The
Targeting Process will
examine how the military uses the Decide, Detect, Deliver, Assess (D3A), and
the Find, Fix, Finish, Exploit, Analyze, Disseminate (F3EAD) methodologies to
develop criteria for target selection and effect. Targeting can be
kinetic (lethal; neutralizing a threat), or non-kinetic (non-lethal; targeting
to influence).
Source
Operations will go
into detail about how to establish and operate information net. Just like
reporters and journalists rely on sources of information to publish the news,
so must we rely on sources of information to stay informed about our
communities and operating environment. We’ll cover source recruiting and
direction, prioritizing, and some source tradecraft. (Source Operations
is covered in limited detail in the ICAC.)
Psychological Operations (PSYOP) will cover how to establish strategies and messages to inform and influence a targeted audience, as well as planning for distribution of the message, and assessing the efficacy of our messages.
PERIODIC INTELLIGENCE
REPORT
___________________________
Issuing HQ/unit, date, time of report …………………………..
Prepared by Int officer …………………
Distribution……………
Classification….
Annexes…………….. (maps/.charts/photographs, drawings...)
Sr.No…
___________________________________________________
PIR is a portrayal of the existing overall situation (brief description of activities observed/events that have occurred, identification of threat forces, of agencies involved, the environmental factors with respect to population/politics/admn,media reports, public gatherings/hate speeches targeted at our forces), any specific situational report by cross referencing to maps, charts, other documents, and the counterintelligence/ security element (personnel/equipment/comm. Security etc). Further a summary of weather, terrain with impact on current and future operations clearly stated.
A threat assessment in analytical form is written briefly touching on threat intent, capabilities, vulnerabilities and the current status of our mission with respect to the threat.
From all these most likely threat course of action is predicted.
_____________________________________________________________________________________
INTELLIGENCE
ESTIMATE:
SR NO:…………….
REFERENCES: MAPS/CHARTS…
MISSION DEFN
AO
THREAT ASSESSMENT
THREAT CAPABILITIES
CONCLUSIONS
The planning and operation of the entire
multidisciplinary collection system comporising of sensors
,assets,processing,exploitation and dissemination if synchronized and integrated and will yield
the best situational development enabling the commander to shape the
battlespace as his priority
intelligencve requirements are hereby answered successfully.This ISR
synchronization is predicated by the commanders need for an a competitive edge
ove the enemy in terms of information operations,enabling him to successfully
execute C2 Attack , C2 exploit and C3 protect. Here we achieve perfect
integration of intelligence and operations.
When a target is identified
the initial Warning Order (WARNO) is supposed to be written. A target profile
is built with the initial intelligence available and a reconnaissance plan
developed. This initial information normally put into WARNO 1. It is used to
develop the reconnaissance plan and intelligence collection plan. This plan is
then laid against other collection requirements based on the priorities of the
commander. Including all the assets available to the collection manager will
increases not only the option but the number of targets a unit can gather on at
any specific time.
The collection manager then
coordinates with the S-3 section for ground units to conduct patrols and
reconnaissance’s to confirm or deny intelligence. The other forms of ISR could
be synchronized to provide over watch and gather enemy reactions not detectable
to the ground units. As the target area is narrowed down, special teams
emplace UGS and or conduct surveillance mission in unison with air assets. If
actionable intelligence is confirmed with these units in place they can act as
an interdiction, outer cordon or emergency assault force.
I recommend synchronizing ISR by capabilities, similar to how the requests are processed for air assets. It is very common to hear the ISR manager state ‘ISR for mission X was not supported.’ This almost always means no air assets were allocated. We would be more effective if, “Intelligence officers use ISR synchronization tools with staff input to synchronize the entire collection effort, including all assets the commander controls, assets of lateral units and higher echelon units and organizations, and intelligence reach to answer CCIRs.”[v]