1 Coy platoon main tasks

The Targeting Process will examine how the military uses the Decide, Detect, Deliver, Assess (D3A), and the Find, Fix, Finish, Exploit, Analyze, Disseminate (F3EAD) methodologies to develop criteria for target selection and effect.  Targeting can be kinetic (lethal; neutralizing a threat), or non-kinetic (non-lethal; targeting to influence).

Source Operations will go into detail about how to establish and operate information net.  Just like reporters and journalists rely on sources of information to publish the news, so must we rely on sources of information to stay informed about our communities and operating environment.  We’ll cover source recruiting and direction, prioritizing, and some source tradecraft.  (Source Operations is covered in limited detail in the ICAC.)

Psychological Operations (PSYOP) will cover how to establish strategies and messages to inform and influence a targeted audience, as well as planning for distribution of the message, and assessing the efficacy of our messages.

PERIODIC INTELLIGENCE REPORT

___________________________

Issuing HQ/unit, date, time of report …………………………..

Prepared by Int officer …………………

Distribution……………

Classification….

Annexes…………….. (maps/.charts/photographs, drawings...)

Sr.No…

___________________________________________________

PIR is a portrayal of the existing overall situation (brief description of activities observed/events that have occurred, identification of threat forces, of agencies involved, the environmental factors with respect to population/politics/admn,media reports, public gatherings/hate speeches targeted at our forces), any specific situational report by cross referencing to maps, charts, other documents, and the counterintelligence/ security element (personnel/equipment/comm. Security etc). Further a summary of weather, terrain with impact on current and future operations clearly stated.

A threat assessment in analytical form is written briefly touching on threat intent, capabilities, vulnerabilities and the current status of our mission with respect to the threat.

From all these most likely threat course of action is predicted.

_____________________________________________________________________________________

INTELLIGENCE ESTIMATE:

SR NO:…………….

REFERENCES: MAPS/CHARTS…

MISSION DEFN

AO

THREAT ASSESSMENT

THREAT CAPABILITIES

CONCLUSIONS



The planning and operation of the entire multidisciplinary collection system comporising of sensors ,assets,processing,exploitation and dissemination  if synchronized and integrated and will yield the best situational development enabling the commander to shape the battlespace  as his priority intelligencve requirements are hereby answered successfully.This ISR synchronization is predicated by the commanders need for an a competitive edge ove the enemy in terms of information operations,enabling him to successfully execute C2 Attack , C2 exploit and C3 protect. Here we achieve perfect integration of intelligence and operations.

 

http://smallwarsjournal.com/sites/default/files/tdisr3.jpg

When a target is identified the initial Warning Order (WARNO) is supposed to be written. A target profile is built with the initial intelligence available and a reconnaissance plan developed. This initial information normally put into WARNO 1. It is used to develop the reconnaissance plan and intelligence collection plan. This plan is then laid against other collection requirements based on the priorities of the commander. Including all the assets available to the collection manager will increases not only the option but the number of targets a unit can gather on at any specific time.

The collection manager then coordinates with the S-3 section for ground units to conduct patrols and reconnaissance’s to confirm or deny intelligence. The other forms of ISR could be synchronized to provide over watch and gather enemy reactions not detectable to the ground units.  As the target area is narrowed down, special teams emplace UGS and or conduct surveillance mission in unison with air assets. If actionable intelligence is confirmed with these units in place they can act as an interdiction, outer cordon or emergency assault force.

I recommend synchronizing ISR by capabilities, similar to how the requests are processed for air assets. It is very common to hear the ISR manager state ‘ISR for mission X was not supported.’ This almost always means no air assets were allocated. We would be more effective if, “Intelligence officers use ISR synchronization tools with staff input to synchronize the entire collection effort, including all assets the commander controls, assets of lateral units and higher echelon units and organizations, and intelligence reach to answer CCIRs.”[v]

 

 

http://smallwarsjournal.com/sites/default/files/tdisr1.jpg