartime when access to enemy territory is difficult or impossible. Air Photography provides a

means of obtaining accurate information more quickly than by any other sources of military intelligence.

0630. The principal uses of air photography for military intelligence purposes are as follows :

a. The production of material for the compilation of target maps.

b. The recording of results of attacks, whether with bombs or other weapons.

c. The detection of military movement on roads, railways, tactical areas and at sea.

d. The surveillance of targets or areas of strategic or tactical importance, industries and stock piles.

e. The preparation and revision of maps.

0631. There is a difference between air photo reading and interpretation. Air photo reading is merely to scan

an air photo under a stereoscope and determine whether it is a canal, building, road, railway, bridge etc. It does

not call for an assessment of the target for military use. For interpretation one has to read the photographs

correctly and then from the information available or signatures on air photographs derive at interpretation which

becomes intelligence.

0632. Aerial photograph has several advantageous features as opposed to visual reconnaissance, which,

despite its simplicity, does not meet the complex nature of reconnaissance information needed in planning.

These are :

a. The information collected is unbiased and unprejudiced as the camera does not lie.

b. A permanent photographic record of a vast amount of details can be kept.

c. Information can be collected over areas inaccessible to man.

d. Comparative study of an area can be made by successive photo covers.

e. Permits accurate measurement and location of various targets.

f. Permits detailed study of a target with the use of instruments and specialists in any particular

field.

g. Special kinds of equipment can be used to overcome natural difficulties like weather, haze etc.

Very low level sorties using special equipment can be flown to avoid enemy action.

h. Special equipment permits real time displays too.

j. Largest source of tactical and strategic intelligence.

k. Quickest means of obtaining accurate and up to date information.

l. It contains more details than map.

m. It can give complete picture of ground slope including three dimension view.

SIGNAL INTELLIGENCE

General

0633. It is the product resulting from the collection, evaluation, analysis, integration and interpretation of

information derived form intercepted electromagnetic emissions. It is divided into communications intelligence

(COMINT), electronic intelligence (ELINT) and foreign instrumentation signal intelligence (FISINT).

0634. Signal Intelligence (SIGINT) comes from intercepted communications, radar and telemetry. Traditional

SIGINT has had three sub-disciplines :

a. Communications Intelligence (COMINT). Intercept of foreign communication systems by other

than the intended recipient.

b. Electronic Intelligence (ELINT). Intercept of foreign non-communication electromagnetic

emanations other then nuclear detonations or radio sources.

c. Foreign Instrumentation Signals Intelligence (FISINT). Intercept of equipment parameters and

performance monitoring control systems, telemetry, beacons, command links and fuse arming signals.

With the computer age upon us, SIGINT includes a fourth category: Digital communication signals used to

transmit data between machines.

Analysis of SIGINT

0635. An analysis of SIGINT is given below :

COMMUNICATIONS INTELLIGENCE (Comint)

0636. As its name indicates, COMINT is the intelligence obtained by the interception, processing and

analysis of the communications of foreign governments or groups, excluding radio and television broadcasts.

The communications may take a variety of forms--voice, morse code, radio-teletype or facsimile. The

communications may be encrypted or transmitted in the clear.

0637. Many governments also targets the communications between different components of a large number

of governments. On some occasions both components are located within the country, on other occasions at least

one is located outside national boundaries. Communications that may be targeted include those between

government officials, different ministries, a ministry or agency and subordinate units throughout the country and

abroad, arms factories, military units during exercises and operations, police and security forces and their

headquarters.

0638. Another major set of COMINT targets are associated with economic activity (of both the legal and

illegal variety) for example, the communications of multinational corporations and narcotics traffickers. In

1970, the predecessor to the Drug Enforcement Administration informed the NSA that it had a requirement for

any and all COMINT information which reflects illicit traffic in narcotics and dangerous drugs. Specific areas of

interest including organisations and individuals engaged in such activities, the distribution of narcotics, narcotic

cultivation and production centres, efforts to control the traffic in narcotics and all violations of law.

ELECTRONIC INTELLIGENCE (Elint)

0639. Electronic intercept operations are intended to produce electronic intelligence (ELINT) by intercepting

the non-communication signals of military and civilian hardware, excluding those signals resulting from atomic

detonations. Under NSA project KILTING, all ELINT signals are stored in computerised reference files

containing the most up-to-date technical information about the signals.

0640. The earliest of ELINT targets were World War II air defence radar systems. The objective was to

gather emanations that would allow the identification of the presence and operating characteristics of the radars-

-information that could be used to circumvent or neutralise the radars (through direct attack or electronic

countermeasures) during bombing raids. Information desired included frequencies, signal strengths, pulse

lengths and rates and other specifications. Since that time intelligence, space tracking and ballistic missile early-

warning radars have joined the list of ELINT targets.

SIGNAL INTELLIGENCE (SIGINT)

Capabilities and Advantages :

- Passive activity; just listening.

- Can indicate levels; are they talking more ? Less ?

- Can indicate a change in status or direction.

- Can give clues to intentions.

- Usually reliable data.

Limitations and Disadvantages :

- Requires an active target; can listen only if someone is transmitting.

- Susceptible to deception; fake transmitters, misleading statements.

- Can require considerable time to decode or analyse.

- Requires a large numbers of highly-trained personnel resources, including

linguists and computer programmers and technical analysts.

- Some SIGINT collection effort is expensive to run and maintain.

Foreign Instrumentation Signal Intelligence (FISINT)

0641. A subcategory of SIGINT is Foreign Instrumentation Signal Intelligence (FISINT). Foreign

instrumentation signals are electromagnetic emissions associated with the testing and operational deployment of

aerospace, surface and subsurface systems that have military or civilian applications. Such signals include but

are not limited to, signals from telemetry, beaconing, electronic interrogators, tracking-fusing-aiming/command

systems and video data links.

0642. A subcategory of FISINT is Telemetry Intelligence (TELINT). Telemetry is the set of signals by which

a missile, missile stage or missile warhead sends data about its performance during a test flight back to earth.

The data relates to structural stress, rocket motor thrust, fuel consumption, guidance system performance and the

physical conditions of the ambient environment.

Other Categories

0643. Two further categories of SIGINT were listed by expect such as non-imaging infrared and coherent

light signals. The former involves sensors that can detect the absence/presence and movement of an object via

temperature. The term "coherent light signal" refers to lasers and hence this category includes the interception of

laser communications as well as the emissions from Soviet laser research and development activities.

0644. The case with which signals (whether communications or electronic signals) can be intercepted and

understood depends on three factors; the method of transmission, the frequencies employed and the enciphering

system (or lack of) used to conceal the signals meaning from unauthorised personnel.

0645. The most secure form of transmission is that sent by cables, either land lines or underwater cables.

Communications or other signals transmitted through such cables cannot be snatched out of the air. Interception

of cable traffic has involved physically tapping into the cables or using 'induction' devices that are placed in the

proximity of the cables and maintenance of equipment at the point of access. This might be unobtainable with

respect to hardened and protected internal landlines, the type of landline that carries much high-priority, secret

command, control and communications.

MEASUREMENT AND SIGNATURES INTELLIGENCE (MASINT)

Analysis of MASINT

0646. MASINT is technically derived intelligence that detects, locates, tracks, identifies and describes the

especially signatures of fixed and dynamic target sources. It can provide the analyst with details about a beyond

literal exploitation, providing information on performance and composition. MASINT covers the entire

electromagnetic spectrum. It involves radar, laser, optical, infrared, acoustic, nuclear radiation, radar frequency,

spectrometric, and seismic sensing systems as well as gas, liquid, and solid materials sample and analysis.

0647. Products include seismic reports of nuclear weapons tests, radar signatures of weapon systems and

chemical composition of air and water samples. MASINT has a number of sub-disciplines, including :

a. Acoustic .

b. Electro-optical.

c. Radar.

d. Geophysics or Seismic.

e. Laser.

f. Infrared.

g. Radio Frequency (RF).

h. Effluence and Debris.

j. Nuclear Radiation.

0648. An Analysis of MASINT is shown below :

0649. Radar intelligence (RADINT) is the intelligence obtained from the use of non-imaging radar, similar to

electronic intelligence in that no intercepted communications are involved. However, RADINT does not depend

on the interception of another object's electronic emission. It is the radar which emits electronic signals radio

waves and the deflection of those signals allows for intelligence to be derived. Information that can be obtained

from RADINT includes flight paths, velocity, manoeuvring, trajectory, and angle of descent.

SCIENTIFICS AND TECHNICAL INTELLIGENCE

0650. Scientific Technical Intelligence (S&T) is the intelligence that derived from the collection and analysis

of threat and foreign military equipment and associated material for the purpose of preventing technological

surprise, assessing foreign S&T capabilities and developing countermeasures designed to neutralise the

adversary's technological advantages.

0651. This is that intelligence concerning technological developments and the performance and operations

capabilities of foreign material which now or eventually may have a practical application for military purposes.

This types of intelligence contributes significant to fulfilling the intelligence requirements of tactical units.

Typical S&T targets at tactical levels include enemy equipment and facilities. Tactical units must rapidly

evacuate captured equipment and personnel of S&T intelligence units who exploit them in support of tactical

and strategic requirements.

0652. Tactical information and intelligence may result from action taken within any of the categories

previously described. For example, signal intelligence may provide a key element of intelligence that tell the

commander when the enemy will attack. Imagery intelligence may provide the strength of the attacking force.

0653. Human intelligence may provide knowledge of where the enemy will strike. Taken separately or in

isolated increments, it is unlikely that a complete picture of the battlefield can be developed. However, the

integration of these bits of intelligence with other information provides a composite picture that allows the

commander to 'see' the battlefield. The composite picture of the battlefield is the result of intelligence from all

sources.

COUNTER INTELLIGENCE

General

0654. Counter intelligence is those intelligence activities intended to detect, evaluate, counteract or prevent

hostile intelligence collection, subversion, sabotage, terrorism, or assassination conducted by or on behalf of any

country, persons or organization operating to the detriment of the Bangladesh Army. It includes the

identification of the hostile multidiscipline intelligence collection threat; determination of friendly

MEASUREMENT AND SIGNATURES INTELLIGENCE (MASINT)

Capabilities and Advantages :

- Access-sensors can acquire data on hard-to-see target.

- Quantifiable; not very subjective.

- Reliable; not very subjective.

- Provides technical intelligence data on equipment and performance.

- Can assist with treaty compliance inspections and verifications.

- Provides unique signature data across the Electro-magnetic spectrum.

- Provides automate target identification data.

Limitations and Disadvantages :

- Requires personnel with technical abilities to interpret the data accurately.

- Highly technical and specialized.

- Depending on the sub-discipline, it may require activity from the target.

- Difficult to gauge intentions.

- Sensor limitations.

- Most Sensors and MASINT collection programmes are expensive.

- Little in common among MASINT sub-disciplines; this makes it difficult to

develop all-around expertise.

vulnerabilities to that threat and the recommendation and evaluation of security measures. Counter intelligence

supports operational security, rear operations, and tactical deception. This section describes, in general terms the

enemy intelligence threat, tasks which must be performed, and the integration of counter intelligence with the

command's tactical operations.

0655. Counter intelligence support to operational security orients on defeating or degrading an enemy's multi

disciplined intelligence effort. It includes those counter human intelligence, counter imagery intelligence and

counter signal intelligence measures necessary to oppose effectively the collection systems available to the

enemy at the tactical, operational, and strategic levels. It also includes counter intelligence analysis performed as

an integral part of the operational security process.

Threat

0656. Intelligence collection and target acquisition are the means by which ground commanders acquire

information on opposing forces. Rapid success in military operations, a basic tenet of enemy doctrine, demands

that commanders have timely information on the terrain, weather, and their opponents.

0657. Any potential adversary will have an excellent intelligence collection, analysis, and dissemination

capability. This capability is organic to all echelons from command to unit. He recognizes that in order to make

maximum use of his massed fire power and mobility, their target acquisition capabilities must be characterized

by accuracy and short reaction times. Tactical reconnaissance is conducted to varying depths by specialized

reconnaissance units as well as all other troop units.

0658. Air reconnaissance is a good source of tactical intelligence to any adversary and is undertaken by

aircraft of the frontal aviation. These air craft have visual, photo, infrared, radar and signal intelligence

capabilities. A certain portion of reconnaissance missions are accomplished by pairs of fighter and ground attack

aircraft assigned locate and attack missions. Potential adversaries have extensive intercept capabilities for both

radio and radar. Intercept units are moved forward just behind leading manoeuvre regiments. They have the

capability to intercept all electronic. These ranges are greatly extended when airborne intercept equipment is

used. Information derived from the intercept of 'Clear' traffic is immediately evaluated and exploited.

0659. Their direction finding (DF) capability is equivalent to that for intercept. While information from DF is

evaluated quickly, it is unlikely to provide a sufficiently accurate fix on a moving, tactical target. If a strike is

required, confirmation is most likely accomplished by aerial reconnaissance. Targets within artillery range, such

as forward command and control facilities, are attacked within minutes after DF.

0660. Reconnaissance in depth is carried out by specially trained personnel. Organized into teams, they

operate long forward of the main force and can be expected to infiltrate deep into own division, brigade and unit

rear areas. Their primary mission is to collect information concerning tank, heavy weapons, units in assembly

areas, moving headquarters, technology and communication facilities. Normally, teams are equipped with long

range radios and except in emergencies, probably report by burst transmission on a scheduled basis to minimize

detection.

0661. All tactical formation of the adversaries‘ army have organic tactical ground reconnaissance capabilities.

Mechanized and tank divisions have reconnaissance battalions and companies equipped with tanks and scout

cars and infantry fighting vehicles. Brigades on the march dispatch battalion sized advance guards forward of

the main body. The advance guard sends a company forward, and that company deploys reinforced platoon

strength for reconnaissance purpose, Armour, Engineer and artillery troops all have their reconnaissance

elements which are attached to leading reconnaissance units in the advance. Corps and divisional artillery

brigades have an organic target acquisition capability. Generally, these units have surveillance and weapons

locating radars. They are also capable of sound ranging and flash spotting from the forward line.

0662. Potential adversaries‘ military doctrine stresses attacking opposing forces throughout the depth or their

disposition. They fully appreciate the important role that special forces can play in support the main attack.

These operations consist of a variety of military and paramilitary operations to include partisan warfare,

subversion, sabotage, and terrorism conducted during periods of peace and war. It also includes other operations

of a covert or clandestine nature. The overall objectives are similar regardless of mission category and include :

a. Weakening the military capabilities of the target country.

b. Supporting follow on conventional military operations.

0663. Strategic special warfare missions are controlled by the national intelligence organization. These

missions, conducted in the heartland of the opposing forces, are aimed at reducing the later's ability to continue

fighting and toward breaking the national will to resist. Strategic missions include efforts to intimate and

demoralize the populace, create chaos and disrupt public services and undermine national resistance.

0664. Strategic special warfare missions also may be performed by select regular airborne forces. These

would not be normal air borne missions which generally require coordination with front line operations, but

small, elite airborne groups which operate at great depths behind enemy lines. Their basic objective are to

weaken enemy operational readiness and combat effectiveness. Their missions could include :

a. Neutralization of major opposition headquarters.

b. Destruction of weapons of man destruction.

c. Sabotage to support disruption of communication and key logistics.

0665. Operational special warfare mission in support of the command and crops are carried out under the

control of the commander of a command. Air bourns forces, the clandestine special purpose units, and army

special are employed for:

a. Preparation and security of landing sits for regular airborne forces.

b. Intelligence on the location and strength of enemy forces.

c. Sabotage operations against airfield, railway line, road and rail bridges and commu-nications

system.

d. The use of terror to intimidate the population.

e. Organizations of local guerrilla or partisan groups.

0666. The level I threat includes activities of enemy agents, sabotage by enemy sympathizers, and activates

of terrorist organization. Level II includes diversion, sabotage, and reconnaissance conducted by tactical units

smaller than battalion size. level III includes airborne operations, air assault insertions, and amphibious

operations of battalion size of larger. Counter intelligence provides support in countering all target levels;

however, Counter intelligence is most effective in providing indications and warning regarding level I and level

II threat activities.

Support to Operation Security

0667. The intelligence threat described in the preceding paragraphs means tactical commanders must take

specific action to minimize the enemy's ability to collect against them. Such actions are embodies in the

command's operational security program. This program includes the coordinated application of a variety of

measures and procedures tailored to the unique requirements of each unit, mission, and situation. This requires a

totally integrated effort consisting of actions in three major categories of operational security measures; counter

surveillance, countermeasures, and deception measure.

0668. Counter surveillance measures are those measures routinely taken to protect the true status of friendly

activities and operations from enemy intelligence activities. They include measures which are integrated in

communication, correct electronic maintenance procedures and camouflage and concealment. Such measures

generally are required by regulations, directives or SOP.

0669. Countermeasures are planned, recommended, and selected to overcome specific operations which are

not countered by more routine counter surveillance. Once a friendly vulnerability is identified and determined to

be a risk, an specific counter-measures is developed to preclude exploitation by the enemy. Countermeasures

may include both protective and offensive action. Protective measures include those taken to protect against

hostile collection without directly attacking the collector. Offensive measure includes electronic counter

measures, fire, and manoeuvre directed against the collector. Although countermeasures are always written into

each SOP, specific countermeasures are dependent upon the situation and the mission.

0670. Operational security encompasses every element of the command and requires the involvement of

commanders, staffs, and troops to be effective. In fact, every soldier must take an active part in protecting the

command through operational security. Operational Security is directed and guided by the commander,

coordinated by the operations officer, supported by other staff members, and executed by the soldiers of each

unit.

Counter Intelligence Support to Operational Security

0671. General. Counter intelligence support is a critical element in any effective operational security

program. Counter intelligence functions, performed by the intelligence staff, are integrated with the operational

security functions of the operational staff. An accurate assessment of enemy intelligence capabilities is the

foundation of friendly vulnerability assessments and the development of effective operational security measures.

Identifications and assessment of the hostile intelligence threat are accomplished through a continually updated

data base maintained by the counter intelligence analysis personnel. Included in the operational security data

base are friendly force profile made up of signatures, patterns, and indicator. These show how a unit might

appear through the eyes of the enemy. The friendly force data is crucial to planning operations because it aids in

developing essential element of friendly information (EEFI), operational security measures, accurate appraisal

and effective deception plans.

0672. Profiles. Profiles are comprehensive studies of a unit and its activities to include equipment, doctrine,

SOPs, and so forth. Profiles result from actions, to include the timing of those actions, taken by military units

and individual soldiers. Once compiled, unit profiles provide a picture of the unit as the enemy sees it. Analysis

of a unit's profiles can reveal signatures and patterns about unit procedures and, over time may be used to

determine intentions. Collectively, profiles can be used by the enemy to help predict probable course of action.

0673. Signature. Signatures are unique characteristics of a unit which result from the presence of a unit or

activity on the battlefield. Signatures are detected because various units have different equipment, are of

differing sizes, emit different electronic signals. and have different acoustic, thermal (infrared), and seismic

signature. Detection of individual signatures can be grouped by analysts to show installations, units and

activities.

0674. Patterns. Patterns are stereotyped actions which habitually occur in a given set of circumstance.

Military forces have SOPs for virtually everything they do. Predictable patterns may be developed by

commanders, planners, and operators. Types of patterns are as numerous as there are procedures in military

operations. For example, before every offensive operation the volume of communications increases dramatically

and then drops off equally dramatically just before the attack. Enemy analysts would note this pattern and be

able to predict a unit's intentions for all future offensives.

0675. Indicators. Indicators are pieces of information concerning a military unit and its activities (much like

a piece of puzzle) which allow enemy analysis to make estimates to friendly capabilities, weaknesses, and

intentions. In preparing for a tactical operation, it is virtually impossible for military forces to avoid or conceal

all indicators. In many cases, these activities can be detected by the enemy and used to predict probable courses

of action. Indicators that cannot be eliminated or concealed may be considered as a basis for a deception plan.

Identification and interpretation of specific indicators are critical tasks in intelligence operations weather the

indicator is friendly or enemy. Intelligence people look for indicators, analyze them, and make estimates of

capabilities, vulnerabilities and intentions. These analyses lead to requests for information and planning and

eventually provide d the basis for decisions and orders.

0676. Vulnerability Analysis. Friendly force vulnerabilities are identified through comparison of friendly

indicators and hostile collection capabilities. As an aid to analysis, IPB techniques are applied to friendly force

patterns and signatures so we can see ourselves as viewed by enemy collection systems. For example, the range

and focus of hostile collection means can be plotted on a map and, with inter-visibility overlays, and

determination made of what friendly activities are vulnerable to enemy observation. Further, IPB can be applied

to develop operational security measure recommendations. For example, a map overlap could be constructed to

indicate which routes minimize detection during movement, or which areas would afford concealment and cover

for signature unique equipment.

0677. Protect EEFI. Operational security measures must be systematically developed to protect EEFI from

enemy detection. Generally, there are six options for the decision maker :

a. Apply one or more operational security measures.

b. Accept risk of detection.

c. Use deception.

d. Change the operation enough to eliminate the vulnerability.

e. Any combination of the above.

f. Prohibit the activity (cancel the mission).

Support to Rear Operation

0678. The primary purpose for conducting rear operations is to retain freedom of action to conduct close and

deep operations. The objectives of rear operations are to :

a. Secure the rear areas and facilities.

b. Prevent or minimize interference with command, control and communications.

c. Prevent or minimize disruption of combat support and CSS forward.

d. Provide unimpeded movement of friendly units throughout the rear area.

e. Provide area damage control (ADC) before, during and after hostile actions or natural disaster.

0679. Counter intelligence supports rear operations through a variety of actions designed to defeat or assist in

defeating the enemy threat to our rear areas. Each action is based on the threat posed by enemy agents, elements

and units normally used against the rear. Operating in the enemy rear areas, these units try to prevent effective

and timely employment of reserves. They also serve to generally disrupt enemy offensive and defensive

capabilities.

0680. Counter intelligence support to rear operations includes those functions performed in support of

operational security. It also includes a number of other functions normally not accomplished in support of the

operational security mission. Counter intelligence personnel conduct liaison with local police and intelligence

agencies. both military and civilian, to foster a very gad of cooperation and to obtain information. Generally,

liaison is established in peace and carried over into war. The cooperation obtained from such agencies through

liaison efforts is critical to neutralizing the level I threat.

0681. The counter intelligence analysis personnel creates and maintain black, gray and white lists to permit

rapid identification of key indigenous personnel in rear areas. Persons on black lists are those personnel whose

capture and detention are of prime importance to the Bangladesh Army. They include known or suspected

agents, saboteurs, enemy sympathizers and other who represent a serious threat to rear area security, Gray lists

contain the identities and locations of those personalities whose inclinations and attitudes towards the political

and military objectives of the Bangladesh Army are obscure. Regardless of their political inclinations or

attitudes, personalities may be listed when they are known to possess information or particular skills required by

Bangladesh forces. They also may be individual whose political motivations require further exploration before

they can be of use to Bangladesh Forces. White lists contain the identities and lactations of individuals who have

been identified as being of intelligence or counter intelligence interest.

0682. Counter intelligence identify and assist in neutralizing special warfare teams and cells, and important

priority in rear operations. Information provided by counter intelligence personnel is passed to local police or

military forces. Counter intelligence teams conduct incident investigations of suspected sabotage, subversion

and espionage directed against the rear area. These investigations can lead to the identification and elimination

of perpetrators of hostile actions in the rear area. Pattern analysis of multiple incidents can reveal enemy plans

and intentions. Counter intelligence conduct tactical human intelligence operations to exploit captured personnel

who can identify other hostile agents and saboteurs, pinpoint team locations, or provide other information. Time

constraints generally preclude extensive tactical human intelligence operations, but enemy agents, sympathizers,

and terrorists can often be neutralized.

Support to Deception

0683. Battle field deception includes all actions at tactical level taken to mislead the enemy into actions

which are counter to enemy interests. Based not the command, control and communications recommendation,

the commander selects a deception objective. The operations include manipulating, distorting, or falsifying

information availability\le to the enemy to ensure security of actual plans, operations, or activities. Generally,

deception operations require an high degree of security through the application of effective operational security

and other support to achieve effectiveness. Part of the support provided is counter intelligence. Counter

intelligence supports deceptions with :

a. Analysis of the intelligence threat.

b. Recommendations of deception measures.

c. Support to the security of the deception and the actual operation.

d. Evaluation of the implementation of deception measures.

e. Evaluation of the effectiveness of the deception.

0684. Analysis of the enemy intelligence system is the critical elements of any deception. Analysis is

performed on the information maintained in the hostile intelligence collection data base, which is used for both

operational security and deception; when this analysis is accomplished for operations security purposes, it

focuses on enemy capabilities. When supporting deception, it focuses on enemy intelligence vulnerabilities.

Counter intelligence analysis of the enemy intelligence system determines :

a. The types of collectors, their capabilities and limitations, to which false information must be

presented.

b. The minimum requirements for realism in deception measures.

c. The strengths and weaknesses of enemy intelligence analysis to further determine the amount of

information needed for the enemy to draw appropriate conclusions.

0685 – 0700. Reserved.

CHAPTER - II

SITUATION AND TARGET DEVELOPMENT PROCESS

SECTION - 7

SITUATION DEVELOPMENT STAGE

General

0701. Situation and target development are the processes that provide commanders the intelligence and

targeting data they need to plan in any operation or battle. Both the processes are conducted simultaneously

incorporating Intelligence Preparation of Battlefield (IPB) and the Intelligence Process function. Both are

continuous and are performed by commanders and intelligence staffs at all echelons. Beginning in peacetime,

they become the essence of intelligence production during hostilities.

0702. Situation development enables commanders to see and understand the battlefield in sufficient time and

detail to employ their forces and weapon systems effectively. In situation development, the intelligence staff

uses IPB to produce a description of enemy force disposition on the battlefield in terms of location, size, type,

direction, rate of movement and activity. This portrayal is based on an analysis of intelligence holdings which

are continuously updated through the collection and processing of information. Situation development conforms

to four stages of intelligence process :

a. Direction through Situation Development.

b. Collection Management.

c. Processing and Target Development.

d. Dissemination of Intelligence.

0703. Target development is the process of providing timely and accurate locations of enemy movers,

emitters, shooters and sitters that may impact on current and future operations. Effective target development is

based on situation development and is accomplished throughout the commander‘s area of operations and

interest. It provides commanders the targeting data they need to effectively attack targets with fire, manoeuvre

and Electronic Warfare (EW) means.

0704. Situation and target development represent the essence or final goal of the intelligence production

process at the tactical level. Both are dependant on the collecting, processing and disseminating of information.

This chapter describes how the collection management, processing and dissemination functions are performed

so as to support situation and target development. It focuses on collection management procedures; the collation,

evaluation and interpretation of information and dissemination of the end products to its users.

Mission Analysis

0705. IPB, in addition to being an information processing function, provides a basis for accomplishing

situation and target development. IPB orients the mission planning, collection, processing and dissemination

efforts of situation and target development. Because of its important role, IPB is described first so that the other

functions in this chapter can be better understood.

0706. Mission planning is the initial step in preparing for war or for future operations during war. Mission

planning guides the IPB process by focusing on unit contingency areas. It draws together, in priority, the

information needed to build the IPB data base. Upon receipt of a mission, commander analyse it to determine its

key elements. They complete the analysis based on the analysis of the battlefield area presented by the

intelligence staff and available information provided by other staff members. After completing mission analysis,

commanders restate the mission and issue planning guidance. Planning guidance results in the preparation of

staff estimates. The intelligence estimates along with other staff estimates are presented to commanders for use

in determining what actions must be taken to accomplish the mission. Using these estimates commanders decide

on a course of action and announce their concept of the operation.

0707. The commander‘s guidance and concept of the operation are the basis for action by his staff. From

these and individual analysis of the mission team members determine what Intelligence Electronic Warfare

(IEW) requirements must be satisfied to prepare and execute the mission and build the IPB data base. The staff

mission analysis is the first step in determining planning requirements. Each staff member analyses the

commander‘s restated mission to determine the specific tasks to be performed. They consider the effects of

individual requirements on the planning of their own and other staff sections and subordinate units.

0708. Once the staff has determined its planning requirements, a great deal of information will be required

for the IPB effort and the analysis of the battlefield area. In most cases, the intelligence staff will be responsible

for acquiring all the needed information. Each intelligence staff identifies individual requirements of the

command and identifies the probable sources of the data. They focus planning requirements on answering

questions about the enemy, weather and terrain. Generally, they plan for :

A. ACQUISITION OF CURRENT INTELLIGENCE FOR INITIAL COMMAND

AND STAFF PLANNING.

b. Dissemination of intelligence.

c. Acquisition of intelligence during movement.

d. Collection, processing and dissemination of information after deployment.

e. Counter intelligence support before, during and after the operation.

0709. The intelligence staff needs information to satisfy individual planning needs and provide other staff

elements and subordinate units the information they need. Information needed includes composition,

disposition, equipment and effectiveness of enemy forces in the mission area and Terrain, trafficability, ground

and air avenues of approach, barriers, obstacles, line of sight and climatic conditions.

0710. The operation staffs IEW planning requirements are in the areas of targeting, EW, deception and

operational security to support manoeuvre, electronic counter measures (ECM) and rear area operations.

Generally, the operational staff plans for integration of jamming and deception with fire and manoeuvre and

Protection of the combat force during the planning period, movement and after arrival in the area of operations.

0711. In addition to information to support fire and manoeuvre, the operation staff needs information to

support ECM, deception and operational security planning. To support these functions, the intelligence provides

the commander and operational staff information about :

a. Enemy situation.

b. Weather conditions.

c. Terrain.

d. Long-range operational requirements.

e. EW needs and special requirement of the area of interest.

f. Enemy order of battle.

g. Enemy EW capability.

h. Enemy intelligence capability.

j. Reliability of local nationals.

k Enemy vulnerability to deception.

IPB

0712. IPB is a systematic and continuous process of analysing the enemy, weather, and terrain in a specific

geographic area. This approach integrates enemy doctrine with the weather and terrain, the mission and the

specific battlefield environments. IPB helps to systematically determine and evaluate enemy capabilities and

vulnerabilities. The IPB continuous is a process. It concentrates on building the IPB data base prior to hostilities

and outlines its applicability in support of tactical operations. This results in an intelligence estimate and

analysis of the battlefield area which shows probable enemy courses of action and intentions. Mission planning

sets the IPB process in motion.

0713. Graphics are basis to IPB analysis. Most intelligence can be communicated with pictures. Annotated

military maps, multilayered overlays, griddled photomaps, microfilm and large-scale map substitutes all capable

of computer assisted cathode ray tube display are used in the IPB process. These graphics become the basis for

intelligence and operational planning. The analysis of the battlefield area and the intelligence

appreciation/estimate are not replaced by graphics but are merely converted to them where possible. Currency is

maintained through graphics renewal or update.

0714 IPB provides a basis for collection management planning before the battle and guides the effective

employments of collection resource during the battle. The graphic data bases developed and maintained through

IPB coupled with conventional data bases provide a foundation for situation and target developments. They

provide a means for projection significant for predicting enemy intentions. By comparing them with actual

events and activities as they occur, the intelligence staff can provide the commander with timely complete and

accurate intelligence.

IPB Process

0715. Detailed IPB products are prepared at army and division which provide needed products to brigades

and battalions to assist their IPB by compensating for their lack of time and personnel resources. Below brigade,

the IPB process is less formal, producing detailed products only when time and resources permit. IPB orients on

the area of operations, the area of interest and the enemy faced that expected to be operating in those areas.

There are four stages of IPB. These are; define of battlefield environment, describe the battlefield effect,

evaluate the threat and determine the threat courses of action. Templates are vital to the IPB process. Template,

normally drawn to scale, is a graphic illustration of enemy force structure, deployment or capabilities. It

provides a means for seeing the battlefield and a sound basis for command judgements and decisions affecting

resource allocation. It is used as a comparative data base to integrate what we know about the enemy with

specific weather and terrain information. Templates enable us to visualise enemy capabilities and predict likely

courses of action before the battle, and confirm or refute them during combat. Templates also provide a means

for continuous identification and assessment of enemy capabilities and vulnerabilities. Information graphically

displayed on templates can be added, changed or deleted as the situation changes.

0716. The following chart describes the four principal types of templates developed during the IPB process

and explains how and when each should be used :

IPB TEMPLATES

TEMPLATE DESCRIPTION PURPOSE WHEN

PREPARED

(a) (b) (c) (d)

Enemy doctrinal deployment

for various types of operations

without constraints imposed

by weather and terrain.

Composition, formation,

frontages, depths, equipment,

numbers and ratios and high

value targets are types of

information displayed.

Provides the basis for

integrating enemy

doctrine with terrain

and weather doctrine in

processing, information

used to establish

probable location of

unlocated units

Threat

Evaluation

Depicts how the enemy might

deploy and operate within the

constraints imposed by the

weather, terrain and current

strength.

Used to identify critical

enemy activities and

location. Provides a

basis for situation and

target development and

High Value Target

(HVT) analysis.

Threat

Integration

Doctrinal

Situation

(a) (b) (c) (d)

Depicts location where

critical events and activities

are expected to occur and

where HVT will appear in a

particular time.

Used to predict time-

related events within

critical areas. Provides

a basis for collection

operation, predicting

and confirming enemy

intentions and locating

HVT.

Threat

Integration

Depict decision points and

target areas of interest keyed

to significant events and

activities. The intelligence

estimate in graphic form.

Graphically establishes

a decision to time/space

relationship. Used to

prepare commanders to

make tactical decision

related to battlefield

events. Assist the

commander/ staff in

synchronizing the

battle.

Threat

Integration

Function 1: Define the Battlefield Environment

0717. The first function of the IPB process is battlefield area evaluation. When the areas of operation and

interest area applied to the battlefield, the analyst‘s attention is focused on a specific geographical area for

enemy, terrain and weather effects analysis. The limit of the command‘s areas of operation (fire, EW, and

manoeuvre)are prescribed by higher headquarters. There is no limit to a unit‘s area of interest; it is

recommended by the intelligence staff based on Mission, Enemy, Terrain, Troops and Time available and

approved by the commander. The Dimensions of the areas of operations and interest are in terms of width,

depth, airspace and time.

0718. In addition to Mission, Enemy, Terrain, Troops and Time available and the commander‘s concept of

the cooperation, the intelligence staff must consider several other factors when recommending the unit‘s area of

interest. Foremost is the security of the command. The area of interest must extend (in an irregular shape and as

far as needed) in all directions to safeguard the command from surprise. The area of interest must also be deep

enough to support planning for future operations.

Function 2: Describe the Battlefield Effect

0719. The second function of the IPB process is terrain and weather analysis. It is also known as analysis of

battlefield environment. This function is focused on the military aspects of the weather and terrain and their

effects on friendly and enemy capabilities to move, shoot, and communicate. Terrain Analysis includes the

following five factors (short title: OCOKA) :

a. Observation and fields of fire.

b. Concealment and cover.

c. Obstacles.

d. Key terrain.

e. Avenues of approach and mobility corridors.

0720. Observation and Fields of Fire. Observation relates to the impact terrain has on the capability of

battlefield systems. In the IPB context, it refers primarily to visual and electronic Line of Sight LOS determined

through (LOS) analysis. Many battlefield systems require LOS to function effectively. These systems include

radios, radars, Electronic Support Measures (ESM) systems, direction finders, jammers, direct fire weapons and

human vision.

Event

Decision

Support

0721. Concealment and Cover. Concealment is protection from observation. Cover is protection from the

effects of fire. Concealment is vital to operational security and deception. Concealment and cover offered by the

terrain to both friendly and enemy forces is determined through IPB.

0722. Obstacles. Obstacles are natural and artificial terrain features that stop, canalise impede or divert

military move. Their direct influence on mobility makes them one of the most important considerations in

terrain analysis.

0723. Key terrain. Key terrain is any feature or area of which, the seizure, retention or control will effort a

marked advantage in the conduct of operations to either combatant. The determination of key terrain is

depended on the echelon of the command, the mission, the enemy and the situation. The commander may

designate certain key terrain as decisive terrain if it will have an extraordinary impact on the mission. To

disseminate terrain as decisive is to recognise that the mission depends on seizing or retaining it.

0724. Avenues of Approach. Avenues of approach are air or ground routes by which a force may reach an

objective or key terrain. They are evaluated in terms of their :

a. Potential to support manoeuvre.

b. Access to the terrain and adjacent avenues.

c. Degree of canalisation.

d. Concealment and cover.

e. Observation and field of fire.

f. Obstacles.

0725. Final Step. The terrain analysis process emphasises the use of graphic to portray the effects of

trafficability and indivisibility on operations. A terrain factor matrix and a series of overlays are prepared to

develop a terrain graphic data base to facilitate threat integration. Several steps are followed to organise and

refine the information needed to accurately analyse a specific piece of terrain. The terrain factor matrix guides

the selection of terrain and weather factor overlays needed to analyze the terrain. Engineer terrain analysis

begins with a detailed review of the terrain data base to identify information gaps. Terrain factor overlays

graphically portray the military aspects of terrain (types and spacing of vegetation, soil, climate conditions and

variations) in the area of operation. The final step of the terrain analysis process selects the avenue of approach

that supports friendly and enemy capabilities to move, shoot, and communicate. It further describes terrain

analysis and its importance to tactical operations.

0726. Weather Analysis. Weather has a significant impact on both friendly and enemy capabilities.

Analysing the weather in details to determine how it affects friendly and enemy capabilities to move, shoot and

communicate is critical to this function of IPB. Because the weather has tremendous effect on terrain. Terrain

and weather analysis are inseparable factors of intelligence.

a. Locating Battery Weather Team and Engineer Terrain Teams work together during much of the

analysis process. The weather teams analyses climatic data to determine the characteristics of weather

in the battlefield area. The terrain team analyse the effects of weather on tactical operations and

integrates climatic and current weather data with terrain analysis. This information is integrated into a

three steps operation known as the weather analysis process. To determine the impact of weather on

terrain and operations. This process incorporates developing as :

(1) Weather data base

(2) A weather factor analysis matrix

(3) Weather factor overlays

b. During peacetime, historic weather conditions for at least five years past are used to determine

significant weather parameters in the area of operations. The weather team focus on specific periods

within each season that may deviate from the seasonal norm. The weather data base is continually

updated and is used as the foundation for analysing the effects of weather on tactical operations.

c. The weather factor analysis matrix helps to determine what weather effects overlays will be

required. It identifies the weather factors that are militarily significant and correlates their effects with

specific intelligence use and tactical applications. As in terrain analysis, maximum use of graphics is

instrumental in analysing the effects of weather on combat operations. Through weather effects

overlays, weather data is converted into graphic displays. Various weather effects will have significant

impact on tactical operations. Cloud cover at low levels will have a significant impact on low level

attack helicopters, close air support aerial visual observation and some aerial surveillance systems.

d. A combined obstacle overlay combines all terrain and weather induced obstacles resulting from

this analysis. It focuses on significant terrain areas. Next, avenues of approach and mobility corridors

(MCs) are identified. Avenues of approach are identified for friendly or enemy forces at the same

echelon and one below and mobility corridors for forces two echelons below. Once the most viable

avenues of approach and mobility corridors have been selected, overlays are prepared depicting each.

Analysis enables the developments of LOS for weapons, communications, target acquisitions,

intelligence collection and Integrating Terrain and Weather, ECM systems for each option.

Function 3: Evaluate the Threat

0727. The third function of the IPB process is threat evaluation. It consists of a detailed study of enemy

forces, their composition and organisation, tactical doctrine, weapons and equipment and supporting battlefield

functional systems. The thrust of this function is to determine enemy capabilities and how they operate as

prescribed by their doctrine and training.

0728. Threat evaluation also includes an evaluation of high value target (HVT) and doctrinal rates of

movement. HVTs and movement rates are revaluated during threat integration within the constraints imposed by

a continuing process as new capabilities to wage war develop and as doctrine change. Threat evaluation follows

a multi step process.

0729. Development of a detailed threat order of battle data base by the processing section is vital to threat

evaluation. A current, accurate and comprehensive data base on potential enemy forces facilitates a thorough

evaluation of their doctrine and capabilities. To develop the threat data base a review of the mission and area of

interest is required. Through this review, identification and dissolution of threat forces significant to the mission

are accomplished. As information about the enemy is assembled, gaps are identified and information

requirements led to the collection management section.

0730. When the threat data base has been developed and evaluated, the intelligence staff and the processing

section must determine what doctrinal templates are required. Determining which enemy echelons should be the

focal point of attraction is the first step. Generally the 'one up and two down' formula is used so that attention is

concentrated on those enemy echelons that pose the greatest threat.

0731. Requirements for doctrinal templates of battlefield function systems are also identified. Those

battlefield functional system which tell the most about enemy operations are template. This matrix allows rapid

analysis of the relationship between battle systems and the operations supported by those systems. It helps the

analyst to conduct Target Value Analysis (TVA) and determine additional needs and requirements.

0732. Doctrinal templates convert enemy order of battle factors into graphic portrayals. They are models of

how the enemy might look according to doctrine and training it not constrained by the weather and terrain. They

portray various echelons and types of units for various capabilities and schemes of manoeuvre. They also

graphically portray the composition and disposition, frontages and depth, spacing and signatures of these

echelons and units. The final step in determining doctrinal template needs to compare currents requirements to

previously prepared templates. If additional templates are needed, the analyst must request for it or prepare new

one.

0733. Doctrinal templates may include a portrayal of higher echelon supporting elements or elements

normally deployed with the unit being templated. They may be further refined into doctrinal templated subsets.

These subsets might include battlefield functional systems or weapons and equipment deployments. Such

templates, especially those depicting weapons and equipment deployments, are very useful in identifying types

of enemy units and specific formations. Subsets may be equally useful in determining enemy intentions.

Function 4: Determine Threat Course of Action

0734. General. The nucleus of the IPB process is the integration of enemy doctrine with weather and terrain

data. The objective of threat integration is to determine how the enemy will fight as influenced by weather and

terrain. Threat integration, sequential process is accomplished through the development of situation, event and

decision support templates.

0735. Situation Template. A situation template depicts enemy dispositions for a specific instant in time.

Thus, several situation templates or situation ‗snapshots‘ may be created to show how the enemy may change

his disposition during the conduct of an operation.

0736. Event Template. Once the analyst has hypothesized the probable enemy course of action, he creates

an event template to test his hypothesis. The event template provides the information needed to project what

events will most likely have to occur related to enemy courses of action. As an enemy force moves along a

mobility corridor, it will be required to do certain things at certain time appliances which are dictated by terrain,

weather and tactics. Based on this, the analyst selects named areas of interest (NAI) where he expects to see

certain activities or events of which have tactical significance. The analyst projects a sequence and timing of

events based on an analysis of the relationship of NAI to one another and to specific available courses of

actions. Activity or the lack there of confirms or denies the enemy course of action.

0737. Named Area of Interest (NAI). NAI are points or areas along a particular avenue of approach or

mobility corridor when activity or lack of it, will help to confirm or deny a particular enemy course of action.

NAI are only plotted on the event template. Activity in NAI-1 would indicate whether mobility corridor alpha or

bravo was being adopted as the route of advance. Forward movement of enemy bridging elements as the force

approached a destroyed bridge at NAI-5 would be an indication that a river crossing would be attempted rather

than a move to NAI-6 where river crossing would be less difficult. Other NAI in the example represent

intermediate points for collection planning purposes or tracking for target development purposes.

0738. Decision Support Template (DST). The matrix enables the analyst to more precisely correlate what

event or activity is expected within the geographical location and at what time the event is expected to take

place. The event analysis matrix is normally prepared at divisions and above. This capability, along with

doctrinal and situation templates provides the basis for critical node or HVT analysis. The estimated time

between NAIs within a mobility corridor are derived by determining the effects of terrain and normally seasonal

conditions (derived from earlier functions) on doctrinal rates of advance (opposed or unopposed, as

appropriate). The event template and event analysis matrix allow for the initiation of precise collection

requirements, maximising the use of limited collection assets against the vast array of potential targets on the

future battlefield. By knowing in advance what the enemy can do and comparing it with what he is doing, the

analyst has the basis for predicting what the enemy intends to do next. Such information provides the basis for

queering intelligence collection and constructing DSTs.

0739 – 0800. Reserved.

SECTION - 8

COLLECTION MANAGEMENT STAGE

General

0801. The collection management process is an activity that acts and reacts to Collection Requests and

Requests for Information. The purpose of collection management is to identify and satisfy a valid need for

intelligence/information required by a decision maker. The process, while somewhat complicated, identifies

priorities for collection assets. It also allows for the combining of similar requests from different agencies and

organisations into a single collection mission and ensures collection requirements do not duplicate information

already available.

0802. Perhaps the most important person in the collection management process from the intelligence analysis

perspective is the Collection Manager (CM). This is a person who knows what systems are available and best

suited to meet the needs of the analyst. Even more important, the CM knows how to submit Collection Requests

(CRs) in the proper format. As the central figure of the process, the CM coordinates and facilitates the activities

of two cyclic, mutually supporting functions :

a. Collection Requirement Management (CRM).

b. Collection Operations Management (COM).

0803. Analysts responsible for producing and disseminating intelligence products are an integral part of

CRM. Production organisations like the Directorate General of Forces Intelligence organises inter service

oriented production play a vital role in identifying gaps in intelligence data and in justifying collection

requirements. Their all-source intelligence production organisation determines if data already available can

satisfy Requests for Information or if a new collection requirement exists.

0804. Collection management is the timely, efficient process of formulating detailed collection requirements

and tasking collecting agencies for required information. The overriding purpose of collection management is to

use the limited resources available to answer the commander‘s Essential Elements of Information (EEI), Other

Information Requirements (OIR). The intelligence staff is the principal CM and is assisted by other CMs in the

formation intelligence. Units‘ collection managers in the intelligence section receive approved EEI and

Information Requirement (IR) from the intelligence staff. They place each requirement in priority order and

based on commanders‘ guidance, prepare collection plan how to satisfy each. Specifically they :

a. Assess collection and reporting implications of each new requirement and plan collection

operation.

b. Develop multidiscipline tasking that exploits the capabilities of intelligence resources, reflects

established priorities and detects enemy deception attempts.

c. Identify and task collection units or agencies.

d Maintain a constant awareness of the agencies.

e. Maintain a constant awareness of the operational status of collection resources.

f. Evaluate requirements satisfaction, provide requester feedback and adjust collection plans.

0805. Specific collection planning steps and considerations that optimise collection results include :

a. Checking with the collated information first to see if a request for intelligence information can be

answered with data already available.

b. Keeping currency with the event template and the changing terrain, weather and enemy situation

data available to the collation staff.

c. Considering collector status, capabilities and limitations for each situation.

d. Maximising multi-disciplined operations and emphasising cueing, expansion and verification of

information.

e. Providing continuity of operations.

f. Ensuring that collection units or agencies are given specific orders and requests.

g. Asking higher headquarters for information and verifications.

h. Ensuring that collection requirements are assigned priorities and are current.

j. Ensuring that timely feedback on request status is provided.

Collection Plan

0806. The CRM process begins with a collection plan. It addresses EEIs or OIRs. EEIs and OIRs are

basically the same in that they identify what a commander needs to accomplish i.e. a given mission and assigned

operational tasks. In CRM, the analysts will receive Requests For Information (RFIs) from subordinate or lateral

organisations and either answer them from available data or identify an intelligence gap. When data is lacking,

the analyst working with the CM can validate intelligence CR, determining which asset resources will best

satisfy a request.

0807. The collection plan is a dynamic tool used to coordinate and integrate the efforts of all collection units

and agencies. Since the collection effort involves continuous planning, an entirely new collection plan is seldom

prepared except when a unit first enters combat or enters a news operation phase. The collection plan is

continually revised as required. In effect, it is a state where new entries are written and outdated entries are

removed.

0808. Because information requirements are more complex at higher echelons, the collection plan is normally

more extensive and formal at these levels. At any level, however, collection planning is essentially a mental

process and the collection plan, regardless of the format being used, is merely an aid. It is not a substitute for

thinking and is maintained only to the extent that it assists in planning and supervising the collection effort and

maintaining continuity between shifts in the command post.

0809. Of the seven major intelligence collection disciplines, five come under the collection management

process: Imagery Intelligence (IMINT), Human Intelligence (HUMINT), Signals Intelligence (SIGINT),

Measurement and Signatures Intelligence (MASINT) and Counter Intelligence only Open Source Intelligence

(OSINT) and Scientific and Technical Intelligence (S&T) is not 'managed' since everyone in theory can 'collect'

data from unclassified publications and data banks.

Collection Management Process

0810. Each collection effort begins by processing Information Requirement IR. These requirements may take

many forms and are generated by many sources: The commander‘s EEI and OIR as identified by the intelligence

staff, targeting needs of the operational staff, tasking from higher echelons and RFI from subordinate and

adjacent commands. At all echelons, most of IRs requirements are based on information needs associated with

Named Area Interest (NAI) and Target Area Interest (TAI) developed through IPB. Regardless of their origin,

the CM transforms them into specific collection requirements. This transformation must be performed as

quickly as possible while ensuring optimum employment of the limited resource available. Collection

management cycle is shown below :

Figure 8.1 : Collection Cycle.

THE COLLECTION MANAGEMENT CYCLE

RECEIVE

AND

ANALYSE

REQUIREMENTS

DETERMINE

RESOURCE

AVAILABILITY

AND

CAPABILITY

TASK

COLLECTION

RESOURCES

EVALUATE

REPORTING

UPDATE

COLLECTION

PLANNING

Receipt and Analysis Step

0811. There are steps in receiving and analysing requirement. These steps are shown in a chart below and are

discussed in subsequent paragraphs :

Figure 8.2 : Receipt and Analysis Step.

Receive Requirements

0812. When any requirement is received in the collection management section it is first logged in the shift

journal and identified by assignment of a control number. Requests and tasks from elements outside the

headquarters are identified by the control number assigned by the originating headquarters.

0813. Next, the validity of the requirement is determined. A requirement generated outside the command is

generally accepted as valid. Requirements from the command are checked to ensure that each merits

commitment of collection and processing resources. A requirement is then sent to the processing section of the

command where an attempt is made to answer it immediately. This step is important. If the information is

readily available the processing section provides an immediate answer through the collection management to the

requester. This reduces the workload of the processing section and collection management section and reduces

requirements for collection resources. The processing section checks each requirement to see if the information

is readily available in data bases. If the information is not in the data bases, collection subsystems are checked.

The key is knowing what recently completed collection actions have the potential for answering the

requirement. Only after available information has been researched should a requirement be validated for new

collection action.

Determine Indicators

0814. A necessary step in directing the collection effort is to determine those enemy activities or

characteristics of the battlefield area which answer the IR. This procedure is called determination of indicators

and is a function of the processing section assisted by other command post elements. An indicator is any

positive or negative evidence of enemy activity or any characteristic of the battlefield area that points toward

enemy capabilities, vulnerabilities or intentions. The ability to read indicators (including recognition of enemy

deception indicators) may contribute to the success of friendly operations, since an analysis of all available

indicators will be the basis for recommendations to the commander for a specific course of action. A thorough

knowledge of the enemy, the characteristics of the battlefield, and the general capabilities of collection assets is

required to develop indicators. Particularly valuable is a detailed knowledge of :

a. The enemy organisation, equipment and doctrine.

b. The personalities of major enemy commanders when possible.

c. The past performance of enemy units.

d. Terrain and weather factors.

e. The event template for current operation.

0815. Indicators have certain characteristics which are considered during the selection process. By

considering these characteristics, the best possible indicators can be derived. The determination of indicators is

based on those characteristics which reflect :

RECEIPT AND ANALYSIS STEP

RECEIVE

REQUIREMENTS

DETERMINE

INDICATORS

DETERMINE

SPECIFIC INFORMATION

REQUIREMENTS

DETERMINE REPORTING

REQUIREMENTS

a. Normal doctrinal activity or disposition.

b. Activity required for a particular course of action.

c. Actions within enemy capabilities and limitations.

d. The characteristics of enemy commanders.

e. Possible or practicable operation.

f. Collection characteristics.

0816. Event templates are used to determine indicators. They allow the correlation of a particular event or

activity with probable enemy courses of action. Additionally, they are used to determine when and where that

activity should occur. By determining what events or activities must occur for an enemy to follow a particular

course of action, attention is focused on the indicators associated with those events or activities. Event templates

help to decide :

a. Where to look ?

b. When to look ?

c. What to look for ?

After determining indicator for each requirement, the processing section develops specific information

requirements (SIR) for each indicator.

Determine Specific Information Requirements

0817. Indicators and target characteristic are analysed to determine SIRs. These are the basic questions that

need to be answered to confirm or deny the existence of an indicator. For example, as an indicator or possible

enemy intentions, the location of a particular enemy air defence element is needed. The SIR in this case would

be a question asking whether or not there is any air defence element at that location. However, such a

requirement may be only one part of a broader requirement.

0818. The accurate determination of indicators and specific IR is essential for effective collection

management. Knowing where, when and what to look for helps in selecting what to look with. This in turn

maximises the use of limited collection assets against a vast array of collection targets. After indicators and

specific information requirement have been prepared, the processing section passes them to the collection

management section for collection action.

0819. After being validated by the processing section and returned to the collection management section, new

requirements are compared against others in the active collection requirements file. The intent is to identify

duplication. If the requirement is a duplicate one, the requester‘s address and other specific needs are noted on

the original requirement. When the requirement is answered, each addressee is provided with the information

needed.

0820. If a requirement is not a duplicate one, the copy is filed in the collection file as a control measure and

for use in disseminating collected and processed information. The next step is to evaluate each requirement

based on its time sensitivity. The evaluation is made based on the time required to :

a. Process the request.

b. Assign it to a collection unit or agency.

c. Collect and report the information.

d. Disseminate the resulting intelligence in time to meet the needs of the requester.

0821. The next step is to assign a priority to each requirement. The commander‘s EEIs are always the highest

priority collection requirements which also include requests for information and tasks from higher headquarters.

These are evaluated based on standing operating procedures and guidance. Requests and requirements from

outside the headquarters generally carry a priority assigned by the originators. These priorities are evaluated in

light of current collection actions and integrated with existing priorities and appropriate action. The primary

basis for determining the priority of any requirement is its criticality to friendly mission accomplishment and the

time the information is needed or will no longer be of value. Priorities must be passed to collection agencies to

ensure that they collect what is needed, rather than that which is easy. Requirements are listed on the collection

plan by priority and reporting requirements are then determined for each.

Determine Reporting Requirements

0822. Reporting requirements specify when, where, and in what detail information is to be reported.

Reporting requirements are developed in terms that are understandable by collection units or agencies. The

purpose is to provide the collection agency with specific collection and reporting requirements which ensure that

the right data is collected and report promptly to the appropriate end user.

0823. Tactical information is reported to the requester or user as soon as it is collected using the most direct

means available. When developing reporting requirements for tactical information, the first task is to identify to

which recipients collection units should report. Secondly, a determination is made as to what reporting

requirements are necessary for reporting tactical information for intelligence processing purpose. This may

involve a different level of detail. Usually, reporting tactical information should follow standing operating

procedures.

0824. Reporting requirements must include the identity of all units and headquarters requiring the

information. Commanders who do not receive the intelligence they need at the specific time may miss a fleeting

opportunity to catch the enemy at a disadvantage. Once determined, information and reporting requirements

influence the selection of specific collection units and agencies.

Determine Resources Capability and Availability

0825. Capability. Asset capabilities must be known by the CM. These include factors such as frequency

ranges for electronic support measures (ESM) systems, other system ranges, aircraft mission duration, mobility,

linguistic capabilities and other similar factors. This knowledge is used to determine which asset is capable of

collecting information that will answer specific information requirements. Human intelligence resource

capabilities must be obtained from the parent organisation.

0826. Availability. For organic agencies the CM needs to know the collection capability and the percentage

of that capability available at a given time. For higher echelon resources, it is necessary to know the number of

resources allocated and the approximate availability.

0827. Selection. Once the available resources have been identified by unit and type, potential units are

selected for each IR. This selection is made by comparing each available unit‘s resources against the CR, based

on five critical selection factors :

a. Range.

b. Timeliness.

c. Technical characteristics.

d. Environment (terrain and weather).

e. Enemy.

The following chart defines sources and agencies and shows what units and activities fit into each category :

SOURCES AND AGENCIES

SOURCES AGENCIES

A source is a person, system, or activity from

which information is originally obtained. Source

may or may not be under friendly control.

Agency is any individual or organisation

which exploits a source to collect and / or

process information.

COMMON SOURCES COMMON AGENCIES

(a) (b) (c) (d)

Captured enemy

documents and material

Recovered military

persons

Displaced persons

Lower and adjacent

commands

Military

Police

Psychological

Operation

Units

Enemy electromagnetic

emissions

Enemy activities

Local residents

National agencies

Shell and missile

fragments

Nuclear bursts

Refugees Civil Affairs Units Air Defence

units

Contaminated areas Sounds Chemical units Combat

support units

(a) (b) (c) (d)

Radioactive material

reports

Imagery

Craters

Engineer units

Terrain teams

Combat

service

support unit

Weather forecast Odors

Duds

Ground Surveillance

Radar (GSR)

Weather teams

Counter

Intelligence

Teams

Interrogation

Teams

Field

Intelligence

Units

Maps Artillery

Civilian agencies Enemy Prisoner of

War

Troops

Reconnaissance Troops

Support Company

Patrols

0828. Relationship between Capabilities and Requirement. A system‘s capability is limited by its range.

Range also, however, may not be the determining factor. A GSR, for example may be within range of target but

not able to detect the target because of an interruption by weather or terrain. In some cases, a system‘s range

may be flexible, depending on its height above the ground or be limited by the technical design of the intended

target. Range may limit some HUMINT agencies such as patrols or reconnaissance troops. The following

illustration shows the correlations between specific information requirements and systems availability and

capability :

Figure 8.3 : Capability Requirement Correlation.

Time Line

0829. System timeliness is defined as the period beginning when an IR is received and ending when the

information is delivered to the requester. System timelines in the sum of times from T to T6. Times required to

complete each of the events shown in the graph should be calculated or estimated for each available system

based on the tactical situation and the local standing operating procedure. Times will vary, depending on

mission priority assigned, specific system availability for the collection requirement and related information

processing and dissemination means. The events shown in the following graph depict the general timeliness

sequence that must be considered during any system capability assessment :

Figure 8.4 : Event Time Line Sequence.

T4

System

selection

Request

Mission

Mission Preparation

Collection Operation

Processing

Analysis

T T1 T2 T3 T4 T5 T6

RECEIPT OF

INFORMATION

REQUEST

TIME OF

COLLECTION

REQUESTED

INFORMATION

DELIVERED

SYSTEM TIMELINESS= T+T1+T2+----+T6

SPECIFIC

INFORMATION

REQUIREMENT

SYSTEM AVAILABILITY AND

CAPABILITY ELEMENTS lo

cate

wh

ere

iden

tify

wh

en

sear

ch

typ

e

mo

del

freq

uen

cy

spee

d

alti

tud

e

bo

re

sig

ht

loca

l

len

gth

EC

M

RANGE TO TARGET RANGE OF PLATFORM

OR COLLECTOR

TIME AVAILABLE TIMELINESS OF

RESPONSE

CHARACTERISTICS

OF THE TARGET

CHARACTERISTICS

OF THE COLLECTOR

LOCAL WEATHER WEATHER

LIMITATIONS

ENEMY THREAT THREAT TO

THE COLLECTOR

TERRAIN TERRAIN INFLUENCE

ON COLLECTOR

SELECTED RESOURCES

0830. Timeline is also affected by dependence on communications not included as part of the collection

system. Tasking and reporting must flow over communications links that are highly vulnerable to enemy action,

limited by range, and difficult to maintain during rapid displacement. Although the agency selected may be

perfectly capable of acquiring the information needed, reporting may be delayed by communications problems.

Select Collection Resources

0831. After availability and capabilities are determined, units and agencies are selected and tasked to acquire

and report information. During this process all units are considered for tasking against every requirement.

Capable assets are selected by a process of elimination. Various procedures may be used to select the unit to

collect specific information. One procedure is to use a selection worksheet re-prepared in a format similar to the

one in the following illustration :

ASSET SELECTION WORKSHEET

Formation :

Unit :

DTG :

Collection Manager :

Target Range :

Specific information requirement :

Time Required :

Characteristics :

ASSETS

Capability Factors Environmental Factors

Capable Remarks Range

Time-

liness

Character-

istices

Wea-

ther Threat Terrain

+ + + + + + +

+ + + + + + +

ASSETS SELECTED :

0832. In many case the worksheet may be pre-printed with current resources listed. It is used to consider the

major factor determining the capability of an asset to satisfy specific information requirements. The CM begins

the unit and agency selection process by listing all available units and resources along the left-hand column of

the worksheet. Next, the specific IR and its key elements are entered on the top of the form. As each asset or

factor combination is considered, a mark is entered on the unit selection worksheet to identify the capability of

that asset against that factor. One of three marked used :

a. + = fully capable

b. 0 = Marginally capable

c. - = Incapable

0833. A single dash under any factor eliminates that asset from consideration. Often the experienced CM can

readily identify one or more asset or factor combinations that would result in an incapable rating. This

constitutes of considerable saving of time, since a large percentage of the incapable assets can be eliminated by

a quick inspection of the asset or factor combinations. When there is doubt about the capability of an asset, refer

to the appropriate documents.

0834. Enemy capabilities are considered during the system selection process. In many cases, enemy action

will restrict the use of, or reduce the effectiveness of a particular system. Weather plays a particularly important

role in the selection process. Weather can affect both capability of system to collect data and the exploitation of

the date collected. Terrain also influences the selection of systems.

0835. All outstanding intelligence requirements and the tactical situation are considered in collection

planning. However, certain collection factors must be considered before tasking orders are sent. These factors

include resource integration, cueing of one system by another to build the required data package, and the

selection of a proper resources mix and redundancy to increase the probability of completing the collection

mission successfully while defeating enemy deception attempts.

0836. Employing a mix of systems not only increases the probability of collection but also provides more

complete information. Employing a mix of systems is always desirable if the situation and available resources

permit it. Mixing systems also uncovers deception attempts by revealing discrepancies in information reported

by different collectors.

0837. An agency must be physically capable of providing the desired information in a timely manner. Within

the limits imposed by other considerations, the collection workload is balanced among formation intelligence

units and other units. Balance, however, is a very minor consideration when compared with the importance of

other factors.

Task Collection Resources

0838. Following agency selection, IR tasking is prepared. IR tasking is directed towards a unit or agency

rather than a specific asset. However, because of the completed collection planning process described above, the

CM is able to direct tasking to a unit with assets capable of collecting the information. The purpose of IR

tasking is to provide the selected unit with a specific requirement, but not with specific instructions for carrying

out the mission.

Requests for Intelligence Information (RII)

0839. RIIs are generated by a subordinate command to obtain intelligence or information collection support

for needs that exceed organic capabilities. RFI are prepared using the RII or a similar narrative format. Requests

received that exceed organic requirements are always consolidated and forwarded to the next higher echelon as

RII. A request reaching corps is at the highest echelon of tactical RII processing. Regardless of the echelon

originating the request or requirements tasking, the tasking is prepared to indicate the degree of urgency and the

type of request being made. Requests are assigned priorities depending on criticality and the timeline specified

by the requester.

0840. Division and brigade intelligence requirements tasking is directed toward division field intelligence

unit commanders and commanders of other elements capable of collecting the information. Priorities are

assigned to each IR tasking based on those previously established. When new intelligence requirements‘ tasking

is generated in an ongoing operation, high priority requirements may pre-empt lower-priority mission previously

tasked. Besides tasking directed to subordinates request may be sent to higher or adjacent commands. ICR,

which exceed the capabilities of organic assets, are prepared as specific requests for information using the RII.

Requests may include information concerning adjacent areas of interest, the command‘s own area of interest at

ranges beyond the capabilities of organic resources, or other information not obtainable by the command.

Tasking Documents

0841. Tasking documents are used to levy IR on the various agencies. In the case of organic systems, this

involves orders to units in accordance with command policy and SOP. As a general rule, intelligence

requirements tasking at both corps and division is done through either fragmentary orders, the intelligence annex

to the operational order SOP.

0842. The intelligence annex is standardised Instructions on how to prepare the intelligence annex are

contained in JSSDM-2003. Paragraph 3 of the intelligence annex, intelligence acquisition tasks, implements the

collection plan. It contains a complete list of current orders and RII. Except for collection orders which are a

part of the unit SOP, previously issued tasking not repeated in the intelligence annex are automatically

cancelled. When intelligence orders and requests are lengthy, they may be placed in an appendix to the

intelligence annex. The purpose of the intelligence annex is to :

a. Issue instructions to subordinate commander and requests to higher headquarters to collect

information before or during the initial phase of an operation.

b. Provide intelligence orders or guidance, which varies from SOP, for handling of PWs, refugees,

captured documents and materiel during the documents and materiel during the operation, and NAI

particularly important to the issuing headquarters.

c. Confirm the orders and requests for information that have been made in fragmentary form and

that are still current at the time the annex is issued.

d. Preserve brevity, clarity, and simplicity in the body of the order.

e. Amplify an order when information is limited application to the entire command or is primarily

technical in nature.

f. Disseminate information and intelligence at the start of an operation and when there is a major

change in mission.

0843. Fragmentary Order is used most frequently because IR continually changes. Operation order has a

prescribed format, but Fragmentary Orders do not. Those elements found in a complete order are omitted when

they have no changed, are not essential, or are unavailable or incomplete at the time of issue.

Tasking Flow

0844. Division is the point where national, departmental, joint, multination and tactical levels are integrated.

Requests beyond the capability of corps division systems are passed by the collection manager to Army

Headquarters, national level, or other services for action. Conversely, national and other services task division

systems through Army Headquarters. The CM incorporates these requirements into collection planning as other

requirements that must be answered. Regardless of the echelon originating requirements tasking, the tasking is

prepared according to a number of general considerations. Requests are normally categorised by degree of

urgency and type. The degree of urgency determines the time constraints placed on the request. Requests are

assigned a priority depending on criticality and how soon the information must reach the requester. RFI

forwarded to national systems should specifically state the time the information is required by the user.

Reconnaissance and Surveillance

0845. Surveillance is the systematic observation of aerospace, surface or subsurface area, place persons or

this by visual aerial, electronic photographic or other means. Surveillance is normally used to gain information

on the subject over a long period of time to note any changes that may take place. Because of the

interrelationship reconnaissance and surveillance, the same assets used to execute reconnaissance missions may

also be used for surveillance tasks.

0846. Reconnaissance is undertaken to obtain by visual observation or other detection method, information

about the activities and resources of an enemy or potential enemy or to obtain data concerning the

meteorological, hydrographical or geographic characteristics of a particular area. Reconnaissance is a directed

effort to obtain information on a subject at a particular time.

0847. As noted above, surveillance mission are characterised by systematic, although not necessarily routine

or constant, watch of persons, places or thing by human intelligence or resources. Surveillance missions are

usually pre-planned and are particularly suited to :

a. Cover large areas rapidly and repetitively.

b. Minimise risk to the collector.

c. Observe or detect change on the enemy side of the forward areas.

d. Keep other collectors stand by for more detailed coverage.

0848. Planning for surveillance operations is conducted after determining the general mission of the tactical

force. Surveillance mission are often developed as a joint effort involving all of the intelligence organisations

having an interest in the same area of operations. This is due to the limited availability of surveillance systems

and the large number of overlapping requests that could be generated in a joint or combined operations.

0849 A reconnaissance mission seeks to obtain information by visual or other detection means and is

characterised by limitations of coverage to one or more specific target areas at a particular time without the

requirement for systematic coverage. Reconnaissance missions are conducted by HUMINT, IMINT and

SIGINT resources and are designed to :

a. Collect specific, detailed information at a particular location and time.

b. Support current or planned operations.

Evaluate Reporting

0850. Collection management does not end with the issuance of orders and requests. Steps are taken to ensure

that orders and requests are received by the collection agencies and that they are clearly understood. Collected

and processing section reports are monitored through out the collection process to ensure that intelligence and

information are reporting the right user in a timely manner. Reporting are selectively extracted for sampling and

are reviewed for :

a. Timeliness. The time the event took place compared to the time the event was reported. This

comparison reveals delays and possible problems with the reporting of collected information.

b. Format. Reports are checked to see if they contain the proper addresses and data elements.

c. Responsiveness. Reports are checked to see if the information being reported satisfies the

commander‘s priority information requirement. The following illustration shows the report evaluation

process.

Figure 8.5 : Report Evaluation Process.

Update Collection Plan

0851. An important aspect of the collection management process is the cancellation of IR tasking and the

updating of the collection plan. The CM must always be able to cancel requirements to make room for new high

priority tasks in response to the commander‘s operational needs. For example, if an armoured division

commander is moving north and suddenly sees an opportunity for a flanking manoeuvre to the west, collection

management must have the flexibility to provide responsive support.

0852. When requested information is reported back to the collation management section, it must be matched

with the collection requirement it satisfies. The collection management effort is only effective if it can match

incoming information with CR. The incoming information may not come from the collector that was tasked and

may, by coincidence, partially satisfy another requirement. If so, the old CR, which is now broader in scope than

necessary must be rewritten to fill the specific information gap.

0853. Collection agencies must be notified of modifications to CR. The modified requirement may also

require a new priority and an adjustment to its time specification. Each time the requirements is modified or

satisfied, the collection plan is updated. Updating the collection plan is a continuous process requiring close

attention. It is updated upon :

a. Fulfilment of Priority Information Requirement (PIR) and IR.

b. Receipt of new PIR and IR.

c. Modification of existing PIR and IR.

d. Changes in enemy, weather or terrain which dictates a change in tasking.

0854. The processing section determines when PIR and IR have been satisfied. When it is determined that a

requirement has been satisfied the collection management section is notified immediately. Satisfied

requirements are removed from the collection plan and collection actions against those requirements cancelled.

This frees tasked resources for other collection mission. Fulfilled PIR and IR also are compared with the

collection planed to determine unsatisfied requirements. Unsatisfied EEI and OIR, related indicators and SIR are

reviewed to determine if :

SELECTIVELY

EXTRACT COLLECTOR REPORT FOR EVALUATION

REVIEW REPORTS FOR

TIMELINESS RESPONSIVENESS

AND FORMAT

REVIEW PROCESSING

SECTION NOTATION OF SOURCE RELIABILITY AND

INFORMATION ACCURACY

REVIEW REPORTS FOR PRIORITY INFORMATION AND

INFORMATION

REQUIREMENT SATISFACTION

RESULTS: REPORTING IS EVALUATED FOR RESPONSIVENESS,

TIMELINESS AND FOR SATISFACTION OF IR.

a. The IR is still valid.

b. Further tasking necessary to fulfil the requirement.

0855. Fulfilled and unsatisfied requirement no longer applicable are deleted from the collection plan. Often

during the analysis process, the processing section identifies void in the intelligence data base. The CM is

notified that adjustments are needed to the collection plan. When notified of a void in the collection plan, steps

are taken to update the collection plan and initiate the appropriate collection action. Collected information is

reported to the collection management section. As incoming reports are received they are noted on the collection

plan and forwarded to the processing section for processing. During information processing, data to support

situation developments are obtained.

0856 – 0900. Reserved.

SECTION - 9

PROCESSING AND TARGET DEVELOPMENT STAGE

PROCESSING

General

0901. In the situation development process, intelligence is developed in response to the commander‘s

information and operational needs. It is then evaluated and integrated into an all-sources product to provide a

continuing estimate of enemy intentions. Through process, situation development provides all sources

intelligence for tactical decisions. Processing is the transformation of information into intelligence and targeting

data. The objective of information processing is to :

a. Answer the commander‘s requirements regarding enemy movers, emitters, shooters, sitters,

capabilities, vulnerabilities, probable courses of action, intentions, terrain and weather in the battlefield

area.

b. Develop the targeting data required for effective attack of mover, emitter, shooter and sitter

targets.

Intelligence Data Base

0902. The intelligence data base provides the basic information required in the situation development

process. The data base is created for potential contingency area before hostilities. It is a combination of what we

think we must know, what we know and what we don‘t know about the enemy, weather and terrain It :

a. Is established and maintained by the processing section.

b. Focuses on specific area.

c. Contains information on enemy, weather, terrain, sociology, politics, training, economics,

psychology and other factors.

0903. The following matrix depicts data base information requirements by echelon. The intelligence data

base is created by accomplishing a thorough, in-depth IPB analysis. Existing order of battle to include technical

data is used to create the initial data base. After hostilities begin, the data base is maintained and refined to

reflect all pertinent knowledge of the enemy, weather and terrain in the friendly unit‘s area of interest.

0904. The intelligence data base must be functionally organised for the intelligence production process to be

successful. Organising the data base is done by separating information either manually or by automation into

appropriate files. These files should consist of the intelligence journal, order of battle data, IPB products and

situation map (SITMAP). The number of files maintained should be determined by time and resources.

Available elements of the data base are shown in the following illustration :

DATA BASE ELEMENTS

INTELLIGENCE

JOURNAL

WEATHER

ORDER OF

BATTLE DATA

TECHNICAL

DATA

DATA BASE

IPB

PRODUCTS

INTSUM

COORDINATE

REGISTER

SITMAP AND

OVERLAY

TERRAIN

Figure 9.1 : Data Base Elements.

DATA BASE NEEDS BY ECHELON

SERIAL CATEGORY OF INTELLIGENCE BN BDE DIV ARMY JFHQ

1. Identification,

organisation,

weapons,

equipment,

location, tactical

deployment,

movement and

strength of --

Companies x x

Battalions x x x

Brigades x x x x x

Divisions x x x x

Corps x x x

Command/Army x x

2.

Logistics

All classes and types of

supply

x x x

Requirements x x x

Procurement x x

Distribution x x x

Transportation x x x

Installations x x x

Terminals x x

Evacuation and Salvage x x

Maintenance x x x

Continued.

DATA BASE NEEDS BY ECHELON

SERIAL CATEGORY OF INTELLIGENCE BN BDE DIV ARMY JFHQ

3.

Unit

effectiveness

Personnel strength x x x x x

Amount and condition

of weapons/equipment

x x x x x

Status of training x x x x x

Efficiency of personnel x x x x x

Length of time unit in

combat

x x x x x

Traditions and past

performances

x x x x x

Personal traits of unit

commander

x x x x x

Status of technical and

logistical support unit

x x x x x

Morale, health,

discipline and political

reliability

x x x x x

4.

Terrain

Obstacles x x x x

Rivers x x x x x

Bridges x x x x x

Fords x x x x x

Ports and harbour x x

Observation and fields

of fire

x x x

Concealment and cover x x x

Key terrain x x x x

Ground and air avenues

of approaches

x x x x

Drop zone and landing

zone

x x x x

Barriers and

fortifications

x x x x x

Roads x x x x x

Built-up areas x x x x

Continued

DATA BASE NEEDS BY ECHELON

SERIAL CATEGORY OF INTELLIGENCE BN BDE DIV ARMY JFHQ

5.

Weather

Temperature x x x x x

Ground visibility x x x x x

Surface winds x x x x x

Precipitation x x x x x

Snow and ice cover x x x x x

Winds aloft x x x x x

Cloud cover x x x x x

Light x x x x x

Severe weather x x x x x

6.

NBC

Location of nuclear

explosions and yield

x x x x x

Nuclear and chemical

weapons

x x x x x

Status of training x x x x x

7.

Electronic

data

Emitter nomenclature x x x x

Emitter type x x x x

Mode of emission x x x

Frequency range x x x

Location accuracy for

Direction Finder

x x x x

Associated use-units or

weapons

x x x x

Intelligence Journal/Log Sheet

0905. The intelligence journal is a permanent, chronological record of each message or documents entering

or leaving the processing section and may contain administrative data according to standing operating

procedure. The journal provides a cross reference—a complete compilation of all incoming reports for the

purposes of future recovery. The journal covers a specified time, usually 24 hours and is recorded on prescribed

format. The journal file contains the formal and incoming or outgoing documents collected during the specified

time. Documents are posted with the corresponding journal entry number and filed in sequence. The journal is

an invaluable tool during continuous 24 hours-a-day operations involving personnel shift changes.

Order of Battle Data

0906. Order of battle is the identification, strength, command structure and disposition of the personnel, units

and equipment of any military force. In low intensity conflict campaigns involving irregular force units,

auxiliary and under ground elements are included in such data base. This data base consists of evaluated

information on the enemy :

a. Composition.

b. Disposition.

c. Strength.

d. Training status.

e. Tactics.

f. Logistics.

g. Combat effectiveness.

h. Electronic technical data.

j. Miscellaneous data.

0907. Data is developed in many fields outside the scope of order of battle, but all intelligence are ultimately

related to it. For example, scientific technical intelligence produces intelligence on the capabilities of weapon

systems, but order of battle intelligence determines the effect of weapon capabilities and characteristics on

enemy tactics, combat effectiveness and organisations. Order of Battle files are cross-referenced and organised

for rapid access and retrieval. They are kept current and used to identify gaps in data holdings. These files

provide a format for recording enemy combat losses.

0908. Combat loss data, resulting from post event assessment provides input to compute enemy strength.

Information concerning strength provides indications of enemy capabilities and assists in determining the

probable courses of action or options open to enemy commanders. A lack or a preponderance of strength has

the effect of lowering or raising the estimate of the capabilities of an enemy force. Similarly, a marked

concentration of units in an area gives indications of enemy objectives and probable courses of action. During

peace time, changes in the strength of potential enemy forces are important factors which indicate the enemy‘s

intention to wage war.

Situation Map

0909. The basic situation map provides a temporary graphic display of the current, known dispositions and

major activities of both friendly and enemy forces. The basic situation map provides a format for accurate

notations of enemy forces relative to friendly boundaries. The purpose of the intelligence situation map and all

associated overlays is to contribute to sound tactical decisions. The primary intelligence uses of the situation

map and associated overlays are to :

a. Display the enemy situation and disposition.

b. Provide a basis of comparison to determine the significance of newly received data pertaining to

enemy forces.

c. Provide a basis for briefings and intelligence reports.

d. Focus attention on intelligence gaps which require redirection of the collection effort.

e. Assist in determining patterns of enemy movement and probable courses of action.

0910. Separate overlays are used in conjunction with the situation map to display all other information

regarding the enemy. The following are examples of the types of entries, that may be posted on the current

situation map overlay to show following elements of enemy :

a. Unit identifications.

b. Unit locations including time of information.

c. Boundaries.

d. Locations of major weapons systems.

e. Command Posts.

f. Logistics centres.

g. Aircraft staging areas.

h. Landing zone and Drop zone.

j Nuclear, Biological and Chemical contaminated areas.

0911. Posted information varies with the size of the friendly unit maintaining the situation map. For example,

division situation map will normally show the location of enemy units down to battalion level. Smaller elements

of some critical enemy units, such as artillery may be shown. If the presence of weapon system is considered a

decisive factor in a particular operation, they are shown. Reports of system weapons and equipment can be

critical to the analytical effort whenever such information would contribute to the identification and location of

the unit to which assigned.

0912. The situation map overlays are normally limited to secret information. All incoming information which

meets the classification levels can be posted of on the situation map overlay. More than one overlay may be

necessary to allow for an uncluttered presentation and to facilitate functional integration.

Electronic Order of Battle Overlay

0913. Electronic order of battle overlays are used to graphically depict communication and non

communication emitters (radio/radar/ jammer) and associated units, facilities and activities which have been

located through electronic support measures and signal intelligence. There will be many more emitters than

units on the battlefield. To attempt to depict on one graphic all order of battle elements on are graphic would

quickly clutter a single 1:50,000 scale overlay. Therefore, it is recommended that a separate overlay to be used

for the emitter data elements listed below. Emitter types and signal parameters can be associated with particular

units. Not all the elements listed will be known or will be appropriate for a single emitter. These elements may

include :

a. Emitter type.

b. Modulation.

c. Frequency.

d. Unit identification or level of command.

e. Weapons system association.

f. Date and time of observation.

g. Journal number of message providing the data.

Intelligence Production Process

0914. The processing system convert reported intelligence and information from the subordinate units into

all-sources intelligence using a basic production process. The section receives data in two forms. The first is

information data which has not been subjected to correlation or analysis. The second is the processed

intelligence. Through the process illustrated below, both types of input are correlated and analysed to give the

processing system further refined intelligence.

0915. The following illustration provides an overview of the analysis and production process.

Figure 9.2 : Analysis of Production Step.

Receive Intelligence and Information Reports

0916. General. The first step in the intelligence production process is the receipt and routing of incoming

information's. In this step information is logged in, checked for reliability and distributed for further evaluation.

An over view of this process is shown in the following illustration.

Figure 9.3 : Receipt and Routing Step.

ANALYSIS AND PRODUCTION STEP

Receive Intelligence

and information

Reports

Evaluate Intelligence

and Information

Reports for Accuracy

and Pertinence

Update Intelligence

Files

Estimate Enemy

Probable Courses of

Action and Intentions

Develop Targeting

Data

Monitor Collection

Plan

Produce Intelligence

Reports

RECEIPT AND ROUTING STEP

Determine

Internal

Distribution

Log and

Distribute

Incoming

Reports

Determine

Sources and

Agencies

Reliability

Determine

Credibility

of Infor-

mation

0917. Determine Internal Distribution. Distribution is determined and noted on each incoming report.

Experience has proven that a logical sequence for routing data is important. Establishing an SOP stating who

gets a certain report first, second or third is essential. Flow charting may be used to describe the distribution

scheme.

0918. Log and Distribute Incoming Reports. Incoming reports are logged in the journal and distributed

immediately after received. Reports may be received through message centre channels, by courier or by either

radio or telephone. If the report is received verbally, the information is transcribed before processing. The

logging and filing of incoming messages and reports provide a historical record of data transaction and allow

personnel to refer to previously reported data for :

a. Comparing newly reported data.

b. Adjusting collection efforts.

c. Evaluating the responsiveness of collection agencies to produce pertinent data on time.

0919. Determine Source or Agency Reliability. Sources reliability is determined and recorded on the

incoming report by the collecting unit or agency. The processing system personnel also judge reliability based

on the past performance of the reporting unit or agency and assess an overall reliability factor for each incoming

report. The overall reliability factor is marked on each report and clearly distinguished from the factor assessed

by the reporting agency :

a. The reliability of each incoming item is evaluated by a standard system using letters A to F. The

overall source or agency reliability factor is signified by various degrees of confidence as shown in the

following table.

b. Determine credibility of information. Credibility is designated by a number between 1 and 6.

c. To determine the combined ratings, the two aspects evaluation, reliability and credibility must be

considered independently. The rating is expressed as a letter number combination. For example,

information received from a usually reliable source that is judged as probably true is rated as B2

Information from the same source but judged as ― truth cannot be judged" is rated as B6.

0920. Evaluate Intelligence and Information Reports. The second step in the process is evaluating

intelligence and information reports. All incoming reports must be examined for pertinence in terms of

reliability and reliability factors. A decision is then made concerning the reports value. Event template is a

valuable aid in determining a report is value. If a report is determined not to be pertinent, it will be filed for

possible future reference. Coordination with the collection manger is made to modify or clarity tasking.

Pertinent information is then fused with other information in the data base. Information is evaluated for

pertinence by determining whether the information is :

a. Pertinent in regard to the enemy or to the characteristic of the battlefield area.

b. Needed immediately.

c. Of future value.

d. Of no apparent value.

e. Of value to higher lower or adjacent unit.

0921. Update Files. Intelligence files are updated by fusing incoming intelligence reports with information

in the data base. Fusion is accomplished by :

a. Reviewing reports to determine the area and enemy unit.

b. Searching files for corresponding information.

c. Noting the previous report number and source or agency on the new report.

Significant data is extracted from the reports and posted to the appropriate file. Extract from SIGINT, ESM and

collateral reports are used to update the enemy Order of Battle and collateral SITMAP overlays. Periodically, all

SITMAP overlays are compared with the source SITMAP. By making this comparison, the flow of movement

can be observed and enemy concentrations will appear more clearly.

RELIABILITY OF SOURCE / AGENCY TABLE

LETTER DEGREES OF

RELIABILITY

USE

A Completely reliable Only assigned under the most unusual circumstances.

B Usually reliable Indicates a source or agency of know integrity.

C Fairly reliable Indicates a source or agency that is fairly reliable.

D Not usually reliable Indicates a source or agency not usually reliable.

E Unreliable Indicates a source or agency usually unreliable.

F Reliability cannot be

judged

Assigned when there is no adequate basis for

estimating the reliability of the sources.

CREDIBILITY OF INFORMATION TABLE

NUMBER DEGREES OF

CREDIBILITY

USE

1 Confirmed by other

sources

Used when it can be states with certainty that the

information originated from two or more different

sources.

2 Probably true Used when no proof of the above can be established and

no reason exists to suspect that the reported information

comes from the same source.

3 Possibly true Used when investigation reveals that the reported facts

are compatible with the previously observed behaviour

of the target or its known background of a target leads

to the deduction that the target might have acted as

reported.

NUMBER DEGREES OF

CREDIBILITY

USE

4 Doubtful Used when reported but unconfirmed information

contradicts the estimate of the development or the know

behaviour of a target.

5 Improbable Used when reported information is not confirmed by

available data can contradict the experience as summed

to be reliable with regard to the development of a target

or issue.

6 Truth cannot be

judged

Used when an investigation or a report reveals that a

basis for allocating ratings 1 to 5 does not exist.

0922. Further File Integrations. Once the preceding steps have been accomplished, a second level of

processing is required for further file integration. This is accomplished by :

a. Posting the Essential Element of Information (EEI) and Other Information Requirement (OIR)

number to the reporting EEI and OIR has been partially or totally satisfied.

b. Identifying all significant information if no EEI and OIR have been satisfied.

c. Fusing data with known intelligence.

d. Updating the all source SITMAP.

e. Comparing the enemy order of battle overlays and other overlays with the all – source SITMAP.

f. Reviewing event analysis matrixes.

g. Identifying major enemy movements and concentrations.

h. Updating event analysis matrixes.

j. Considering impact of events on Target Area of Interest (TAI)and Named Area of Interest

(NAI).

k. Updating Order of Battle, if necessary.

EEI and OIR are answered when the information is available. Questions are answered when there is a

reasonable probability (80 percent or better) that the answer at hand is correct. The EEI and OIR should be

answerable at this point in the intelligence process unless the requirement involves predicting enemy intentions.

If intention is required then process the probable courses of action from which to predict intention.

0923. Estimate Enemy Probable of Courses of Action (COA). An overview of this phase of the

intelligence production process is shown in the following diagram.

Figure 9.4 : Probable COA Step.

0924. Compare Information and Intelligence. Comparing reports with event

analysis matrix is done by :

a. Reviewing each report to see if it correlates with indicators in the event analysis matrix or might

be a deception attempt.

b. Posting usable information on decision support templates. As this information is poster, each

mobility corridor (MC) is analysed for the enemy‘s indicated course of action.

c. Determining if events support enemy use of particular MCs.

d. Identifying indicator of enemy probable courses of action.

e. Considering the impact of events on TAI and NAI.

This phase provides an updated decision support template.

Formulate Conclusions

0925. Conclusions are the last step in the interpretation of information. Conclusions are reached by logical

decision, based on an analysis of available intelligence, knowledge of the battlefield area and the enemy‘s

situation, capabilities and vulnerabilities. The following illustration provides an overview of this step :

FORMULATE CONCLUSIONS

Compare Decision and

Situation Templates

Identify Courses of Action

Still Available to the Enemy

Eliminate Courses of Action

no Longer Available

Update Decision Template

and Event Analysis Matrixes

FORMULATE CONCLUSIONS

Based on Available Information

of Enemy Situation, Disposition,

and Probable Course of Action---

--

PROBABLE COA STEP

Compare Information and

intelligence Reports with

Event Analysis Matrixes

Compare with Friendly

Operations Templates

Formulate Conclusions

DETERMINE

ENEMY PROBABLE

COURSES OF ACTION

Intelligence Staff Estimate

Processing Section

Report File

Provide

Input

File

Figure 9.5 : Formulate Conclusion.

0926. As posted intelligence reports begin to fill out decision support templates, the templates are compared

with the situation templates to identify those courses left open to the enemy commander. Courses of action

which, by virtue of enemy disposition, are no longer viable are eliminated. Templates are updated as necessary

to reflect these changes.

0927. An estimate of the enemy‘s most probable course of action and intentions are the result of situation

development. Estimating enemy intentions are accomplished by :

a. Analysing the current enemy situation as depicted on the decision support templates.

b. Determining the enemy‘s most probable course of action based on those courses of action left

open to the enemy commander, the disposition and composition of the enemy force and the friendly

situation. This effort focuses on answering the EEI.

TARGET DEVELOPMENT

Types of Target

0928. Intelligence can never be completed. Limited time and resource, battlefield confusion and enemy

deception all work to degrade the quality and quantity of intelligence. To provide the best intelligence, possible

intelligence collectors are concentrated on the most valuable indicators of enemy intentions and targets of the

highest value.

0929. In order to plan intelligence collection and decide which collector to task, the targets for intelligence

collection are divided into categories. These categories allow matching the activity (such as movement along a

section of road) with the collection capable of detecting it. Most enemy units simultaneously fall into more than

one category. But it is the activity as specific type of target that will answer a specific intelligence need. The

four categories of targets are :

a. Movers: Moving elements of the enemy force.

b. Emitters: Communications and non-communications systems.

c. Shooters: Weapons and weapons systems.

d. Sitters: Stationary targets.

0930. Movers. The detection, location and tracking movers are important in identifying enemy pattern of

activity. Movement patterns help to locate enemy concentrations of combat power defensive positions, line of

communication (L of C), key installations and movement of reserves. By tracking movers in the area of interest,

precise times and locations for attack high pay of target may be determined. Movers are often lucrative targets

by themselves.

0931. Emitters. Since virtually every unit on the battlefield uses communications and non-communications

emitters, electromagnetic emissions are especially lucrative sources of information and intelligence. Analysis of

electromagnetic emissions provides:

a. Targeting data for fire support, offensive air support and jamming systems.

b. Intelligence collected through the interception of enemy communications.

c. Intelligence derived from traffic analysis and cryptanalysis.

d. The identification and locations of weapons, units and systems through the detection and

locations of both communications and non communications emitters.

0932. Shooters. Shooters include all direct and indirect fire weapons and missile system. Generally, shooters

are located through their projectiles after they are fired or launched. However, missile systems, due to their

nuclear, biological and chemical (NBC) capability, may be located and destroyed as movers, emitters or sitters

before they can be fired.

0933. Sitters. Sitters are fixed or semi-fixed targets such as enemy command posts (CPs) and service support

facilities. They may include other more mobile targets which have stopped and are not shooting or emitting.

Such targets may include forces in an assembly area, weapons in ready or firing positions but not firing and

other such targets. Sitters can be critical to enemy operations and their destruction can severely degrade enemy

combat power over the long term. Identifications and location of sitters may provide indications of enemy

intentions.

Resources for Target Acquisition

0934. Information collected against each of these targets may be used as tactical information, as direct

targeting data and as intelligence. The resources available to each commander for use against the four target

categories are listed in the following table, additionally; an enemy unit may be an emitter-shooter-sitter or

emitter-mover target at the same time. Therefore, more than one resource may be employed against the same

target.

COLLECTION RESOURCES

RESOURCES TARGETS

MOVERS EMITTERS SHOOTERS SITTERS

Interrogators x x

Controlled Sources x x

Counter Intelligence x x

Reconnaissance x x x

Troops x x x

HF/VHF Intercept x

VHF/UHF Intercept x

Multichannel Intercept x

Photo Recce x x x

Infrared x x x x

Ground Surveillance

Radar (GSR)

x

Weapons Locating Rader x

Technical Intelligence

Units

x x x

Special Operating Forces x x x x

Fire Support Team x x x

Army Aviation x x x

Battlefield Surveillance

(Artillery) Radar

x x

Air Defence Radar x

Develop Targeting Data

0935. Target development is the process of providing targeting information to support the commander‘s

tactical plans. Performed by the processing system at corps and division and to a more limited degree by

intelligence staff at brigades and battalions. It is an integral part of the all source intelligent analysis and

production process. The same collection, IPB and analysis functions that support situation development also

support target development. Where the objective of situation development is an estimate of enemy intentions,

the objective of target development is to provide direct or correlated targeting data which meets the

commander‘s target selection standards. An overview of the target development process is shown in the

following illustration.

Figure 9.6 : Target Development Process.

0936. There are two objectives in the target development process. The first objective is to provide direct

targeting data (Combat information) to commanders for immediate fire and manoeuvre in close operations. The

second objective is to collect and correlate information from all sources to develop targeting data for attacking

second echelon target in deep operations. Direct targeting data results from the immediate identification and

location of targets and reporting that information directly to FSEs for attack. This normally occurs when

accurate detection, identification and location of a target is obtained from a single source and is immediately

available for fire support use. An example of this would be armour target acquired by GSR.

Target Value Analysis (TVA)

0937. Correlated targeting data result from comparing or correlating information from multiple sources to

accurately fix a target. Target correlation includes TVA. TVA is a methodology for identifying HVTs and

HPTs. HVTs are elements or resources of an enemy formation which the enemy commander considers to the

essential to accomplishing a specific tactical objective. HVTs are determined independently of friendly

capabilities to acquire and engage them. HPTs are HVTs which can be successfully acquired and engaged by a

friendly force to a degree which makes the enemy formation vulnerable to exploitation. It is the successful

friendly exploitation of the enemy formation which results in the tactical PAYOFF. Using IPB template, TVA is

done before the battle so that during the battle the commander can quickly select and attack specific targets to

manipulate the enemy force. When faced with a numerically superior enemy force, commanders will not have

enough resources to attack every target acquired. Therefore, TVA must be keyed to determining which targets

out of the entire enemy array should be attacked to achieve the greatest tactical benefit for the resources

expended. TVA determines :

a. The critical targets.

TARGET DEVELOPMENT PROCESS

TACTICAL REQUIREMENTS

1. Close Operations.

2. Deep Operations.

3. Rear Operations. 4. Command, Control, Communication

Counter measures.

5. Post-Attack Assessment.

TARGET CORRELATION

1. Analyse Information.

2. Develop Targeting Data. 3. Update Target Sheets.

4. Report Target Data to Fire support

Element (FSE).

5. Determine Target Attack Damage.

TARGET VALUE ANALYSIS

1. Determine HVTs and HPT.

2. Prepare Target Spread Sheet.

3. Prepare Target Sheet.

TARGET ACQUISITION

1. Focus Collection on HVTs and HPTs. 2. Cue and Employ Collection Systems.

3. Report Direct Targeting Data.

b. When these targets should be attacked.

c. Where these targets should be attacked.

0938. TVA links the effects of attacking a target directly target behaviour. TVA begins in IPB by a detailed

analysis of enemy doctrine tactics, equipment organisations and expected behaviour. Information derived is then

used to project how, in each tactical formation, the enemy will respond when confronted with different tactical

situations. Activities, behaviour, equipment and elements of the selected enemy force which are critical to

successful operation in each situation are identified. An example of this is the engineer company in an

mechanise infantry during a advance to contact. When the mechanise infantry is faced with making a river

crossing, the engineer company‘s location within the march formation changes. Other preparatory activities also

must take place in order for the river crossing to succeed. Through TVA is listing of actions and elements are

developed that would prevent the mechanise infantry from conducting a river crossing. Preventing the river

crossing may accomplish the desired effect by disrupting, delaying or blocking the mechanise infantry based on

the commander‘s tactical plan. In depth TVA provides a means of determining which targets would be attacked

for the greatest tactical benefit in a given situation. These targets are identified as HPTs.

0939. When conducting TVA, the situations value of target is a significant factor. As the distance from the

forward line of own troops (FLOT) increase, the value of combat forces decreases with respect to Service

Support Unit forces and facilities. For example, at the forward line of own troops (FLOT), a tank battalion is a

significant threat and is a very important target to the manoeuvre battalion commander. However, 10 kilometres

forward of the FLOT, that tank battalion is not as important to the success of the enemy‘s immediate mission as

an ammunition supply point or a fuel dump. Recognition of these situational value elements is important in

TVA.

0940. TVA tools are an effective means of functionally applying TVA and include target spread sheets and

target sheets. These tools should be prepared in conjunction with the IPB effort. Target Spread sheets are a

means of describing and identifying target in specific tactical situations at various echelons of forces. Target

sheets support sport sheets and list the critical elements of various target groups which, when attacked, will

restrict options or capabilities. Both of these products are classified because often nature of the information

depicted. Once completed these sheets are used by the intelligence staff, operational staff and fire support

element as shown in the following chart.

SPREAD SHEET USER

Intelligence Staff Operation Staff/Echelon

1. Focus intelligence collection assets.

2. Determine target development needs.

3. Recommend target priorities to

operational staff and commander.

1. Develop target priorities for the commander.

2. Development methods of attack.

3. Establish priority for attack.

4. Develop fire support plans.

5. Develop ECM plans.

0941. The target value matrix is divided into five columns. The first three columns describe three effect

desired from attacking the target. The Xs in the columns identify which effects cab be achieved in a particular

situation against the size of formation for which the sheet is being prepared.

0942. The target set column lists the 08 target sets identified previously. The RELATIVE WORTH column

depict the worth of attacking one target set with respect to the other target sets on the sheet. The subdivisions in

the column are not scaled and should not be interpreted as absolute values. This column allows a rapid

identification of the priority different target sets should have when resources for attack are scarce.

0943. For target sets assigned a relative worth, brief statements describing the rationale for attacking each set

are placed, in columnar form, to the right of the target value matrix. Specific HVTs for each target set assigned,

a relative worth are also listed in column form, to the right of the appropriate attack rationale statement. Specific

HVT listing will also contain the number of the appropriate target sheet describing each HVT for easy reference.

For example, in the river crossing scenario, the engineer target set may be assessed as critical with an attack

rationally statement to the effect 'Halt or impede preparation of crossing site and execution of crossing'. A

specific HVT in this case might be the ferry crossing site with reference to a target sheet number for that HVT,

for example, Ferry Crossing Site.

0944. A target sheet is prepared for each potential HVT. The target sheet is numbered or references identifies

the target and provide information on the size, doctrinal location, vulnerability, signature (visual and electronic)

and probable impact of the loss of the target on the enemy‘s operation. A sample target sheet is providing below

:

SAMPLE TARGET SHEET

TARGET CATEGORY : Engineer

HIGH VALUE TARGET : TGT 75. Ferry crossing site.

FUNCTION : Provide rapid crossing of water obstacles for tanks and other

non- amphibious systems.

DESCRIPTION :

--- TGT radius- point target.

--- Posture- exposed on water surface FEBA distance.

COMPOSITION : Vehicles normally 2 ferries or rafts (if river over 300m wide

may be as many as 5).

PERSONNEL :

SIGNATURE :

VISUAL :

ELECTRONIC :

OTHER :

DEGRADATION :

-- Non-amphibious forces must find alternate means to cross.

-- Force that secured bridgehead is not reinforced.

Figure 9.7 : Sample Target Sheet.

0945. The target value matrix also contains information on enemy doctrine. This includes likely formations

and distances (doctrinal template), objectives of the force and likely enemy courses of action if the attacks on

these forces are successful.

SAMPLE TARGET SPREAD SHEET (EXTRACT)

DIS

RU

PT

DE

LA

Y

LIM

IT

TARGET SET

RELATIVE

VALUE

Relative

value of

attack in

this

situation

.

Contribution in

this situation to

disrupt/delay

unit responses.

x C3

x Fire Support

x x x Manoeuvre

x ADA

Engineer

x x Intelligence

The

nuclear/chemical

target set is high

payoff a division

and higher levels

regardless of the

situation. Its

contribution

varies too greatly

to be predictable,

thus, the

different

graphical

treatment

x x Radio Electronic

Combat

x x x Nuclear/Chemic

al

x

x x x

DESIRED EFFECT

THREAT IS ATTACKING THREAT IS DEFENDING

DISRUPT

Preclude the efficient

interaction of combat and

supporting systems

Same.

DELAY

Alter arrival time of the force

outside planned/ predicted

movement schedule

Slow defensive preparation and or

delay reinforcement.

LIMIT Cause the force to shift to

another avenue of approach. Isolate the defender.

NOTE: Actual target spread sheets will also contain information on the size of forces,

tactical situation specific HVTs and doctrinal templates.

Figure 9.8 : Sample Target Spread Sheet.

0946. When completed, TVA results in a list of high payoff targets for each enemy echelon of command and

tactical situation. These lists are used jointly by the operation, intelligence and fire support staffs to develop a

high payoff target matrix. A sample high payoff target matrix is provided in the following illustration. An

approved high payoff target matrix can then be used to further refine attack criteria and attack guidance as to :

a. What targets are to be attacked (in order of priority) ?

b. When they are to be attacked ?

c. Why they are to be attacked ?

d. What are the condition for success and failure ?

Scientific and Technical Intelligence (S&T)

0947. S&T intelligence target lists must also be considered in target development. These lists can be used by

fire support and operation staffs to disrupt, destroy or capture facilities, depots or critical materials which are

important to the sustainment of enemy combat operations. These lists also may contain key enemy logisticians,

industrialists, scientists, engineers, laboratory technicians or specific document.

0948. S&T intelligence targets are categorised and listed by priority and reflect the target‘s criticality to

current and planned operations :

a. Priority I. Highly critical to the out come of the campaign and are probably perishable.

b. Priority-II. Highly critical to out come of the battle and are probably perishable.

c. Priority-III. Significant, not perishable.

d. Priority-IV. Desirable, not perishable.

Data for Targeting

0949. Targeting data is developed for those targets that must be attacked to support the commander's tactical

plan. Selected future targets are identified by the Operational Staff as early as possible. This permits the

detection, location and tracking of these targets as they enter the command‘s battlefield area. This facilitates

early target development which allows attack of targets at the optimum time and distance from the FLOT.

0950. Collection of information for target and situation development normally occurs simultaneously. The

collection manager establishes separate collection missions when priorities are sufficiently high and planned

collection missions will not provide the specific information desired. Information to support target development

is acquired by the same resources which collect for situation development and is divided into the same

categories (movers, emitters, shooters, and sitters). Information collected for targeting purposes requires greater

location accuracy than that of collected for answering EEI and OIR. When determining reporting requirements

to support target development, the collection manager must ensure that the specific derails needed is stated in

the collection requirement. Reporting requirements must include :

a. Target location accuracy required to include the sensor‘s target location error if applicable.

b. Time target was last observed at the reported location.

c. Target description.

0951. The time required to process collected information must be as short as possible to ensure that target

data can be developed and reported in minimum time. The objective to enable attack of the target while it is still

where it was detected. This means that targeting data must be reported as expeditiously as possible.

0952. Targeting data must be reported in time for decisions to be made and fire control procedures to be

completed before a target leaves a desired attack area. Quick fire channels are established between the

intelligence staff and operational staff for use in reporting targets as they meet pre- established criteria.

SAMPLE HIGH-PAY OFF TARGET MATRIX

Priority Target Set

(TS)

Target Sheet

Number

Description

1.

2.

8 (TS)

1 (TS)

77, 79

29, 34

Division, Army Main Command Post.

Division Artillery Command Post.

3. 2 (TS) 5 Command vehicle.

4. 2 1, 2, 18 Artillery Unit fire direction centre,

command observation post, field artillery.

5. 1 25 , 30 Regimental Main Command Post,

6. 3 51, 50, 46, 48 Assembly Area, Mechanised/Armour

Company

7. 4, 7 63, 64, 91, 92 Air defence electronic warfare Site,

Radio/Radar interception Sites.

8. 9 115, 116 Regiment/Division Petrol Points

9. 10 120, 121 Division /Army Ammo Depots

NOTE :

1. List may have any number of target priorities.

2. This list is jointly developed by intelligence and Operational staff.

Post attack assessment is performed by processing system as part of the processing function to determine the

effects of deep attacks against the enemy‘s follow on and supporting echelons. Damage reports and other

information used to assess the effectiveness of the attacks are handled in the same way as other reports are

handled. The reports are evaluated from reliability and credibility, logged in, distributed and used to update

intelligence files.

0953. The corps or division operational staff established the planned time and desired effects of an attack.

After the attack, it is than determined. Through analysis, if the criteria established by the operational staff have

been satisfied satisfaction of the attack criteria is determined by deciding whether or not the desired damage was

done to the enemy. The post attack assessment process is shown in the following illustration :

Monitor Collection Plan

0954. Processing section personnel constantly monitor the collection plan to provide immediate responses to

collection requirements and recommend adjustments to the collection plan to meet processing section needs. To

fulfil EEI, OIR and TAI information needs, the collection plan must ensure that the required information is

collected to answer the critical questions asked by the commander. The processing section monitors the

collection plan and identifies gaps by :

a. Reviewing template files and the TAI overlays.

b. Determining if TAI information needs to match EEI and OIR.

c. Comparing EEI and OIR to the all source SITMAP and the event analysis matrixes.

d. Determining the satisfaction of EEI, OIR and event indicators.

e. Identifying, if necessary, additional information needed to fulfil TAI needs and the commander‘s

targeting guidance.

f. Informing the collection management section of additional collection needs.

0955. Once gaps are recognised, appropriate orders and request are issued by the collection management

section to eliminate unproductive coverage and focus on updated collection requirements. The collection

management section is notified immediately of a gap in intelligence holdings.

Produce Intelligence Reports

0956. Intelligence reports are produced both processing section to satisfy situation and target development

requirements. Reports are generated based on information developed through IPB, extracted from incoming

reports or developed through all source analysis. The production process focuses on identifying reportable

information and preparing and transmitting the report to the necessary units or agencies. Reports are prepared

after :

POST ASSESSMENT

Operational Staff

Determines

Desired Effects on

the Enemy

Determine

information

needs

Include Post

Attack

Assessment info

Requirements in

Collection Plan

Receive

Damage

Reports

Analyse

Results of

Attack

Terms of

Desired

Effect

Disseminate

Results of

Assessment

Figure 9.9 : Post Assessment.

a. Reviewing the decision support template and EEI and OIR file.

b. Reviewing the estimate of the enemy‘s most probable courses of action.

c. Identifying enemy events which satisfy EEI and OIR.

d. Identifying enemy intentions supported by actual events.

0957. A distribution planning file is used to control the reporting of intelligence. This list or matrix that

provides a ready reference for determining the distribution of each report. The file is used in conjunction with

the SOP, which stipulates report formats for each report. If an item of information does not fit within the

established reporting criteria and intelligence spot report is transmitted.

0958. Reporting the enemy‘s intended or actual use of weapons of mass destruction or the location of these

weapons is especially critical. If it is determined that the enemy has or intention to imitate of weapon of mass

destruction attack this information must be reported to higher, lower and adjacent commands by the fastest

means with the highest message precedence. Initial reports are sent using a FLASH message precedent;

subsequent reports are transmitted with immediate message precedence.

0959 – 1000. Reserved.

SECTION - 10

DISSEMINATION OF INTELLIGENCE STAGE

FUNDAMENTAL ASPECTS

General

1001. The final function supporting situation and target development is dissemination. Intelligence and

combat information are of little value if not delivered when and where needed. Failure in this aspect defeats

thorough and successful collection and processing effort. Since most intelligence and all tactical information are

time sensitive, they must be disseminated to commanders and others who need it, when they need it and in a

form they can use.

1002. Timely dissemination of intelligence enables commanders to make decision with confident. It also

provides knowledge in light of new information which may be processed. Intelligence is used in the same way at

all echelons. The means of dissemination are likewise similar at all level but volume, distribution and frequency

vary. Intelligence is disseminated within the producing headquarters and to the next higher, next lower and

adjacent units. Dissemination to lower and adjacent units is more difficult and yet more important, because:

a. The intelligence picture at lower echelons changes more rapidly.

b. The requirement for greater details may result in delay.

c. The specialised intelligence produced only at higher echelons may have significant bearing on the

operations of lower echelons.

1003. Tactical information and targeting data are the mainstay for brigade and battalion commanders and fire

support units. Commanders use this data for immediate action against the enemy. Any element that obtains

combat information must disseminate it by the fastest and most direct means available.

Requirements for Dissemination

1004. Timelines. Intelligence and combat information are disseminated in time to permit formulation of

plans and initiation of action using that data as a basis. Certain items of information, such as a report of an

impending counterattack, must be disseminated immediately to permit maximum reaction time. The immediate

significance of such combat information is obvious and thus does not require much evaluation before

transmitting. After transmitting, it is analysed for further significance. The resulting intelligence is disseminated

as rapidly as possible.

1005. Usable Form. Intelligence must be disseminated in a form which will permit its ready use. The form

varies according to the nature and location of the prospective user, the urgency, nature of the intelligence and

available means of dissemination. Dissemination to the commander, the unit staff and subordinate units located

near the Command Post (CP) is accomplished through personal briefing using the Situation Map (SITMAP).

Combat information and intelligence should be disseminated in the form of brief message to permit prompt

understanding and use. Written intelligence estimates, intelligence annexes and intelligence reports are effective

dissemination tools when the requirement is for general dissemination of a large amount of information.

1006. Pertinence. Caution must be exercised to ensure that all intelligence is disseminated to all units and

agencies which have a need for it. Dissemination should not result in units frequently receiving irrelevant

intelligence which they can not use or large amounts of information that ties up their communications channels.

This is especially valid in the case of dissemination to brigades and battalions, because of their limited

capabilities for processing and storage. Generally, dissemination to subordinates is based on the pertinence of

the intelligence to the unit concerned. Intelligence is disseminated to adjacent units on the same basis without

going through the chain of command. Conversely, virtually all intelligence should be disseminated upward.

1007. Security. The enemy‘s awareness that friendly forces have certain intelligence concerning their

situation may cause them either to alter their actions so that the intelligence is no longer valid or to strengthen

their security effort. This makes subsequent collection of information by friendly agencies difficult.

Accordingly, dissemination is accomplished with adequate transmission security. Classified message which are

transmitted by a means susceptible to enemy interception are normally encrypted.

MEANS OF DISSEMINATION

General

1008. There are various means available for the dissemination of combat information and intelligence.

Combat information is transmitted by the most direct means. Intelligence may be disseminated by:

a. Any available communication means.

b. Direct contact in the form of conferences, briefing and liaison visits.

c. Issuance of intelligence documents such as Intelligence Annexes, Intelligence Summary

(INTSUM) and Periodical Intelligence Reports (PERINTREP).

1009. Dissemination with a headquarters is usually made by personal contact, verbal reports briefing and by

distribution of intelligence estimates and written reports. The urgency of the information, the types of

communications available and security requirements. With the exception of tactical information, the selection of

communication means is usually the function of the collection management section.

Selection

1010. Selecting the most suitable means to be used for dissemination depends principally upon the nature and

urgency of the intelligence and the means available. When wide dissemination of a comparatively large amount

of intelligence is require, it is usually disseminated by the issuance of appropriate intelligence documents. As

examples, during the planning phase of an offensive operation, written intelligence estimates and intelligence

annexes to operations plans are used. INTSUM, PERINTREP and periodic intelligence summary

(PERINTSUM) are also used similarly during the current phase. Electrical communication means are effective

for the dissemination of intelligence message. The imposition of radio silence requires that message to be

delivered by visual means or by messages or courier. Graphic materials such as sketches, overlays and reports

can be disseminated by means of facsimile equipment. Availabilities of automatic data processing (ADP)

equipment will permit rapid dissemination of urgent items.

Products

1011. The products used to disseminate combat information and intelligence depend upon their intended use.

Command Standing Operating Procedure (SOP) dictates what products to use and when to use them. Spot

reports are one time reports used by all echelons to transmit intelligence or information of immediate value. The

spot report is afforded the most expeditious means of transmission consistent with required security. There is no

prescribed format for the spot report; however, it should provide information on size, activity, location, unit,

time and equipment.

1012. The intelligence report (INTREP) is a standardised report which is disseminated on a requirement

basis. An INTREP is prepared when facts influencing the enemy capabilities have been observed or when a

change in enemy capabilities has taken place. The INTREP is passed to higher, lower and adjacent units at the

discretion of the commander producing the report. It is dispatches as quickly as possible following receipt to the

information and is sent by the most expeditious means available. There is no prescribed format for the INTREP

except that the acronym 'INTREP' will be the first item to appear in the report. However, when involve in joint

service operations, originators of INTREPs will use the format contained in Chapter V, JCS publication 12.

1013. The INTSUM contains a brief summary of information or intelligence interest covering a periods of

time designated by the commander. The INTSUM provides a summary of the enemy situation in forward and

rear areas, enemy operation, capabilities, weather and terrain characteristic. The INTSUM is an aid in assessing

the current situation and updates other intelligence reports. Negative information may be included in the

INTSUM, but unnecessary information is excluded. The INTSUM reflects interpretations and conclusions of

enemy capabilities and probable courses of action. The INTSUM is normally prepared at brigade and higher

echelons and is disseminated to higher, lower and adjacent units. It has no prescribed format except that

INTSUM will be the first item of the report.

1014. The supplementary intelligence report (SUPINTREP) is a standardised report form used for more

comprehensive review concerning information on one or several specific intelligence targets. It may also contain

selected intelligence data collected over an extended period of time and may include items contained in the

INTREP or INTSUM. The nature and content of data contained in the SUPINTREP dictates the specific

dissemination. At the commander‘s discretion, the SUPINTREP is passed to higher, lower or adjacent units. It is

normally produced on special request or in support of a particular operational plan and dispatched by the most

suitable means available.

1015. The PERINTREP is a summary of the intelligence situation for a specified period, normally 24 hours,

in a tactical situation. The PERINTREP is a means of disseminating detailed information and intelligence. It

covers the enemy situation, operation capabilities and vulnerabilities, characteristics of the area of operations

and counter intelligence. Other intelligence documents such as Scientific and Technical (S&T) intelligence

summaries, intelligence interrogation report, translations of captured documents, weather and climatic

summaries may be disseminated as annexes to the PERINTREP. The use of abbreviations and unnecessary

reference to map coordinate are avoided. The PERINTREP is normally prepared at corps and higher echelons.

Dissemination is made by the most suitable means, usually by liaison officers or messengers to staff, adjacent

units, subordinate and higher headquarters at the next two higher and lower echelons. The PERINTREP should

be disseminated in time for use in day planning. In joint service operations, the PERINTREP is replaced by the

PERINTSUM. The format for the PERINTSUM is contained in GSTP 0101.Weekly intelligence summary

generally follows the format of a PREINTREP (or the PERINTSUM in joint service operations). This report

normally is prepared at echelons above corps. (EAC).

1016. Imagery analysis reports disseminate imagery intelligence (IMINT). The basic types of imagery

analysis reports are the reconnaissance exploitation report, initial programmed interpretation report and

supplemental programmed interpretation report. These reports are prepared and disseminated by the imagery

analysis personnel in the field intelligence unit.

1017. Intelligence interrogation and translation reports summarise the results of interrogation of enemy

prisoners, civilian detainee or refugees and translations or summaries of enemy documents. Information of

immediate value is disseminated through spot reports. Other information is disseminated in the most suitable

form for the user. At Army Headquarters information received from interrogation and translation reports is

included in the PERINTREP.

1018. Information on enemy bombing, shelling or mortaring activity is initially disseminated by means of

bombing report, shelling report or mortaring report (BOMREP, SHELREP, or MORTREP) as appropriate.

Submission is the responsibility of the affected unit. SHELREP and MORTREP are provided to the affected

unit‘s fire support officer (FSO) for input to the counter fire element of the force artillery command post.

Reports are rendered as normal messages and are transmitted by the faster means available. Each transmission is

preceded by SHELREP in the case of enemy artillery or by the code word ―BOMBREP‖ in the case of an

enemy air attack.

1019. Initial reports and data of enemy or un-identified nuclear detonation and biological or chemical attacks

are disseminated from the sources, through designated headquarters to the highest headquarters. Reporting is by

flash precedence. Initial and follow up reports are evaluated at each headquarters and the results are

appropriately disseminated. Warning of expected contamination from a nuclear burst or biological or chemical

attack is disseminate by the first headquarters capable of determining such information.

Automated Intelligence Support

1020. The introduction of computer and dedicated intelligence communications will enable the intelligence

staff to collect, process, analyse and produce more pertinent, reliable data in a much shorter time than with

current manual systems. Currently, almost all analysis are done in manual mode. The analytic function

described in this chapter is performed by the analyst with assistance from automation. This process is time

consuming, cumbersome and personnel dependent. Automated assistance is presently being incorporated into

many newly fielded systems. Systems still in engineering and advanced development include automated

assistance.

1021 – 1100. Reserved.

CHAPTER - III

INTELLIGENCE SUPPORT FOR OPERATIONS OF WAR

SECTION - 11

INTELLIGENCE IN OPERATION PLANNING

GENERAL

1101. Intelligence is the key that unlocks the planning process of all other staff branches. Every effort is

made to collect information on terrain, whether and enemy before development of friendly courses of action.

Maximum use is made of IPB to provide predictive intelligence. The analysis of terrain and weather show how

these two factors affect the capabilities of both friendly and enemy units to move, shoot and communicate. The

doctrine template and later the situation template portrays how the enemy formations would array their forces at

different stages of the battle. These analysis helps in producing enemy courses of action that later drives

development of friendly courses of action. While analysing the situation in the IPB process, one need to

consider both area of operation and area of interest simultaneously.

1102. While the intelligence staff carries out IPB, the operation and logistic staff take a stock of the

availability of the units and formation, their capabilities, equipments, status of supplies, present dispositions and

determine the short fall vis-à-vis the requirement of projected operation. They also make every effort to bring

them to the highest standard of readiness and impart training special to the operation in hand.

1103. Logistic staff with the help of intelligence staff gathers logistic intelligence. It is the information that is

essential for formulating any viable logistic plan. These include information on terrain, climate, road, rail and

river communication network, airfields, availability of civil resources (source of fuel, stock at fuel storage depot,

water resources, public health facilities, electrical power, military production by local manufactures etc).

Logistic intelligence is generally collected through own intelligence staff, higher formation and command

channel. These information are to be evaluated and interpreted at various levels to suit their particular

requirement.

INTELLIGENCE IN DEFENSIVE OPERATIONS

General

1104. Reduction of enemy strength to achieve a more balanced correlation of forces is the basic aim of the

defensive operation. For this, the defenders take maximum advantage of terrain, weather and time to gain

positional and preparation advantages over the enemy forces and destroy the attackers when they expose

themselves during the process of attack. However, as the destruction of enemy forces is hardly possible by a

single major campaign/battle, the defenders constantly seek to repulse enemy attacks and prevent them from

gaining their operational /tactical objectives by skilful application of fire and manoeuvre. The commanders

conducting defensive operation look for omissions of the attackers and exploit them to the full as the mistakes

multiply due to the disruptive activities of the defenders. While the power of the attacker diminishing due to

battle losses, physical fatigue and continual reversals, the defenders gradually grow stronger and go over to the

offensive.

Intelligence Function in Defence

1105. Intelligence in defensive operations enables the commander to see the battlefield clearly. Before enemy

makes contact with the friendly forces, the function of intelligence is to monitor enemy movements and to seek

high value targets. It provides commander with early warning of enemy intentions and targets for fire and

manoeuvre forces. It also detects enemy deception attempts and reports them in sufficient time for the

commander to act effectively. During operation in covering troops area and main defensive position, the

intelligence staffs try to identify enemy‘s main effort as early as possible. For this, they try to detect enemy

signature formations whose commitments convey the intention. Generally the commitment of enemy signature

formation indicates his point of main effort. Intelligence supports reserve operations by identifying enemy

thrust lines, reporting extent of enemy penetration and forecasting his future intention. The rear area security is

aided by the intelligence staff mostly in the form of giving early warning of enemy landings detection and

identification of enemy agents and saboteurs. The commander responsible for rear area security must maintain

close liaison with intelligence staff to respond effectively against rear area threat.

1106. The air attack on any target during defensive operation must be based on intelligence. Initial attack will

most likely be by air force assets conducting both Air Interdiction and Battlefield Air Interdiction missions.

Battle damage assessment must be made to provide information on the effectiveness of attacks so that a decision

can be made to re-attack, continue to track or seek other targets.

1107. Enemy‘s doctrine, habit, equipment and likely course of action greatly influence the planning of

defence. A commander must look at his own deployment through the enemy commander‘s eye and try to

recognise the vulnerabilities, which he may exploit. The commander must visualise enemy objectives and

approaches so that he can array forces in relation to likely enemy movements. He should also anticipate how

enemy forces would be echeloned for the attack and exactly at what point the follow up forces would join the

battle. He then can plan slowing down of the closure rate of enemy formations so that forces in position can take

on one enemy echelon at a time. The purpose is to upset enemy‘s attack timetable and create exploitable gaps

between his committed forces and reserves.

Use of Terrain in Defence 1108. Any aspect of terrain that hinders enemy movement and prevents his manoeuvre and concentrations

must be exploited to the full. The defenders should place themselves in areas where the attackers will be put at a

disadvantageous position during the actual conduct of the attack. Controlling the vital ground is essential for the

successful prosecution of the defensive operation. When it proves to be of decisive importance, the entire

defensive plan is anchored on it. However, vital ground and enemy objective may not coincide if enemy does

not have adequate information concerning terrain and friendly deployment. Terrain alteration due to sudden

weather change or the effect of seasonal variations must also be considered while planning. Wherever possible,

the obstacle value of various terrain features are to be analysed in detail and reinforced to impede enemy

movement as well as protect friendly positions and manoeuvre.

1109. As it has already been explained the defence aims at achieving favourable correlation of forces by

fighting from an advantageous position. Retaining important terrain features on the battlefield and denying

enemy access to the same features achieve this aim. The defender aims at defeating enemy attack by taking

advantage of prepared positions and exploiting enemy vulnerabilities during the move.

Deception in Defence

1110. Deception in defensive operation aims to mislead the enemy regarding friendly pattern of deployment

in area of operation. The covering troops fight the battle in a way that prevents enemy from seeing the main

defensive position and knowing how friendly forces have been distributed over the entire battlefield. Preferably

the covering troops fall back to the main defensive position from the flanks so as to deny knowledge of the

actual FEBA to the enemy forces. When the main defensive battle begins, the defenders seek to lure the enemy

into selected killing areas by allowing him to advance rapidly along selected routes. Reserve operations are also

masked by skilful implementation of a deception plan that diverts enemy attention to another sector when the

decisive stroke is delivered. Whenever deception is planned, it should always be tied to the main defensive plan

to avoid giving contradictory signals to the enemy commander so that friendly intention is not deciphered.

Threat to Operational Security in Defence

1111. To provide structure for and to describe the threat, three levels of threat activities are used.

a. Level I threat includes enemy controlled agents‘ activity, sabotage by enemy sympathizers and

terrorist.

b. Level II threat mainly comprises diversionary and sabotage operation conducted by

unconventional forces and raid, ambush and reconnaissance operations conducted by combat units.

c. Level III threat consists of specialized operations such as helicopter borne operation, airborne

operation, amphibious operation and infiltration operation. These threat activities will not occur in

specific order. The rear area may face one or all actions at one time. Additionally some activities may

take place well ahead of general hostilities including terrorist attack against key personnel and

activities.

Intelligence Function in Tactical Redeployment

1112. Intelligence effort should be concentrated on finding out the enemy capabilities and intentions prior to

the commencement of tactical redeployment. This will be more necessary if the timing of the tactical

redeployment is linked to the enemy‘s ability to launch a major attack. Once a tactical redeployment has started

it may be difficult to obtain timely information of enemy intentions from ground troops. Air reconnaissance is of

great value at this stage. Reconnaissance by army aviation and air force will play an important part in obtaining

information about enemy movements. Stay behind parties with the assistance of unconventional forces and

intelligence organisation also can produce valuable information. However, information of enemy activity in the

rear area will also be a matter of great urgency.

1113. During the tactical redeployment heavy demands are placed on the intelligence systems. The

intelligence system provides early warning if the tactical redeployment is discovered by the enemy before it is

completed. As the tactical redeployment progresses, the intelligence system places an increasing reliance on

unconventional or human collection assets from the intelligence organisation. Such sources are employed on

high-speed avenues of approach and along potential parallel flanking routes that the enemy may attempt to use

in pursuit.

1114. The larger the redeploying force, the more important security becomes to prevent the intention of the

operation from being prematurely revealed to the enemy. Once the operation begins, deception operations are

directed to confuse the enemy. Limited objective attacks or feints are used for this purpose.

INTELLIGENCE IN OFFENSIVE OPERATION

Intelligence Function in Offensive Operation

1115. The success of an offensive operation will depend on speedy acquisition of intelligence both before and

during the operation. A sound operation plan can only be made after obtaining detailed intelligence on the

enemy and the terrain. As the operation progresses a continuous flow of combat intelligence will allow the

commander to modify his plan and identify 'fleeting opportunities' in time to react to them.

1116. Infiltration at any scale needs an accurate intelligence and careful planning. Precise information

regarding enemy strength, disposition, reinforcement capabilities, command, control and communication system

would call for both conventional and unconventional technique of information gathering. Specific information

irrespective of gaps/lanes between defended localities or obstacles especially mine-fields, enemy forces depth

locations and their overall surveillance and target acquisition plan will be essential for any infiltration plan.

Beside conventional intelligence gathering effort, unconventional forces operating at the rear and on the flanks

of the enemy will best suit the requirement of providing such vital information.

1117. Intelligence is primarily needed to assess the right time for launching a pursuit by accurately detecting

the indications of enemy‘s collapse. Mobile troop should reconnoitre on a wide front, taking considerable risks

to find routes forward, which are not covered by enemy rear guards. Air reconnaissance should be bold and

continuous.

Deception in Offensive Operation

1118. Deception is closely linked with the operational plan and is therefore, the responsibility of the

operations staff that issue orders for implementation of deception plans. But the success of it depends on

detailed knowledge of the enemy, which is the preview of the intelligence staff. Therefore, in working out and

executing a deception plan there must be the closest liaison between the operations and intelligence staff.

Deception in offensives will have the following objects.

a. To provide the commander with freedom of action to carry out his mission.

b. To gain surprise.

c. To mislead the enemy and persuade him to adopt a course of action that is to his disadvantage and

which own forces can exploit.

1119. Infiltrating forces must consider all measures to avoid detection. The passage of the groups through the

enemy positions and their movement to their attack positions/ forming up place (FUP) may be accompanied by

feints and demonstrations, including preparatory fires in areas not included in the infiltration.

Electronic Warfare (EW) in Offensive Operation

1120. The pursuing force should employ all available means of electronic countermeasures to confuse the

enemy, to deny him use of his command, control and communications and to hinder his attempts to consolidate

and reorganise.

1121. EW operation must support offensive operation. This can be done if the EW plan is developed early

and is fully integrated into the overall operational plan. It must also be updated continuously in the light of

changes in the tactical situation. The nature of offensive operations will demand that EW assets are deployed

well forward in order to develop the EW information base for further EW support of operation. The tasks of EW

will be :

a. Information Gathering. By means of Electronic Support Measures (ESM) all enemy electronic

emissions can be located, intercepted and identified. This information can then be used with other

intelligence to build up the combat intelligence picture. Prior to contact with the enemy ESM may

provide information from which indicators of enemy Order of Battle (ORBAT), tasks, locations,

dispositions and intentions can be obtained. After contact, changes in enemy ORBAT, his location,

activities and main effort can be identified. EW could also assist in target acquisition and development.

b. Increase Combat Power. By provision of a capability to disrupt the enemy‘s use of the

electromagnetic spectrum at critical times in battle.

Enemy Reconnaissance and Security of Operations

1122. Because of enemy reconnaissance and the length of time, which may pass before battle is joined,

formations should mask their intentions for as long as possible. Own intentions can be concealed by adopting

flexible dispositions which do not limit the force to a single type of manoeuvre. Active deception and security

operation also help to conceal own intentions. Covering troops should operate well forward during operational

manoeuvres to give the force information on the enemy‘s dispositions and time and space in which to act. As

battle is joined formations adjust their final movement and look for opportunities to defeat enemy defence in

depth. In particular they seek ways to employ operational reserves effectively.

CLANDESTINE INTELLIGENCE OPERATIONS FOR WAR

General

1123. Clandestine Intelligence Operation is not a peace time effort only. It is conducted both during peace

and war, even more prior to or during war than during peace. Clauswidth stated that commanders at all level

especially at higher level face the biggest challenges from fog of war or uncertainty of war. In the period prior to

hostility, the decision makers and planners at strategic level want to avoid being strategically surprised and

during war commander at operational level want to avoid tactical surprise. Whatever modern instrument that has

come up in the field of Signal Intelligence, Imagery Intelligence or Technical Intelligence, it can not read the

human mind and it can not get a copy of the latest operational or campaign plan. It is ultimately the human

Intelligence through espionage or agent operation the secret of the secrets can be extracted. It is not only the

espionage or secret intelligence gathering but also the other fields like sabotage, subversion and covert action

that we have to resort to.

1124. Hundred of historical examples can be sited where special type of agent operation were conducted prior

to or during war. Russo-Japan war and Austo Hungarian War of 19th century and last two World Wars are

classical example of employing agent for military operation. The side used it most had ultimately signed the

peace treaty. Though it appears difficult in present day battle but still the trade craft is being used in all modern

warfare. Boldness, tenacity and secrecy are the crux of the whole operation. Centralised planning, distribution of

responsibility and decentralised execution keeping the overall campaign goal will be the pillar to success.

1125. When one side has resource short fall and the other side is much superior in economic, military and

technical field, intelligence can act as a force multiplier if meticulously planned and executed. Dividend can be

very high as compared to the expenditure. This can be taken as a very good lesson for Bangladesh, when we

have to compensate our resource constraints in the face of potential mighty adversary. This should not be taken

as a special operation conducted by commando troops only.

Method of Operation

1126. General. This is basically under cover operations conducted by intelligence organisation deep inside

enemy territory or enemy held territory with the help of locally recruited agents or own personnel working as an

agent. In the context of war, different types of agent operations are specially required, which are :

a. Agent in Place/ Penetration Agent.

b. Roving Agent.

c. Resident Agent.

d. Stay Behind Agent.

e. Dormant/ Sleeper Agent.

f. Covert Action Agent.

1127. Agent In Place/ Penetration Agent. Agent in place is an agent who is able to obtain intelligence

information or material by being within the specific target itself. He has either been successful in gaining

placement and access within a designated target or he was already in the target and was recruited as an agent.

National level intelligence organisation or inter service intelligence organization should plan for placement of

agent in place in order to monitor troops, aircraft and ship movement. This is a full time job and must be

resorted to during peace in and around all known Army, Air force and Naval bases. Agent should also be

employed in the nearest Command Corps, Division, Air Base, Naval Base to get access to the operation plan and

other information of that are operationally very important. Another group of agent should be employed for

monitoring strategic intelligence like war production, scientific development, economic vulnerability,

transportation and commutation etc of the enemy country.

1128. Roving Agent. Roving Agent is an agent who arrives in the vicinity of target and is able to move

within the area. He is given specific instructions by the agent handler as to where or when he is to travel, how he

is to travel and what target he is to observe. This agent may be an individual dispatched from base country or

third country into the vicinity of the target. He may be a legal traveller or an illegal border crosser depending

upon the method of lunching (illegal or legal).

1129. Resident Agent. Resident Agent is an agent who obtains intelligence information or material by being

in the vicinity of the target. He may be an individual who was recruited because he was already residing in the

vicinity of the target or he may have been dispatched to take up residence near the target, but does not live in the

immediate vicinity of the target.

1130. Stay Behind Agent. Stay behind Agent is an agent recruited for the specific purpose of staying behind

in the area from which friendly forces are to be or have been withdrawn and to collect information or to operate

as subsequently directed. He is also sometimes referred to as sleeper agent. They operate normally in the enemy

occupied area or closely enemy territory under suitable cover with a reasonable status to support his cover

identity. They will live of the land and pass on the secret information through clandestine wireless. They are

normally employed along the enemy axis of advance in order to gather maximum information through

observation or through agent net. It is the responsibility of formation to plan for such operation.

1131. Sleeper Agent/ Dormant. Sleeper Agent / Dormant agent are either infiltrated into target countries or

recruited from among local citizens. These agents remain inactive and completely disassociated from

clandestine activities till such time they are needed. They are usually made active during war. They normally do

not perform any job unless they are activated prior to the hostility. This helps them in not being blown. They are

employed deep inside enemy territory for all types of intelligence Job. The very location may be a chock point

or vital ground or nearer to vital military installation like air field, ammunition depots, sea port, cantonment etc.

They provide vital information regarding deployment of NBC, missile, tank, bridge equipment, ship and air

movement. Another type of sleeper are employed for destruction of communication system, vital war materials

and assassination of key personal to have demoralising effect. They are employed at the strategic level by inter

services and national intelligence organisation under an overall plan.

1132. Covert Action Agent. In order to provoke subversion, agitation, mass movement, insurgency and

terrorism, a group of specially trained agent handlers are sent to the problem areas of the enemy country. With

the shelter of the local supporters these agent handlers motivate and train more agents for subversive action

against enemy country. A peace time strategic intelligence analysis and link is a pre-requisite for success.

a. Saboteur. There are special saboteurs employed during the war, either by para drop or by off

shore landing or by land infiltration. They occupy safe houses maintained by agent in place or sleepers

one after another under suitable cover and reach near to the target, destroy it and withdraw to the safe

area.

b. Provocation Agent. Their purpose is to provoke the intelligence agencies of the target country

into course of action which will benefit own intelligence organisation.

c. Confusion Agents. An agent who is launched to deliberately feed false or misleading

information to enemy intelligence agencies is known as confusion agent.

How to Plan Clandestine Intelligence Operation

1133. Planning Consideration. Clandestine intelligence for war must be planned and partially executed

during peace. Following aspects need to be considered prior to engaging for such operation :

a. In 1st stage through Strategic Intelligence Analysis of the enemy country is the foremost priority.

This analysis must need to be elaborated.

b. In 2nd stage a vulnerability study to be conducted for both own and enemy country which will

lead to the places need to be observed, targets need to be destroyed and organisations need to be used

for covert action and other support facilities to be availed for sound execution of the mission.

c. Basing on the priority of locations, targets and organisations the requirement of manpower and

fund will be worked out.

d. Requirement may be executed in phases basing on the resource constraint and requirement of

prevention from of breech of security.

e. A decentralised clandestine training should be conducted for different types of agent and their

likely mission.

f. Maintenance of secrecy is the crux of the whole business. Therefore adequate security and

deception must be catered for planning, training, preparation dispatch and employment of these agents.

1134. National and Inter Services Level. Basing on the campaign plan chalked out at the highest level a

complete plan for war time agent operation is also worked out at the national or inter services intelligence level.

This plan is based on the campaign requirement and the strategic intelligence analysis. In this plan location,

target and organisation are identified and responsibility is distributed to various organisation. Broad policies,

provision of fund, training and employment are mentioned.

1135. Service Level. Basing on the above plan service HQ works out their plan. Their minimum jurisdiction

will be corresponding command level and peace time location of command reserve of the enemy. Service should

also execute sabotage and covert action if assigned by the national plan. For Air Force and Navy the entire

opposite force should be made the target for clandestine operation.

1136. Formation Level. It is very difficult to ascertain up to which they should operate. Putting up a

mileage limitation is no way justifiable due to enemy denial and deception and likely fluidity of war. During

peace and prior to war, formation intelligence unit can operate external network in and around enemy

cantonment and military installation. During war their look out should be the depth or reserve formation. They

should also employ stay behind agent from own trained personnel behind the enemy line and in the enemy

occupied area. Primary means of communication should in this stage be clandestine wireless. Agent should live

off the land with necessary fund provided and should use previously worked out safe houses or contacts houses.

Their cover should also support their livelihood and mission.

Support Agent Operation

1137. Basic Types. A support agent is an individual who can assist in obtaining of intelligence under the

management of an agent handler. This category is further divided into four types, like spotter, investigators,

trainees and principle agents.

1138. Communication Agent. Agents who assist in the technical means of communication within the

intelligence activity is not a communication agent. These agents include radio operators, computer operator etc.

1139. Safe House Keeper. An agent, who is an attendant, takes care of and manages a safe house and also

retains the appearance that such a house is being occupied under normal conditions.

1140 – 1200. Reserved.

SECTION - 12

ENEMY ORDER OF BATTLE ANALYSIS

General

1201. Order of Battle (ORBAT) intelligence is an integral part of intelligence analysis at all level.

Intelligence analysts consider ORBAT intelligence and integrate it with other intelligence pertaining to weather,

terrain, and other factors to determine threat capabilities, vulnerabilities, and probable course of action. This

chapter describes the ORBAT analysis process and the tools used to develop and integrate ORBAT.

1202. ORBAT is the identification, strength, command structure and disposition of the personnel, units and

equipment of any foreign military force. Data is developed in many fields outside the scope of ORBAT, but all

intelligence is related ultimately to it. For example, technical intelligence (TI), produces intelligence on the

capabilities of weapons systems, but ORBAT intelligence determines the effect of weapon capabilities and

characteristics on enemy tactics, combat effectiveness and organisation.

Order of Battle Factors

1203. The ORBAT consists of evaluated information on enemy, allied and neutral forces on the following

factors:

a. Composition.

b. Disposition.

c. Strength.

d. Tactics.

e. Training.

f. Logistics.

g. Combat Effectiveness.

h. Electronic ORBAT.

j. Miscellaneous Data.

Composition

1204. Composition is the identification and organisation of units and formations. It applies to specific units

or commands as opposed to type of units. Unit identification often is called the key to ORBAT intelligence

because it leads to the answers to many questions concerning the enemy. Unit identification consists of the

complete designation of a specific unit by name or number, type, relative size or strength. Through

identification, the ORBAT analyst develops a history of the composition, training, tactics and combat

effectiveness of an enemy unit. The identification of a specific unit within organisation alerts the analyst to the

possible presence of other unidentified or unallocated units of the same organization.

1205. Organisation is the physical structure of an unit and the relationship of the various elements within the

structure. Knowledge of the organisation of an unit or military force aids in developing accurate intelligence on

current strength and combat efficiency. Further threat capabilities as they relate to tactics, training and logistics

are difficult to assess accurately without knowledge of the current organisation.

1206. The basic self-sufficient tactical unit (normally in infantry division) is considered when developing

intelligence concerning composition. In some countries, the field army is considered the basic self-sufficient

tactical unit. In other, it is the brigades. The importance of this concept lies in the term 'self-sufficient'. Units

subordinate to self-sufficient tactical units, although capable of limited independent action, cannot sustain

themselves over relatively long periods of time. Subordinate units seldom are employed independently or

separately from the basic self-sufficient tactical unit. For example, a new Wolf land (WL) Infantry Brigade is

reported in the Area at Ocean line. When one of these brigades is located, suspect that the remaining elements of

the division also are in the area. Composition also implies grouping and regrouping of combat and combat

support unit of the same formation or even other formation.

Disposition

1207. Disposition consists of the location of enemy units and the manner in which these units are deployed

tactically (or administratively in times of peace). In addition, disposition includes the recent, current and

projected (or probable) movements of enemy units. Location refers to a geographical area or position occupied

by an unit or formations units. Knowledge of the strength and location of an enemy force assists the intelligence

officer in determining the capabilities of the enemy force and its effect upon the accomplishment of the friendly

mission. Data of this type is collected during peacetime and forms the basis for assessing capabilities during the

initial period of hostilities.

1208. Tactical deployment is the relative position of units and formation with respect to one another or to the

terrain. Tactical formations are designed for exacting the various tactical manoeuvres and usually are based

upon doctrine. If this deployment is predetermined, it leads to an accurate appraisal of probable enemy courses

of action. The knowledge of how units are arranged in echelon indicates ( if the enemy assumes the offensive)

which units are used in the initial attack and which units are employed in supporting and reserve roles. Tactical

deployment with respect to terrain is also important. A study of disposition with an analysis of the terrain leads

to conclusions concerning enemy capabilities, vulnerabilities, and probable courses of action. This may be

accomplished this through the intelligence preparation of Battle Field process.

1209. Movement of units is part of disposition. Movement is the physical relocation of a unit from one

geographical point to another. Patrol activity may be an indication of planned movement but, in itself, is not

movement. Movement is significant because it automatically changes the tactical deployment of the opposing

forces. When a threat unit has moved, is moving or possibly will move in the future, it becomes capable of

execution a number of actions which affect the conduct of the battle (or the current political situation). Such a

unit moves into an attack position, moves to reinforce or to replace a unit or performs other missions. In view of

these possibilities, movement of a unit becomes important. The ORBAT analyst must continually monitor unit

movements on order to provide correct and detailed data on enemy disposition.

Strength

1210. Strength describes a unit or formation in terms of personnel, weapons and equipment. Information

concerning strength provides the commander with an indication of enemy capabilities and helps determine the

probable courses of action or options open to threat commanders. A lack of strength or a preponderance of

strength has the effect of lowering or raising the estimate of the capabilities of an opposing force. Likewise, a

marked concentration or build-up of units in an area gives the commander certain indication of enemy

objectives and probable courses of action. During peacetime, changes in the strength of potential enemy forces

are important factors which may indicate changes in the enemy‘s intention. Enemy strength computations are

described separately in another section.

Tactics

1211. Tactics in ORBAT intelligence include tactical doctrine as well as tactics employed by specific units.

Tactical doctrine refers to the enemy‘s accepted principles of organisation and employment of force for the

conduct of operations. Tactics, on the other hand, describe the manner in which units conduct an operation.

From knowledge of tactical doctrine, the ORBAT analyst knows how the enemy may employ forces under

various conditions and in certain type of situations or special operations. Units normally are expected to perform

according to certain patterns within the framework of their tactical doctrine. All Armies establish basic

principles and patterns for the employment of infantry, mechanized unit, tank, and artillery units in the offence

and defence. For a more specific nature, in specialized tactical doctrine, employment of a certain unit in a given

situations during combat or training activities is analyzed, because it indicates possible changes in enemy

doctrine. Doctrinal template, is one method of graphically portraying enemy tactics.

Training

1212. Individual and unit training contribute significantly to the combat effectiveness of any military

organisation. The thoroughness, degree and quality of initial training which the recruit, specialist, junior leaders

and officer receive are major factors in determining the overall efficiency of an armed force. Unit training,

normally conducted in seasonal cycles form small unit exercises to large-scale manoeuvres, is an essential part

of the training necessary for a unit to operate at its full potential. Each type or phase of training a unit

accomplishes adds to its capabilities and effectiveness.

1213. Specialized training that a unit receives may point to its ability to undertake certain missions beyond its

normal doctrinal capabilities or responsibilities. Therefore, it is easier to appraise the combat effectiveness of a

unit when the degree and quality of its training are known, as well as any specialized training it undertakes.

Logistics

1214. Logistics closely relates to combat effectiveness. The adoption of a course of action depends on the

ability of the logistical system to support that action. With knowledge of the current capabilities of an unit‘s a

logistical support structure, we can make a more accurate evaluation of its capabilities, strengths and combat

effectiveness. Also, the location of elements of a unit‘s logistical support structure indicates the disposition of

manoeuvre formations and combat support elements. Categories of logistical information include :

a. All classes and types of logistical requirement.

b. Supply lines of communication.

c. Logistical policies.

d. Procurement methods.

e. Distribution priorities and procedures.

f. Transportation networks and modes.

g. Installations, logistical control points and terminal.

h. Dumping Policies.

j. Evacuation and Salvage Procedures.

k. Repair and Maintenances.

Combat Effectiveness

1215. Combat effectiveness describes the abilities and fighting quality of an unit. Numerous tangible and

intangible factors affect it. Combat effectiveness affects the capabilities of a unit or army and is predicated by

analysing followings:

a. Personnel strength.

b. Amount and condition of weapons and equipment.

c. Status of training.

d. Efficiency of the Officers, Junior-commission officers and Non- commission officers.

e. Quality of leadership.

f. Length of time the unit has been committed in combat.

g. Traditions and past performance.

h. Personality traits of the unit commanders.

j. Geographical area in which committed.

k. Morale, esprit, health, discipline and political reliability (or belief in cause)

l. Status of technical and logistical support of the unit.

m. Adequacy of military schooling at all levels.

n. National characteristics of the people.

Electronic ORBAT

1216. Electronic ORBAT information is required to conduct Electronic Warfare. This data includes

communication and non-communication equipments such as emitter type and nomenclature (including encoding

equipment), modulation, multiplex capability, pulse duration, pulse repetition frequency, bandwidth, associated

weapons systems and other technical characteristics of electronic emissions. They also include critical

communications nodes such as Command Post and logistical control points. They support enemy electronic

order of battle (EOB) template. With electronic technical data, a more accurate evaluations of the enemy‘s

vulnerability to electronic countermeasures (ECM) and deceptions is made; signals intercept and directions

finding (DF) for the production of SIGINT is made easier and support is given to electronic counter-

countermeasures (ECCM) by assessing the enemy EW capabilities.

Miscellaneous Data

1217. Know Your Enemy. Miscellaneous data includes supporting information needed by an analyst to

develop other ORBAT elements. It includes basic intelligence described as 'know your enemy'. Information on

uniforms and insignias is an important part of 'know your enemy' intelligence. This information assists in

establishing unit identification and organization and in determining morale and esprit de corps.

1218. Personality Files. A personality file contains information on certain characteristics and attributes

which describe individual members of a military force. Knowledge of personalities is important in identifying

units and in some cases, predicting the course of action the unit will take. Personality data, therefore, is valuable

because the tactics and combat efficiency of particular units are often closely related to key individuals within

its command structure.

1219. Unit History. This includes information and intelligence on the elements of a specific unit; on present

and past parent units; personalities who have commanded the units and other details like past performance and

activities which describe, limit, or clarify the capabilities of the unit concerned. The development of unit history

is important in determining the capabilities and limitations of a unit. Military or paramilitary units, like

individuals, develop characteristics which distinguish them from other units. Just as they consider the various

qualifications and traits of enemy personalities, ORBAT personnel also must consider a enemy unit as a

personality in analyzing its capabilities and limitations.

1220. Unit Code/Tactical Number/Field Post. Some foreign armies use systems of code number, names or

false tactical markings to conceal true designations (or affiliations) of units, field post number (unit mailing

address), and vehicle identification or side numbers. These systems, when properly analysed are valuable

sources of information that are related to unit composition and disposition.

ORBAT Book

1221. General. An ORBAT book is a summary of all basic intelligence concerning the composition,

disposition, identification, subordination and strength of a service that function in ground or ground support

role. It normally is published by the Service Headquarters and by the Inter Services Intelligence Organisation.

The level or echelon of units shown depends on the level of command for the intended user. Generally, this is at

least one echelon above and two echelons below that of the intended user. During peacetime, units, which form

only on mobilization, are identified as such.

1222. Contents. The ORBAT book includes the following information for each unit :

a. Identification to includes numerical designator and type of unit, nationality (unit) religion.

b. Field Post Number.

c. Parent Formation (brigade, division, corps, command).

d. Category and effective strength.

e Location to includes Place name (and country if deployed abroad), Installation

number or name (if applicable), Military geographic region (if applicable) and

Universal transverse meter (UTM) coordinates (supplement with geographic

coordinates whenever possible).

1223. Additional Data. The following data are also included :

a. Code name or code number (enemy assigns official name or number).

b. Nickname (unofficial popular name).

c. Honours or honour titles.

d. Unit insignia.

e. Latitude and longitude of subject (in addition to UTM coordinates)

f. Commander‘s name, rank, initials and specialty and those of other key personnel.

g. Combat effectiveness (including any data on specialized training).

h. Turret numbers, vehicle registration numbers, or other tactical signs.

j. Any other data at the discretion of the originator.

k. Encyclopaedia or target data inventory numbers.

The structure of an ORBAT book varies. However, it normally contains three sections: namely General, detailed

ORBAT and Summaries of Supporting Documents.

Strategic ORBAT Hand Book

1224. The Strategic ORBAT handbook, which is often referred to as a handbook of military forces, is a

summary of basic intelligence on a foreign nation‘s political or governmental structure and military

establishment , including its tactics and doctrine. It includes more technical data's such as the logistical system

used and the characteristics of weapons and equipments.

1225. The ORBAT handbook normally deals with only one country. It deals with two or more countries in

separate parts, especially when these countries are closely associated with each other by pact, geographically or

in some other way. As minimum, it contains :

a. History, Governmental and Political Structure. This includes a short history of the nation and

a comprehensive description of its governmental and political structure.

b. Armed Forces Organisation. This includes a description of the nation‘s military establishment

(including paramilitary and an explanation of how command and control of the is affected. This also

includes a complete explanation of the organisation and composition of all the various types of ground

force units and formations. The organization and composition of a new ground force unit also is

included if that unit is likely to be placed under command or in support of the ground forces in time of

war.

c. Logistical Support Organization. An explanation of the logistical system the ground forces

employs from ministerial level to the lowest echelon.

d. Strategic and Tactical Doctrine. A description of reserve forces, the mobilization system and

times required for mobilization.

e. Military Education and Training. This includes a description of the military education and

training system and an explanation of the personnel recruitment and selection process.

f. Uniforms and Insignia. A full description of all armed forces uniforms, ranks, and insignia.

g. Weapons and Equipment. A listing and brief description including characteristics of the various

types of weapons and equipment found in the armed forces. The list includes weapon and equipment‘s

country of origin, availability of technical expertise and likelihood of availability of equipments and

spares.

h. Allies. A list of likely military and political allies and type of support each may render.

1226. The contents of the ORBAT handbook are organised in the sequence shown above. When included,

organisation and tabular data are presented as follows :

a. Governmental and Political Structure and Armed Forces Organisation. Organizational charts

are to support the narrative description of these subjects where possible. There is no format for such

charts.

b. Organisational Structure. One should depict organisational structure for each type of unit and

arrange the organisational diagrams in the following sequence: headquarters, combat units, combat

support units, service support units.

c. Tables of Personnel, Weapons, and Equipment. Produce the tables according to available

information.

1227. Amendments of ORBAT handbook are done periodically. The timing and degree of amendment are

left to the discretion of the originator. They should, however, initiate amendment action whenever some one can

detect a substantial change to intelligence contained in the handbook or whenever it has a number of minor

amendments.

Installation Handbooks

1228. Ideally, installation handbooks contain complete information concerning every military installation in

every city in the country. They are useful, particularly during peacetime, for establishing which forces are

already in place. During wartime, the usefulness of installation handbooks decreases somewhat. However, they

still indicate likely production facilities reserve mobilisation and training centres.

Miscellaneous References

1229. Other publications and periodicals prepared at departmental and area command levels are of value to

the ORBAT analyst. These references may deal specifically with ORBAT or with any or all phases of tactical,

operational, and strategic intelligence. The External Intelligence Organization produces studies on general

military capabilities and economic factors which has impact on military capabilities. Directorate General of

Forces Intelligence makes special studies on various subjects concerning foreign and enemy military forces.

These studies usually are detailed, technical in nature and provide a wealth of special information not otherwise

available.

1230. The ORBAT analyst uses various recording aids in organization and cataloguing ORBAT information.

He creates ORBAT rerecords and files through a compilation of information available in the references

discussed above. Subsequently, these are used continuously to produce current intelligence and to update other

intelligence records, like the situation map and IPB products. ORBAT files facilitate easy reference and

comparison of ORBAT information collected at various times from various sources. Each intelligence-

processing element decides, which aids to maintain. The type used depends on the echelon of command and the

local situation.

1231 – 1300. Reserved.

SECTION - 13

MILITARY CAPABILITY ANALYSIS

General

1301. Intelligence analysts advise military commanders about enemy rather than about direct combat

operations. Yet, the value of intelligence in warfare is great. The Chinese military theorist, Sun Tzu, summarised

the importance of intelligence this way: ―Now the reason the enlightened prince and the wise general conquer

the enemy whenever they move and their achievements surpass those of ordinary men is foreknowledge. An

army without secret agents (or modern intelligence resources) is exactly like a man without eyes or ears.‖

1302. Seeing and hearing the truth is the goal of all intelligence analysis. The national interest requires that

Bangladesh Army acts quickly and wisely. To act quickly, they must have the benefit of foreknowledge, and to

act wisely they require information that is as free from bias and distortion as possible.

1303. The most important role of intelligence analysts is to advise military commanders and other decision

makers about the military strengths and weaknesses of potential adversaries. Military capability analysis

provides the foundation for providing such ―advice‖. It includes tangible aspects like military hardware and size

of forces and intangible, attributes like training, spirit de corps, and educational expertise.

Types of Analysis

1304. The nature of intelligence from a strategic standpoint is to provide processed information on broad

patterns and trends that is used by hostile nation's policy makers and its command authority. Military capability

analysis are of three types :

a. Strategic Military Capability Analysis. It orients on indications and warning based on

capabilities of opposing force and commitment of opposing leadership to their strategic goals and

objectives.

b. Operational Military Capability Analysis. It orients of the gathering of information to provide

analytical support in order to reveal and identify capabilities, activities and interrelationships between

formations and units.

c. Tactical Military Capability Analysis. It provides actionable information on current or

imminent location, movement and activity. It is time critical information requiring immediate

dissemination and responses. It is not analysed in a comprehensive manner.

STRATEGIC MILITARY CAPABILITY ANALYSIS

Factors

1305. When analysing a country‘s military capability, four areas usually surface. Force structure,

modernisation, readiness and sustainability. These areas are known as the four pillars of military capability

analysis. Following factors are required to be considered :

a. Force Structure. The number, size and composition of a unit which comprise a military force,

e.g. Divisions, Ships, Air Wings or Squadrons, their command, control, communication and battle field

functions are discussed.

b. Modernisation. The technical sophistication of forces, units, weapons systems and equipment

including training and education. This also includes hardware production and replacement capabilities.

c. Readiness. The technical sophistication of forces, units, weapons systems and equipment to

deliver the outputs for which they were designed, including the ability to employ/deploy without

delays, mobilisation, etc.

d. Sustainability. This is the ability to maintain the necessary level and duration of operational

activity to obtain military objectives. It is a function of providing for and maintaining those levels of

ready forces, material and consumables necessary to support the military effort. This also includes

people‘s participation and support, reinforcement, production or replacement or stocking capabilities.

1306. Force structure and modernisation is the least dynamic and most stable pillar. It is most easily predicted

at strategic and operational levels. Force structure can be most critical and dynamic at tactical levels. Readiness

and sustainability govern the degree to which force structure and modernisation can be exploited. They can be

the most dynamic and critical factor throughout the strategic, operational and tactical analysis. Readiness can be

however, the hardest factors to quantify and measure and can be the most difficult to predict. Force structure and

modernisation together with organisational structures and doctrine constitute a theoretical maximum force

potential, while readiness and sustainability act as enablers and constrainers on the maximum forces potential.

Intentions Analysis

1307. Will a hostile armed force threaten retention and capabilities of our nation such as the stability of

government? Where and when are these threatened actions likely to occur?. Intention is as much a political

question as military one. Thus, analysts must begin by studying the political conditions underlying the war.

Sensitivity to underlying political situation separates military intelligence from normal military operations.

1308. One can learn the enemy‘s intentions by studying his actions, by reading his statements including

encrypted messages and through analysing his troop movements. Enemy statements and troop deployments

often are themselves political (non-violent) posturing, as well as indicators of imminent combat.

1309. This first question of intention is studied in terms of grand strategy. That is, what are a hostile nation‘s

political goals-including reasons they would initiate war, as well as what they hope to achieve after the war. All

components of strategic intelligence are involved in grand strategy. Should threatening actions actually begin,

will the hostile armed force achieve its goal (i.e... defeat, resist or conquer our forces) despite our own military

actions, is the most fundamental question to be addressed to determine intention.

1310. The second question, that of a hostile military‘s capability to defeat or confound its enemies, requires

the simultaneous comparison of two military forces (friendly and enemy). Analysing military capability requires

the study of both strategy and the operational art. A net of all these factors is an assessment of potential war

fighting capabilities.

Doctrine of Capabilities

1311. The commanders must be certain that they base their actions, dispositions and plans upon the

appreciation of the enemy capabilities rather than upon the appreciation of enemy‘s intentions. An appreciation

of the enemy capabilities can be objectively formulated because it is based upon the knowledge of enemy

strength, disposition, activities, organisations and morale. But the enemy intentions can seldom be determined

easily. The enemy commanders may change their orders. Furthermore the enemy may promulgate false orders

and rumours which in themselves would indicate an action different from that which he actually intends. The

enemy may also take measures to give false information for him to do this than to spread false information about

his intentions.

The Initial Planning Process

1312. Intelligence specialists analyse information and communicate findings which satisfies the requestor‘s

needs. The analyst must use his time and resources well to determine followings :

a. What ? What is the task? Whether this task be redefined to be made more clear? Am I answering

the underlying question ?

b. When ? When must the project be completed? Will all the milestones, from intelligence

collection and production through distribution, be completed in time ? Is there sufficient time for

thorough analysis ?

c. How ? What collection and analytical methodologies are appropriate to this project ?

d. To Whom ? Who is the ultimate consumer ? What are the appropriate methods for

discriminating or communicating this information ?

1313. The analyst‘s challenge is to reach a net assessment of the military situation– that is, simultaneously to

consider the capabilities and intentions of both the enemy and own forces. Net assessments force the intelligence

officer to view the situation differently than do operations officers.

Hypothesis Generation

1314. Intelligence officers analyse a military problem by separating the whole into its component parts and

they do this for both enemy and friendly forces. Armed with heaps of data about an enemy military force,

intelligence officers must now answer the consumer‘s question. Complex problems rarely have simple answer,

nor can one rely on a single information source. Yet, one must conceive or sometimes guess at the correct

answer. Hypotheses are possible answers to a question. Implicitly or explicitly, intelligence analysts make use of

hypotheses.

1315. An important difference between intelligence analysis and operational analysis is that the intelligence

analyst must ―role play‖, that is, think like the enemy. Optimally, you must know enough about enemy military

operations to empathise with the enemy‘s situation to the degree that you can think like the enemy commander.

At a minimum, however, you need to broadly understand military operations, as well as understand the political,

economic, geographic and demographic issues involved, for both friendly and enemy forces.

1316. Intelligence analysts use at least two hypotheses: viz the most likely course of actions by the enemy

and the most dangerous action the enemy could take. Both of these hypothesis estimate the military result (or net

assessment) of these hypothetical enemy actions. Two hypotheses are a minimum because; fundamental

intelligence errors result from the failure to hypothesise all possible enemy courses of action.

Other Steps of Analytical Process

1317. Gathering and Listing Evidence. Most strategic analysts love data, and are most conscious about

gathering evidence. Bias can distort the selection of evidence. They should be sure to collect information that

may be pertinent to the least likely hypothesis.

1318. Prepare the Evidence/Hypotheses Matrix. At a minimum, contrast at least two hypothesis, viz what

the enemy prefers to do and what the enemy must do.

1319. Refine the Matrix. Refinement requires removal of evidence with diagnostic value. Additionally,

here one may employ additional techniques, such as mathematical analysis and comparison with base rate data.

1320. Draw Tentative Conclusions. Let truth, rather than personal preference, be the guide at all times.

1321. Sensitivity Analysis. Strategic intelligence typically relies on huge sources of data which makes

sensitivity analysis singularly important. Moreover, not all sources are of equal significance.

1322. Report Conclusions. The strategic planner must receive intelligence reports on time and in a usable

form. Intelligence improperly communicated is worthless.

1323. Identify Milestones. You must communicate your judgments and identity those factors that could

cause you to alter your judgment.

OPERATIONAL AND TACTICAL CAPABILITY ANALYSIS

General

1324. Commanders base their plans and actions on the enemy's operational and tactical capabilities and the

probability of their adoption. Enemy capabilities can be appeared objectively because these are based on

knowledge of the area of operations, the enemy's time and space factors and others pattern of deployment .The

enemy may practice cover and deception to indicate actions different from those which he actually intends. In

considering enemy capabilities actions which are generally disadvantageous to the enemy or unreasonable are

not included. For example, the enemy may be physically capable of disengaging troops committed outside our

area in order to employ them against us. However, in most circumstances the intelligence staff does not consider

this to be a capability which is unreasonable.

1325. Definition Military capabilities at operational and tactical level are those courses of action of which

the enemy is physically capable and which if adoptable will effect the accomplishment of our operational and

tactical mission. The enemy capabilities must fulfil the following requirements :

a. Time and Space. The enemy must be physically capable of adopting the particular course of

action within time and space dimensions.

b. Own Mission. The course of action if adopted must effect the accomplishment of our mission.

1326. Meaning of Effects. It is readily understood that all possible enemy courses of action that might

interfere with the accomplishment of the mission are of interest to the commander. Their considerations in

conjunction with other factors assist greatly in making correct plans and decision. However, in some instance

the enemy courses of action that would actually favour the accomplishment of our mission may prepare the

commander to take advantage of a weakness developing in the enemy situation. This may enable him to save his

men, time and material. He may also be able to gain a more favourable position from which to continue the

action against the enemy. The enemy capabilities may have an important bearing on our action. Therefore,

enemy capability that favours the accomplishment of our mission must not be overlooked.

Determination of Enemy Capabilities

1327. General. The statement of enemy capabilities must provide the answers to what, where, in what

strength and when. In dealing with the capabilities to attack or defend, reinforced are invariably expressed.

When concerned with the delay and withdrawal capabilities the what strength and 'when' are often omitted

which implies that the operation can be executed with the entire command at any time in reference to the air

capabilities. Omission of when implies that it can be excited at any time. The factors for the determination of

enemy capabilities are discussed subsequently.

1328. What. It implies followings :

a. Courses of Action. Here we discuss what general types of tactical courses of action are usually

possible. The enemy can attack, defend reinforce or execute a retrograde movement. These operations

are usually drivable into a variety of specific courses of action. Example of an attack may be a

penetration, envelopment, turning movement or pursuit. A defence may be in one position or in

successive positions either static or mobile.

b Specific Action. The specific actions which the enemy can physically adopt depend upon the

available means and conditions under which those means can be used. Consequently the ‗what‘ of each

of the enemy capabilities determined by the characteristic of the area of operation, the order of battle of

the opposing forces and time and space factors. Characteristics of the area of operations, friendly

situation and means available to the enemy usually indicate that the enemy is physically capable of

certain actions. For example, the enemy can envelop only when we have a physically not capable flank.

He can conduct airborne operation only when he has the necessary troops and aircrafts.

1329. When. The determination of the ‗when‘ of any enemy capability implies :

a. Time. Here time means the time required for the enemy to employ his combat power. This

capability depends upon the disposition of his forces and equipment. Forces deployed near the

operational area may be committed without significant delay. Considerable time may be required to

commit other resources.

b. Displacement of Forces. An enemy capability involving displacement of forces cannot be put

into effect until sometime after the force has started to move. Reserves cannot reinforce an attack or

defence until they have been moved to appropriate locations such as attack position or forward

assembly areas.

1330. Where. It designates the point or area of the possible activity of the enemy. This is determined from

three factors i.e. the areas of operations including terrain and weather. Enemy dispositions and own dispositions.

Exception arises in the case of reinforcement or withdrawal. In reinforcement ―what― is some logically chosen

point where reserves must reach in order to reinforce the enemy or to affect our mission. The factors in

determining the possible area of activity are :

a. Climate and Weather. Under the existing and predictable conditions of weather, the terrain may

provide approaches or avoidable routes of entry into our position from the flank. Two certain type

terrains possibly in conjunction with weather may have effect on certain type of enemy action e.g. an

armoured attack or motorised cross country movement. If sub divisions of the terrain are made then

each sub division of the terrain in conjunction with a specific course of action will be covered. The

number of areas of tactical significance selected must not be so great that the enemy capabilities

become confusing.

b. Enemy Disposition. Known enemy dispositions may emphasise certain areas even though such

emphasis may violate logical ground sub divisions. The direction point of an attack and the location of

a defensive position might be indicated from the enemy disposition.

1331. In What Strength. It implies followings :

a. Order of Battle. The strength the enemy can use in any particular capability depends primarily

upon the composition, disposition and strength of his available forces. Order of battle intelligence

furnishes these data. Detailed of the order of Battle is discussed separately.

b. Employment of Forces. The forces which the enemy has committed against friendly units can be

chosen to adopt. If six brigades are committed against a division, the enemy can attack with brigades

supported by all available artillery and air. He also can defend in his present position with the same six

brigades and the same support. In addition to the forces committed the enemy also can use the reserves

available at any echelon. If the enemy has six brigades committed and a brigade in reserve he usually

can reinforce either his attack or his defence with the reserve brigade. A partial statement of this

capability could be ―attack now to envelop our north flank with six brigades supported by all available

artillery and air, reinforced by one brigade at the following times and places‖.

Statement of Enemy Capabilities

1332. This is where we list those courses of action of which the enemy is physically capable and which, if

adopted, will affect the accomplishment of our mission. This paragraph contains intelligence vital to the

commander and his staff in determining friendly courses of action. Here we discuss what the enemy can do, will

not do to have a negative impact on our mission. Both general and specific capabilities are addressed. General

capabilities are listed using the time-tested acronym DRAW-DS‖ as a guide.

a. Defend

b. Reinforce.

c. Attack

d. Withdraw.

e. Delay

f. Support (optional).

1333. When a general capability is assumed, the estimate will then address specific capability. For example,

when it is assumed that the enemy will attack, the estimate will list viable capabilities for conducting that attack.

The viable specific capabilities will answer the question, like what the enemy is physically capable of doing ,

when he can execute the action, where he can carry it out and in what strength he can do it. An example of a

specific capability statement is given below :

Delay now along successive positions to prepare defensive strongpoint on the high ground north and northeast

of objective A with four mechanized battalions reinforced with artillery and attack helicopters.

1334. We addressed what the enemy can do, now we will state our analysis of what he will do, in the same

sequence as they are listed in paragraph above. The analysis is conducted with an eye toward determining the

enemy commander‘s most probable course of action. Using the under mentioned figures (or something similar

to it) as a guide, each capability is dissected on the points of indications, advantages/disadvantages to the enemy

and the effect on our mission :

Capabilities Indications Advantages to

Enemy

Disadvantages to

Enemy

Effect on our

Mission

Attack

Defend

Delay

Withdraw

Reinforce

Support

Facilitate

Delay

Jeopardise

Deny

1335 – 1400. Reserved.

SECTION - 14

COMBAT EFFECTIVENESS ANALYSIS OF ENEMY STRENGTH

General

1401. Enemy strength undergoes a continuous fluctuation between authorised strengths and varying levels of

force, unit, equipment and personnel strengths during the course of a battle, campaign or war. These fluctuations

are a result of unit, personnel and equipment losses and the enemy‘s ability or inability to provide suitable

replacements quickly and consistently. Enemy strength computations provide a method for estimating the level

of combat effectiveness of enemy forces. It is computed in terms of committed forces, reinforcing and

supporting units and the number of nuclear weapons and chemical and biological delivery systems suspected or

identified as being deployed within the friendly commander‘s Area of Operation or Area of Interest.

1402. Based on the analyst‘s knowledge of enemy doctrine, order of battle and current information and

intelligence on enemy disposition, locations, and capabilities, the numbers of committed, reinforcing and

supporting forces are computed. Once these enemy forces are determined individual enemy units can be

identified or located and enemy strength computed. Personnel and equipment strengths are based upon reported

enemy personnel and equipment losses and known or estimated rates of replacement.

Definitions

1403. Numerical Strength. It is the expression of unit or force in terms of numbers or personnel, weapons

and equipment.

1404. Initial Strength. It is the strength of an enemy unit or force which comprises of the number of

personnel, weapons and equipment authorised by established and approved tables of organisation and equipment

(TO&E).

1405. Effective Strength. It is the strength of an enemy unit or forces which consists of that part including

logistics components of its initial strength of combat complement. It is the strength minus losses plus

reinforcement/ replacement.

1406. Strength by Type of Unit. It is the expression of units or forces in terms of numbers of units by type

such as infantry, amour, artillery and air.

1407. Committed Force. Committed forces are those enemy ground units, currently in contact or with

which imminent contact is expected, whose area of employment is not expected to change to counter the

specific course of action selected by the friendly commander. Committed forces may change disposition within

their area of employment but no significant delay is involved in their employment. Designation of enemy forces

as committed forces primarily depends upon their disposition, location at the time of the estimate, the echelon at

which the estimate is being prepared and enemy doctrine. Committed forces are located, unallocated, identified

or unidentified units.

1408. Reinforcement. Reinforcements are those enemy forces whose area of possible employment against

the friendly force depends on the friendly selection of a specific course of action and on enemy capabilities.

Reinforcements include all known enemy forces which are neither committed against a friendly force nor

committed outside the friendly zone or sector but which reasonably are considered capable of closing with the

friendly force in time to affect the accomplishment of the mission.

Computation of Enemy Strength

1409. Ingredients. Enemy strength is computed in terms of committed forces, reinforcement, air, nuclear

weapons, chemical and biological warfare capabilities. Since doctrinal differences allow for the holding of

specific units in a reserve and reinforcement role it is extremely important to study the enemy‘s doctrine prior to

computing strength. Enemy strength is normally presented in terms of numerical strength by type of unit.

Nuclear weapons capabilities are expressed in terms of weapons delivery systems and yields. Chemical and

biological capabilities are expressed in terms of the type, persistency, lethality and delivery systems.

1410. Circumstances. Prior to and at the onset of hostility, effective strength is compiled from intelligence

appreciations based on the martial strength and such circumstances are :

a. Degree of Initial Strength. The degree to which the enemy unit is up to initial strength at that

time.

b. Standing Force. Whether the enemy maintained large standing forces before the outbreak of

hostilities ?

c. Warning. Whether any warning of war was issued or would be received ?

d. Preparation. Whether the preparation for war was done because it was premeditated ?

e. Other Commitment. Whether the enemy was to or would be committed in other theatres ?

f. Movement. Movement facilities and means of communication be adequate of land, air and sea

facilities.

1411. Basic Consideration. Following basic considerations are made :

a. Appreciation. A consideration of the previous appreciations (if any) of effective strength as well

as more recent reliable intelligence is made.

b. Casualties Estimate. The incidence of casualties, reinforcements and replacements can be

estimated based on standard procedures.

1412. Elementary Method. The calculations which are to be expressed as percentages of the initial strength

are computed as under :

a. Attrition Rate. A percentage attrition rate is deducted from the initial strength when experience

has enabled this to be established for the circumstances. This rate is based on those men, weapons and

equipment which are temporarily not available to a unit for reasons other than battle casualties or

losses.

b. Subtractions/Additions. These are made in the light of reliable intelligence. Any items having

only a temporary significance should have their time lapse noted on the estimate. The following should

be physically counted where possible :

(1) Personnel. Killed in action, Prisoners of war and Wounded in action /non effectives.

(2) Weapons and Equipment. Destroyed, Captured and Damaged requiring base repair.

c. Reinforcements. Reinforcement of personnel and replacement of weapons and equipment is then

added in accordance with the strength estimated or the strength justified by reliable intelligence, where

this is different. In the absence of other guidance and where the enemy has secure lines of

communication to the main base, it is assumed that personnel reinforcement can be completed within

maximum 72 hours. Small weapons and light equipment can be replaced within 12 hours and other

weapons and equipment can be replaced within 72 hours.

Computation of Strength by Type - Uncommitted Troops

1413. Importance of Estimation by Types of Units. The commander and the operation officer use the

information the intelligence officer provides on enemy committed forces and reinforcements for planning and

conducting tactical operations. Accurate information is particularly important during the commander‘s analysis

of opposing courses of action. For example, in planning for an attack, an overestimation of committed enemy

forces and an underestimation of enemy reinforcements could cause the friendly commander to attack with a

small reserve. The intelligence officer‘s error in computing committed and reinforcing forces could allow the

enemy to counterattack with an unexpectedly strong force, inflicting unacceptable casualties upon the friendly

force.

1414. Committed Number of Units. The Designation of enemy units as committed forces depends

primarily on their disposition and location at the time the appreciation is made. Enemy unit identification may

facilitate in determining if a particular unit is the reserve of the elements in contact with the brigade or battalion.

Strength by type of unit includes the total number of enemy units listed by category and type. Normally,

intelligence staff account for enemy units down to and including two echelons below their own level of

command. For example, Intelligence staff at division level would express enemy strength at battalion level.

1415. Contact with Adjacent Units. When an enemy unit of the size used is accounted for committed

forces is in contact with two adjacent friendly units, the entire enemy unit is considered to be the committed

force by the intelligence staff of both the formations. For example, if an enemy battalion is in contact with the

elements of two adjacent divisions, the intelligence staff of both the divisions will consider the entire battalion

as committed against their respective divisions. It points out the need for correct identification and accurate

strength computation at each echelon.

1416. Protective Detachments. When enumerating enemy forces, enemy protective detachments forward

of the main defensive position are normally considered reinforcements of the main defensive position until

contact with that protective detachments is made. The intelligence staff must correctly identify the enemy‘s

main defensive position and must not be deceived by protective detachments. The protective detachments will

normally become reinforcements for the main defence after completing their mission.

1417. Fire Support. All ground fire support weapons organic to the enemy units are usually referred to as

normal artillery and are always considered to be in support of committed forces. That is, each committed unit is

assumed to have available to its normal proportion of the available supporting weapons organic to the regiment.

These weapons, therefore, need not to be enumerated unless desired. Fire support weapons not organic to enemy

battalions or brigades, which are identified as within supporting range are enumerated as if in support of

committed forces. In the event that the forces committed against the brigade or battalion have on known TO&E

(that is, volunteer or irregular-type units), all fire support weapons which are identified are enumerated.

1418. Level to Count. Strength by type of unit includes the total number of enemy units listed by category

and type. Normally, enemy units are counted down to and including two echelons below the friendly force‘s

level of command. Some special purpose units may also be counted for three echelons below :

a. At Higher Level. Usually, an intelligence officer accounts for committed enemy forces by the

size of the enemy unit which is opposing the friendly elements. At the most basic level, state the actual

number of weapons systems. Against an enemy army corps, a division Intelligence Staff usually counts

committed forces in terms of battalions and at corps level in terms of brigade. All Fire Support weapon

systems available including tanks, infantry fighting vehicles (IFVS), and artillery also are listed and

expressed in terms of total numbers.

b. The Brigade Level. He considers as committed forces the first and second echelon companies of

enemy mechanised, tank or reconnaissance battalions in contact with the brigade. Although the enemy

company is the basic sized unit used by the brigade in accounting for committed forces, the staff also

accounts for smaller units which have been located as separately employed.

c. The Battalion Level. He considers as committed forces the first and second echelon platoons of

the enemy mechanised, tank or reconnaissance companies in contact with the battalion. Although the

enemy platoon is the basic unit used by the battalion staff in accounting for committed forces, available

intelligence frequently does not enable the individual platoons composing the enemy company to be

located. Therefore, the battalion staff considers that a located enemy company normally consists of

three platoons composing (-) consists of two platoons.

1419. When 3rd Unit Not Known. When only two elements of a unit are located, they are counted as they

appear. By templating, it is possible to determine the approximate location of the third element. Although this

unit should not be counted, the commander is advised as to its possible location. An exception to this rule

occurs, however, in situations where enemy doctrine normally precludes elements of unit operating

independently of each other. For example, if a brigade staff detects the presence of one mechanised company of

Wolf Land, then the remaining elements of the mechanised are counted as committed but unallocated, enemy

forces. This is because Wolf Land doctrine normally precludes the mechanised companies of a mechanised

battalion from operating independently of each other.

Computing Enemy Reinforcement / Uncommitted Forces

1420. General. All uncommitted enemy forces are considered as reinforcements if they are committed in

time to affect the accomplishment of the mission. If there is doubt as to whether an enemy unit is committed or

reinforcing, it is considered as reinforcement. This reduces the risk of surprise.

1421. How to Count. Reinforcements are stated conveniently and meaningfully. For example, if the

opposing division has a mechanised force in reserve, this reinforcement is referred to as a mechanised force in

actual size. When enemy units either committed forces or reinforcements are very much under strength, the

estimated remaining strength is expressed. Two divisions, each at half strength, are usually more formidable

than a single division at full strength because of the added flexibility of employment and the additional combat

support probably available. A half strength field artillery battalion is more than half as effective as a full strength

battalion. Factors derived from analysis of past similar enemy movements determine the time required for an

enemy to move troops from one place to another and commit them. The considerations described in subsequent

paragraphs are applicable in training and as a point of departure for the development of experience factors in

operations against an enemy force.

1422. Time Calculation. To determine the time when the enemy employ an uncommitted unit, the travel

time from the unit location to a logical point where the unit can be committed is calculated. To the travel time,

add the closing time (pass time of a column). Except when observation of enemy units is continuous, it is

assumed that any unit could have started to move immediately after its last reported location. Therefore, to

determine the earliest time at which the enemy can reinforce, add the travel plus closing time to the time last

observed. For example, if an enemy reinforcement was last observed at 0800 hours, and it can deploy to envelop

the northern flank in one hour, it is assumed that the attack can be launched as early as 0900 hours (0800 plus

one hour). In the exceptional case involving piecemeal commitment of enemy reinforcements, consider only

travel time. Forces which are committed piecemeal do not close into an assembly area or attack position.

1423. Start and Completion Time. Because observation of reinforcements is rarely continuous, statements

of enemy reinforcing capabilities should include both the earliest time and that time after starting movement

when the reinforcement is accomplished. For example, ‗the enemy reinforces the attack with the 45th

Mechanised Brigade at 0900 hours or one hour after starting movement. ―When the time since the last report is

greater than the time after starting movement, only the time after starting movement is given. For example, ―the

enemy reinforces the attack with the 45th

Mechanised Brigade now or one hour after starting movement. ― When

the number of reinforcements is large or the enemy is capable of reinforcing in several areas, reinforcing

capabilities are presented in tabular form. Table given below is an example of this. It shows the enemy

reinforcing the attack or defence with all or part of the following units at the places and times indicated :

EXAMPLES OF ESTIMATION REINFORCEMENTS

UNIT PLACE MECHANISED FOOT REMARKS

45th

Mechanised

Brigade

Square 6382 Now or 1 hr after

starting.

091205 Jun or

4 hr 5 min starting

movement

Square 8884 090930 Jun or 1 hr

30 min after starting

movement.

091605 Jun or

4 hr 5 min after

starting movement

37th

Mechanised

Brigade

Square 6382 090800 Jun or

2 hr after starting

movement

090730 Jun or

23 hr 40 min after

starting movement

Square 8884 090920 Jun 1 hr

20 min after starting

movement

091430 Jun or

7 hr after starting

movement

1424. Location. In selecting a logical point for reinforcement, consider the effects of Area of Operation

characteristics, such as Avenue of Approach. For reinforcement of an attack capability, select locations for

commitment of second echelon and reserve forces for enemy battalions and regiments and forward assembly

areas for enemy divisions and larger units. For enemy units moving to reinforce a defence, select defence or

counterattack positions. For movements by aircraft, select logical Landing Zones and Drop Zones from which

the enemy forces can materially affect the accomplishment of the mission.

1425. Simultaneous Work. The time required by the enemy to issue extra ammunition, make detailed

reconnaissance, issue orders, and deploy to a line of departure is not normally considered because all these

actions are completed before starting the operation or simultaneously with movement.

1426. Guidance. The following guidance's are applicable until you develop experience factors against a

particular enemy :

a. Compute foot marching time for all appropriate reinforcements. Compute motor movement time

only for distances greater than 10 kilometres (6 miles). If a unit is observed in trucks, compute only the

motor movement time.

b. Consider a foot march of more than 32 kilometres (20 miles) as a forced march. Consider a motor

movement of more than 280 kilometres (175 miles) as a forced march for mechanised units and a

movement of more than 224 kilometres (140 miles) as a forced march for tank units.

c. Compute closing time at the night rate of march if a column begins to close before the night

closing time: if a column begins to close at or shortly after sunset, use the day rate of march. If a

column begins to close before the sunset use the day rate of march: if a column begins to close at or

shortly after sunrise, use the night rate of March.

d. Move and close the entire unit to move an enemy infantry battalion. To move unit of brigade or

larger size, move and close two-thirds of the combat elements; that is, two battalions of an infantry

brigade, two brigades of an infantry division, etc.

1427. How to Express. Expressing strength in number of units, by type, within an enemy force is stressed

because it is a simple, reliable and readily understood method of computing enemy strength. At the same time,

the order of battle analyst can not ignore individual unit strength computations. This is particularly important in

arriving at a true picture of the enemy‘s strength.

Effectiveness Rating

1428. Form of Expression. Resultant calculations are expressed as percentage of TO&E strength where

possible. However, numerical expression may be necessary to present a better understanding of the fighting

capability of a force and to provide a commander with a basis for comparison.

1429. Conventional Warfare. The ratings given below do not take into account unit leadership and morale

which are both important factors in determining a unit combat effectiveness. Generally, however, the higher

ratings imply good leadership and morale both in peace time and after initiation of hostilities. The two lower

ratings may reflect a poor leadership and morale but may also reflect either a unit build up or after repeated

engagements in wartime, obvious combat ineffectiveness due to losses. Following ratings are normally used :

a. Combat Effective (C-I). Any unit or force at 80 to 100% TO&E strength in a high state of

training.

b. Marginally Combat Effective (C-2). Any unit or force at 70 to 80% TO&E strength in an

acceptable state of training.

c. Limited Combat Effective (C-3). Any unit or force at 50 to 70% TO&E strength in an only

partially trained state.

d. Non Effective (C-4). Any unit or force below 50% TO&E strength and seriously lacking in

training.

1430. Nuclear- Capability Rating. Estimates of enemy Nuclear, Biological and Chemical (NBC)

capabilities usually are prepared at field army and higher headquarters. Units below field army level usually lack

the means to gather the information to make such estimates. They use the estimates of the higher headquarters

and modify them with available information. The determination of enemy NBC operation capabilities is

primarily based on estimates of numbers and types of weapons and amount and types of agents available,

knowledge of enemy doctrine, past experience and estimates of enemy capabilities involving the employment of

ground troops. It is rarely possible to estimate what portion of the available enemy NBC effort may be used

against a division or corps within a field army or a command in the communication zone. It is also rarely

possible to estimate the number of nuclear weapons the enemy is capable of using within period as short as one

day. The period selected is a month or longer, depending on the available information and past experience. The

statement of the enemy‘s capability of using chemical and biological agents includes the amount, type and

delivery means of available agents. This rating scheme may be expanded to include delivery capability. The

ratings are as under :

a. N-I. Possesses strategic and tactical nuclear weapons.

b. N-2. Possesses tactical nuclear weapons.

c. N-3. Maintains a nuclear weapons development capability but is not believed to posses

nucleate weapons.

d. N-4. Unit is nuclear non capable and is not a nuclear threat.

1431. Combined Ratings. By combining the above system, a total rating of unit capability can be achieved

i.e. C-1 N-1 etc. This system provides the analyst with an additional tool in determining strength in terms of

combat readiness and capability by consideration of effective strength, training, morale, leadership and nuclear

capability. As automatic data processing systems come into use as intelligence data handling means, this rating

system will lend itself readily to computerisation.

1432. Strength Comparison. Expressing strength in terms of number of units by type within an enemy force

is stressed because it is simple, reliable and a readily understood method of computing enemy strength. At the

same time, the intelligence staff cannot ignore individual unit strength computations. This is particularly

important in arriving at a true picture of the enemy‘s strength compared to friendly forces. The enemy may have

eight battalions of infantry in a given area and only five friendly battalions may be located in the same area.

However, because of differences in organisation, the total friendly strength may exceed that of the enemy force.

Conclusion

1433. Ancient military thinker Sun Tzu suggested conducting accurate estimate of enemy capabilities. He

even suggested that it might even lead to victory in hundred battles. Now it is the intelligence staff who is

responsible to conduct accurate computation to determine relative combat effectiveness of enemy formation.

This when done very religiously is likely to open avenue before commander to exploit a fluid situation which

otherwise he would over look.

1434 – 1500. Reserved.

SECTION - 15

RECONNAISSANCE AND SURVEILLANCE

General

1501. Surveillance is the systematic observation of aerospace, surface or subsurface area, place, persons or

this by visual aerial, electronic, photographic or other means. Surveillance is normally used to gain information

on the subject over a long period of time to note any changes that may take place. Because of the

interrelationship reconnaissance and surveillance, the same assets used to execute reconnaissance missions may

also be used for surveillance tasks.

1502. Reconnaissance is undertaken to obtain by visual observation or other detection method, information

about the activities and resources of an enemy or potential enemy or to obtain data concerning the

meteorological, hydrographical or geographic characteristics of a particular area. Reconnaissance is a directed

effort to obtain information on a subject at a particular time.

Planning Reconnaissance and Surveillance

1503. Planning for surveillance operations is conducted after determining the general mission of the tactical

force. Surveillance mission are often developed as a joint effort involving all of the intelligence organisations

having an interest in the same area of operations. This is due to the limited availability of surveillance systems

and the large number of overlapping requests that could be generated in a joint or combined operation.

1504. A reconnaissance mission seeks to obtain information by visual or other detection means and is

characterised by limitations of coverage to one or more specific target areas at a particular time without the

requirement for systematic coverage. Reconnaissance missions are conducted by human intelligence, imagery

intelligence and signal intelligence resources and are designed to:

a. Collect specific, detailed information at a particular location and time.

b. Support current or planned operations.

1505. Most reconnaissance requests are planned before the operation. However, once operations begin many

reconnaissance requests will be immediate. The time constraints of the typical reconnaissance request will not

allow for elaborate planning or coordination. A request that would be classified as a requirement for a

reconnaissance mission might be for urgent photographic coverage of a proposed helicopter landing some zone

distance beyond the forward defended locality.

1506. Valid justification is particularly important for immediate surveillance or reconnaissance requests. This

is critical because national systems may be required to collect the information. Such systems are in high demand

and the restructuring of programmed national collection plans requires adequate justification.

1507. Requests for support from national systems cannot be so easily categorised as pre-planned or

immediate or as surveillance or reconnaissance. This is , in part, because of the many national agencies involved

and the diverse missions and performance characteristics of individual collection resources. In the case of the

national imagery intelligence, the collection manager must be familiar with the mission, the commander‘s

intention, the operational plan, and the Imagery Reconnaissance Directives list associated with the area of

interest.

1508. The inter service (also national) signal intelligence system also operates against long-term and standing

requirements. In the case of signal intelligence the tactics commander‘s crisis or combat requests will be termed

time sensitive and handled expeditiously. Requests for national human intelligence support ultimately go

through Armed Forces Division and Directorate General of Forces Intelligence coordination procedures have

been completed.

1509. It is essential to gather information in the field for accomplishment of the mission by the commander.

The process of collection of information is under taken by the elements of the army and they are given the

specific tasks. During the operations, reconnaissance is one of the primary means of obtaining information vital

to the intelligence effort. Superiority of the reconnaissance may prove the deciding factor in an obscure situation

by providing the commander such information that is necessary to make sound decisions. The reconnaissance

elements must, therefore, carry out their assigned missions diligently.

1510. Reconnaissance is a directed effort in the field to collect information about the terrain and enemy or

resources undertaken by an appropriate element of the armed forces. Battle reconnaissance it is the directed

effort by individuals and small patrols to gather information of the immediate battlefield area. Every fighting

unit executes battle reconnaissance for itself.

Type of Reconnaissance

1511. Close Reconnaissance. It is the collection of information of the area of current operations. It furnishes

the commander with information upon which he can base his tactical plan. Close reconnaissance may consist of

mounted or dismounted patrolling. In the armoured formation, this is carried out by the reconnaissance troops or

medium tanks of the armoured regiments. In the infantry formation, this is the primary role of the division

support battalions.

1512. Medium Reconnaissance. It is the collection of information in an area which is beyond the reach of

the normal reconnaissance elements of a division and beyond the range of the supporting artillery. In the

armoured division it is performed by the divisional reconnaissance regiment and in infantry divisions by

elements of corps reconnaissance regiment if available or the division support battalions.

1513. Deep Reconnaissance. It is the exploration of objectives deep in the enemy territory and the air force

is assigned with this task. It could be entrusted to commando battalion under certain circumstances.

1514. Armed Reconnaissance. It is of two types:

a. Ground. An offensive mission conducted to search for an attack target of opportunity in a

designated area or along designated routes.

b. Air. An air mission flown with the primary task of locating and attacking opportunity targets in

assigned general areas or along assigned routes and not for the purpose of attacking specific target.

1515. Reconnaissance by Fire. A method of reconnaissance in which fire is placed on a suspected enemy

position to cause the enemy to disclose his presence by movement or return of fire.

1516. Reconnaissance in Force. It is an attack to discover and test the enemy's position and strength.

Though its primary aim is reconnaissance, it may discover weaknesses in the enemy dispositions, which could

promptly be exploited.

1517. Air Reconnaissance. It is the acquisition of the information by aircraft. It may be either photo or

visual.

Principle for Reconnaissance

1518. Aim. The aim of the reconnaissance must be understood and remembered throughout. In the multitude

of information that becomes available during the reconnaissance, the aim should not be confused or lost sight of.

1519. Gaining and Maintaining Contact. Gain contact as soon as possible and maintain it throughout the

operations. The information about the location, strength and movement of the enemy troops must be gained at

the earliest practicable moment. Contact with the enemy, once gained, must be continuously maintained. Nearer

to the enemy, the more intensive is the reconnaissance. The ground reconnaissance elements gain and maintain

contact with the enemy by working through the gaps, around the flanks and the rear. They endeavour to

ascertain the strength, movements, composition and dispositions of the enemy's force and the approach of the

enemy reinforcements. The air force and army aviation aircraft may be employed to supplement the execution of

reconnaissance by the ground units with due regard to their vulnerability to the enemy action.

1520. Early Reporting with all Details. Much of the information has significance that may not be readily

apparent at the time of its collection or to the individual collecting it. All items of information must be reported.

It is important to receive negative information in order to know what the enemy is not doing or where he is not

at a given time. The information helps in determining the enemy capabilities and his probable courses of action.

Small bits of seemingly irrelevant or unimportant information may be the key to the entire picture in higher

headquarters. No information should be over looked or cast aside.

1521. Movement and Observation. It is neither possible to maintain contact with the moving enemy by

staying in one place nor can maximum information be obtained if the reconnaissance is confined to canalised

routes only. Reconnaissance agencies must freely move about in the area in order to keep pace with the activity

of the enemy and holding him under constant observation.

1522. Fighting for Information. Fight only either when it is desired to force the enemy to reveal his

position or when the mission requires it. It is costly both in time and manpower for a reconnaissance agency to

engage in a fight. Fighting should be resorted to only when necessary to save the reconnaissance forces from

annihilation/capture or when the mission requires that the enemy be forced to reveal his dispositions through

fighting. Normally, reconnaissance should be conducted by stealth. Patrols that engage in useless fighting delay

the return of information to their commanders and often reveal their own dispositions. Reconnaissance activity

if known to the enemy, may reveal the intentions of the own commander.

1523. Reporting in Time. Report information in time to be of value. The most valuable information may be

utterly worthless if received too late. Planning and executing an operation requires a certain minimum time. The

reconnaissance agency must, therefore, return the information to the commander in time for him to make his

decision. There may appear to be conflict between this principle and that of reconnaissance by stealth or that of

avoiding battle with the enemy, however, the principle of time is paramount.

1524. Planning Reconnaissance. Reconnaissance must be planned well, otherwise time will be wasted, the

information will be staled and the required information will not be obtained.

1525. Determination of Mission. The intelligence staff must prepare suitable mission in order to obtain the

desired information. Missions are usually derived from the collection plan. In determining any mission, the

following must be borne in mind :

a. Capabilities and Limitations of Agency. Missions must be assigned according to the

capabilities and limitations of the agency employed.

b. Specific Mission. There should be no doubt as to the type of information desired, therefore, the

mission must be specific. The assignment of a vague reconnaissance mission will result in vague and

unsatisfactory information. Broad generalisation such as, report strength and dispositions of the enemy

should be avoided. Furthermore, the specific time by which the information is desired should be clearly

stated.

c. Priority. It is quite likely that more than one reconnaissance mission may be assigned to any one

agency at a given time. Such situations should be avoided. However, in the event of such a case, there

must be a definite priority assigned to these missions. This priority is determined by the importance of

the information sought and the time by which it is desired. By indicating the priorities, the intelligence

staff ensures proper attention to the most important missions.

d. Co-ordination. In order to avoid needless duplication of effort and the possibility of battle

between friendly units particularly at night, all reconnaissance missions are co-ordinated through the

intelligence staff. This does not present many difficulties in as much as; there should be an overall

reconnaissance scheme and close liaison among the intelligence staff at various echelons as well as

with the operational staff.

e. Vital Task. In preparing and assigning the reconnaissance missions, the bulk of agencies should

be assigned to the vital tasks. It is not desirable to spread the available agencies thinly over a wide area

on a series of missions. The critical mission should be selected and concentrated upon, until it is

satisfactorily completed. This does not imply that all other missions should be neglected for a single

task. However, a reasonable concentration of a majority of the agencies on the important missions will

achieve better results in a shorter time without prejudicing the necessary coverage.

f. Reserve. It is a good practice to keep a few agencies in reserve for entrusting them with some

unforeseen assignments.

Battlefield Surveillance

1526. To make the best use of our limited resources it is essential that we gain sufficient information to allow

the intelligence staff to determine the enemy‘s dispositions, capabilities and intentions and to do so in a manner

that will allow us sufficient time to react. This information will come from our reconnaissance and surveillance

systems but much will still come from other sources, including contact reports from our troops either observing

or fighting the enemy. The introduction of radars, remotely piloted vehicles (RPV), night fighting and other

ground surveillance devices has or will greatly increase the real time information available to commanders and

staffs. We must learn how to manage this information for it to be useful. The aim of this chapter is to explain the

battlefield surveillance and target acquisition (STA) systems now in use in Bangladesh Army.

1527. Battlefield Surveillance is the continuous, all weather, day and night systematic observation of the

battle area to provide timely information. It involves a mission to obtain, by visual observation or other

detection methods, information about the activities and resources of an enemy or potential enemy or to produce

data covering the meteorological conditions or the terrain in a particular area.

1528. The watch must be continuous and must be effective by day and night, in all weather (rain, fog, haze,

mist, cloud etc) and when battlefield obscurity is present (smoke, dust etc). This requirement dictates the types

of systems and sensors to be used. The watch must also be systematic, covering the whole area in a manner that

allows regular updating of information.

1529. Finally information must be obtained in sufficient time to allow us to react. It may take a lot of time to

interpret the information acquired, to assess it and from this formulate plans, issue orders and carry out

deployments. This requirement for timely information dictates the response times for systems and can also

determine the range at which they must be effective.

1530. With the many resources these are available, careful co ordination and tasking are of vital importance,

as is the recording and storing of the mass of information that they will produce. In doing this intelligence staffs

must keep in mind the following :

a. The sources available to each agency including those of other formations.

b. The capability and limitations of each source.

c. The need to provide full and continuous cover in depth for the battle area.

d. The need to be able to store and rapidly retrieve the information produced.

1531. The need for forward planning combined with clear and accurate tasking of the appropriate agency

cannot be under stressed and serves to emphasis the need for all staffs to be aware of the capabilities of the

available assets within specific time frames.

Counter Reconnaissance

1532. General. Counter reconnaissance and surveillance includes all measures taken to prevent hostile

observation of a force, area or place. One method is to seek out and destroy enemy reconnaissance elements and

other are to deny the enemy access to certain areas. In both cases, counter reconnaissance becomes more

difficult as the dispersion of units increases. All units have reconnaissance and counter reconnaissance

capabilities and responsibilities. These responsibilities may be limited to short patrols or defensive counter

reconnaissance measures during the conduct of normal mission activities, or they may extend to offensive

operations involving specific reconnaissance or counter reconnaissance tasks. Certain units are specifically

organised for such operations.

1533. Principles. Counter reconnaissance is based on different principles than reconnaissance and these are

:

a. Destruction/Neutralisation. Hostile reconnaissance elements must be destroyed or neutralised by

fighting.

b. Prevention. The centre of gravity of counter reconnaissance forces is the friendly forces being

screened and not the enemy force. Its aim is to prevent the enemy reconnaissance force from nearing

the friendly force for carrying out observation.

c. Depth. The screening force should be echeloned in depth. This would permit natural support and

prevent any deep penetration by the enemy reconnaissance force into the area being screened.

1534. Relation with Reconnaissance. Reconnaissance and counter reconnaissance are inter related as under

:

a. While the aim of reconnaissance is to gather information the aim of counter reconnaissance is to

deny information to the enemy. Good reconnaissance assists a certain amount of security also. On the

other hand the activity of counter reconnaissance provides a certain amount of information as well.

b. When the unit are assigned simultaneously the tasks of reconnaissance as well as counter

reconnaissance, the order must state capacity which of the two has precedence, in course of sufficient

size. Each task may be assigned to one force only.

c. Reconnaissance and counter reconnaissance cannot be completely separated. This is so because

effective reconnaissance helps security and counter reconnaissance activities also provide

reconnaissance information. Forces executing reconnaissance missions may be employed

simultaneously on both types of missions. Orders given to the unit should, however, state which one of

the two missions is to receive priority.

Using Intelligence Preparation of the Battlefield for Counter Reconnaissance

1535. General. Once again, the IPB process can help in planning. The two most important products will be

developed in counter reconnaissance (CR) are situation templates and event templates. It will be helpful to

develop a series of situation templates which depict enemy reconnaissance movement. Such templates allow

developing event template and letting operational staff to visualise how the enemy is expected to conduct their

reconnaissance battle.

1536. Situation Template. The mistakes should not be made in thinking that the enemy‘s reconnaissance

will use the same Avenue of Approaches (AAs) as the enemy main force. It must be remembered that the enemy

reconnaissance elements most likely to operate by two or three vehicles. Such small elements can traverse

almost any kind of terrain. It should be kept in mind that the mission of reconnaissance is to seek and report

information, not to fight. Therefore, enemy reconnaissance will use routes that have plenty of concealment and

cover. It should also be remembered that enemy reconnaissance is looking, the enemy may decide that attacking

over rough terrain is preferable to attacking open but heavily defended country. For this reason, it has to be

considered the entire Area of Interest (AI) when situation templates are developed. 'Tunnel vision' should not be

considered the only obvious AAs or MCs. It has to think always that how the enemy can enter in own sector

including using severely restricted terrain. As a general rule, the more concealment or protection a route

provides, the more likely it will be used by reconnaissance elements. The outcome of well prepared situation

templates is the indication of what the enemy will look like on the battlefield. This eventually will save

Reconnaissance and Surveillance (R&S) assets and many hours of unnecessary reconnaissance or surveillance.

1537. Event Template. Based on situation templates event template is developed. Event template will show

where on the battlefield the enemy reconnaissance elements are expected to see. Then R&S attention is

concentrated on those areas (NAI) to detect enemy reconnaissance activity. The key to CR intelligence support

is finding those enemy reconnaissance units before they can discover friendly positions and report back.

Therefore, the effects of weather and terrain on enemy reconnaissance must be carefully studied to determine at

what point the enemy can observe friendly positions. Usually, this is a function of observation and visibility in

own unit‘s Area of Interest (AI). These limits should be compared with the enemy‘s known reconnaissance

observation capabilities (such as infrared, thermal, light enhancement, and telescopic). As it is done, it will

begin to identify a limit of enemy advance (LOEA). Essentially, the enemy must be prevented from going

beyond this limit because past that limit, the enemy can observe friendly positions.

1538. Focus. R&S assets should be focused forward of the LOEA to identify enemy reconnaissance before

they can spot own unit‘s positions. Additionally, the analysis of the terrain may indicate there are isolated terrain

features forward of the LOEA which must be controlled to prevent enemy observation of own unit‘s position.

For example, It might have to be determined, based on general terrain and weather conditions, that LOEA is 5

kilometres in front of FEBA. However, two hills were discovered approximately 7 to 8 kilometres in front of

FEBA which allow observation of own unit‘s positions. Essentially, those three hills become key terrain for the

CR battle. The enemy must be prevented from occupying those hills. By integrating LOEA and key terrain with

event template, the battlefield is barrowed to specific points or areas where R&S assets can be focused

determining. Surveillance, Intelligence and Reconnaissance (SIR), matching R&S assets can be focused.

Determining surveillance, intelligence and Reconnaissance (SIR) matching R&S assets with SIR and NAI and

developing detailed R & S instructions. can be gone through.

1539. Tasking. Normally operational staff will actually task units for the CR mission based on input. Of

course, this may differ depending on unit SOP. Because of the importance of winning the CR battle, many units

use a large CR force. Sometimes this force may be up to one third of the entire unit.

1540 – 1600. Reserved.

SECTION - 16

COMBAT INDICATIONS FOR VARIOUS OPERATIONS OF WAR

Introduction

1601. Indicators are any positive or negative evidence of enemy activity or any characteristic of the Area of

Operation (AO) that points towards enemy capabilities, vulnerabilities, intention or those activities which

influence commander‘s selection of a Course of Action (COA). Individual indicator cannot stand alone. Each

indicator is integrated with other factors and indicators. Indicators are developed by the intelligence analysts

who are assisted by other elements in the headquarters. All indicators are developed to answer the commanders

Essential Elements of Information (EEI) and Other Information Requirement (OIR). The analysts use indicators

to relate particular events or activities with probable enemy COA. These are also used in the collection

worksheet in the form of tasking.

Fundamentals of Intelligence Indicators

1602. Responsibilities of Intelligence Staff. A necessary step in directing the collection effort is to

determine those enemy activities which will indicate the answer to the EEI. The ability of intelligence staff to

read ‗indicators‘ including recognition of enemy deception and counter deception, indicators may contribute to

the success of friendly operations.

1603. Actions Influence Indicators. Indicators include conditions and circumstances of the enemy situation

which result from the previous enemy action or from the enemy‘s failure to take action. For example, the current

enemy disposition may indicate a particular enemy capability or vulnerability. The enemy‘s logistic situation

may favour the adoption of a particular capability or may influence friendly selection of a COA. Direction of

river crossing means in one area may lead as faint to own forces and the enemy may cross elsewhere. The

presence of obstacles such as areas of poor traffic-ability may influence the adoption or rejection of a COA by

either side.

1604. Determinations of Indicators. The intelligence staff will determine the indicators by the application

of sound tactical principles and by the knowledge of the enemy, his organisation and methods of fighting. For

example, if a brigade commander has been given the mission to attack in the next morning, what are the other

actions he may do? He may move his artillery forward, dispose units on another front, increase his patrolling

effort, dominate the no man's land and other preliminary operations prior to attack.

1605. Indicators Based on Physical Action. Indicators are based on the physical action which will have to

be accomplished by the enemy prior to his adoption of a particular COA. The indications based on the habitual

activities of the enemy prior to the adoption of a particular COA is dependent upon the production of good order

of battle, intelligence concerning the enemy‘s tactical doctrine and the personality of the enemy commander.

Information related to a few indications will normally be insufficient to justify a sound conclusion. Therefore, it

is mandatory that the intelligence staff must analyse an EEI for all possible valid indications.

Analysis of Indications

1606. Factors. The EEI is analysed to determine the indications which by their existence or non existence

provide an answer to the requirement. Normally, these are indications which are likely to exist when the enemy

prepares to adopt or does adopt any particular COA..

1607. Capability. An EEI which asks in part, ''will the enemy attack,'' is analysed by determining the

indications of attack which may exist during the preparation or launching of offensive actions. These indications

frequently include reconnaissance, forward move of hostile troops, forward displacement of artillery,

identification of air operations, increased activity in rear area, forward displacement of command posts,

logistical installations and stepping up of patrolling activities.

1608. Vulnerability. The EEI concerning enemy vulnerabilities are analysed by intelligence through

determining the indications which are :

a. Low Morale. Abnormal number of incidents of suicide, desertions, and cases of murder or

attempt to murder may be indications of low morale.

b. Intelligence Deficiencies. The failure of the enemy to exploit our vulnerabilities may be an

indication of the intelligence deficiencies.

c. Logistic Deficiencies. A marked reduction in the expenditure of ammunition may be an

indication of logistic deficiencies.

d. Civilian Hostility. A diversion of enemy fighting forces to police duties in the rear areas may be

an indication of the civilian hostility toward the enemy.

1609. Knowledge. Intelligence analyst requires a thorough knowledge of the enemy and the characteristics of

the AO which can effect military operation. Particularly detailed knowledge of the enemy is valuable regarding :

a. Organisation.

b. Equipment.

c. Tactical doctrine.

d. Logistic methods.

e. Enemy knowledge of the area under friendly control.

f. Personalities of the opposing enemy commanders.

g. Past performance of the opposing enemy.

1610. Basis of Order /Requests. Having identified indications which reveal answers to the EEI, the

intelligence staff determines those specific activities which by their very nature and location will establish each

of the pertinent indications. These specific Information constitute a basis for orders/requests against enemy

indication which also prevent the use of false indications by the enemy against own force.

1611. Deceptive Indicators. Intelligence agencies must believe the fact that indications presented by the

enemy may be false. The enemy will go to great efforts to deceive us by portraying indications, which point to

the adoption of a COA which he does not intend to adopt. Enemy deception operations provide indicators in an

attempt to create false or misleading patterns of enemy intentions. Analysts detect these false indicators and then

determine what actual COA, the enemy is attempting to initiate. Enemy attempts at deception are discovered by

comparing indicators and combat information from all sources to arrive at an accurate picture of the battlefield.

Operation Wise List of Indicators

1612. General. The lists of combat indicators are by no means complete nor are they intended to apply to all

situations or all types of enemy forces. They give some types of indicators which, when incorporated with other

indicators, create patterns or suggests a series of activities which point to typical enemy COA. Analysts are

prepared to develop their own indicator lists for the specific situations, which confront them.

1613. List of Indicators – Offensive Operations. For Bangladesh Army the main concerned will be how

enemy forces will attack our force. A list of attack and advance indicators is as follows :

COMBAT INDICATION ATTACK – VARIOUS TYPES

CONVENTIONAL ATTACK

Indications Explanation

1. Increased air reconnaissance

2. Air borne surveillance

3. Patrol (especially engineer and armoured).

4. Probing actions.

5. Deep patrol activity.

1. Early Indications of reconnaissance.

2. Direction and intensity of

reconnaissance might lead to direction

of attack.

1. Fwd dumping, especially ammunitions, bridging

and mine breaching equipment.

2. Increased medical installation.

1. Administration build-up for attack.

2. Preponderance on artillery build up

is expected.

3. Development of roads and bridging, increased line

of communication and base.

4. Arrival of reinforcement.

5. Increased communication on administration and

traffic control net.

3. H hour is unlikely before artillery

build up is completed.

1. Re-grouping of troops.

2. Withdraw of forward troops for preparation.

3. Arrival of Special units, e.g., amphibious

engineer.

4. Forward control of infantry, armour or

amphibious forces.

5. Control of air borne-troops and aircraft near to

airfields.

1. Tactical build-up late indications.

2. Indication of River crossing

3. Indication of bridge head with

armour.

4. Like to have Para troops / helicopter

drop as a link up operation.

Indications Explanation

6. Increase in artillery control and ammunition

stocking.

7. Changed pattern of wireless traffic (increase

wireless silence).

8. Move of headquarters.

1. Registration.

2. Move of artillery to firing position.

Late indications of fire plan.

1. Gapping of minefields, wire and other obstacle.

2. Preparation of own side of obstacles.

3. Opening of traffic control communication.

4. Signing of routes.

5. Move of assault echelon.

Move of troops late indications.

ATTACK BY INFILTRATION

Indications Explanation

1. Most of the indications for attack by infiltration

are the same as that of attack. The indications which

are peculiar to attack by infiltration are given in

succeeding paragraphs.

_

1. Recruitment of guides.

2. Hiring of local ponies / animals.

3. Stress on Infiltration training.

4. Reconnaissance on the entire front and flanks.

5. Reconnaissance in the inter formation/inter

battalion gaps.

1. Early indications for attack by

infiltration.

2. Absence of adequate armour and

mechanised force.

3. Instead of registration artillery

covering move of troops.

6. Concentration of small forces at various places.

7. Air reconnaissance of depth areas.

8. Dispersal of artillery.

9. Security of firm base.

Indications Explanation

1. Increase in sabotage and subversion activities.

2. Uprising by the locals.

3. Move of Infiltration force through gaps.

4. Feint attack on wide front.

5. Securing of firm base and blocking position in

depth.

6. Use of attack helicopters at a large scale.

1. Late Indications for infiltration

attack.

2. Attack on depth with blocking

position established, feint in the

Forward Defended Localities (FDL)

initially and finally attempt to assault

from front is a likely COA.

7. Shelling and serial bombardment of depth

objectives.

8. Attack on the depth objectives.

9. Infiltration move of stores.

10. Major attacks on Forward Defended Locality

(FDL) and attempting to establish bridge head for

link up.

OPPOSED RIVER CROSSING

Indications Explanation

1. Increase in ground and air reconnaissance.

2. Concentration of troops.

3. Move forward of Infantry and engineers.

4. Move forward of artillery to gun areas closer to

water obstacle.

5. Construction and/or improvement of roads and

tracks from the main axis of enemy‘s advance to the

waterway.

6. Securing of firm base(s) on the enemy side of the

waterway.

7. Move of engineer stores.

8. Increased radio traffic in the earlier stages and

complete radio silence prior to assault.

9. Establishment of ammunition dumps require for

assault in the forward areas.

10. Opening of additional medical units close to the

likely sites of crossing control.

11. Establishment of traffic circuits for control of

traffic near the water way.

1. Early Indications for river crossing

operations.

2. Location of brigade will indicate

likely direction of brigade and possible

break out route.

3. Location of follow up brigade is vital

for predicting next phase.

4. Securing firm base and preliminary

action will indicate location of O-1 and

O-2 line.

Indications Explanation

1. Neutralisation of objectives on the far bank. 1. Late Indications of assault.

2. Move of assaulting echelons to water line and

preparation of water craft for crossing.

3. Expansions and build up bridgehead.

4. Construction of bridge.

2. Location of brigade will indicate O-3

line.

BREAK OUT BY DIVISION /CORP SIZE FORCE

Indications Explanation

1. Concentration of the force including mechanised

forces.

2. Increased aerial reconnaissance.

3. Increase of patrolling activity on very wide front.

4. Bridging forward and dumping of artillery and

engineer equipment (bridge equipment and trawling

equipment )

5. Digging and occupation of artillery positions.

6. Move forward of logistic installations.

7. Concentration of air defence resources.

1. Early indications for break out.

2. Concentration of armour and

mechanised force in an area will

indicate likely break out and fast

moving battle.

COMBAT INDICATIONS ADVANCE

Indications Explanation

1. Ground and air reconnaissance.

2. Anti national propaganda.

3. Take over by static units to relieve active units for

advancing.

4. Air reconnaissance and air borne surveillance over

routes and obstacle.

5. Deep patrol.

Early indications of reconnaissance

1. Construction of forward airfields.

2. Forward move of maintenance facilities.

3. Forward dumping of fuel.

4. Increase in traffic control organisation.

5. Forward move of engineer stores.

Admin build-up –early stage

Indications Explanation

1. Opening of reserve formation headquarters.

2. Changes in command nets.

3. Move of Special troops between formation

4. Take-over by static units.

5. Withdraw of mobile units to rear.

6. Move of air borne troops to airfields.

Tactical build up – early stage.

7. Route clearing action by air borne troops /

partisans/ saboteurs.

Late indications of tactical build up.

8. Increase depth of target.

9. Air borne patrols on pursuit routes.

Fire Plan – Late indications.

1614. Combat Indication Defensive Operation. Conventional and Unconventional forces will relentlessly

endeavour to force enemy to go for defensive operation such as Conventional Defence, Withdrawal, Delaying

Action, Reinforcement, etc. A list of Defensive Operations indications are below :

CONVENTIONAL DEFENCE

Indications Explanation

1. Ground and air reconnaissance.

2. Concentration of troops in depth.

3. Digging and procure freshly dug earth.

4. Mines, wire and cable lying.

5. Armour concentration in rear (either for counter

penetration or counter attack).

6. Preparation of artillery positions.

7. Improvement of roads and tracks.

8. Constructions of pill boxes and bunkers for

headquarters.

9. Dumping of stores and ammunitions.

10. Establishment of workshops, hospitals and other

facilities well in depth to keep them out of battle.

Early Indications.

Indications Explanation

1. Aggressive patrolling.

2. Development of defence works.

3. Gradual development in all aspects covered in early

indications.

Late indications.

MOBILE DEFENCE

Indications Explanation

1. Most of the indications for mobile defence are the

same as that of conventional defence. The indications

which are peculiar to mobile defence are given in the

succeeding paragraphs.

1. Reconnaissance on very wide front.

2. Extensive digging in echelons.

3. Langer gapes between difficulties / areas.

4. Extensive mine fields by mechanised means.

5. Occupation of artillery positions.

6. Dumping of ammunition and stores.

7. Forward deployment of administrative installation.

Early Indications.

1. Gapping of wires and obstacle.

2. Outflanking moves by combat groups.

3. Increase in radio traffic.

4. Move of assault echelons.

Late Indications.

COMBAT INDICATION TACTICAL REDEPLOYMENT (TRD)

Indications Explanation

1. Rundown of stocks includes demolitions.

2. Evacuation of nonessential troop.

3. Forward control of mechanised force.

4. Rearward move of administrative installation.

5. Back loading/destruction of stocks.

Early indication of administrative

preparations.

Indications Explanation

1. Mining and demolitions of non essential routes.

2. Mining on previous patrol routes.

Route denial - early indications.

1. Withdraw of reserve.

2. Adjustment of boundary.

3. Artillery layout for route protection.

4. Rearward movement of headquarters.

Grouping - early indications. Grouping – early indications.

1. Increase in artillery activity to cover noise of

withdraw.

2. Predominance of auto weapon with the rear guards.

3. Smoke screens during day withdraw.

Late Indications fire sp.

1. Tanks mechanised force covering former infantry

localities.

2. Absence of patrol.

3. Local counter attack.

4. Thinning out of forward troops.

Move – Late indications.

1. Prep of intermediate position in rear.

2. Detonating the reserve demolitions.

3. Aerial Bombardment beyond a line.

Late Actions.

Conclusion

1615. At every headquarters, lists of enemy activities peculiar to each indication is compiled. The lists are

then circulated to higher, lower and adjacent headquarters. These should not be accepted as rigid set of

indications applicable under all conditions as these are of general nature. It must be fully understood that a

potential enemy may not follow all the indications but he may, in addition give other unexpected indications as

well.

1616 – 1700. Reserved.

CHAPTER - IV

ELECTRONIC WARFARE AND INFORMATION OPERATION

SECTION - 17

INTELLIGENCE AND ELECTRONIC WARFARE SYSTEM

General

1701. Commanders require intelligence about the enemy and the battle space prior to engaging in operations

in order to execute battles, engagement and operations. Intelligence assists commanders in visualising the battle

space, organising his forces and controlling tactical objective and end-state. Intelligence also support other

related factions such as electronic warfare (EW) and counter intelligence. Intelligence and Electronic Warfare

(IEW) system as a whole helps a commander in using intelligence as a force multiplier by dealing with enemy

overt and covet threat and assist operational staff in conducting electronic warfare both in offensive and

defensive manner.

1702. While there are no simple formulas for winning any battle, there are certain key factors for success on

the modern battlefield. One key factor is the support provided to the various commanders through IEW

operations. IEW operations, in both peace and war, support the winning of conventional and unconventional

battles and campaigns- the focus of the doctrine described in GSTP 0032. The mission of IEW operations is to

provide any level of commander with three key forms of support intelligence, EW and counter intelligence.

Functional Structure

1703. The IEW system design philosophy is embedded in a common IEW structure at each level of

command. Each command has directors, coordinators, producers and executors who perform critical IEW

functions. Commanders play a significant role in the design philosophy of the IEW system. Their requirements

must be satisfied, their direction moves the system to respond and their personal involvement keeps the system

on track.

1704. The coordinators are the intelligence staff and operational staff. They have staff responsibility for

coordinating the IEW effort. They respond to commander as the functional experts in IEW, supervise and direct

the operations of producers and coordinate the efforts the executors with supports from higher, lower and

adjacent commands. Salient of the functional structure are already discussed at section 4.

Intelligence Staff

1705. The intelligence staffs are the commanders‘ principal advisors for intelligence, counter intelligence

operations and protective security policy. They plan and manage operations in each of these functional areas.

The intelligence staffs coordinate the intelligence effort. They identify intelligence requirements based on the

commander‘s guidance and concept of the operation. They manage the collection effort, supervise all source

analysis and ensure rapid dissemination of needed intelligence and combat information. They, through the

division and brigade‘s command post support elements task or field intelligence unit (FIU) and other elements

of the command with collection missions. Common IEW System structure is shown below :

1706. The intelligence staff request support and receive intelligence from higher echelons, adjacent units,

other services allies and national sources. They integrate intelligence from all sources to meet the commander‘s

information and operational needs. They are responsible for information regarding the enemy, weather and

terrain. They use their expertise to reduce battlefield uncertainties, providing commanders with estimates and

other critical intelligence in support of unit operations.

1707. Generally, the responsibilities of the intelligence staff are similar at each level of command. These are :

a. Recommends intelligence requirements and priorities.

b. Prepares plans, orders and requests for intelligence, electronic support measures and counter

intelligence.

c. Supervises and coordinates the command's intelligence collection electronic support measures

and counter intelligence activities to support situation development and target development.

d Processes information from all available sources to produce intelligence.

e Assesses enemy intentions and predict likely courses of action.

f Develops document and personnel security policy for the command.

g Supervises and directs the efforts of the engineer terrain team under his operational control and

coordinates support from other teams.

h Exercises staff supervision of the weather officer from locating battery.

j Supervises and coordinates predictions of fallout from enemy -employed nuclear weapons and

chemical dispersion.

COMMAND

Direct and control

organic assets to

satisfy requirement

DIRECTOR

FORCE COMMANDER

COORDINATORS

EXECUTORS

Intelligence Staff

Intelligence

Counter Intelligence

COMMANDERS

FIU

Armour

Artillery

Manoeuvre

Operation Staff

Operations

Electronic Warfare

Operation Security

Deception

PRODUCERS

* Collection Management

Prepare collection plans

Manage collection activities

* Analysis

IPB

Processing

Intelligence analysis of

Enemy, weather and terrain

data bases

* ESM

Technical data base support

* Operation Security

Data base support

Vulnerability analysis

Countermeasures

Recommendation

* Dissemination

Reports

Briefings

Estimates

COMMON IEW STRUCTURE

Figure 17.1 : Common IEW Structure.

k Disseminates combat information and intelligence.

l Provides information and intelligence to other staff sections.

m Assesses enemy intelligence capabilities and procedures, their vulnerability to deception and the

effectiveness of friendly deception operations.

n. Provides counter intelligence support to operational security

p. Prepares intelligence estimates and annexes.

Operational Staff

1708. The operational staff has staff responsibility for planning and directing the operation security deception

and electronic warfare operations of the command. They advise and assist other staff officers on the operations

and training aspects which impact on their respective areas of responsibility. They are responsible for :

a. Plans and coordinates electronic warfare operations.

b. Directs electronic countermeasures actions needed to support planned and ongoing operations.

c. Identifies, in coordination with the intelligence staff as appropriate, requirements to support

electronic support measures.

d. Coordinates and establishes ECCM to protect friendly counter electronic operations.

e. Prepares the electronic warfare annex to operations plans and orders.

f. Identifies and recommends essential elements of friendly information (EEFI).

g. Implements operation security measures to frustrate the enemy intelligence collection effort.

h. Plans and coordinates deception operations to support the commander's scheme of fire and

manoeuvre

Producer and Executors

1709. The producers support the coordinators at each echelon. They perform collection management,

information processing and dissemination, Counter intelligence analysis, and electronic warfare management.

The intelligence office; various combat, combat support and combat service support units, give the unit

intelligence staff the capability to effectively manage his part of the IEW system. They are not a separate

element but an integral part of the intelligence section.

1710. Intelligence officers provides the detailed control and coordination of intelligence collection,

production and dissemination. They play a limited role in electronic warfare and operation of security. It not

only expand the capabilities of the intelligence sections, but free the intelligence staff from routine tasks so he

can better manage the overall intelligence effort.

1711. The executors command the units which provide IEW support and direct and control them to satisfy

assigned IEW missions. They deploy, maintain, train and sustain their units to carry out assigned missions.

Executors include the commanders of military intelligence, armour, artillery and manoeuvre units and all other

organisation capable of executing IEW operations. Military intelligence unit commanders are the command's

primary IEW executors.

Coordination Structure

1712. The key players in fusing IEW into the overall tactical concept are the intelligence and operations

staffs. Their mission is to serve the commander and assist subordinate commanders. The senior intelligence and

operations officers must think like the commander in order to anticipate requirements. Both require a solid

foundation in tactics to accomplish their missions. Their functions are reciprocal; both should be able to do the

other's job. Their functions are complementary, requiring very close cooperation and coordination. Common

perspectives enable them to communicate with precision. The senior intelligence and operations officers of the

command assist in the development and training subordinate unit intelligence and operations staffs.

1713. In coordinating various operations and battles, commanders demand complementing capabilities from

their intelligence and operational staff as shown in the following illustration :

HOW STAFFS ORCHESTRATE IEW OPERATIONS

PLANNING

ORGANISING

DIRECTING

CONTROLLING

COORDINATING

1. Determine current

and future needs.

2. Study situation

and limitations.

3. Make reasonable

assumptions.

4. Perform detailed

planning.

5. Determine time

and resource

requirements to

support plan.

6. Ascertain

requirement/resource

balance.

7. Adjust plan If

necessary.

8. Develop alternate

plans.

9. Establish

policies/procedures

to support plan.

10. Use SOPs for

communications and

promote

understanding.

1. Determine

requirements to

support mission.

2. Establish

work

breakdown

structure of

tasks, Subtasks.

3. Establish

organisational

relationships.

4. Select/ assign

resources to

accomplish

mission.

5. Assign

mission

responsibilities.

6. Emphasize

essentiality,

balance,

cohesion

flexibility and

efficiency.

1. Determine

extent of

direction

necessary.

2. Issue timely

instructions

and mission

tasking and

ensure they

are

understood.

1. Determine

extent, type and

method of control

necessary to

accomplish

mission.

2. Establish

criteria for

measuring results.

3. Establish

minimum variance

from criteria that

is acceptable.

4. Take corrective

action.

5. Supervise

execution.

Monitor resource

performance and

sustainability.

1. Promote

cooperation's and

mutual under

standing.

2. Cross-train

supervisors and

keep them

informed.

3. Encourage lateral

and vertical

communication

through out the

organisation.

4. Synchronise

requirements with

external activities.

1714. They along with intelligence unit commander comprise the IEW team. The staff officers plan, organise,

direct, coordinate and control while the intelligence commanders execute the directives. The IEW team is held

together by the force commander who gives the team leadership, motivation, focused perspective and direction.

Each member of the IEW team has a full array of vital responsibilities. All of these responsibilities must be

integrated, mutually supporting and focused on the commander's concept for accomplishing the mission. Close

and continuous coordination among all members of the teams is essential.

1715. The following chart provides a graphic illustration of responsibilities and the coordination required to

assure a fully intergraded IEW operation :

IEW STAFF RESPONSIBILITIES

FUNCTIONS

STAFF RESPONSIBILITY

IN COORDINATION

INTELLIGENCE

IPB

Collection Management

Situation Development

Target Development

ELECTRONIC WARFARE

ESM

ECM

ECCM

OPERATIONAL SECURITY

CI Support

Intelligence Staff

-do-

-do-

-do-

-do-

Operation Staff

Intelligence Staff

Operation Staff

Operation Staff

Operation Staff

Intelligence Staff

Operation Staff

-do-

-do-

-do-

-do-

Intelligence Staff

Operation Staff

Intelligence Staff

-do-

Intelligence Staff

Operation Staff

1716. No single level of command is capable of meeting all of its requirements with organic resources. Each

is dependent on higher lower, and adjacent commands to complete the intelligence picture of the battlefield, to

meet electronic warfare requirements or the support the security needs of the command. Therefore, commanders

at each echelon must ensure that their resources are integrated into the overall IEW effort. For example, division

depends on brigades and battalion for some information about first echelon enemy battalions and brigades. It

also depends on higher echelon such as army headquarters for information about second echelon division. The

interdependencies between echelons create the need for detailed interfaces. Such interfaces exist between the

coordinators at successive echelon between producers at division and higher levels and between executors at

division and higher level. Additional interfaces are established laterally and at various level with other services,

national agencies and allied forces.

Situation and Target Development

1717. Situation development is the basic process by which intelligence is developed. Information is collected,

then integrated into an all source product to provide an enemy intentions in sufficient time to permit the

commander to select the most effective friendly course of action. Situation development provides :

a. Knowledge of the weather and terrain throughout the areas of operations and interest.

b. Knowledge of the enemy to include enemy organisation, equipment and tactics-how the enemy

fights; the strengths and weaknesses of enemy dispositions; the capabilities, limitation and patterns of

particular enemy units; the enemy's operational, technical and human weaknesses and personalities; the

enemy's intentions and the enemy's probable reactions.

1718. Weather and terrain have more impact on the battle than any other physical factor, including weapons,

equipment or supplies. The terrain on which battles are fought presents opportunities to both sides. Most battles

have been won by the side that used terrain to protect itself and to reinforce fires to destroy the enemy.

Commanders must understand the nature, uses and reinforcement of terrain to be effective in order to use it as a

force multiplier.

1719. IEW operations assist commanders in selecting and understanding the battlefields on which they

choose to fight. Intelligence preparation of the battlefield (IPB), a systematic approach to the analysis of enemy,

weather and terrain, is the principal tool used. It clearly portrays what enemy forces can and cannot do on the

battlefield and the probability of the adoption of a specific course of action. It also is used to clearly show the

effects of weather and terrain on friendly forces and courses of action. IPB begins long before the battle and is

updated continually.

1720. To succeed in battle, commander must avoid enemy strengths and exploit weaknesses. They must

surprise enemy forces catching them at a disadvantage as often as possible IPB provides the basis for the

situation and target development tasks which make this possible. Situation development reduces battlefield

uncertainty and provides the confident to generate superior combat power.

1721. Target development, based on situation development, is the process of providing direct combat

information, targeting data and correlated targeting information to commanders and fire support means. It

provides the commander with timely and accurate locations of enemy weapons systems, units, and activities

which may impact on current or projected operation. Targeting data must be sufficiently timely and accurate to

support effective attack by fire, manoeuvre or electronic means.

1722. Situation and target development provide commanders with the intelligence they need to fight the air

land battle, both are distinct tasks, yet they must be integrated totally to provide an accurate picture of the

battlefield and to assist in successful accomplishment of the friendly commander's intent. Both tasks focus the

area of operations and interest.

Division of Areas

1723. The battlefield is comprised of the area of operations (AO) and the area of interest (AI). Commanders

and staffs view these areas in terms of width, depth, airspace and time.

a. The AO is defined as "that portion of an area of conflict necessary for military operations. Higher

commanders consider the factors of mission, enemy, terrain, troops and time available (METT-T) when

assigning AOs‖.

b. The area of interest is defined as "that of concern to the commander, including the area of

operations, area adjacent thereto and extending into enemy territory to the objectives of current or

planned operation. This area also includes area occupied by enemy forces which could jeopardise the

accomplishment of the mission". The area of interest overlaps those of adjacent and higher units, to

include areas of the area of operations.

1724. Area of Operations and area of interest help to focus the information requirements of commander from

battalion to Army Headquarter. Specific information requirements are dependent on the mission and the tactical

situation. Usually, in conventional battles, information requirements are based on the one -up-and-two-down

formula. Commanders require detailed information about enemy forces at their equivalent levels of command as

well as at one level above and two levels below their own. For example, brigade commanders need information

about enemy brigades (equivalent level), enemy divisions (one up) and enemy battalions and companies (two

down), Generally, the enemy forces of concern to each commander are found within the command's area of

operation and area of interest.

Electronic Warfare

1725. EW exploits, disrupts and deceives the enemy command and control system while protecting friendly

use of communications and non-communications systems. It is a significant force multiplier when integrated and

employed with fire and manoeuvre.

1726. Offensive part of EW known as Electronic Counter Measures (ECM) represents significant contributor

to command, control and communications countermeasures which is the integrated use of operations security

(OPSEC), military deception, jamming and physical destruction to disrupt enemy command and control. ECM

protects friendly command control and communications (C3), influences, degrades or destroys enemy C3

capabilities and denies the enemy own information of intelligence value.

1727. Electronic counter-countermeasures (ECCM) or defensive EW, are the responsibility of all soldiers

who use or who supervise the use of communications electronics equipment. ECCM are passive in nature and

are used to protect friendly C3 systems against enemy radio electronic combat activities. Passive ECCM include

both anti-intercept and locate (for example, emission control, terrain masking and avoidance) procedures and

anti jam or kill features. ECCM also include the immediate identification and reporting of beaconing, intrusion,

jamming and interference on a friendly C3 facility.

1728. Electronic warfare support measures (ESM) can provide commander the capability to intercept,

identify and locate enemy emitters. They represent a sources of information required for jamming, deception,

ECCM, targeting and other tactical employment of combat forces. ESM support the destruction and jamming of

enemy C3 systems through acquisition and reporting of targeting data. ESM also support the commander's

efforts to counter enemy operation security and deception.

1729. In extreme situations, electronic counter measures can be used to protect friendly C3. Jamming systems

may be used as high -powered radios to transmit a key message through enemy jamming. Additionally, jammers

may protect friendly communications by using directional antennas to jam known enemy signal intelligence

(SIGINT) systems on the same frequency as key friendly communications to screen and prevent enemy

intercept. This option takes multiple jammers to cover the deployed enemy collectors and can place our jammers

at great risk. Expandable jammer may also be used to screen friendly communications if their emplacement near

enemy signal intelligence sites is feasible.

1730. The offensive components of EW, passive ESM and active ECM, provide commanders :

a. Intelligence to plan, direct, coordinate, support and conduct their deep and close operations.

b. Combat information and targeting data to manoeuvre their forces and target their weapons

systems.

c. ECM no lethal attack capability to systematically disrupt the C3 systems of enemy first and

second -echelon units.

1731. Command and control warfare in air-land combat operations is complex when viewed as a maze of

intangible electronic signals criss-crossing above and over the battle field. Command and control warfare,

however, can be reduced to the simplest terms of reference and understanding. It is composed of both tangibles

and intangibles. The tangibles are the C3 "nodes" which present visual signatures for commanders to see and

shoot. The intangibles are the "information links" between the nodes which can be intercepted, identified and

jammed. There are also nodes which can be intercepted, identified and jammed. There are also nodes and links

which must be seen and monitored, but neither shot nor jammed. Simply speaking we jam and kill the fighters

and sustainers and collect information from the planners and coordinators.

Counter Intelligence

1732. IEW operations must include specific actions which support the protection of the force, through

counter intelligence, IEW operations support actions which :

a. Counter the hostile intelligence acquisition threat.

b. Safeguard the command from surprise.

c Deceive the enemy commander.

d. Counter enemy sabotage, subversion and terrorism.

1733. The need for commanders to know the enemy is not restricted to friendly force commanders. Enemy

commanders, to succeed against us, must employ all - sources intelligence systems to collect information about

our forces. Depriving enemy commanders of this information is important, even crucial to friendly force success

on the battlefield. It supports the operational security of the command to achieve this objective.

1734. Safeguarding the command from surprise includes two elements of IEW support. The first is

intelligence which enables the commander to know the enemy's activities and intentions. The second is counter

intelligence support to operational security which helps to deprive the enemy commander of the intelligence he

needs to create situations in which the friendly force can be taken by surprise.

SYSTEM ELEMENTS FOR IEW

General

1735. The IEW system includes combat, combat support and combat service support elements. While

military intelligence units provide dedicated IEW support, all units in the combat force, by virtue of their

mission, capabilities and AOs, have an implied mission of collecting and reporting information. The IEW

mission is accomplished through the integrated effort of all elements of the force. In turn, every element relies

on supports form the IEW system to accomplish its mission.

Manoeuvre Unit

1736. Manoeuvre units are among the best eyes and ears of the command. Individual soldiers and leaders

provide a great deal of real-time targeting and combat information. Manoeuvre unit conduct patrols, capture

prisoners and documents, operate observation post and observe enemy forces with whom they are in contact.

They report information about the activity of enemy first-echelon forces, patrols and reconnaissance elements.

Combat information and targeting data collected by manoeuvre units are normally used by the collecting units to

engage the enemy. Pertinent information is introduced into the IEW system by the intelligence staffs of the

collecting units. By collecting and reporting information, manoeuvre units support the IEW effort. They, in turn,

receive intelligence, EW and counter intelligence support from other elements of the system.

1737. Armour reconnaissance troops and composite platoons of support battalions are combined arms combat

reconnaissance force mounted in ground vehicles. They constitute the primary reconnaissance capability at

division and brigade level. They uniquely organised equipped, and trained to find the enemy and prevent the

friendly main body from being engaged under adverse circumstance. While conducting these tasks,

reconnaissance elements provide the IEW system information about terrain, effects of weather on the terrain and

the presence or absence of the enemy. In turn, they rely heavily on the IEW system for support to plan and

accomplish its mission.

Artillery

1738. Field artillery units provide the IEW system with valuable information about enemy activity. The

tactical fire direction system has markedly enhanced the field artillery capability to collect, analyse and

disseminate targeting data. Organic target acquisition resources provide information concerning the enemy

through, visual observation, combat observation teams, moving target locating radar, weapon-locating radars

and aerial observers. Artillery fire support teams operating with manoeuvre units are a major source of targeting

and other combat information. Combat information and targeting data are exchanged constantly between

operation and intelligence staffs and the field artillery. This exchange takes place through each tactical echelon.

1739. The principal function of the artillery intelligence staff is to provide data and co-ordination, within the

artillery organisation, for target acquisition with particular reference to enemy batteries and weapon systems.

However, in collecting information on enemy artillery, mortars and tactical missiles, the artillery intelligence

staff acquires information of great interest and value to the intelligence staff. This information gives the pattern

of enemy artillery deployment, which can produce vital intelligence when processed with other information in

the possession of the intelligence staff. For this reason there must be close and constant liaison between them,

and if at all possible they must be co-located side by side in headquarters. Commanders and staff must accept

this as a priority. Artillery-acquired information of value to intelligence may include :

a. Locations of enemy artillery.

b. Types of enemy artillery.

c. Details of enemy batteries.

1740. Air defence artillery elements, equipped with target acquisition radars, provide surveillance

information to the commander. In addition to organic target acquisition radar, these elements have direct access

to and utilize long –range Air Force assets. They provide information about air routes into the friendly area and

enemy air activity throughout the area of interest. They also provide statistical data about the destruction of

enemy aircraft.

Engineers

1741. Engineers routinely conduct reconnaissance of route, rivers , bridge, obstacle, air landing facility, and

support area. Units operating with forward-deployed forces provide intelligence, tactical information and other

terrain data of value to the commander. Terrain teams at division, brigades and units provide terrain and

trafficability studies and route overlays. Given sufficient time overprinted maps may be produced by the survey

of Bangladesh and supplied by Engineer Company under Engineer Brigade.

1742. Engineer Intelligence is produced primarily for terrain intelligence purpose. The officer at divisional

headquarters, who is responsible for it, is concerned mainly with information on going, routes, communications,

obstacles, enemy demolition, areas suitable for landing zones, enemy engineer resources and local resources.

Much of this is of intelligence interest, specially going, route classification, locations of minefields and other

obstacles and resources. The sources of engineer intelligence include :

a. Intelligence reports from forward units and formations.

b. Engineer reconnaissance parties and patrols.

c. Basic topographical intelligence extracted from publications issued by various organisations.

d. Records maintained by local government departments, such as public works, transportation,

inland waterways and forestry.

e. Through terrain analysis conducted in peace time taking all terrain factors into consideration.

Signal

1743. Signal Intelligence and Electronic warfare (EW) measures are discussed separately. In war they are a

major source of tactical and strategic intelligence. Also in war, EW cell will be located with certain formation

headquarters so as to maintain close liaison between EW resources and the intelligence staff. Signal elements

provide specific support to EW operations by processing and reporting enemy beaconing, intrusion, tanning and

interference reports.

Combat Services Support (CSS)

1744. These units make extensive use of road networks and provide valuable information about line of

commutation, guerrilla activity, weather and terrain condition. Ordnance, medical, units provide assistance in

their technical areas of expertise by evaluating captured enemy materiel. Medical units provide intelligence by

evaluating captured enemy medical materiel and also by providing information concerning the state of health of

the enemy by medically evaluating selected enemy prisoners, refugees, defectors and escapees. Resulting

information is processed and entered in the intelligence data base.

1745. Military Police are responsible for good order, discipline and the collection, movement and control of

enemy prisoners. Alert and well trained MP personnel can provide valuable information on prisoner behaviour,

rear area activities and terrorism. MP provides information useful in resource and refugee control and rear

operations.

Civil Affairs and Psychological Elements

1746. Civil Affairs Elements. They deal with people, equipments and documents which are prime sources

of valuable information. They significantly aid intelligence and counter intelligence operations by :

a. Detecting and warning of sabotage activity.

b. Detecting and reporting the transmission of information and supplies to enemy forces in the rear

area, unfriendly partisan and guerrillas.

c. Locating and securing various records, periodical file, local publications, official documents,

technical equipment, blueprints, plans or other information of interest to intelligence analysts.

1747. Psychological Operation (PSYOP). These elements use intelligence as the basis for all operations.

The objective of psychological operation is to modify the behaviour and decrease the combat effectiveness of

enemy soldiers and units psychological operation intelligence personnel collect information on the attitudes,

susceptibilities and vulnerabilities of enemy force. These units provide intelligence and in turn depend on the

IEW system for intelligence to support their operations.

Army Aviation and Air Force

1748. Army Aviation and Air Force resources, which range over the entire battlefields, have unique

capabilities to observe both friendly and enemy activities. All aviation elements have the mission to cover the

battlefield and report what they see. They provide tactical information and intelligence about enemy locations,

equipment and movement. They also provide weather observations and information about the terrain. Aviation

elements are particularly well suited to support operational security by detecting weaknesses in friendly

camouflage and light discipline. Bangladesh Air Force assets flying close air support missions have a similar

capability and may be contacted through the air liaison officer.

1749 – 1800. Reserved.

SECTION - 18

ELECTRONIC WARFARE AND INTELLIGENCE

General

1801. Electronic Warfare (EW) is defined as military actions involving the use of electromagnetic energy to

determine, exploit, reduce or prevent hostile use of the electromagnetic spectrum and actions which retain

friendly use of the electromagnetic spectrum.

1802. Electronic Warfare (EW) is an essential element of combat power. Its contribution lies in exploiting

enemy weakness, protecting friendly freedom of action, and reducing security and communications

vulnerabilities. A modern military force depends on electronics for command and control of forces and

employment of weapons systems. Because of this dependence on electronic devices, both friendly and enemy

forces are vulnerable to action which can reduce the effectiveness of these devices or gain intelligence from

them. It may be helpful to consider the subject in a less rigorous way working from acceptance of the following

basic ideas :

a. Electronic Warfare should be considered as a Weapon System.

b. The various techniques of Electronic Warfare are indivisible, each supporting the others.

c. Electronic Warfare is a dynamic subject in which equipment, techniques and capabilities are

changing.

d. Electronic Warfare is intimately related to Signal Intelligence (SIGINT).

1803. EW cannot physically destroy a target. It can, however, when integrated into the overall concept of the

operation, confuse, deceive, delay, disorganize, and target the enemy. When other considerations are equal,

victory may go to the force that used EW most effectively. EW is a command responsibility. It is a combat

power element having two facts – offensive and defensive. The offensive components of EW are Electronic

Support Measures (ESM), Electronic Counter Measures (ECM), Electronic Counter Counter Measures (ECCM).

1804. Offensive EW is the employment of EW to disrupt or deny the enemy‘s effective use of their electronic

systems. An understanding of its functions is essential for planning, managing and directing the employment of

EW. As with all offensive operations, the EW process followed is basically a sequence of actions shown below

diagrammatically :

THE EW PROCESS

Figure 18.1 : The EW Process.

COLLECTION, RECORDING,

ANALYSIS & REPORTING

STEER-AGE

JAMMING & DECEPTION

INTELLIGENCE

SEARCH, INTERCEPT &

DIRECTION FINDING

1805. A chart of all branches of EW process is shown below :

EW FUNCTIONS

Figure 18.2 : EW Function.

ELECTRONIC WARFARE

Military action involving the use of electromagnetic energy to determine exploit, reduce, or prevent hostile use of the electromagnetic spectrum and

action that retains friendly use of the electromagnetic spectrum.

ELECTRONIC SUPPORT

MEASURES (ESM)

That part of EW involving actions taken (under direct control of

operational commander) to search for

intercept, locate, and identify sources

of related electromagnetic energy for

the purpose of immediate threat

recognition thus. ESM provides source of information required for actions

involving ECM, ECCM, Avoidance

targeting, and other tactical

employment of forces

ELECTRONIC

COUNTER COUNTER

MEASURES (ECCM)

The part of EW involving

actions taken to retain

effective friendly use of the

electromagnetic spectrum.

ANTI-ESM ANTI-ECM

EMISSION

CONTROL

AVOIDANCE

SYSTEM

DESIGN

SYSTEM DEPLOYMENT

FREQUENCY CONTROL

OPERATOR TRAINING

ELECTRONIC JAMMING

The deliberate radiation and reflection of

electromagnetic energy with the object of

degrading the effectiveness of electronic devices, equipment or systems being used by a

hostile forces.

ELECTRONIC DECEPTION

The deliberate radiation, re-radiation, alteration, absorption,

enhancement or reflection of electromagnetic energy in a

manner intended to mislead hostile forces in the interpretation or use of information received by their

electronic system.

SIMULATIVE ELECTRONIC

DECEPTION (SED)

The creation of electromagnetic

emissions to represent friendly notional or actual capabilities to

mislead hostile forces.

MANIPULATIVE ELECTRONIC

DECEPTION (MED)

The alteration of friendly electromagnetic

emission characteristics, patterns or

procedures to eliminate revealing or convey misleading , telltale indicators that may be

used by hostile forces.

IMITATIVE

ELECTRONIC

DECEPTION (IED)

The introduction of radiations into unfriendly

channels that imitate

hostile emissions.

ELECTRONIC

COUNTER MEASURES

(ECM)

The part of EW involving

actions taken to prevent or

reduce effective use of the

electromagnetic spectrum by

hostile forces.

ELECTRONIC SUPPORT MEASURES (ESM)

1806. Definition. It is that division of EW involving actions taken to search for intercept, locate, record and

analyse radiated electromagnetic energy for the purpose of exploiting such radiations. The aims of ESM are

production of operational and tactical intelligence and production of steerage for other EW activities.

1807. ESM and SIGINT. ESM include essentially the same functions as SIGINT but are focused on the

more immediate requirements of the tactical commander. The relationship of ESM to SIGINT is similar to the

relationship of tactical information to intelligence. Tactical resource performing SIGINT may perform ESM

simultaneously with or a part of SIGINT missions. The primary difference between ESM and SIGINT is how

the information is used. Generally, ESM is a producer of tactical information that can be used for ECM. Fire,

manoeuvre, or threat avoidance with little systematic analysis or processing. SIGINT, however, requires

separate processing to produce the desired product. ESM and SIGINT are mutually supporting. Information

collected through ESM may be processed to produce SIGINT. SIGINT is essential to support EW.

1808. Feasibility of Search and Intercept

a. The lower the frequency the easier it is to acquire signals and the more generalised the intercept.

b. Conversely, the higher the frequencies the more difficult it becomes very localized to intercept.

c. At radio relay and radar frequencies it may be necessary to employ air borne platforms for

effective intercept.

d. The number of communications facilities and radars employed by an enemy will present a

formidable intercept task.

e. This problem of selection means that automation of intercept is a subject worthy of attention and

further development.

f. Message content is not essential since much of value can be gained from such things as traffic

flow and its pattern, the frequency employed, the type of modulation and the configuration of the net.

g. Many forward communication nets use clear speech, therefore direct intercept possible.

1809. Operational Value of Search and Intercept

a. Intercept of enemy radio nets by ground based stations can provide intelligence leading to such

things as identification of units, axes, inter-formation boundaries and arrival and deployment of reserve

forces.

b. Intercept by sensors mounted on airborne platforms can provide information on supporting

forces, redeployment of reserves and the movement of helicopter borne troops.

c. Intercept of air defence radars can reveal the pattern of deployment of air defence units and

hence, possibly the location of vulnerable points such as headquarters and airstrips.

d. Intercept of other radars and electro-optical signals may give indication of the presence of the

enemy and valuable localized warning of imminent attack.

1810. Feasibility - Direction Finder (DF)

a. Accuracy increases with rise of frequency and equipment tends to get smaller.

b. However, at higher frequencies airborne DF stations may be necessary. Accuracy will suffer if the

location of these platforms cannot be exactly defined.

c. Speed of operation can be very good. In communication terms, 4 or 5 working stations on a net

can all be located in 3 minutes. A radar can give 20 to 30 position fixes per second.

1811. Direction Finder Operational Value. Operational value depends on the accuracy that can be

achieved. At present accuracies are not sufficient for acquisition without the assistance of information from

other intelligence.

ELECTRONIC COUNTER MEASURES

General

1812. ECM includes electronic jamming and deception. One function of jamming is to degrade the enemy‘s

combat power by denying effective operations in the electromagnetic spectrum. Another function of jamming is

to reduce the signal security of enemy operators and thereby gain information through ESM. Jamming may be

subtle and difficult to detect or it accomplished from both ground and aerial platforms.

1813. Electronic deception is integrated with an extends and reinforces tactical deception operations. It

requires specific training and planning and must be well controlled if it is to be effective. The objective of

electronic deception is to deceive enemy forces through their electronic systems.

1814. This is the division of EW involving actions taken to prevent or reduce an enemy‘s effective use of the

electro-magnetic spectrum. Electronic deception may be divided into two major parts :

a. Imitative Electronic Deception (IED). Which involves intrusion into enemy‘s net or channels

and impersonate as a station of that net passing false information to confuse or harass the enemy.

b. Manipulative Electronic Deception (MED). This encompasses own fake or true net where false

information's are passed. When this information's are intercepted by the enemy analyst can cause her

into wrong interpretation of the received messages.

c. Simulative Electronic Deception (SED). The creation of electromagnetic emissions to represent

friendly notional or actual capabilities to mislead hostile forces.

Imitating Enemy Sub Station

1815. This enemy could use the call sign of a friendly station to answer call-ups and accept traffic. If the

station to which the call sign is assigned fails to answer, the imitating station may accept the message and

acknowledge receipt. Moreover by doing so the operator may suppress high priority traffic which no enemy

station could copy completely and correctly. If the transmitting operator is careless he may accept this false

receipt and close down. In case the enemy suspects and thereby request for authentication, it can be avoided by

own operators who may call other station and pretending to have high priority traffic.

1816. Delaying Tactics. The reduction of available time for transmission of authentic traffic may be

achieved by several means.

a. Offering False Coded Messages. One of the tactics of reducing the operational capacity of

enemy communication personnel‘s could be by offering false coded messages that is not capable of

being decrypted. If the enemy operator can be induced to waste his time in copying such messages and

attempting to decrypt them, the purpose is accomplished. Lifting a message, including authentication

from one net and interdicting it into another net under a different heading or piecing parts of several

messages together simply to waste time and create confusion, are ways of delaying traffic.

b. Offering Important Traffic. Another tactic is to pretend to have important traffic so as to cause

delays and create confusion. The deception operator may induce several stations to answer with a go

ahead signal. He then pretends not to hear their signal and calls repeatedly. The resulting confusion can

be quite effective in delaying authentic traffic. A deception operator may also disrupt important traffic

by claiming to have emergency messages to transmit.

1817. Frequent Request for Signal Strength. Unnecessary requests for signal strength can be used for own

advantage. The deceptions operators can in such situation ask the enemy operator for his signal strength and

thereby adjust for better results. Deception operators on EW circuits should be able to change their tone keying

characteristic and frequency to resemble the station they are imitating.

1818. Transmission of False Orders. A high degree of confusion can be created by the transmission of

false orders and instructions. In addition to this, amendment can be issued specially at critical hours of combat.

1819. Use of Obscene Language. When the enemy is on radio silence, in order to know his location distress

signals may be made. If such calls are answered it may give out the location of enemy stations. Use of insults

and obscene language may instigate the enemy operator in breaking his radio silence and thereby giving out his

location.

Signals Tactics in Manipulative Deception

1820. Screening Move Leaving back a significant sample of a brigade of battalion net in a place, the brigade

or battalion moves to a new location. This false net acts as a screen to cover the move to the formation or unit.

The enemy as such cannot assess the situation properly and their commanders may get wrong picture.

1821. Broadcasting False Information. By broadcasting false information in both existing and false nets

the enemy can be lead into drawing of inconclusive assessment. When such information are collected they give

out unintelligible conclusions confusing the enemy strategists and analysts.

1822. Exchanging Operators. Those operators whose characteristics are likely to be detected by the enemy

analysts may be changed from time to time. When such operators with peculiarities and idiosyncrasy are

exchanged, may cause the enemy intercepting agency to conclude that the units are on move. Such changes at

irregular frequency may create confusion amongst the enemy analysts who may feel that their deductions are not

free of fault. This may render the enemy analysts ineffective; alternatively force them to increase their effort to

gain more accurate information thereby stretching their capabilities and resources.

1823. Multi channel Communication. Multi channel equipment are usually located with headquarters of

higher formations. If these multi channel equipment are used at headquarters of smaller units they lead the

enemy intercepting agency to confuse them for larger headquarter. If such a net is established at a lower

headquarters the enemy can be made to believe that the net is of a higher formation.

1824. Using Number of Call Sign and frequency. Sub-station may be issued two more call signs, use of

this, projects a net to be large one. The enemy is approached to draw a similar deduction and would lead them

into incorrect net structures. Changing frequency by own forces very frequently would cause the enemy

resources to be overstretched which would mean the enemy will have to increase its effort to find which

frequency is the actual operating frequency.

1825. Observing Radio Silence. The observance of radio silence is an indication of an unusual activity

designed to deny the enemy about intending action. The enemy is therefore likely to draw similar conclusions.

Since radio silence is normally observed before an attack, the enemy is going to react. If it is observed in a false

net at a different location the enemy would divert its resources on that particular front while own forces can

strike at a place where the enemy least expects.

Jamming

1826. General. Jamming is the deliberate radiation, re-radiation or reflection of electromagnetic energy

with the object of impairing the use of electronic devices, equipment or systems being used by an enemy. There

are basically two types of Jamming –barrage jamming and spot jamming.

1827. Barrage Jamming. 'When a band of frequencies are jammed simultaneously it is called barrage

jamming'. Barrage jamming is the transmission of a side band signal to interfere simultaneously with as many

frequencies of channels as possible. This is accomplished by spreading the transmitted signal power

continuously over a wide band of frequencies. It ensures that all frequencies encompassed within the band are

subjected to interference, though the magnitude of interference may vary. Some of its advantages and

disadvantages are :

a. Advantages. Maximum frequencies can be jammed simultaneously. More effective and

minimum information of the jamming frequency is required.

b. Disadvantages. Maximum power is required; wastage of unused power, limitation on use of the

frequency spectrum by friendly forces and more vulnerable to enemy‘s direction finding equipments

are major disadvantages.

1828. Variation of Barrage Jamming. In barrage jamming a complete band is jammed and has many

disadvantages. To overcome these disadvantages some variations of barrage jamming has been developed. The

simultaneous multi spot method is the use of a single jamming signal against multiple frequencies on a power

sharing basis. In this method, a number of frequencies can be jammed at one time, with the jamming power

divided equally among the frequencies. This method is essentially a more sophisticated form of barrage

jamming. This type of jamming can jam a number of pre-selected frequencies at the same time but does not jam

an entire band of frequencies as does the barrage jamming, therefore, power is not wasted on frequencies where

no one is operating.

1829. Spot Jamming. Spot Jamming is the transmission of a narrow band of signal to interfere with a

specific frequency or channel. In other words, when only one particular frequency is jammed it is called spot

jamming. This type of jamming is best for a high jamming to signal ratio. It is useful in the sense that it jams the

selected frequency accurately, effectively and under controlled conditions. The advantages and disadvantages

are :

a. Advantages. Minimum power required, maximum concentration of power, own net is not

disturbed and no wastage of power are its advantages.

b. Disadvantages. Only one single frequency is jammed, accurate information about the frequency

to be jammed is required and a little variation in tuning by the enemy can render it ineffective.

1830. Variation in Spot Jamming. There are a number of variations of the spot method of transmitting a

jamming signal. The Sequential Multi-spot method uses a single jamming signal against multiple frequencies on

a timesharing basis, which is several predetermined frequencies are each jammed in rapid order. Each frequency

receives the full power output of the jamming for a short period of time but the cycling may be so rapid as to

appear that each frequency is being jammed continuously.

1831. Feasibility of Jamming. Jamming requires careful control as it can interfere with our own

communications, surveillance and intercept. Jamming is a power battle in which the unwanted signal must blot

out the wanted signal. In Communication EW the jamming is usually at a disadvantage since it has to operate at

longer range than the transmitter radiating the wanted signal. The reverse should apply in Non-communications

EW, where the jamming should find it easy to radiate more power than the weak echo of a reflected signal.

However, the directional nature of the radar receiving antenna often negates this advantage in the land

environment. Jamming, therefore, tend to be large, thirsty for power and are inherently vulnerable themselves.

1832. Operational Value of Jamming.

a. Communications Jamming. In order to have any significant effect on command and control, it

must be complete (i.e. HF and VHF radio & radio relay) at the level attacked. Effective radio relay

jamming may require airborne platforms. As speech security become more widespread, jamming may

become a more desirable option. Because of its inherent problems jamming may be regarded as a

weapon to be used only when the probability of success is very high.

b. Non-Communications Jamming. Non communication jamming is likely to be of value in a

protective role.

ELECTRONIC COUNTER COUNTER MEASURES

1833. Defensive EW or ECCM are those actions taken to ensure friendly effective use of the electromagnetic

spectrum. Commanders rely on electronic emitters for command and control and for many other critical

battlefield functions. The first priority of defensive EW is to protect these emitters from enemy detection,

location and identification. Command posts or weapon systems cannot survive on the modern battlefield if they

can be located through their electronic emissions. Friendly use of the electromagnetic spectrum and the location

of critical installations and systems are protected through ECCM.

1834. ECCM are protective in nature and are planned around the commander‘s mission and concept of the

operation. Planning begins with the identifications of essential friendly emitters and sensitive communications

that must be protected. Friendly electronic emitters, signatures and profiles are evaluated based on their

vulnerability to enemy signal intelligence capabilities. ECCM are then planned to overcome these

vulnerabilities.

1835. ECCM are closely related to signal security. The primary difference lies in the type of information that

is protected from enemy collection. ECCM protect friendly emitters from enemy detection. location and

identification. ECCM conceal electromagnetic signatures or deceive the enemy as to the location and

identification of the emitter. Signal security, on the other hand, protects the information that is transmitted

through friendly counter electronic systems from enemy exploitation. Many operator techniques may serve as

both ECCM and signal security measures.

1836. ECCM under the direction of the counter electronic officer, begin with training and are executed by

every element of the combat force that uses or is responsible for the use of electronic emitters. The

responsibility for ECCM starts with commanders and extends to supervisors and operators at all levels.

Techniques for reducing friendly vulnerabilities to enemy EW efforts are directed through the Communications-

Electronics Operating Instruction (CEOI), Communications-Electronic Standing Instructions, Standing

Operating Procedures (SOPs) and other instructions. The effectiveness of defensive EW is continually assessed

to validate existing ECCM and to determine the necessity for additional measures.

1837. Technical Factors. Technical ECCM is mainly involved in the design of communications and

surveillance equipments. The following factors assist survivability of ECCM :

a. Power Variability. The ability to operate on minimum power in order to make enemy ESM

more difficult, coupled with the ability to switch to high power to combat jamming.

b. Frequency Agility. It is a product of the range of frequency available to the number of channels

that can be changed.

c. Antennas. Directional or automatic steer able antennas give the best ECCM characteristics.

Transmit antennas can then be aligned to beam power in the required direction and reduce that

available to enemy intercept and directing finding receive antennas can be aligned to accept the wanted

signal and reject the unwanted jamming.

d. Reduce Transmission Time. Any characteristic (e.g. burst transmission) which reduces

transmission time aids ECCM.

e. Choice of Modulation. Dependent on the frequency used, some types of modulation have better

ECCM characteristics.

1838. Operating Factors. Communications and surveillance equipment are operated by all arms. ECCM is

not therefore a matter purely for specialists. The important operating factors are operating drills; sensible sitting;

training; and communication security. If has two components :

a. Functional. Functional ECCM is involved in the operation of communications and surveillance

equipments.

b. Tactical. Tactical ECCM is involved among other things like, EW staff duties; operational

grouping; levels of command; and deployment of forces, communications and surveillance equipment

to support these forces.

EW IN BANGLADESH ARMY

1839. EW is an essential element of combat power. We acquire EW assets for active defence and attacks

against enemy EW capabilities. EW can adopt passive means to protect our command, control and

communication (C3) system. Protecting C3 is the number one priority for EW. Action taken to deny, influence,

degrade or destroy enemy C3 capabilities by lethal fire (Artillery, air etc) is also equally important.

1840. ECCM or defensive EW are the responsibility of all soldiers who use or supervise the use of

communications and electronic equipments. ECCM is passive in nature and are used to protect friendly C3

system against enemy ECM. Passive ECCM includes both anti-intercept and locating procedures such as

emission control. terrain masking and avoidance and locating procedures such as emission control, terrain

masking and avoidance and anti-jam features such as equipment design with built-in ECCM capabilities. ECCM

also includes the immediate identification and reporting of intrusion jamming and interference on friendly C3

facility.

1841. Limited EW support measures are provided by monitoring platoon of the Divisional Signal Battalion

and the unconventional force provide commander the capability to intercept, identify and locate enemy emitters.

Electronic support measures (ESM) represent a source of information required for deception, ECCM targeting

by lethal weapon systems and jamming (when EW assets are made available). It supports the destruction of

enemy C3 systems by skilful employment of both long-range delivery assets and the unconventional forces. It

also supports the commander‘s efforts to counter enemy‘s operational security and deception.

1842. When jammers are available, these can support other combat actions :

a. By disrupting key command and control nets, thus slowing or disorganizing the enemy in critical

sections.

b. By denying the enemy the ability to react to changes on the battlefield.

c. By reducing the effectiveness of enemy fire support and air control nets.

d. By denying the enemy the use of his air defence fire control nets.

e. By disrupting the enemy‘s flow of critical supplies such as ammunition and POL.

1843 – 1900. Reserved.

SECTION - 19

INTELLIGENCE IN INFORMATION OPERATION

GENERAL

1901. History indicates that the speed and accuracy of information available to military commanders is the

significant factor in determining the outcome in the battlefield. Information Operation enables the accuracy and

timeliness of information required by our military commanders by defending our systems from exploitation by

adversaries. Information operations are used to deny adversaries access to our Command, Control, Intelligence

and other supporting automated infrastructures.

1902. Adversaries from both state and non state actors are increasingly exploring and testing Information

Operation actions as asymmetric warfare that can be used to thwart our military objectives. This requires our

military to employ defensive technologies and utilize leading-edge tactics and procedures to prevent our forces

and systems from being successfully attacked.

1903. Information is a strategic resource, vital to national security and military operations depend on

information and information systems for many simultaneous and integrated activities. Information Operations

(IO) are described as the integrated employment of Electronic Warfare (EW), Computer Network Operations

(CNO), Psychological Operations (Psy Ops), Denial and Deception (D&D) and Operations Security (OPSEC) in

concert with specified supporting and related capabilities to influence, disrupt or corrupt, adversarial human and

automated decision making while protecting our own.

THE INFORMATION ENVIRONMENT

Dimension

1904. General. The information environment is the aggregate of individuals, organisations, and systems that

collect, process, disseminate or act on information. The actors include decision makers, junior leaders,

individuals and organizations. Resources include the materials and systems employed to collect, analyse, apply

or disseminate information. The information environment is where humans and automated systems observe,

orient, decide and act upon information and is therefore the principal environment of decision making. Even

though the information environment is considered distinct, it resides within each of the four domains like land,

air, sea and space. The information environment is made up of five interrelated dimensions: physical,

informational, cognitive, technological as well as time and resource.

1905. The Physical Dimension. The physical dimension is composed of the command and control (C2)

systems and supporting infrastructures that enable individuals and organizations to conduct operations across the

air, land, sea and space domains. It is also the dimension where physical platforms and the communications

networks that connect them reside. This includes the means of transmission, infrastructure, technologies, groups

and populations. Examples include :

a. Geographic coordinates of adversary's information infrastructure and capabilities.

b. Organisation of infrastructure and capabilities as well as identification of critical links, nodes and

redundant communication infrastructure.

c. Types, quantity and configuration of information infrastructure and capabilities (with specific

makes, models and numbers).

d. Organisational planning, decision and execution processes.

e. Enemy intelligence/feedback mechanism for gaining battle space awareness, information and

knowledge.

f. Enemy computer attack, defence and exploitation capabilities.

1906. The Informational Dimension. The informational dimension is where information is collected,

processed, stored, disseminated, displayed and protected. It is the dimension where the C2 of modern military

forces is communicated and where commander‘s intent is conveyed. It consists of the content and flow of

information. Consequently, it is the informational dimension that must be protected. Informational properties of

the information environment include those systems and networks where information is created, processed,

manipulated, transmitted and shared. It includes those properties relevant to the electronic collection,

transmission, processing, storage and display of information. These properties may be electronic or human-to-

human or a combination of both. Examples of informational properties include :

a. Specification, capacity, configuration and usage of information infrastructure and capabilities.

b. Technical design of information infrastructure.

c. Networks of human-to-human contact used for the transmission of information (life drops, dead-

drops, etc).

1907. The Cognitive Dimension. The cognitive dimension encompasses the mind of the decision maker and

the target audience (TA). This is the dimension in which people think, perceive, visualise, and decide. It is the

most important of the three dimensions. This dimension is also affected by a commander‘s orders, training and

other personal motivations. Battles and campaigns can be lost in the cognitive dimension. Factors such as

leadership, morale, unit cohesion, emotion, state of mind, level of training, experience, situational awareness, as

well as public opinion, perceptions, media, public information and rumours influence this dimension. Cognitive

properties of the information environment are the psychological, cultural, behavioural and other human

attributes that influence decision making, the flow of information and the interpretation of information by

individuals or groups at any level in a state or organisation. Cognitive properties may include :

a. Cultural and societal factors affecting attitudes and perceptions such as language, education,

history, religion, myths, personal experience and family structure.

b. Identity of key individuals and groups affecting attitudes and perceptions, whether in the same or

a different country as those they influence.

c. Identity and psychological profile of key decision makers, their advisers, key associates, and/or

family members who influence them.

d. Credibility of key individuals or groups and specification of their sphere of influence.

e. Laws, regulations and procedures relevant to information and decision making processes,

capability employment doctrine, timeliness and information content.

f. How leaders think, perceive, plan, execute and assess outcomes of their results and actions from

their perspectives.

g. Identify key historical events between the target country and Bangladesh, which may affect an

individual or group‘s attitudes and perceptions of Bangladesh, whether in the same or different country

as those they influence.

1908. Technological Dimension. Advancements in technology have enabled information to be collected,

processed, stored, disseminated, displayed and protected outside the cognitive process in quantities and at

speeds that were previously incomprehensible. While technology makes great quantities of information

available to audiences worldwide, perception-affecting factors provide the context which individuals use to

translate data into information and knowledge.

1909. Time and Resource Dimension. The finite amount of time and resources available to obtain

information must be considered. Whether decisions are made cognitively or pre-programmed in automated

systems, the limited time and resources to improve the quality of available information leaves decision making

subject to manipulation. Additionally, there are real costs associated with obtaining quality information - that is,

information well-suited to its purpose - such as those to acquire, process, store, transport and distribute

information. The overall impact of successful IO improves the quality of friendly information while degrading

the quality of adversary's information, thus, providing friendly forces the ability to make faster, more accurate

decisions.

Principles of IO

1910. Success in military operations depends on collecting and integrating essential information while

denying it to the adversary and other Target Audience. IO encompasses planning, coordination and

synchronisation of the employment of current capabilities to deliberately affect or defend the information

environment to achieve the commander‘s objectives :

a. Core Capabilities. EW, CNO, Psy Ops, D&D and OPSEC are integrated into the planning and

execution of operations in the information environment.

b. Supporting Capabilities. Information assurance [IA], physical security, physical attack and

counter intelligence have military purposes other than IO but either operates in the information

environment or have impact on the information environment.

c. Related Capabilities. Civil Military Operations [CMO] and defensive support to public

diplomacy may be constrained by our policy or legal considerations. While these capabilities have

common interfaces with Information Operation, their primary purposes and rules make them separate

and distinct. As a result, it is essential that commanders and their staffs coordinate their efforts when

exercising their functions within the information environment.

1911. IO are primarily concerned with affecting decisions and decision-making processes, while at the same

time defending friendly decision-making processes. Primary mechanisms used to affect the information

environment include: influence, disruption, corruption or usurpations.

Fundamental Assumptions

1912. IO ability to affect and defend decision making is based on five fundamental assumptions. Although

each of these assumptions is an important enabling factor for IO, they will not all necessarily be true for every

operation. For any specific operation where one or more of these assumptions are not met, the risk assessment

provided to the commander would be adjusted accordingly :

a. Generally, the quality of information that is considered valuable to human and automated

decision makers is universal. However, the relative importance of each quality criterion of information

may vary based on the influences of geography, language, culture, religion, organisation, experience or

personality.

b. Decisions are made based on the information available at the time.

c. It is possible, with finite resources, to understand the relevant aspects of the information

environment to include the processes decision makers use to make decisions.

d. It is possible to affect the information environment in which specific decision maker's act

through psychological, electronic or physical means.

e. It is possible to measure the effectiveness of Information Operation actions in relation to an

operational objective.

IO Support for Military Operations

1913. Since human activity takes place in the information environment, it is potentially subject to IO.

However, only mission-related critical psychological, electronic and physical points in the information

environment should be targeted directly or indirectly, by IO. The planning methodologies used to identify and

prioritise such points in planning IO are discussed separately.

1914. IO capabilities can produce effects and achieve objectives at all levels of war and across the range of

military operations. The nature of the modern information environment complicates the identification of the

boundaries between these levels. Therefore, at all levels, information activities, including IO must be consistent

with broader national security policy and strategic objectives.

1915. Because IO are conducted across the range of military operations and can make significant

contributions before major operations commence, the IO environment should be prepared and assessed through

a variety of engagement and intelligence activities, all designed to make IO more effective. In addition to

impacting the environment prior to the onset of military operations, IO are essential to post combat operations.

Therefore, integration, planning, employment and assessment of core, supporting, and related IO are vital to

ensure a rapid transition to a peaceful environment.

1916. Objectives. The ultimate strategic objective of IO is to deter a potential or actual adversary or other

target audience from taking actions that threaten our national interests. Additionally, IO actions executed

through civilian controlled portions of the global information environment or which may cause unintended

reactions from our or foreign populaces, must account for our policy and introduction of legal issues, as well as

potentially disruptive infrastructure issues, through civil-military coordination at all levels.

a. Target for IO. IO may target human decision making or automated decision support systems

with specific actions. Technology allows automated decision making to be targeted with increasing

precision and affords more sophisticated ways to protect it. However, targeting automated decision

making, at any level, is only as effective as the human adversary‘s reliance on such decisions.

b. The Focus of IO. The focus of IO is on the decision maker and the information environment in

order to affect decision making and thinking processes, knowledge and understanding of the situation.

Information Operation can affect data, information and knowledge in three basic ways :

(1) By taking specific psychological, electronic, or physical actions that add, modify, or

remove information from the environment of various individuals or groups of decision makers.

(2) By taking actions to affect the infrastructure that collects, communicates, processes and/or

stores information in support of targeted decision makers.

(3) By influencing the way people receive, process, interpret and use data, information and

knowledge.

1917. IO in Military Operations. All IO capabilities may be employed in both offensive and defensive

operations. Commanders use IO capabilities in both offensive and defensive operations simultaneously to

accomplish the mission, increase their force effectiveness and protect their organisations and systems. Fully

integrating IO capabilities for offensive and defensive operations requires planners to treat IO as a single

function. Commanders can use IO capabilities to accomplish the following :

a. Destroy. To damage a system or entity so badly that it cannot perform any function or be

restored to a usable condition without being entirely rebuilt is the ultimate goal.

b. Disrupt. To break or interrupt the flow of information for meeting IO objective.

c. Degrade. To reduce the effectiveness or efficiency of adversary's Command and Control or

communications systems and information collection efforts or means. IO can also degrade the morale

of a unit, reduce the target‘s worth or value or reduce the quality of adversary's decisions and actions.

d. Deny. To prevent the adversary from accessing and using critical information, systems, and

services.

e. Deceive. To cause a person to believe what is not true. D&D seeks to mislead adversary decision

makers by manipulating their perception of reality.

f. Exploit. To gain access to adversary's Command and Control systems to collect information or to

plant false or misleading information.

g. Influence. To cause others to behave in a manner favourable to our forces.

h. Protect. To take action to guard against espionage or capture of sensitive equipment and

information.

j. Detect. To discover or detect the existence or fact of an intrusion into information systems.

k. Restore. To bring information and information systems back to their original state.

l. Respond. To react quickly to an adversary‘s or others‘ IO attack or intrusion.

INTELLIGENCE SUPPORT TO INFORMATION OPERATIONS

Current State of Information Environment to be Evaluated

1918. Like all other aspects of operations, IO requires effective intelligence support. IO is intelligence

intensive in particular and therefore successful planning, preparation, execution and assessment of IO demand

detailed and timely intelligence.

1919. Before military activities in the information environment can be planned, the current 'state' of the

dynamic information environment must be collected, analysed and provided to commanders and their staffs.

This requires intelligence on relevant portions of the physical, informational and cognitive properties of the

information environment, which necessitates collection and analysis of a wide variety of information and the

production of a wide variety of intelligence products as discussed below.

1920. In order to understand the adversary or other TA, a decision-making process and determination of

appropriate capabilities are necessary to achieve operational objectives. Commanders and their staffs must have

current intelligence for doing so very effectively. This includes relevant physical, informational and cognitive

properties of the information environment as well as assessment of ongoing IO activities.

Intelligence Support Planning

1921. Planning Considerations. Intelligence support is an integral part of IO planning. In particular, the

intelligence preparation of the battle field (IPB) process provides a valuable methodology for identifying

capabilities, vulnerabilities and critical nodes within the information environment. A sequential overview of

intelligence support to Information Operation planning includes actions to :

a. Identify adversary information value, use, flow and vulnerabilities relevant to specific types of

decision making.

b. Identify individual systems and target sets relevant to specify adversary or other Target

Audiences decision making.

c. Identify desired effects appropriate to individual systems and target sets.

d. Predict the consequences (non-objective related outcomes) of identified actions.

e. Coordinate with planning personnel to establish priority of intelligence requirements.

f. Assist in developing IO assessment criteria during planning and then assist in monitoring and

assessing IO during execution (which may extend before and after execution of conventional

operations).

g. Tailor assessment/feedback methodologies to specific operations.

h. Evaluate the outcome of executed IO activities/tasks.

j. Provide assessment for IO actions relative to commander‘s objectives and mission.

1922. Information Environment Impact on Intelligence Support. The nature of the information

environment has profound implications for intelligence support to IO. Members of the operational community

and the intelligence community must understand these implications in order to efficiently request and provide

quality intelligence support to IO. These implications are listed below.

a. Intelligence Resources are Limited. Information collection requirements are almost limitless,

specially for many types of IO. Commanders and their intelligence and operations staff must work

together to identify IO intelligence requirements and ensure that they are given high enough priority in

the commander‘s requests to the intelligence community.

b. Collection Activities are Legally Constrained. The nature of the information environment

complicates compliance with legal constraints and restraints. Thus the Intelligence Community must

implement technical and procedural methods to ensure compliance with the law. Additionally,

intelligence may be supplemented with information legally provided by law enforcement or other

sources. Specially in the area of CNO, where the application of different domestic and international

laws may be unclear, close coordination among the operational, legal and law enforcement

communities is essential.

c. IO Intelligence Often Requires Long Lead Times. The intelligence necessary to affect

adversary or other Target Audiences decisions often requires that specific sources and methods be

positioned and employed over time to collect the necessary information and conduct analyses required

for IO planning. Commanders and their staffs, including IO planners, must be aware of the relative lead

times required to develop different types of intelligence both for initial planning and for feedback

during operations. To deal with these long lead times, the commander must provide detailed initial

guidance to the staff during the mission analysis and estimate processes.

d. The Information Environment is Dynamic. The information environment changes over time

according to different factors. Physical changes may occur more slowly and may be easier to detect

than informational or cognitive changes. Commanders and their staffs must understand both the

timeliness of the intelligence they receive and the differing potentials for change in the dimensions of

the information environment. The implication is that we must have agile intellects, intelligence systems

and organisational processes to exploit this dynamic environment.

e. Properties of the Information Environment Affect Intelligence. Collection of physical and

electronic information is objectively measurable by location and quantity. While intelligence support to

IO identification of key individuals and groups of interest may be a relatively straightforward challenge

the relative importance of various individuals and groups, their psychological profiles and how they

interact is not easily agreed upon nor quantified. Commanders and their staffs must have an

appreciation for the subjective nature of psychological profiles and human nature. They must also

continue to pursue effective means of trying to measure subjective elements using measure of

effectiveness and other applicable techniques.

1923. Coordination of Planned IO with Intelligence. Coordination should occur among intelligence,

targeting, IO and collection management personnel. The requirement for accurate intelligence gain/loss and

political/military assessments, when determining targets to attack and means of employment is central to the

integration of IO.

1924. Priority of Effort. The requirement to collect, analyse and produce detailed intelligence required for

IO currently exceeds the resources of the Intelligence Community. Assigning intelligence resources to IO as

with all operations is regulated based on established requirements and processes within the Intelligence

Community. It is imperative that intelligence requirements be coordinated and prioritised at each level of

command.

1925. Sources of Intelligence Support. Through the intelligence staff, IO planners and supporting

organisations have access to intelligence from the national and formation level intelligence producers and

collectors. At the formation level, intelligence centre supports IO planning and execution and provides support

to Commander‘s through established intelligence support elements. In multinational operations, when

appropriate, the operational staff should share information and assessments with allies and coalition partners.

The operational staff normally assigns specific personnel to coordinate with IO planners and capability

specialties through the IO cell or other IO staff organisations established by the Commander‘s.

1926 – 2000. Reserved.

SECTION - 20

INTELLIGENCE SUPPORT FOR PSYCHOLOGICAL OPERATION

FUNDAMENTALS

General

2001. Although the term 'psychological operation (Psy Ops)', is of a fairly recent origin but it is not new. It

was practiced as early as 500 BC by SUN TZU and all successful national and military leaders in the past. In the

recent past the Germans and British practiced it during 1914-18 war; by the Germans, British and Americans in

the 1939-45 war, by the Americans in the Gulf War, recent Afghan and Iraq war. The terms used to define this

type of operation have been varying from time to time but in the more recent past the expressions 'propaganda'

and 'political operation' have been used which are now replaced by the term 'Psy Ops'.

2002. Man has thus known the art of Psy Ops since the earliest time. Recent advancement in the fields of

communication and social sciences, however, has increased its scope. Consequently nations are making a

special study of this kind of operation and to create an organisation for dealing with it more efficiently and

smoothly.

Psy Ops Related Terms

2003. Propaganda. 'It is any information, ideas, doctrines or special appeals disseminated to influence the

opinions, emotions, attitudes or behaviour of any specified group in order to benefit the sponsor either directly

or indirectly'.

2004. Psy Ops. 'It is the planned use of propaganda and other measures that have the primary purpose of

influencing the opinions, emotions, attitudes and behaviour of the enemy, neutral, or friendly groups, in such a

way as to support the accomplishment of national aims and objects.' In other way it can be said that, 'Psy Ops is

the pre-war or wartime use of propaganda directed primarily at confusing or demoralizing enemy populations or

troops putting them off guard in the face of coming attacks, or inducing them to surrender.'

2005. Indoctrination. This term usually means intensive political indoctrination. It may involve long

political lectures or discussions, long compulsory reading assignments, and so forth. Sometimes it can be done

in conjunction with efforts to reduce the audience resistance by exhausting him either physically through torture,

overwork, or denial of sleep or psychologically through solitary confinement, threats, emotionally disturbing

confrontations with interrogators or defected persons, humiliation in front of fellow citizens, etc. The term

brainwashing has been widely used in sensational journalism to refer to such activities conducted by communist

China, Russia and elsewhere.

2006. Education. It tries to present various sides of an issue, the grounds for doubting as well as the grounds

for believing the statements it makes, and the disadvantages as well as the advantages of every conceivable

course of action. Education aims to induce the audience to collect and evaluate evidence for him and assists him

in learning the techniques for doing so.

2007. Advertising. Another related word, to propaganda advertising. It has mainly commercial connotations,

though it needs not be restricted to this; political candidates, party programs and positions on political issues

may be 'packaged' and 'marketed' by advertising firms.' The word 'promotion' and public relations have wider

connotations and are often used to avoid the implications of 'advertising' or 'propaganda'. 'Publicity' often

implies merely making a subject known to a public, without educational, propagandistic, or commercial intent.

Varying Role of Psy Ops

2008. Psy Ops can be effectively used in three conditions: in peacetime, in times of crisis and during war. In

these three scenarios, Psy Ops plays a vital role in ensuring that the Army‘s mission is successfully

accomplished :

a. During peace, Psy Ops can be used as an instrument of public Information and to secure the

support of the populace for the government‘s development programs.

b. During crisis, Psy Ops assets can be deployed to warn people of impending disasters and what to

do in an emergency, complementing other government agencies and mass media particularly in the

remote areas.

c. During war, Psy Ops can be employed to cause enemy defection and surrender and render the

enemy‘s combat power ineffective.

2009. Objectives. Ops is combat multiplier in both conventional and unconventional operations. In

conventional operations, it is used to prepare the battlefield psychologically, to demoralize enemy troops and

increase friendly troop‘s morale. Ops is employed to win popular support while at the same time, reduce the

combat effectiveness of the enemy troops. The aim of Psy Ops is firstly to demoralise the enemy and

population. Secondly, eradicates the doctrine in which they have been taught to believe on his own side and

finally, to indoctrinate them with the positive doctrine we wish them to possess. Following are the objectives of

Psy Ops :

a. Reduce the combat efficiency of the enemy by exploitation of all political, economic, social and

moral aspect of the enemy.

b. Facilitate reorganisation and control of occupied or liberated areas.

c. Produce cumulative affects upon the opinions, emotions, attitudes and behaviour of the target

audiences that will assist in the defeat of the enemy.

2010. Tasks. Like military operations, Psy Ops objectives are achieved by assigning tasks to lower levels.

The tasks may be any one or more of the following for various target audience depending upon the situation and

the level to which the task(s) is assigned :

a. Towards Enemy Military Forces.

(1) To induce malingering, desertion, mutiny and surrender.

(2) To create distrust in the existing enemy leadership, arms and equipments.

(3) To create confusion as to the correctness of enemy war aims.

(4) To install a lack of faith in the enemy's ultimate victory.

b. Towards Enemy Population.

(1) To develop resistance to the political ideologies of the enemy government.

(2) To drive a wedge between the enemy's government and the people.

(3) To create dissension within specific enemy groups.

(4) To encourage resistance move within enemy areas.

c. Towards Foreign Groups.

(1) To gain co-operation of foreign groups within occupied areas.

(2) To deny the co-operation of foreign groups within areas occupied by the enemy.

d. Towards Allies of Own and Enemy

(1) To increase the friendship and co-operation among the allies.

(2) To cause a split between the enemy and his allies.

e. Towards Neutral Groups.

(1) To build goodwill and friendship with neutral countries and groups.

(2) To deny to the enemy the economic or political collaboration of neutral countries.

PLANNING PROCESS AND INTELLIGENCE

General

2011. The need for long range detailed and imaginative planning is as critical for Psy Ops as it is for any

other operation. Psy Ops requires a fluid planning system. Targets of psychological opportunity must be

exploited as they arise. Opportunities to exploit unexpected target vulnerabilities must not be lost by inflexible

insistence upon implementation of original plans.

2012. Vulnerabilities, conditions, target audiences, objectives, and appropriate themes often change swiftly

with shifts in policies or in the balance of political or military events. Psy Ops officers must continuously update

present plans, anticipate future developments and plan for the future. Planning may precede the decision to carry

out a particular propaganda campaign, with the decision coming only after a study of the proposed Ops estimate.

Whether the planning precedes or follows the decision, the ingredients are essentially the same for all Psy Ops.

Psychological Operation Planning Process

2013. Plan Ingredients. Psy Ops plan ingredients include following :

a. Realistic objectives that can be achieved within prescribed policy.

b. Analysis of the situation.

c. Sources of information.

d. Deliberation of the target and its accessibility.

e. Themes to be used to achieve objectives.

f. Media to be employed.

g. The formal staffing and co-ordination required to effect the plan.

h. A determination whether the plan is usable for strategic or tactical operations or both.

2014. Prerequisites. The prerequisites for successful psychological operations are :

a. Complete, accurate and timely planning.

b. Optimum employment of all available time, space, manpower, funding and material.

c. A complete, detailed and accurate information base arranged for ease of extraction of relevant

information.

d. Appropriate direction, control, training, intelligence, co-ordination, co-operation and motivation

to ensure attainment of assigned objectives and accomplishment of the mission. Exceptional

communicative skills, timely and accurate intelligence, logistical planning for non-standard supplies

and maintenance are essential. Psy Ops planning are a continuous, long-range process requiring

imagination, determination and detailed implementation at all levels.

2015. Contingency plans. Contingency plans which treat events reasonably expected to occur, follow the

same pattern. These plans must be implemented immediately upon order when the anticipated event occurs.

Contingency Psy Ops plans cover a variety of situations, such as the end of hostilities; third country

intervention; the use of new weapons; major changes in the country, allies and third country political conditions

and reversal of major operations.

2016. Intelligence Requirements for Psy Ops. Psy Ops units and staffs constantly assemble intelligence in

support of Psy Ops, relevant to designated areas of operation. This intelligence is focused on groups presumed

to be of Psy Ops interest. The basic material gathered form numerous sources are placed into a basic Psy Ops

study. These are :

a. Target Analysis. Target analysis systematically studies the tentative targets selected from those

discussed in the area study.

b. Media Selection. Media selection must take into account pertinent factors about the target

audience which are surfaced in the target analysis as well as resource capabilities.

c. Conceptualisation. Conceptualisation is the translation of the target analysis and media selection

outputs into a workable plan for transmission to the target audience.

d. Impact Analysis. A pretext to determine the probable impact of Psy Ops material should be

accomplished using the appropriate techniques.

e. Reduce the Time and Effort. Psy Ops planning and preparation of propaganda material down to

and including the pretext may take place prior to receipt of a Psy Ops mission. The extent to which

psychological operation staffs and units are correct in gathering relevant data, planning and unit

preparation of propaganda material should materially reduce the time and effort required to implement

a decision requiring Psy Ops support.

f. Transmitting Mission. The Psy Ops mission can be transmitted to the Psy Ops support unit at

anytime during the Psy Ops flow prior to campaign control. Upon receipt of a Psy Ops support mission,

both unit and staff Psy Ops officers follow the routine steps.

g. Prepares the Psy Ops Estimate. The Psy Ops staff officer prepares the Psy Ops estimate of the

situation in support of the commander‘s mission with information from the Psy Ops support unit.

Target analyses are annexes to the Psy Ops estimate. The commander's decision regarding Psy Ops

support of his mission is made using the Psy Ops estimate. In addition to all else, the estimate should

make clear the psychological impact of the commander's courses of action.

h. Psy Ops Staff Prepares Plans. After the commander issues his decision, the Psy Ops staff

prepares his plans. When the plans are approved, the Psy Ops units are tasked with requirements. There

is a continuous interaction between the Psy Ops units and the supported units Psy Ops staffs.

j. Campaign Control. The next step in the Psy Ops flow is campaign control. This involves both

the productions of Psy Ops materials and dissemination.

k. Post-Test. The last block reflected is the post-test.

l. Feedback. The most crucial element of the flow is the element of feedback. It provides the basis

for modification of plan and operations at all points and is critical to the conduct of Psy Ops.

2017. Managerial Decisions. The planned use of propaganda in any conflicting environment requires a

series of managerial decisions. These decisions must be made within the framework of policy and objectives and

with fullest possible intelligence about the target.

2018 – 2100. Reserved.

SECTION - 21

DECEPTION AND DENIAL

GENERAL

2101. Until the 20th

century, military forces never fully understood the psychology behind successful

Deception techniques. It was more of an ―art‖ than a science. In the 12th

century BC, example, the Greeks found

themselves in a war with Troy. Although Homer‘s Iliad was fictionalized this confrontation as a chase caused by

meddling gods and the love of a woman, i.e., Helen of Troy, control of a lucrative trade route between Greece

and Asia Minor was probably the true reason for the nine year war. Legend says the Greeks finally captured

Troy through the use of deception ―the Trojan Horse‖. Although history dose not identify who thought of the

Trojan Horse deception, intelligence analysts are often integral in developing and planning such operations.

2102. Denial includes all measures taken by a government or military forces to prevent a potential adversary

from obtaining sensitive or compromising information. In other words, counter deception attempts to make a

person, unit, or activity ―invisible‖ to the seeing eyes of an enemy. When successful, it provides a distinct

advantage, making effort to identify key activities, facilities, and capabilities by an adversary‘s reconnaissance

more difficult over the past 100 years, deception and denial programs have become more sophisticated and

complicated. It is definitely a force multiplier, when used effectively; it can change the momentum of a battle of

war. The idea behind deception and counter deception is simple :

a. Convince the enemy that friendly forces are not present when they are; or.

b. Convince the enemy that friendly forces present when they are not.

2103. Most dictionaries define deception as ―the employment of trickery or guile‖. It is an effort to cause

another to believe what is not true in order to mislead an adversary into accepting a misperception and pack

understanding of the opponent's mindset. Here the intelligence analyst can play an important role because the

analyst should know the strengths and vulnerabilities of the adversary i.e., what action can best exploit the

enemy‘s interests, intentions, fears, and capabilities.

2104. Deception takes many forms. It might be explicit or implied, may involve concealing what is true or

displaying what is false, or be a combination of both. In conflict and war deception is widely perceived to be

both. At the strategic level, deception aims to influence deception-making processes that influence national

policy and broad (threat) military operations. At the tactical level, it may seek to fool the soldier over the next

hill.

DECEPTION AND MILITARY OPERATION

Objectives

2105. Military deception can be strategic, operational or tactical :

a. Strategic deception is an extension of political deception by using military activities. It is large

scale, long –term projections of false intelligence to assist in the attainment of theatre objective.

b. Deception at the operational level seeks to facilitate the prosecution of a major operation or

campaign by manipulating enemy‘s perceptions and expectations.

c. Tactical deception is deliberate action to achieve surprise on the battlefield. Its aim is to induce

enemy to do something counter to his interests.

Although the line between strategic, operational and tactical deception is not always clear, one can safely onside

the scale and tempo at which these are conducted to differentiate between these three levels.

2106. Deception is conceived and execute to help multiple combat power through surprise and security.

Successful execution requires imagination in the analysis of tactical situations. The decision to deceive or not to

deceive is based on four fundamental questions. These are :

a. Is the enemy susceptible to deception ?

b. Is there an opportunity for deception ?

c. Are resources including time available for deception ?

d. And how is the enemy likely to react in this situation? Being satisfied with the answers and

having decided to deceive the enemy, the commander selects the deception objective, the deception

target and the deception story.

2107. The Deception objective is the desired result of what the enemy is to do or not to do at a critical time

and/or place in the course of the campaign or battle. It can be directed to influence any aspect of the enemy‘s

organization or operation- for example, his reserves, fire support, communications etc. The deception target is

the enemy commander with the authority to make to decision that will achieve our deception objective.

Generally, It is the commander who has the authority to make broad adjustments to enemy dispositions and

plans. The deception story is false information provided to the enemy to lead him to an incorrect appreciation of

friendly forces and plans. The story involves a believable intent or capability so that the enemy makes a decision

which puts him at a disadvantage.

2108. In the indications and warning process, covers the ―cry wolf syndrome‖, which occurs when too many

warnings of a potential devastating development desensitize a decision-maker into not taking action at an

appropriate time. The ―cry wolf syndrome‖ in deception has a similar effect, but now those people who make

decisions for the adversary may fall into the trap. For this work, the adversary believes that :

a. Friendly activities follow a consistent or uniform pattern.

b. Departure from the pattern-a surprise-is unlikely; and,

c. The predictability of future activities reduces jeopardy or concern.

2109. Deception is rarely an end to itself, and most often occurs in conjunction with a greater objective. The

goal friendly forces may want to accomplish can range from simple survival of a country (or army) to gaining

strategic surprise. The deception activity, therefore, must address what the adversary will do if the deception is

successful, and how the deception relates to the overall plan.

2110. Mission objectives dictate deception methodologies. Since successful completion of a mission is the

desired end state, any effort to deceive an adversary should accomplish the mission or goal. To avoid working at

cross purposes, the planning process for a deception effort moves in a reverse direction. In other words, a

deception ―story starts at the end‖.

Categorization of Deception Methods

2111. Physical Deception Methods. Involve military activities designed to either deny or convince an

opponent of pending operations, and can include dummy equipment and devices, logistic actions, ―exercises‖,

and tests.

2112. Technical Deception Methods. Involve the deliberate, re-radiation, alteration, absorption, or

reflection of energy designed to convey or deny information about an actual or pending activity.

2113. Administrative Deception Methods. Involve oral, pictorial, or documentary data designed to

mislead or deny to adversary information of an impending activity or operation.

Selected “Tools” of Deception

2114. Four types of deception are used to present the deception story; feint, demonstration, ruse and display.

a. The feint is limited objective attack varying in size form a raid to a supporting attack. It

contributes to the overall accomplishment of the mission as well as misleading the enemy. A

supporting attack is a feint when it is presented to the enemy as a main effort.

b. Demonstrationist use a show of force on the battlefield where a decision is not sought. It is similar

to a feint with one exception – no contact with the enemy is intended.

c. Ruses are tricks of war. They are characterized by deliberate placing of false information into the

hands of the enemy. Ruses range form simple tactical tricks employed by soldiers to strategic actions

employed by nations.

d. Finally, displays are activities to simulate, disguise or portray various facts to enemy‘s

surveillance system.

e. Simulations are projection of objects or systems that actually do not exist on the battlefield. A

disguise is altering an object to make it look like something else.

f. A portrayal on the other hand s presenting to the enemy a unit which does not exist or which is of

a different type than actually does exist.

2115. To manipulate an adversary to act or react in a particular fashion, the deception planner must consider

who or what can galvanize the response. Obviously intelligence about the adversary is key to precipitating the

desired reaction. In creating a story which the adversary will believe, the plan may use a variety of ―tools‖. The

listing below, however, merely illustrates the broad range of instruments available to the deception planner.

2116. Camouflage and Concealment. Earlier in this section has emphasised the linkage between

camouflage, concealment, and deception. Camouflage is the use of natural or artificial material to evade

detection, and concealment is the judicious use of cover and terrain to hide from observation.

2117. Demonstration, Feints, and Diversions. These operations draw an adversary‘s attention away from

an area or activity. Demonstrations make no contact with adversary, while feints and diversions do. The

Normandy invasion in 1944, the amphibious landing at Inch on in 1950, and the preparations for an amphibious

assault on Kuwaiti beaches in 1991 are good examples of demonstrations, feints, and diversions.

2118. Displays, Decoys, and Dummies. These activities involve the placement of tangible (physical)

fabrications made of natural or artificial components to simulate the presence of real equipment or units, or to

suggest that an activity is not taking place.

2119. Mimicry or Spoofing. This is the use of intangible (signals) fabrications to portray an entity or object

of significance. In the 1982 Israeli invasion of Lebanon, for example, the Israelis released a large number of

remote-control drone aircraft to confuse Syrian radar‘s and to collect data on the radio and radar frequencies

used by the Syrians. Then the Israelis sent out Electronic Warfare (EW) aircraft to jam or confuse the Syrian

radar‘s. The Israeli EW aircraft false signals which interfered with the Syrian radar guided missiles. A detailed

procedure for EW deception is at Annex A.

2120. Dazzling or Sensory Saturation. This is the overloading of an adversary sensory processing abilities

with an abidance of stimuli. The principal idea is to raise the ―noise‖ level high enough to drown out the target

signal.

2121. Disinformation or Ruse. This involves the ―doctoring‖ of printed, electronic, or photographic media

passed to an adversary with the intent to mislead or deceive. Today manipulating open source data is a method

which evens the relatively unskilled deception practitioner can use to reinforce a particular position. when

motivated, some countries and non-state actors have had little difficulty creating or perpetuating a false story,

diverting attention to another issue, or influencing public opinion at home or abroad. The increased use of the

Internet has also created even more deception opportunities. Verifying the source and veracity of information

obtained from the internet is sometimes difficult, if not impossible.

2122. Conditioning and Exploiting. This involves two elements: 1st taking advantage of an adversary‘s pre-

existing bias, belief, habit, or 2nd generating and then taking advantage of a bias, belief or habit. Whether the

adversary‘s bias, belief, or habit is naturally acquired or induced by the deceiver is incidental.

2123. Deception as a “Two-Edged Sword”. Deception when successfully used by friendly forces can

prove most rewarding and save lives, but an adversary may also employ deception. Like a double-edged sword,

a successful deception operation against friendly forces can prove devastating. The intelligence analyst has an

important obligation to recognize any enemy deception activity, and to remain constantly on guard for new

deception projects. Failure to identify an aggressor‘s deception efforts and to accept erroneous data on such

items like troops movements, equipment locations, combat objectives, defence positions, or conditions of

targets, could place friendly forces in jeopardy.

2124. Contradictory Requirement and Failure Option. Additionally, the analyst must also inform

decision-makers if a failure has occurred with a friendly deception activity. This will require careful analysis of

incoming data and close monitoring of an adversary‘s activities. The intelligence analyst involved with the

planning of a deception operation should also consider the legal issues. The generation and dissemination of

patently false or misleading information is a complex and murky under current guidelines, the government

reserves the right to use deception against hostile forces, but policy does not allow for the deliberate use of false

information to misinform or mislead citizens and decision makers. Many grey areas exist between these two

policy positions. What if deceptive information targeted against an adversary leaks to the international news

media, and then is fed back to the public? Can employ deception against non combatants who are friendly to an

enemy? What about employing deception against a neutral or unfriendly force (or country) not directly involved

in the confrontation? The answer to these and other similar questions are unclear, but that doesn‘t mean the

intelligence analyst should avoid asking them.

Some Basic Considerations

2125. With an increased understanding of camouflage, concealment, and deception (CC&D), a growing

availability of CC&D materials, and the rapid advancement of technology, the job of the intelligence analyst has

become more challenging and more important. The intelligence analyst cannot afford to ignore deception, no

matter what the sophistication level of a state or non state player happens to be. For sure, militaries and non-

state players will incorporate the technologies of deception into future operations. The task for the intelligence

analyst in the 21st century thus becomes one of providing a unique insight for planning friendly deception

activities while simultaneously detecting D&D effort employed by an adversary.

2126. Deception requires the provision of false indicators to the enemy. Thus if the supporting attack is to be

portrayed as a main attack, the units conducting the supporting attack, must give the enemy evidence that it is

the main attack. Information passes back and forth between the opposing forces on a battlefield by what is seen,

hared, smelled and picked up by communications and electronic. The types of deception measures are therefore

classified as visual, sonic, olfactory and electronic.

2127. For planning deception. it is essential to identify the threat to deception operations. It is encompassed

within the enemy intelligence collection effort. Hence, deception planning requires familiarity with enemy

intelligence operations. The commander planning deception needs detailed information on the enemy‘s

intelligence capabilities in the battle area. It is on this information that he bases his plans for projecting the

deception story. The prevention of enemy having prior knowledge of the planned deception is the major concern

during planning and preparation for the operation.

2128. The most important factor in deception planning is time; its availability and its use form both the

friendly and enemy point of view. In planning, the commander must perceive the sequence of activities through

the entire duration of the deception. The commander must determine the appropriate time to begin and end each

action. This is done by visualizing the false situation being projected and sequencing the deception actions as if

they were real. The controlling factor throughout is the timing of the true operations. To control the deception

sequence, and implementing schedule or a chronological listing of events and activities must be prepared.

2129. Deception measures must relate to past and future battlefield activities. To avoid detection by the

enemy the tactical plan must be flexible enough o allow discontinuance of nay deception effort. Deception

activities should terminate in a logical manner. At times, the enemy will blame his own systems for failing to

provide timely and accurate intelligence, rather than accept the fact that he was deceived. The aim at all stages

should be to remain undetected, or, if detected, to be discovered too late for the enemy to recover adequately.

2130. Patterns of various battlefield activities can be used for deception purposes. Units battlefield habits

know to enemy intelligence can be fit into the deception story to make it more believable to the enemy

commander. Similarly, previous deceptions must be reviewed to avoid establishing a deception pattern which

would cause compromise. Repeated employment of a particular pattern degrades it usefulness. Deception is not

achieved by following a rigid or stereotyped pattern. Commanders must ensure that deceptions by the

subordinates do not become predictable to the enemy intelligence staff.

DENIAL

General

2131. For an adversary to accept either premise as true, the deception planner must use a creative

combination of camouflage, concealment, and deception (CC&D). In the military sense camouflage means to

fool, concealment means to hide, and deception means to bluff. These three terms are closely intertwined; and

many references on the subject address CC&D, the derivation of the word ―camouflage‖ is right on target. It

comes from the French term camouflage, which means ―to play a practical joke‖.

2132. Making something indistinguishable from its background is the art of camouflage. Because a human

being sees an object as a single unit, when they don‘t recognize the single unit, they simply don‘t see it. While

making an object totally invisible is not possible, deception planners can make it difficult to identify by using

random patterns or covers. Camouflage falls into there categories: strategic, operational and tactical.

Types of Camouflage

2133. Strategic Camouflage. It involves measures taken to conceal strategic intentions and activities from

an enemy. This camouflage is organized at the highest levels of command.

2134. Operational Camouflage. It involves the concealment of troop's movements, including weapons, to

prevent an adversary from knowing the nature, objectives, scale, and timing of a campaign.

2135. Tactical Camouflage. It is the effort to hide the assembly of military forces, troop contingents, the

deployment of forces, and conditions of other tactical targets and the activities of units.

Technological Developments

2136. In all three categories, the deception planner must consider technological developments and the

sophistication of the adversary in using various reconnaissances and targeting systems. Most countries and even

non-state actors-now have surveillance and acquisition technologies that use entire electro-magnetic spectrum.

As a result, camouflage today is interdisciplinary in that it is a combination of equipment specialties and human

creativity.

2137. Reconnaissance and weapon sensors identify targets by recognizing signatures or physical features

unique to targets or target systems. Concealing equipment or installations in future conflicts will require

camouflage systems that simultaneously address following :

a. Visual. In ground to ground and air to ground close combat the mark-1 eyeball remains an

important sensor. For this reason, visual camouflage plays a significant role on CC&D. In the

Electro- magnetic spectrum, visual camouflage involves wavelengths ranging from 380-760 mm (or

that region of the spectrum known as visual light). This type of camouflage works to conceal real

targets or to display false ones by reducing or imitating the contrast between a target and its

background.

b. Infrared (IR). Today‘s camouflage however must consider the entire Electro-magnetic spectrum,

not just visible light. For example, camouflage netting in the 21st century must look right to non-human

sensors. Vegetation poses a particular problem. If camouflage netting resembles foliage in a forest or

jungle, it must address the signature of those environments.

c. Signatures. Radar and sonar are the main threat for such camouflage. Radar is a kind of light

energy, and operates between 1 mm and 10 meters in the Electro-magnetic spectrum. Unlike visual or

infrared reconnaissance systems which are passive, radar can only detect what it itself has transmitted.

In other words, radar emits a signal, which is then reflected from the target back to the radar. In radar

camouflage, the idea is to reduce or eliminate the signal echoing back to the signals. Targets which

employ many 90 degree angles produce strong radar echoes, called Radar Cross Section.

d. Acoustic Signatures. Acoustic camouflage deals with sound waves, works by eliminating,

reducing, or imitating sounds between a target and its background. Because ideal atmospherics (for

sound in the air) or sea conditions (for sound in water) can result in impressive detection ranges, sound

has become both a weapon and an enemy.

2138 – 2200. Reserved.

CHAPTER - V

UNCONVENTIONAL WAR AND TOTAL PEOPLE‟S WAR

SECTION - 22

INTELLIGENCE FUNCTION

FUNDAMENTALS

Unconventional Warfare and Intelligence

2201. GSTP 0032 states that the popular concept of fighting unconventional war on termination of

conventional war no longer stands valid as it deprives both the war efforts of significant advantages that can be

gained by blending them together. This doctrine strongly advocates their concurrent conduct although one

would always dominate a particular phase of the campaign. For example, during the initial stages of the

campaign, conventional war will remain the principle means of seeking a decision with the unconventional war

as its adjunct. Later, as the conventional power diminishes, unconventional war will assume the major role,

relegating conventional war effort to a supporting status. Whatever is the case; both conventional and

unconventional war must be blended together to achieve the combined effects that would produce the desired

end state on conflict termination.

2202. Unconventional war is not necessarily an aimless fighting by a handful of guerrilla bands. The

unconventional force normally operates behind the enemy lines along with a well established chain of command

within the framework of a well conceived plan. They generally merge with the population and operate in small

groups with the local help and normally live off the land. They also concentrate rapidly for a task which means

that they can be involved in both major and minor actions deep inside enemy line with the purpose of creating a

significant impact on the conduct of campaigns and battles along the traditional front. Simultaneity of operations

and non-linear engagement of enemy forces throughout the length and width of the theatre/battlefield saturate

enemy‘s command and control system with a surge of events that make the enemy commander incapable of

taking right and timely decisions.

2203. The area of operation of a small unconventional warfare force will be much larger than equivalent

conventional forces since they mainly operate behind the enemy line. Thus they need very sound intelligence for

following operational tasks :

a. They threaten enemy in the rear areas, tie up a sizeable portion of his force to protection duties,

extend the battle space and disrupt his plan by interdicting the movement of follow up formations. The

cumulative effect of all these actions creates a gradual deterioration in enemy‘s cohesion and destroys

the mental balance of the enemy commander.

b. As enemy advances through friendly territory, the engagement areas grow in size and the enemy

force in the expanded theatre present a target rich environment to the unconventional forces. In such

circumstances, the enemy commander is confronted with threat both from the front and rear. When he

finds himself incapable of tackling both, he gives up his fight along the conventional front in favour of

securing his rear.

c. The unconventional forces usually concentrate on key enemy capabilities such as his command

and control centres, fire support systems, air bases, and logistic installations, lines of communication,

air defence equipment, mobility assets and troop and armour concentrations. The purpose is to

eliminate or severely degrade these capabilities so that these can‘t be used against friendly forces at the

decisive time and place.

d. When large-scale operations such as interdiction of enemy follow up formations or destruction of

a vulnerable portion of enemy force are contemplated, the unconventional forces make rapid

concentrations by pre-arranged methods and battle drills.

e. Unconventional forces are also useful for reconnaissance, surveillance and target acquisition

tasks.

f. They can provide real time information concerning enemy dispositions and movements when

equipped with suitable communications.

g. When properly trained, they can acquire targets for engagement by friendly air and artillery

systems.

j. They can also act as pathfinders for air borne and air mobile operations and do the job of forward

air controllers by directing friendly aircraft on high value targets.

Total Peoples' War and Intelligence

2204. According to GSTP 0032, apart from blending conventional and unconventional war during the

prosecution of the national war effort, Bangladesh may have to resort to total people‘s war after its conventional

power diminishes. This is likely to happen when enemy closes round friendly centre of gravity and the latter lay

exposed and vulnerable to enemy attack. The decision to switch over to total people‘s war must be accurately

timed. If it is too early, the political fallout might put the Army in the midst of an unfriendly population. If it‘s

too late, the Army may find itself in great disorder, thereby making the transition from conventional to

unconventional war a difficult one.

2205. Generally the situation described above would occur when enemy is in such close proximity of friendly

centre of gravity that continuing further conventional war would be a fruitless exercise. However, the Army at

this point of time would still remain intact with substantial organic cohesion and will make a smooth transition

to unconventional war upon being ordered by the Government.

2206. Smooth transition from conventional to unconventional war would be one of the major challenges

faced by the commanders at all levels. Success will greatly be measured by how quickly the Army can disperse

itself into the civil population. Usually, the transition plan will be prepared by the formations and units

beforehand as one of their contingency plans. On receipt of the orders from the Army Headquarters, the plan

will be activated and the formations and units will move into their allocated sectors. The divisions will usually

be operating within their own geographical areas; brigades will be responsible for allocated sub-sectors, while

the infantry units would be operating in various administrative districts with companies deployed in various

thanas.

2207. The unconventional forces that were operating behind the enemy lines would be quickly absorbed by

the sectors basing on a pre-conceived plan. The plan must cater for their quick absorption without displacement.

These forces should remain in place and continue to harass the occupation forces so that there is no operational

vacuum during the transition period. Exposing to total people's war demands a very good intelligence system in

place for following tasks :

a. Selection of target demands detailed study of not only the ground, but the prevailing political and

economic situation as well. Each operation must be weighed against the psychological value it is going

to gain or lose; at times it is advisable to accept tactical defeat with the hope of achieving operational or

strategic success. However, forces must not be squandered every now and then just to enhance the

political image as it is quite difficult to raise units in an operationally constrained environment.

b. Exposing and attacking enemy‘s centre of gravity remains important even in unconventional war.

The commanders at the operational level should identify enemy centre of gravity and devise the way to

attack it. They must direct the sector operations in a way so that it is exposed and becomes vulnerable

to friendly attack at the earliest. While the core of the enemy army or important terrain feature is

usually identified as centre of gravity in conventional war, breaking enemies will to fight becomes the

principal focus for all unconventional operations. Enemy‘s will is broken when he finds that he is

entangled in a long drawn battle of attrition, there is no visible enemy to settle the score on his own

term, he is being hit at every opportunity without being given the chance to strike back, the physical

losses are mounting with every passing day and he is surrounded by a hostile population. However, to

infuse such psyche in enemy‘s mind is not an easy task. Enemy commanders would make every effort

to minimise their effects as much as possible, which in turn might lead to severe pressure on friendly

forces with concurrent deterioration of morale. It is, therefore, highly essential to judiciously formulate

plans for attacking enemy‘s centre of gravity and to pursue them aggressively.

c. The unconventional force will mostly bank upon the local population for obtaining intelligence

regarding enemy dispositions, movements, intentions and target areas. An elaborate intelligence

network must be built to collect first hand intelligence for conducting prompt and swift operations so

that enemy is unable to discover friendly intent before he is struck. The unconventional force should

also take adequate measures to defeat enemy intelligence operation.

Principles of Intelligence Applied

2208. General. Intelligence is vital and pivotal for successful unconventional warfare and total people's war

situation. Commanders responsible must have timely and accurate intelligence and to get timely and accurate

intelligence, he must have efficient and well integrated intelligence system. The idea of conducting intelligence

by untrained personnel with no knowledge on enemy tactics, equipment and function should not be encouraged.

All principles of intelligence will more or less equally apply to unconventional warfare and total people's war

situation. Both conventional and unconventional forces must understand each others intelligence need and

should develop a common system of intelligence acquisition and processing based on certain sound principles.

2209. Centralized Control. For conventional war normally centralization will occur at the highest

practicable level to ensure the widest possible coverage for the resources available. Contrary to this in

unconventional warfare and total people's war the centralization of intelligence should occur at every possible

level.

2210. Objectivity. Once collected, information must be processed with conscious objectivity. There is often

a temptation to distort information to fit preconceived ideas or previous assessments. This must be avoided at all

costs. Without proper objectivity, resource utilization will never be rational rather more wastage will take place

in an unconventional warfare and total people's war situation.

2211. Systematic Exploitation. Sources and agencies must be exploited systematically and logically by

methodical tasking at all level. In an unconventional warfare and total people's war situation, personnel must be

trained to do so accurately.

2212. Accessibility. Relevant information and intelligence must be readily available to an unconventional

warfare force. Proper communication suitable for local situation is a pre requisite for success.

2213. Continuous Review. Intelligence must be reviewed continuously and wherever necessary revised

taking into account all new information which should be compared with that already known.

2214. Timeliness. The most accurate and reliable information or intelligence is useless unless it reaches the

user in an unconventional warfare forces in time to serve as a basis for appropriate action.

2215. Vision. Intelligence operations require imagination and foresights. Clear vision about future enemy

course of action will take the operation a long way in a in an unconventional warfare and total people's war

situation.

2216. Source Protection. Sources must be given protection in commensuration to their value and their

vulnerability to detection in a very fluid situation.

2217. Co-operation. Co-operation is essential amongst the intelligence staffs, branches, agencies and

services involved in an unconventional warfare forces as well as conventional forces.

2218. Security. Unauthorised personnel must be denied information about operations of intelligence

agencies, sources of information and the intelligence products.

Limitations of Intelligence

2219. Following limitations in the acquisition of information and dissemination of the intelligence may be

faced in the field while conducting unconventional war and total people's war :

a. Security Measures. The enemy will take extensive security measures to deny the information

collection by own personnel concerning his true intentions and future course of action.

b. Resources. Limitation of resources in the field may force to derive the conclusion from a single

piece of information that may not provide conclusive evidence.

c. Time. The time factor may also limit the accuracy and utility of the information.

d. Change in Enemy‟s Plan. The enemy is free to choose her courses of action and to vary the

course of action when he so desires.

e. Training of Personnel. The performance of the intelligence staff in an unconventional war and

total people's war situation is likely to vary due to their aptitude, training and individual characteristics.

Remedial Measures to Overcome Limitations

2220. General. The intelligence personnel/staff in an unconventional war must take certain remedial

measures in order to overcome the inherent limitations in the field of acquisition and dissemination of

information and intelligence. These are discussed in the subsequent paragraphs.

2221. Selection and Training of Personnel. The intelligence personnel who are employed to carry out the

intelligence task in an unconventional war and total people's war situation must be selected carefully, keeping in

mind their education, aptitude and individual characteristics. The intelligence personnel must be trained

thoroughly so that they can carry out skilful and enthusiastic interpretation of the information that will help them

to carry out the intelligence task. The peace time training of intelligence personnel should not be conducted for

period less than 4 weeks time. The training may be conducted along with division level collective exercises

which should include:

a. Special training on under cover intelligence gathering procedure.

b. General training on enemy organization, equipment, tactics and behaviour.

c. Special training on reporting and clandestine communications.

d. General training on language used by enemy.

2222. Access to Conventional War Intelligence. The intelligence personnel of Unconventional Warfare

(UCW) must have a direct access to the Conventional Intelligence so that all information can be shared and

passed speedily and decisions obtained promptly.

2223. Transmission of Information/Intelligence. Extensive and thorough arrangements for the

transmission of information and dissemination of intelligence must be made. This can be ensured by the

availability of good communication system and set procedures for passing the information and disseminating the

intelligence between conventional and unconventional forces. However due to paucity of resources,

improvisation and use of local resources having duplication may have to be resorted to.

INTELLIGENCE FUNCTIONS IN UNCONVENTIONAL WAR AND

TOTAL PEOPLE'S WAR

2224. War Time Reality. Before understanding about employment of unconventional warfare intelligence

team during war, it is important to understand the likely wartime reality :

a. Preparation for war starts much before the actual war starts. For example observation in the

bordering areas, troops movement in the rear, dumping of logistics, extensive training for war, civil

defence, psychological war, etc.

b. Once the hostility begins, though the refugees and displaced persons start moving towards both

direction but the entire population does not vacate the whole battle front. This may allows some body

to stay within population and conduct clandestine activities.

c. Existing communication system available near the battlefield may be totally or partially

disrupted. Therefore dedicated wireless or improvised communication like special courier, man to man

communication (gonoline) or along with some clandestine communication like dead drop,

accommodation addressees, safe houses etc may have to be used.

2225. Basic Concept of Intelligence Operations. In absence of adequate and functional technical

acquisition means, the total endeavour for unconventional warfare and total people's war intelligence operation

will revolve around employment of human intelligence resources. Thus the requirement of quality of selection,

training and employment will matter much. Without quality, there will be every chance to hit around the bush

and producing fabricated report by personnel employed for such job. Extensive exploitation of human sources

and agencies must also be done at all level.

2226. Exploitation of Directed Source. Unlike conventional force, unconventional forces will have some

different types of sources which will be very useful in the planning and executing intelligence collection task.

These are as followings :

a. Specially Manned Observation Post/ Listening Post. Unconventional force must cater for

specially manned Observation Post/ Listening Post all along the enemy axis of advance. For convenient

they should be under cover of any suitable identity that gives them the chance to survive enemy

challenges. They should operate without weapon and any insignia which should be dedicated enough to

go as close to the enemy as possible. They should use clandestine radio or available communication for

passage of information. Clandestine intelligence training is a pre-requisite for their success.

b. Roving/ Fighting Patrol. Unconventional force should organize roving/fighting patrol for

intelligence purpose. They normally should operate away from the enemy for own safety but gather

information by observation and elicitation of local habitants.

c. Uncommitted Village Defence Party (VDP)/ Ansar. Since every village of Bangladesh has the

presence of good number of Ansar and VDP members, they should be integrated in the intelligence

collection and passage of information process if they have not participated in the war effort directly.

They should be encouraged to live in their own village and act as the intelligence collector. A Gono-

line may be organized with available and intelligence trained Ansar and VDP members.

d. Local Journalists. Due to the professional need, local journalists may have to travel a long away

for collecting news for there own media. They should be tasked and exploited for intelligence

collection if trustworthiness is not doubtful. .

e. Local Merchants and Suppliers. Even in the thick of the battle, many local merchants and

suppliers will continue performing their own job. They are likely to come across much enemy

information. Some of them might have access to the enemy deployed areas for meeting casual or

regular enemy need. They should also be recruited, trained and employed for intelligence job.

f. Local Government Members/Officials. Due to their appointment enemy commanders may call

them to provide support in order to bring normal life in the enemy held territory. In all over the

country they should also be exploited to the fullest for intelligence purpose.

g. Local Transport Drivers/ Workers. It is also likely that local communication system such as

bus, truck, rickshaw, rickshaw van, tractor, boat, baby taxi, etc may not seize functioning during war. It

is therefore important for unconventional force to cater for employment of such transport drivers and

workers for intelligence purpose.

h. Local Doctors or Paramedics. Due to professional requirements doctors and paramedics may

have to move to other places for attending patients. It is therefore easy for them to come across enemy

movements and activities which may be exploited by intelligence persons.

j. Local Telephone Operators/Postmen. Similarly telephone operators and postmen will come

across enemy personnel in course of their normal activities which may also be exploited for

intelligence purpose.

k. Tactical Intelligence Team. Tactical Intelligence Team of Local Field Intelligence Unit (FIU)

should also be employed along with unconventional force following strict security measures.

2227. Exploitation of Undirected Sources. There are other persons who cannot be directed or recruited for

intelligence purpose but they might have seen or heard about the enemy movement or might have knowledge of

enemy‘s significant activities. Following casual or undirected sources should also be exploited at the fullest :

a. Refugees. Refugees and internally displaced persons often come across enemy movement. Some

of them due to own background may have better understanding of enemy equipments and other

identifications. Intelligence personnel form conventional and unconventional forces should regularly

encourage and interview such person for valuable information.

b. Smugglers. This is unlikely that smuggling across the frontier will seize due to war. Smugglers

will have very good knowledge about enemy movements and other important aspects. They should also

be exploited for intelligence purpose.

c. Enemy Suppliers. During war a good numbers of enemy suppliers will also be available in

enemy held territory. Trained intelligence personnel can exploit them for intelligence purpose through

friendly elicitation.

d. Enemy Soldiers. There will be good number of casual enemy soldiers who may pass down vital

information during casual talk with local civilians. Trained intelligence person should look for such

opportunity or create situation for such opportunity. .

e. Enemy Prisoners of War. If unconventional force can capture enemy personnel as prisoners of

war, then they should look for vital information from them, before they are handed over to

conventional forces. However without training this may not bring satisfactory result.

2228. Chain of Unconventional War Intelligence Effort. A probable chain of intelligence effort in

unconventional war is suggested below :

Employment of Tactical Intelligence Teams with Unconventional Forces

2229. Bangladesh Army being technically inferior needs to have dependency on employment of human

sources like long range penetration group or under cover team working behind enemy lines or in the enemy held

territories. For example a division commander needs to know the location and activities of follow up division

and reserve troops of enemy corp. Only tactical intelligence team of Field Intelligence Unit (FIU) is capable to

send their teams under cover to a long distance and gather worth while intelligence about follow up formation

and reserve at enemy crop level. These teams also need to support forward brigades it division commander feels

it necessary. They should be employed for gathering intelligence through unconventional forces.

2230. Each formation should employ tactical intelligence team out of the manpower available in respective

FIU in order to provide guidance, support, communication and liaison to Unconventional Warfare Intelligence

Team in respective area. However individual security should be maintained at all times so that under cover

operation is not compromised and the clandestine operation can achieve significant success. Mutual trust and

cooperation will not mean compromise of security. Both teams can get best out of other teams if peacetime

training and understanding of the intelligence business is well achieved and catered for. Each unconventional

warfare force company should form a intelligence cell with the support of the FIU Team.

2231. Basic Principles for Employment. Following principles are followed for employment of Tactical

Intelligence Team along with unconventional forces :

a. There should be teams dedicated for covering areas deep inside the enemy territory through agent

operations.

UNCONVENTIONAL

PLATOON

OTHER

COMPANY

CELL UNCONVENTIONAL

COMPANY AND FIU TEAM

OTHER

COMPANY

BRIGADE /DIVISION

INTELLIGENCE STAFF

HIGHER INTELLIGENCE

STAFF

UNDIRECTED

SOURCES

MANNED

POST

ROVING/

FIGHTING

PATROL

FIU TEAM GONOLINE /LOCAL

SOURCE

UNDIRECTED

SOURCE

b. There should be teams for supporting forward brigades and some team as reserve.

c. There should be team for carrying out under cover long range surveillance for getting answer

related to essential element of information like location and details of follow up formation.

d. There should be teams employed along likely enemy axis of advance but having distinct area of

responsibility.

e. Minimum two members should form a team and be employed under suitable cover which support

their employment.

f. Their cover should normally be inhabitant of the locality which should allow them to move

without arousing suspicion. Cover thus selected should be deep in nature and may also allow them to

earn their livelihood.

g. Selection and training of personnel is very critical for success. There should be good reward for

good job done.

2232. Method of Operations. Following method of operation should be followed :

a. Each team should employ adequate sources and agent depending upon their capabilities. However

extreme caution must be exercised in their selection and subsequent employment.

b. Significant information should be collected personally and in other cases also verified personally

by the team leaders.

c. All personal discipline, security drills and communication security must be maintained.

d. They must work being logistically self contained and live off the land.

e. Clandestine radio set may be used for one way communication only. Available cell phone,

telephone communication may be used with caution. A workable chain of courier (gono line) should

also be place.

f. Unconventional forces may be used extensively for intelligence gathering and passage of

information. There could be joint cell composed of Tactical Intelligence Team and Unconventional

Warfare Persons.

Conclusion

2233. Basic purpose of employment of unconventional warfare forces is to have force multifunction effect on

the conventional operation. Without professional training there will be tendency to hit every insignificant target

avoiding important and high value one. Selection and training of the personnel at grass route level is therefore a

prerequisite for success. However both conventional and unconventional forces must learn to survive with all

odds likely to be encountered for executing respective mission.

2234 – 2300. Reserved.