Professional Documents
Culture Documents
FM34 36 (1991)
FM34 36 (1991)
FM34 36 (1991)
K ¿)-D d /
FM 34-36
PECIAL OPERATIONS
FORCES INTELLIGENCE
AND ELECTRONIC
WARFARE OPERATIONS
^ia,70rU;,
ATTH: !■■■■' • • ‘ --v;
Roctr, ; „ 1
W&O-GQSQ
■i
f “
-4/
FM 34-3€(
FIELD MANUAL DEPARTMENT OF THE ARMY
no. 34-36 Washington, DC, 30 September 1991
Table of Contents
Page
PREFACE .iv
Page
ii
FM 34-36
Page
GLOSSARY . . .Glossary-1
REFERENCES References-1
iii
FM 34-36
PREFACE
Army Special Operations Forces (ARSOF) need timely and accurate intelligence and
information to—
• Plan missions.
This is done across the operational continuum of peacetime competition, conflict, and
war.
This manual focuses on the missions and functions of intelligence elements and
organizations which provide intelligence and electronic warfare (IEW) support to
ARSOF organizations. It provides doctrine for special operations forces (SOF) IEW
operations, including military intelligence (MI) organizations, missions, functions, and
capabilities from support operations team-A (SOT-A) and S2 section levels to SOF and
the senior intelligence officer (SIO) at the joint level. It shows how these IEW assets
meet ARSOF operational needs within the established IEW system. It also lays out some
"how to" techniques and procedures required to conduct IEW operations within the
framework of the intelligence cycle.
This manual expands upon the doctrine in FM 34-1 and FM 100-25. This doctrine is
written specifically for SOF S2s, military intelligence (MI) commanders, and other
assigned MI personnel, and the elements which support them. It also includes SOF
commanders and their staffs. The doctrine reflects current Army SOF IEW capabilities.
Unless this publication states otherwise, masculine nouns and pronouns do not refer
exclusively to men.
iv
FM 34-36
CHAPTER 1
ARSOF includes Special Forces (SF), rangers, special • Deploy in regions of national geopolitical and
operations aviation (SOA), psychological operations military interest to support unified and specified
(PSYOP) units, and civil affairs (CA) units—these are (U&S) commands.
discussed in Chapters 4 through 8. Figure 1-1 shows the
ARSOF organizational structure based in the continental Missions are assigned to ARSOF to directly support
United States (CONUS). The seven primary ARSOF the operational requirements of the theater commander-
missions are— in-chief (CINC). These missions are integrated, vital ele-
ments of both theater strategy and national objectives.
• Direct action (DA). ARSOF missions and activities span the operational con-
• Special reconnaissance (SR). tinuum from peacetime competition through conflict to
war. Figures 1-2 and 1-3 show the operational con-
• Counterterrorism (CT).
tinuum.
• Unconventional warfare (UW).
• Foreign internal defense (FID). Commanders need properly executed and timely col-
• PSYOP. lection, processing, and dissemination of intelligence and
combat information across the operational continuum.
• CA.
ARSOF commanders use the IEW system to prevent
surprises and to concentrate fighting forces and combat
ARSOF are forces specifically organized, trained, and
systems where they will be most effective.
equipped to conduct special operations (SO) or to
provide direct support (DS) to other SOF. ARSOF—
At the tactical level, the IEW mission is to support
commanders with situation development, target develop-
• Provide a flexible military capability to defend US
ment, electronic warfare (EW), and counterintelligence
national interests.
(Cl). At the operational and strategic level, the IEW
mission also includes indications and warning (I&W).
• Play an important part of our total defense posture
Figure 1-4 shows the IEW mission.
and are a strategic instrument of national policy.
The IEW system supporting ARSOF includes or-
• Give the National Command Authority (NCA) op-
ganizations and assets from the national level down to
tions from which they can choose to respond to in-
and including the tactical ARSOF soldier in the field.
ternational situations at reasonable cost and risk to
This system supports all ARSOF activities across the
US interests.
operational continuum.
1-1
FM 34-36
ro
CG, USASOC
(STAFF and DCG)
Figure 1-1.
USACA and
SWCS USASF CMD 75th RGR RGT 160th SOAR
PSYOP CMD
*
FM 34-36
Peacetime
Conflict War
Competition
National
Limited —Vital ^
Survival
Figure 1-3. Example of operational continuum for Desert Shield and Desert Storm.
THE IEW
MISSION
I I 1
SITUATION TARGET
&W EW Cl
DEVELOPMENT DEVELOPMENT
1-3
FM 34-36
OPERATIONAL CONTINUUM
The operational continuum is a dynamic spectrum con- Had OPERATION DESERT SHIELD succeeded in
sisting of three environments: peacetime competition, convincing Iraq to withdraw from Kuwait, then it would
conflict, and war. Within this continuum, the US can not have been necessary to move into the next environ-
find itself in peacetime competition with one nation and ment of the continuum—war. However, when months of
at war with another nation, while in conflict with still diplomatic and military maneuvering failed, the US and
another nation —all at the same time. Moreover, as its allies initiated OPERATION DESERT STORM. At
recent peacetime contingency missions (such as this point, we crossed over into the war environment.
URGENT FURY, JUST CAUSE, OPERATION
DESERT SHIELD, and OPERATION DESERT Initially, the allies limited their actions to aerial bomb-
STORM) reveal, the operational continuum is not a one- ing, hoping to persuade Iraq to withdraw. However,
way street but rather a multi-path avenue which permits Iraq’s failure to withdraw forced the allied move deeper
operations to flow in all directions. into the war environment. After the 100-hour ground
war, the allies called a halt to offensive operations but
Figure 1-3 shows how OPERATION DESERT maintained forces inside Iraq—thus moving into the con-
SHIELD and OPERATION DESERT STORM flowed flict phase of the continuum.
along the operational continuum. Initially, the US and
Iraq were in an environment of peacetime competition Still within the conflict environment of the continuum,
that began at the end of the Iran-Iraq War. the situation with the Kurdish refugees in northern Iraq
caused the US to initiate OPERATION PROVIDE
The US was hoping to gain some influence over Bagh- COMFORT. This was a disaster (manmade) relief effort
dad and pull them out of the Soviet sphere. But in July under the heading of a Peacetime Contingency Opera-
1990, Iraq massed troops on the Kuwait border and tion.
threatened to invade if Kuwait, among other things, did
not cut its oil production. The US response was mostly Although the final chapter in the war with Iraq remains
in the diplomatic arena; however, we held some joint air uncompleted, the allied goal is to work through the
defense exercises with our Persian Gulf allies which operational continuum while rebuilding Kuwait and Iraq
placed us on the verge of a conflict environment on the and to reestablish a peacetime competition environment.
operational continuum. However, it is up to Iraq whether that happens. The
potential exists for the US to shift backwards through
When Iraq appeared to back off, the situation ap- conflict and war agam before achieving peace.
peared to remain in a peacetime competition environ-
ment. However, after Iraq’s invasion of Kuwait and the The ARSOF SIO must be prepared to meet the
subsequent execution of OPERATION DESERT commander’s intelligence requirements for any mission
SHIELD, the US and Iraq entered the environment of and be able to anticipate what new requirements might
conflict. arise as the operation flows along the continuum.
HISTORICAL PERSPECTIVE
Timely and accurate intelligence and unprocessed com- • In January 1945, timely and accurate intelligence
bat information can be a significant factor in operational enabled the 6th Ranger Battalion to rescue 511
success. Historically, the commander who has superior American and Allied prisoners from a Japanese
knowledge of mission, enemy, terrain, troops, and time prisoner of war (PW) compound near Cabanatuan
available (METT-T) factors has a critical edge in com- in the Philippines.
bat. As the following examples show, the more informa-
tion and intelligence commanders have, the greater their • During the Korean War the intelligence community
chances for success. identified enemy vulnerabilities for exploitation by
psychological warfare teams. These efforts were
1-4
FM 34-36
very successful in lowering the morale, reducing resource control, military government) slowed the
combat effectiveness, and encouraging desertion transition from combat to nation building.
and defection of communist troops. In summary, it
is estimated that 65 percent of more than 150,000 • In Iraq, superb intelligence support resulted in an
communist PWs said US psychological warfare had overwhelming victory over the Iraqi armed forces.
some influence on their decision to surrender. Intelligence also played a key role in dealing with
the Shiite Muslims in occupied southern Iraq.
• In South Vietnam, the combined intelligence However, in northern Iraq, the US had to play
center’s imagery interpretation (II) photographic catch-up to determine the direction the Kurdish
study program provided valuable intelligence that rebellion was taking and was reconnoitering for
helped SF units set up camp and hamlet security. suitable sites for refugee camps. This occurred only
Often these camps became isolated strongpoints days before the camps were to be established.
astride communist infiltration routes and were a
constant thorn in the side of the North Vietnamese. What history tells us is that the intelligence community
does an excellent job of supporting combat operations.
• In Panama, timely and accurate intelligence enabled However, it is incumbent upon both the IEW system and
US forces to achieve all mission objectives within a ARSOF to identify intelligence requirements for opera-
short time. While this intelligence resulted in a tions across the operational continuum to include pre-
quick end to the fighting, gaps in the intelligence and post-hostilities phases.
support to post-hostilities operations (population
COMBAT INFORMATION
Combat information is unevaluated data. It is gathered
SINGLE-SOURCE INTELLIGENCE
by ARSOF elements during any combat operation or
wartime environment. This information is provided If the sources of an intelligence product are from only
directly to the ARSOF commander which, due to its one intelligence discipline, the final product is called a
highly perishable nature or the criticality of the situation, single-source intelligence product. The following are
cannot be processed into intelligence in time to satisfy SOF-related examples of each intelligence discipline:
the user’s intelligence requirements.
• Human intelligence (HUMINT) is intelligence
Information becomes intelligence once it is collected, derived from information collected and provided by
evaluated, analyzed, integrated, and interpreted. In human sources. ARSOF units provide the IEW sys-
other words, the distinction between combat and intel- tem with HUMINT through SR and debriefings of
ligence is in how the information is processed and used. units after operations. SR is explained in detail in
When information must be processed and analyzed, or if Chapter 4. MI units support ARSOF with
it needs to be integrated with other data and then HUMINT through controlled collection and tactical
analyzed and interpreted, it is intelligence and not com- interrogation operations. (See FM 34-60, Chap-
bat information. Information may be both combat infor- ter 5; and FM 34-52, Chapter 3.)
mation and intelligence, but in sequence. (See FM 34-1,
Chapter 2.) • Signals intelligence (SIGINT) is intelligence that in-
cludes all communications intelligence (COMINT),
Unevaluated information collected by ARSOF units electronics intelligence (ELINT), and foreign in-
during target specific operations is considered combat strumentation signals intelligence (FISINT).
information. It can be combined later with other intel- ARSOF units use SIGINT to prepare for and
ligence or information as part of the all-source intel- conduct infiltration and exfiltration; to locate actual
ligence product. Only after the data is validated, or potential threat positions; and to analyze possible
analyzed, and processed does it become intelligence. courses of action (COAs). ARSOF units can collect
(See FM 6-20-10.) There are two types of intelligence limited COMINT with organic assets. (See
products: single-source and all-source. FM 34-40, Chapter 4.)
1-5
FM 34-36
• Imagery intelligence (IMINT) is intelligence derived or previously unidentified material. (See FM 34-54,
from the exploitation of products from visual Chapters 1,3, and 4.)
photography, infrared sensors, lasers, electro-optics,
and radar sensors. ARSOF units use IMINT for • Measurement and signature intelligence (MASINT)
targeting, infiltration and exfiltration, and general is a highly sophisticated application of state-of-the-
reconnaissance or area orientation. (See FM 34-55, art technology and processing techniques to detect
Chapters 1 and 2.) and identify specific foreign weapon systems based
on inadvertent signatures. This identification aids in
• Technical intelligence (TECHINT) is intelligence determining capabilities and intentions. ARSOF
concerning foreign technological developments, and units use MASINT for developing target data.
the performance and operational capabilities of
ALL-SOURCE INTELLIGENCE
foreign materiel, which have or may eventually have
a practical application for military use. ARSOF use All-source intelligence can be a combination of combat
TECHINT products to exploit foreign weapons. information, intelligence from more than one intelligence
Since ARSOF units operate deep in hostile or discipline, or even data from previously completed all-
denied territory, they are often first to discover, source intelligence products. To be called all-source in-
identify, and provide information concerning new telligence, it must contain information from at least two
of the intelligence disciplines.
1-6
FM 34-36
and information requirements (IR) and the operational threat, weather, terrain, sociology, politics, training,
requirements for the staff. economics, psychology, and other factors. The mission
and the commander’s direction define the parameters of
The SIO must know the composition of the IEW sys- the data base.
tem, the ARSOF SIO’s place in it, and how to use it;
otherwise, the SIO cannot answer the commander’s PIR ARSOF commanders and their staffs also maintain in-
and IR. Figure 1-5 shows SOF IEW requirements. telligence data bases, but these bases are three-tiered
pyramidical bases; they consist of generic data, durable
The SIO plans, supervises, and coordinates collection data, and perishable data, as shown in Figure 1-8.
and analysis efforts to make sure the commander and
staff elements get timely combat information and intel- Generic data, shown at the bottom of the figure, is in-
ligence products. Using the intelligence cycle and the formation common to or characteristic of a whole group
IPB process, the SIO develops and maintains an intel- or class rather than an individual or specific target; for
ligence data base. example, fundamental, critical components of thermal
THE INTELLIGENCE CYCLE power generation that are found at any thermal power
generation plant anywhere in the world.
The existing intelligence cycle is tailored to meet
ARSOF IEW requirements. The intelligence cycle is The middle tier contains site, system, or area specific
used by the SIO to ensure the commander is supplied data that are not time perishable. This includes durable
with pertinent, timely, and continuous intelligence information about existing natural and synthetic terrain
products and combat information. features, installations, equipment, and personnel. It also
includes imagery blueprints, layout diagrams, flow charts,
As its name implies, the intelligence cycle is con- maps, demographics, biographies, and other data that
tinuous. It has no true beginning nor end and, although will not change significantly for as long as such features,
each step is done sequentially, all phases are done con- installations, equipment, or personnel exist. (Both the
currently. The intelligence cycle, which is shown in lowest and middle tiers of data are assembled before a
Figure 1-6, consists of four steps: directing, collecting, warning order is issued and address what may be tar-
processing, and disseminating and using. Supervising geted by ARSOF.)
and planning are inherent in all phases of the cycle.
Chapter 2 discusses the intelligence cycle in detail. The top tier contains site, system, or area specific real
INTELLIGENCE PREPARATION OF THE time or near-real-time (NRT) data that are time perish-
BATTLEFIELD able. This includes transitory information about existing
The SIO uses the IPB process to provide answers to the installations, equipment, and personnel. It is assembled
commander’s PIR and IR. IPB gives the commander after a warning order is issued and focuses on the actual
and staff a continuous picture of METT-T and other locations and status of people, places, and things that
will be targeted by ARSOF. Examples of data in this tier
operational factors. They use this information as a guide
to determine where and when to use available resources. include guard routines, locations of hostages, operational
The IPB product is continually updated and briefed to status of special weapons, and transport and delivery sys-
the commander, who uses this information when making tems during the ARSOF targeting window.
decisions. Figure 1-7 shows the IPB process. The TTP
of IPB to support SOF operations are in Chapter 10. The ARSOF commander and staff use this data
Details of IPB process are in FM 34-130, Chapter 4. throughout the mission planning process. Figure 1-9
shows how the commander’s guidance and interpretation
INTELLIGENCE DATA BASE of the operation plan (OPLAN) set the parameters of the
All MI officers maintain a general data base for their data base and support operational and logistical plan-
commander’s assigned AO as well as for potential con- ning.
tingency areas. This data base contains information on
1-7
FM 34-36
DIA/NSA
NATIONAL
LEGEND:
AGENCES
T 2
target collection requirements
SIGINT AMPS
3 Source-directed requirements
MSC All other collection requirements
except SIGINT AMPS and
USASFC
source-directed requirements
USACAPOC
USAJFKSWCS Informal
MSU
SF
RANGER
SOA
POG
CA
1-8
FM 34-36
DIRECTING
DISSEMINATING
AND USING MISSION
▼
COLLECTING
PROCESSING
1-9
FM 34-36
ANALYSIS
BATTLEFIELD
THREAT AREA
EVALUATION EVALUATION
THREAT
INTEGRATION
WEATHER
¥ TERRAIN
ANALYSIS ANALYSIS
EVALUATION
/ srrE- \
/ SYSTEM, V
/ AREA \
' SPECIFIC '
REAL OR
NEAR-REAL-TIME
PERISHABLE DATA
GENERIC DATA
1-10
FM 34-36
EXECUTION
PLANNING AND
DEPLOYMENT
\ COMMANDER’S
\ ANALYSIS AND SITE
\ INTENT /SYSTEM»
r AREA \ MOCKUP ULTRA-SPECIALTY
POST- \ CCIR PLANNING AND EQUIPMENT
SPECIFIC 1
WARNING 1 TRAINING
REAL
ORDER
OR NEAR-
REAL-TIME
WAR AND^ PERISHABLE
CAMPAIGNS DATA
PRE- PLANS, \
WARNING DOCTRINE \ OFFSET
AND OTHER \ SITE. SYSTEM, OR SPECIALTY
ORDER PLANNING AND
EXTERNAL AREA SPECIFIC EQUIPMENT
DURABLE DATA TRAINING
DIRECTIVES
GENERIC DATA
INTRODUCTORY GENERAL
PLANNING AND PURPOSE
TRAINING EQUIPMENT
1-11
FM 34-36
N> COMMANDER
CDR’s guidance
and doctrine
F
O
Figure 1-10.
S PLANNING AND
SUPERVISING
LOGISTICS
s
Identify and
procure mission DIRECTING O
S DISSEMINATING MISSION
o
and USING
r
>
OPERATIONS PROCESSING
Execution, INTELLIGENCE
mockup offset Collecting site,
and introductory or area specific
planning and PLANNING AND perishable, durable,
training SUPERVISING and generic data.
SOF
t ”4
FM 34-36
CHAPTER 2
2-1
FM 34-36
2-2
Jí.-
UNIT DET GEN PRI VAL COL ASSET THHT CUR TGT DOWN FWD TO
RQMTS TASK RQMTS RQMTS :QMTS RQMTS MGT IAW OB ASMT INTL EST INTEL MDCI
USASFC
USACA POC
TA SOSC
SF
PSYOP
CA
SOA
RGR
112 SIG BN
528 SPT BN
LEGEND:
DET RQMTS - Determine requirements l&W - Indications and warning MDCI Multidiscipline Cl
GEN RQMTS - Generate requirements OB - Order of battle REC Received
PRI RQMTS - Prioritize requirements THRT ASMT - Threat Assessment EVAL Evaluate
VAL RQMTS - Validate requirements EST - Estimate SAN Sanitize
COL RQMTS - Collate requirements TGT INTEL - Target Intelligence FWD Forward
CUR INTL - Current intelligence
MGT - Management
FM 34-36
ro
I
(4
FM 34-36
Based on the commander’s intent, PIR, and initial in- areas usually are along an avenue of approach (AA) or
telligence estimate, the SIO determines the specific IEW mobility corridor where the interdiction of a threat force
assets needed to satisfy the commander’s requirements. by fire, maneuver, or jamming will reduce or deprive that
FM 34-2, Chapter 2; and FM 34-130, Chapter 5, discuss force of a particular capability.
IPB collection management.
ARSOF TAIs include population groups, installations,
The commander’s PIR drives the SIO collection and and critical facility nodes within a strategic target system.
dissemination efforts. Based on thorough knowledge of Some examples are key bridges, assembly areas, trans-
all operational factors, the SIO develops recommended portation systems, and air defense artillery (ADA) sys-
intelligence requirements to support the commander’s tems. See Chapter 10 for more information on NAI and
concept of the operation. The intelligence staff— TAI.
• Accesses data bases. For ARSOF, the collecting phase of the intelligence
• Tasks assets. cycle begins as soon as mission area requirements are
identified. The collection process is conducted using all
• Assesses capabilities.
the means available within the IEW system—both inter-
• Directs, processes, and disseminates intelligence nal and external to the ARSOF organizations. Collected
and combat information during and after deploy- information is reported to the collection management
ment. and dissemination (CM&D) section of the MI detach-
• Uses national intelligence capabilities to forecast ment. As incoming reports are received, they are
foreign intent, COAs, and vulnerabilities. matched with the collection requirements they satisfy and
• Coordinates multidiscipline counterintelligence forwarded to the all-source production section (ASPS)
(MDCI) support before, during, and after the for processing.
operation. PROCESSING
Processing is the phase of the intelligence cycle where
PIR and IR are the basis for intelligence collection and
information becomes intelligence. Processing results in
production. ARSOF PIR are as concerned with host na-
finished intelligence products the ARSOF commander
tion and local populace as they are with the threat and
and staff use for planning and executing the mission.
the other characteristics of the AO. The commander ap-
Processing consists of the three operations discussed
proves PIR and the SIO approves IR. These IR reflect
below.
some of the intelligence requirements that are less criti-
cal to the commander’s decisions, but still include infor- Recording
mation to support the operations. Once approved, PIR Recording converts information into writing or other
and IR are integrated into the all-source intelligence col- forms of graphic copy and then arranges it into groups of
lection plans that drive situation and target development. related items. Recording can be done manually or by
computer and ranges from the simple logging-in of in-
As these mission requirements change or as old re- coming message traffic to preparing IPB terrain
quirements are met and new requirements are estab- products. Posting on an incident map or overlay would
lished, the SIO develops new PIR and IR to answer be recording.
them. Appendix A contains a sample collection plan and
a chart that lists sources and agencies with the units and Evaluation
activities that fit into each category. Evaluation determines if the information is pertinent,
COLLECTING reliable, and accurate. The analyst can rule out or con-
Collecting entails gathering information from all sour- firm the validity of the information by applying his
ces. Collection operations are guided by PIR and IR. knowledge of the terrain or other conditions. However,
The SIO focuses them on named areas of interest this process can require the reorientation of collection
(NAIs), which are pomts or areas where activity confirms assets to confirm or deny the validity of a given report.
or denies a particular COA; or on target areas of interest This is critical for ARSOF units preparing to operate
(TAIs), which are engagement points or areas. These against targets deep behind enemy lines or in denied
areas.
2-4
FM 34-36
To best support their commanders, ARSOF collection The five IEW mission tasks, which are shown at
managers must identify and prioritize their standing and Figure 1-4, are discussed below.
time-sensitive collection requirements. They must then
forward these requests for intelligence information
SITUATION DEVELOPMENT
Situation development is the process resulting from col- and understand the operational environment in sufficient
lecting and integrating intelligence and combat informa- time and detail to employ their forces effectively. Thus, a
tion into all-source products that provide an estimate of picture is developed based on an analysis of intelligence
the situation and a projection of foreign capabilities and holdings which are continuously updated by collecting
intentions. These products let ARSOF commanders see
2-5
\s
FM 34-36
and processing information. Situation development in- by the deployed ARSOF unit and ensures timely answers
corporates all four steps of the intelligence cycle. to the unit’s questions.
During situation development, the SIO uses IPB in the Multiple military and national intelligence agencies
mission planning process to provide systematic and con- prepare TIPs to satisfy ARSOF planning needs for
tinuous analysis of all the operational factors in specific specific targets. Each TIP includes data on the target
geographic areas. and important installations in the surrounding area,
military aspects of terrain, and forces near or at the tar-
The following types of ARSOF analytical products are get that could affect accomplishing the mission.
integrated into the IPB product to support situation
development. TIPs are specially designed to support SOF require-
ments; however, they should also be useful to any
• General area study. services’ ground forces, or air targeting forces with a mis-
• PSYOP estimate. sion against the target. TIPs include but are not limited
to—
• Target intelligence package (TIP).
• Area assessment. • Army country profile (AGP), which is used to obtain
• Civil-military operations estimate. basic data on a specific AO.
GENERAL AREA STUDY
• Imagery, which plays the biggest role in the up-to-
General or specific area studies provide broad back- date information that goes into each TIP. It is used
ground knowledge of an area, region, or country. Each to confirm or deny existing OB information, as well
ARSOF unit performs a general area study to orient its as to provide the latest images of ongoing construc-
members on potential operational areas. With ASPS tion and levels of activity. Imagery is also used to
support, the unit’s area specialist team (AST) manages produce the highly detailed graphics and overlays
the area study program and assists the ARSOF element that accompany each TIP. JCS Publication 3-05.5
with its general area studies. Appendix B provides a specifies the format and control of TIPs.
sample outline for a general area study.
PSYOP ESTIMATE • Maps and overlays, which are used to portray the
A PSYOP estimate is an analysis of the current situa- latest known locations of units in the field, units in
tion from a psychological viewpoint. It considers all of a garrison, defense sites, key terrain, and other
commander’s feasible COAs, analyzes and compares facilities such as communication sites, ports and har-
them, and then recommends key PSYOP factors affect- bors, and lines of communication (LOG).
ing accomplishing the overall mission. Appendix C
• Automatic data processing (ADP), which is used to
provides a sample outline for a PSYOP estimate.
produce up-to-date information that is incorporated
TARGET INTELLIGENCE PACKAGE into each TIP.
TIPs containing operational area intelligence are
detailed studies of specific targets within a designated • Country studies and other publications, which are
joint special operations area (JSOA). The special forces used to provide information demographics, culture,
group (SFG) and battalion ASTs and ranger order of religion, hydrology, and other general subjects.
battle (OB) sections maintain libraries of approved spe- AREA ASSESSMENT
cial operations mission planning folders (SOMPFs).
With ASPS support, they continually review and update ARSOF area assessments are internally generated.
The area assessment is a continuous process that con-
TIPs to provide the latest operational area intelligence to
deploying SOF units. firms, corrects, refutes, or adds to previous intelligence
gained before deploying. The ARSOF unit transmits the
Once an ARSOF unit deploys, the supporting AST or results of the area assessment to its operational base only
OB section continues to search for intelligence of interest when there is new intelligence that differs significantly
from the intelligence they receive before deploying. By
to the ARSOF team. The AST monitors RIIs submitted
conducting an area assessment, a deployed ARSOF unit
2-6
FM 34-36
continually adds to its knowledge of the JSOA. The • Attitude of the civilian population.
ARSOF unit begins its area assessment as soon as it CIVIL-MILITARY OPERATIONS ESTIMATE
enters its operational area.
The civil-military operations estimate aids commanders
There is no rigid format for making an area assessment, in accomplishing their missions while minimizing civilian
but the area study outline at Appendix B provides a interference and reducing collateral damage to the
guide. The area assessment serves as the basis for the civilian populace and economy. These estimates include
commander’s estimate of the situation. Some major information concerning civilian population density, con-
aspects of the area assessment include— figuration, public health, public safety, and probable
routes and numbers of dislocated civilians. Appendix D
• Foreign situation and security measures. contains a sample outline for a civil-military operations
estimate.
• Situation of the supported indigenous force.
TARGET DEVELOPMENT
Target development for ARSOF is conducted during threat activity. Movers, shooters, emitters, and sitters
peacetime, conflict, and war. ARSOF employs two dis- which are identified and located by ARSOF in the JSOA
tinct target development processes which overlap: become a critical set of target categories.
• Deliberate targeting process, which is a long-term However, while a conventional forces targeteer can
process that occurs during peacetime. task units to actively pursue threat forces—much as a
hunter stalks prey—the ARSOF targeteer must approach
• Adaptive targeting, which is an accelerated process the deep battle adaptive targeting process from the
used during crisis or war. mindset of a trapper. The ARSOF SIO examines the
JSOA and its adjoining areas to predict threat force
The MI concept of targeting most closely parallels the movement patterns and to assess their speed of move-
SOF adaptive targeting process. ment. These analyses result in identifying NAIs which
DELIBERATE TARGETING PROCESS the ARSOF commander can nominate as future TAI or
future JSOAs to his theater special operations com-
In the deliberate targeting process, ARSOF missions mander. These TAIs can then become assigned JSOAs
focus on facilities, installations, and system components for ARSOF target missions.
which are critical to a nation’s warfighting capabilities,
infrastructure, or internal stability. This target selection It is important for the ARSOF SIO to know that the
program must examine all potential target systems to deliberate and adaptive targeting processes depend on
determine which are best suited to accomplish the sup- effective and timely use of the intelligence cycle. ARSOF
ported CINC’s objectives. Since the deliberate targeting target development is the result of complete and ac-
program occurs prior to hostilities, critical node selection curate situation development during peacetime contin-
is based on peacetime data bases and analysis. gency planning and battlefield analysis during conflict or
ADAPTIVE TARGETING PROCESS wartime. IPB supports target development programs
and provides the ARSOF commander with the intel-
In the adaptive targeting process, target selection goals
ligence needed to select valid target nodes for his opera-
are not confmed to destroying or damaging a fixed target.
tional elements.
The major goals are to alter, affect, impede, or report
ELECTRONIC WARFARE
EW coordination is a shared responsibility of the electromagnetic spectrum. EW can be defensive or of-
ARSOF staff. This staff consists of the S2, S3, signal of- fensive. It contributes significantly to command, control,
ficer, and MI detachment commander. The commander and communications countermeasures (C3CM). ARSOF
uses EW to determine, exploit, disrupt, and deceive commanders consider integrating Air Force and other
foreign C2 systems while protecting friendly use of the
2-7
FM 34-36
non-SOF EW support into special operations. EW sup- has staff responsibility for ECM. The SF group has a
port is used— very limited organic tactical jamming capability so it
relies primarily on theater systems to provide ECM sup-
• During infiltration and exfiltration. port for its operations. The S3 EW officer (normally an
additional duty) plans and coordinates this support with
• During critical times in mission execution (par- the help of the S2. One of the major duties is to protect
ticularly in DA and CT missions). friendly frequencies.
Cl provides analysis of foreign intelligence threats to • Counter foreign sabotage, subversion, assassination,
include espionage, sabotage, subversion, assassination, and terrorism.
terrorism, and other threats. This is accomplished
through the four major Cl functions: investigation, col- Cl does not include —
lection, operations, and analysis and production. (See
FM 34-60, and FM 34-60A, for more information on Cl.) • Personnel or information security.
Cl operations— • Physical security.
• Operations security (OPSEC).
• Must include specific actions which support the
protection of the force.
MDCI analysis provides ARSOF commanders with
detailed assessments of foreign all-source intelligence
• Counter the foreign multidisciplined intelligence
and security threats near their operational bases and in
threat.
their operational areas. These foreign threat assessments
2-8
FM 34-36
are critical to the unit’s OPSEC and base defense dations of friendly activities to support the deception; if
programs. these activities are employed, they will help evaluate their
effectiveness. See FM 90-2 and FM 90-2A for details on
MDCI analysts also support ARSOF deception opera- battlefield deception and electronic deception principles
tions by determining foreign intelligence collection as- and TTPs.
sets. MDCI analysts provide the S3 with recommen-
The MI commander executes the SOF commander’s The SIO manages and supervises SOF intel-
I&W directives. The ARSOF commander leads the IEW ligence operations and security programs. Based on
2-9
FM 34-36
intelligence requirements, the SIO develops intelligence • Determines friendly vulnerabilities by comparing
collection requirements and tasks subordinate elements, the friendly force profile with the MDCI estimates
including organic and supporting MI units. provided by the Cl section.
The S3 plans and directs EW and OPSEC based on • Recommends OPSEC measures and evaluates their
mission requirements. The S3— effectiveness. The MI detachment commander
manages organic MI assets to accomplish assigned
• Tasks subordinate elements to carry out these mis- IEW missions and exercises C2 over all organic and
sions. attached MI elements and operational control
(OPCON) over supporting MI assets.
2-10
FM 34-36
CHAPTER 3
SOF organizations are based on generic group or US Army Special Operations Command (USASOC)
regimental and battalion structures. These structures are operational elements and the supported theater’s Special
modified to meet specific environmental and operational Operations Command (SOC). These direct channels
considerations which may be unique to specific theaters support ARSOF intelligence tasking and reporting re-
where they are employed. quirements. That is why these DIRLAUTH arrange-
ments are extended to the major subordinate units
There are five theater SOF commands: (MSUs) and the organizations that will exercise OPCON
over them in contingencies and wartime. This ensures
Special Operations Command, Europe (SOCEUR). these elements get timely and accurate intelligence
Special Operations Command, Pacific (SOCPAC). throughout the mission or operation.
Special Operations Command, Atlantic
The J2 USSOCOM establishes the policy, guidance,
(SOCLANT).
and overall direction of SOF intelligence operations.
Special Operations Command, Central The policy, guidance, and overall direction of ARSOF in-
(SOCCENT). telligence operations in peacetime is executed by the
Special Operations Command, Southern USASOC DCSINT.
(SOCSOUTH). THEATER SPECIAL OPERATIONS COMMAND
(J2)
These SOF commands are subunified commands
whose missions are to conduct special operations when The SOC (J2), as the theater SOF intelligence mission
authorized by each unit’s combatant command. Theater tasker—
Army Special Operations Support Commands
(TASOSCs) and the active and Army reserve PSYOP • Develops in-theater IEW policy, planning, and coor-
groups and CA elements are also task organized in the dination.
same way. The ranger regiment can be committed to a
specific theater CINC or held under national control, • Ensures there is enough intelligence support re-
depending on the situation. Figure 3-1 shows the com- quested for each mission tasked by the special
batant command (COCOM) structure. operations commander.
USSOCOM
• Coordinates with theater service IEW organizations
The US Special Operations Command (USSOCOM) is to collect, produce, and disseminate intelligence to
the unified COCOM for special operations. All meet SOF requirements.
v CONUS-based SOF are assigned by the Secretary of
Defense (SECDEF) to the CINC, USSOCOM. • Tasks collection and production assets to satisfy
Figure 3-2 shows the command relationships. The CINC SOF intelligence requirements.
exercises COCOM of assigned forces through a com-
bination of service and joint component commanders. • Coordinates joint special operations intelligence
collection operations and the production and dis-
USSOCOM and most of the theaters it supports have semination of TIPs to support SO targeting. (See
3-1
FM 34-36
u
I
ro
COMMUNICATIONS PRESIDENT
CHAIRMAN
JCS
SECRETARY OF DEFENSE
Figure 3-1.
GLOBAL UNIFIED
SPECIFIED COMMANDS COMMANDS REGIONAL UNIFIED COMMANDS
STRATEGIC US US US SPECIAL us US US US US
FORCES TRANS SPACE OPERATIONS PACIFIC ATLANTIC EUROPEAN SOUTHERN CENTRAL
AIR
COMMAND COMMAND COMMAND COMMAND COMMAND COMMAND COMMAND COMMAND
COMMAND COMMAND
NAVAL NAVSPEC
M8C SPACE USLANTFLT U8NAVEUR USNAVSO USNAVCEMT
WARCOM USPACAF
COMMAND
COMPONENT COMMANDS
US FORCES US FORCES
KOREA AZORES
SOCPAC SOCLANT
<
FM 34-36
OTHER GOVT,
AGENCIES
DEPT OF STATE PRESIDENT
CHAIRMAN, JOINT
CHIEFS OF STAFF
COMMUNICATIONS
JOINT STRATEGIC
TARGET PLANNING DEFENSE AGENCIES SERVICES
DIA, DMA, DCA, DNA
STAFF (JSTPS)
MILITARY
COMMUNICATIONS
ELECTRONICS BOARD
k ★ k k- k- ★ k
AFSOC ASOC NAVSOC ,
(SERVICE COMPONENT) (SERVICE COMPONENT) (SERVICE COMPONENT)
3-3
FM 34-36
• Coordinates with the SOC Communications- • Coordinates directly with USSOCOM and the
Electronics Directorate (J6) to ensure the Theater Army to ensure continuity and com-
availability of secure sensitive compartmented infor- patibility of theater SOF intelligence requirements.
mation (SCI) voice and data communications be-
tween SOC headquarters, SOC component • Manages readiness training (REDTRAIN) and live
commands, and the TASOSC. environment training opportunities and programs
for ARSOF personnel.
• Maintains direct liaison with operational and
strategic level intelligence agencies. • Is the SIGINT mission activities manager for all AC
and RC SOF.
• Maintains direct liaison with combined and allied
SOF intelligence staffs. • Serves as the functional interface between ARSOF
and MI to resolve doctrinal, training, equipment,
• Develops IEW policies, plans, and programs for and personnel issues.
SOF. ODCSINT ORGANIZATION
• Maintains maps and terrain and imagery products The Office of the Deputy Chief of Staff for Intelligence
for immediate contingency use by the SOC head- (ODCSINT), as shown in Figure 3-3, is discussed below.
quarters. Plans, Policy, and Programs Division
US ARMY SPECIAL OPERATIONS COMMAND The Plans, Policy, and Programs Division —
USASOC is the major Army command (MACOM) for
special operations. Its major subordinate commands • Prepares long-range intelligence plans like medium-
(MSCs) are— and long-range threat assessments and crisis impact
analyses.
• US Army John F. Kennedy Spécial Warfare Center
(USAJFKSWC). • Identifies trends and issues in the intelligence field
which may affect the SOF community.
• US Army Special Forces Command (USASFC).
• Reviews, analyzes, recommends, and manages the
• US Army Civil Affairs and PSYOP Command ODCSINT segment of the USASOC goals and ob-
(USACAPOC). jectives.
• Advises the commander on all intelligence training • Establishes intelligence requirements for the com-
matters. This includes current policy, doctrine, and manding general and staff and develops the format,
concepts. content, focus, and timing of periodic output by the
MSC to meet these requirements.
• Develops and implements policy and guidance used
to evaluate and monitor the readiness status of the • Provides policy oversight of all intelligence
AC and RC intelligence units. programs.
3-4
FM 34-36
ODCSINT
• Develops ODCSINT operating policies and SOP in • Is the focal point for all incoming intelligence ar-
accordance with guidance from the ODCSINT. chitecture taskings and actions.
• Compiles and maintains ODCSINT history; estab- • Interfaces with the USAJFKSWC, USASOC, and
lishes suspense dates and registers requirements US Army Intelligence Center on doctrinal, training,
with the Requirements Management Division for and other combat development matters as required.
tasking and tracking.
• Coordinates to acquire nondevelopmental items
• Maintains continuing liaison with policy makers at (off-the-shelf equipment) in conjunction with
USSOCOM and Department of the Army. USASOC Deputy Chief of Staff for Operations
(DCSOPS).
• Administers the Strategic Industrial Targeting
1
Analysis Program. • Is the intelligence focal point for USSPACECOM
actions.
• Produces quarterly progress reports on ODCSINT
goals and objectives. • Is the command focal point for the Tactical Ex-
IEW Support Division ploitation of National Capabilities (TENCAP)
program.
The IEW Support Division—
3-5
Á
FM 34-36
• Coordinates and controls the DCSINT automation • Establishes an all-source intelligence ADP facility to
program. support MACOM, MSC, and MSU automated in-
telligence information requirements in support of
• Is the staff proponent for all intelligence training missions.
matters.
• Validates and processes MSC and MSU requests for
• Represents USASOC to INSCOM, HQDA, and intelligence information.
other agencies and commands to identify intel-
ligence training requirements and training oppor- • Serves as the DCSINT focal point for all imagery-
tunities that support USASOC goals and its IEW related matters and activities.
personnel.
• Performs SIGINT operational management in ac-
• Directs the command’s tactical intelligence cordance with existing regulations.
REDTRAIN program.
• Publishes, develops, and periodically updates the
• Establishes an ARSOF Military Intelligence command’s SIGINT architecture concept of opera-
Specialty Training Element (MISTE) program and tions.
becomes the focal point for MISTE after the
program is initiated. • Conducts SIGINT directives management in ac-
cordance with existing policies and guidelines.
• Is the focal point for all USASOC M&CG activities.
• Registers, validates, prioritizes, and processes all
• Represents the DCSINT on intelligence matters re- HUMINT requirements for integration into the all-
lated to the Joint Readiness Training Center (JRTC) source production effort of ODCSINT, USASOC.
and the National Training Center (NTC).
• Coordinates and participates in National Security
• Reviews doctrinal publications. Agency (NSA) field assistance visits to all MSUs
through MSCs.
• Manages the command’s intelligence readiness
reporting programs. • Coordinates with the theater J2 and applicable na-
tional level organizations and agencies for theater
Requirements Management Division
and national level SIGINT support.
The Requirements Management Division—
• Performs SIGINT operational coordination for re-
• Serves as the ODCSINT focal point for all require- questing, validating, processing, maintaining, and
ments levied by internal or external sources. prioritizing command SIGINT requirements for ex-
ercise, contingency, and real-world military opera-
• Publishes and develops intelligence requirements tions.
management guidance and policy.
• Validates, maintains, and performs SIGINT
• Validates and processes statements of intelligence authority tasks.
interests (SIIs) and requirements for recurring pub-
lications of subordinate units submitted through the • Provides technical support to the Fort Bragg im-
MSCs. agery readiness facility.
• Identifies CONUS-based ARSOF intelligence re- • Develops and maintains SIGINT training material
quirements and forwards them to USSOCOM or and COMINT technical support packages for all
the appropriate national agency for incorporation SOF-supported contingency plans (CONPLANs)
into the national intelligence requirements collec- and OPLANs.
tion apparatus.
3-6
FM 34-36
• Serves as the DCSINT focal point for the manage- — The command’s special access programs (SAPs).
ment and operation of the USASOC secondary im-
agery dissemination system. — MDCI threat and combatting terrorism analysis.
• Directs the overt collection programs. (See — Compromising emanations (TEMPEST) control
TC 34-5, Chapter 3.) program.
Security Division
— Cl and information security for the COMSEC
The Security Division— program.
• Directs Cl activities. To do this, it— • Manages the established SSO support for USASOC.
— Develops policy, implements directives, and • Manages the SCI billet program for subordinate
oversees the Cl effort within ARSOF. reserve and national guard units.
— Provides Cl and security support to the DCSOPS • Disseminates SCI to persons who are authorized ac-
OPSEC program and to MACOM participation. cess.
3-7
FM 34-36
— All physical security actions for the sensitive • Maintains listings of available SCI hard copy
compartmented information facility (SCIF). products and ensures prompt dissemination to all
authorized personnel.
— SCI security awareness programs for all SCI in-
doctrinated personnel. • Processes SCI incoming and outgoing visitor
clearance certifications.
— Required interface with SCI telecommunication
center and ADP facilities to ensure SCI security • Thilors SSO support to the changing needs of the
and proper dissemination. command.
3-8
FM 34-36
NATIONAL
AGENCIES
TRII
RII
RII and validates
and prioritizes
tasks
J
RII
i
ARSOF UNIT S2
\ i
TASOSC ISE
EACIC
-DIRLAUTH-
DIRLAUTH RII
\ ASIC OF
SUPPORTED
1ST HQ
Chapter 9 for information about the SOF targeting tion and debriefing teams in the battalion’s support com-
process.) pany, and the test and evaluation teams in the battalion’s
headquarters company.
• Technical control and analysis element (TCAE) in-
terface. The TASOSC ISE TCAE provides connec- There is also a small tactical intelligence and interroga-
tivity between the theater TCAE and ARSOF units tion section in the product development center (PDC) of
that have EW and SIGINT capabilities. each PSYOP tactical company. CA units have an or-
ganic intelligence staff but have no other organic intel-
• Intelligence liaison. The TASOSC ISE places ISIS ligence resources. The SOA regiment and the rangers
at the all-source intelligence centers (ASICs) sup- have regimental and battalion S2 staffs but have no other
porting major operational headquarters; for ex- organic MI support.
ample, subunified commands, JTFs, and NATO
MSCs. This speeds the flow of combat information The ARSOF unit SIO —
and intelligence between conventional forces and
SOF. The TASOSC ISE and 1ST use established • Identifies and prioritizes unit intelligence require-
theater SCI channels to communicate with one ments.
another.
• Tasks unit collection and analysis assets.
SFGs and battalions have organic intelligence staffs
and MI detachments which provide DS to SF units. The Deployed ARSOF SIOs identify requirements that can-
PSYOP groups and battalions have small organic intel- not be satisfied at unit level and forward them to the
ligence staffs. Other intelligence assets within PSYOP TASOSC ISE. While in CONUS, ARSOF SIOs forward
units include interrogation specialists on the interroga- these same requirements to USASOC.
3-9
FM 34-36
ASSISTANT CHIEF OF STAFF, G2, USACAPOC • Maintains the REDTRAIN program for the com-
The G2, US Army Civil Affairs and Psychological mand.
Operations Command (USACAPOC) organization, as
shown in Figure 3-5, is discussed below. • Identifies intelligence training requirements and
training opportunities for the command.
CI/Security Division
The CI/Security Division— • Programs and reviews the intelligence readiness
posture for the command.
• Performs foreign visitor accreditation and disclosure
functions. • Assists in developing the IEW force structure for
the command.
• Develops Cl threat to support terrorism counterac-
tions. • Develops training in conjunction with the G3.
• Performs as information systems security manager • Performs mapping, charting, and geodesy require-
for the command. ments for the command.
• Performs all SSO functions for the command. • Serves as the focal point for the EW training
program.
• Maintains the personnel security program for the ASSISTANT CHIEF OF STAFF, G2, US ARMY
command. SPECIAL FORCES COMMAND (AIRBORNE)
The ACofS, G2 organization, as shown in Figure 3-6, is
• Maintains the information security program for the
discussed below.
command.
Special Security Office
IEW Division
This is a one-soldier section. It provides doctrinal SSO
The IEW Division—
support for the headquarters and coordinates closely
withUSASOC SSO.
G2
ASSISTANT G2
CI/SEC IEW
DIVISION DIVISION
3-10
FM 34-36
ACofS
and
„V .ff,. 4,J:
G2 OPERATIONS \-'P V '.Sif
.r..y - ■ *
,,,sfi':;
,,,,
1 jl' ■<
3-11
FM 34-36
• Conducts analyst-to-analyst coordination when it is • Serves as the focal point for integrating new intel-
necessary to ensure adequate coverage of areas ligence systems into SF.
identified as areas of command interest. • Plans for and provides intelligence support to MSU
exercises.
• Serves as a focal point for all IMINT and SIGINT
• Develops interoperability guidance for the intel-
activities for USASFC and MSUs.
ligence activities of the command and its MSUs.
Operations Division • Provides intelligence oversight for the command.
The Operations Division—
COLLECTION MANAGEMENT
Collection requirements are always met by the lowest questing unit. This data is used to satisfy the supported
possible echelon so the requestor receives the informa- commander’s collection requirements (see Figure 3-4).
tion or intelligence as soon as possible.
Liaison elements from the national level intelligence
The theater SOC J2 functions as the SOF collection agencies (CIA, NSA, DIA, and other agencies) can be
management authority within the theater. He communi- deployed into a theater area of responsibility. These are
cates directly with supported theater elements and with known as liaison national elements (LNE). They deploy
the national level agencies of other nations, as well as with dedicated communications and provide real-time in-
with our own national level agencies and organizations. terface between these agencies and their parent agencies.
Intelligence sections of MSUs in the theater act as re-
quirements managers. They forward combat information LNE provide limited in-theater analysis of national
and intelligence to the theater SOC J2 and to the re- platforms and systems down-links in support of theater
3-12
FM 34-36
requirements. Normally, these LNEs are available only resources. SIOs validate all subordinate unit SIIs re-
during contingency operations or for major exercises. quirements for collateral and compartmented recurring
When they deploy, they are collocated with the sup- documents, one-time document requests, RIIs, and intel-
ported theater headquarters. In wartime, requirements ligence production requirements (IPRs).
to national and theater assets are requested or levied at
the Unified Command level. During peacetime, if the S2 determines that organic
resources cannot satisfy a request, intelligence support
The J2 passes time-sensitive requirements for national relating to OPLANs or CONPLANs are validated and
level assets to the theater J2. The J2 also gives an infor- prioritized by the SOF component S2. The S2 passes
mation copy of the requirement to the EACIC in-theater. these requirements to the appropriate SOC J2 with an in-
This way, if the EACIC already has the information or in- formation copy to the appropriate MSC (for example,
telligence, it can cancel the original request and fulfill the USASFC and TASOSC). The SOC J2 confirms and
requirement itself. validates the request and forwards it to the JIC if the re-
quest cannot be satisfied by the SOC J2 data base.
The theater J2 attempts to satisfy the RII with the data
base by passing production requests to other service Non-OPLAN related requirements are sent by the
theater collection assets. If the request still cannot be ARSOF S2 to the appropriate MSC (for example,
satisfied at the theater level, it is passed to the ap- USASFC) with an information copy of the request to
propriate national intelligence agency where a collection USASOC DCSINT. Requests that the MSC cannot
requirement is levied on assets available at that level. satisfy are validated and sent to USASOC DCSINT with
an information copy to USSOCOM. USASOC attempts
All ARSOF SIOs are responsible for meeting their to fulfill the request; however, if it cannot, it is validated
commander’s intelligence and combat information re- to USSOCOM with an information copy provided to
quirements. Often, they cannot do this using organic DIA.
resources; they need access to national and theater level
3-13
jr
FM 34-36
CHAPTER 4
INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT TO
SPECIAL FORCES GROUP (AIRBORNE)
This chapter discusses IEW support to SF operations. Detachment S2. Finally, it describes the organic and
It describes the organization and missions of SF and the nonorganic IEW support the Army provides to SF. (See
intelligence units that support SF. It describes the role of FM 100-25, Chapter 13.)
the MI Group S2, the MI Battalion S2, and the MI
MISSIONS
The Special Forces Group (Airborne) (SFG(A)) is a DIRECT ACTION MISSIONS
unique combat arms organization. It is capable of plan- SF conducts DA missions to achieve various goals. The
ning, conducting, and supporting SO in all operational
goals include —
environments and across the operational continuum. SF
is an unconventional combat arm. It combines at the • Degrading the enemy’s C2 and destroying his critical
lowest tactical level the functions performed by several assets.
conventional branches of the Army. In effect, it is a com-
bined arms branch. SF commanders must integrate and • Developing desired psychological effects.
synchronize their organic capabilities with those of other • Preempting enemy operations.
SOF and theater assets.
DA missions require, at a minimum, detailed
As a component of ARSOF, SF plans, conducts, and knowledge of the target site, infiltration and exfiltration
supports the full range of SF activities in all operational routes, and OB of any threat counter-responsive forces.
environments in peace, conflict, and war. Each SFG is Facts about the target must be more detailed than re-
assigned an AO, depending on OPLAN requirements. quired for conventional targeting.
SFGs also conduct DA, SR, CT, UW, and FID missions
and collateral activities, as required and within their DA missions are often launched against targets deep
capabilities. within enemy-controlled territory, far beyond the sensing
capabilities of tactical collection systems. Each target re-
All military forces stand ready to perform missions for quires construction of its own mission planning folder
which they are not specifically organized, trained, or containing detailed target specific data and in-depth area
equipped. (See FM 31-20, Chapter 3, for more informa- studies of the AI.
tion about the SOF missions and collateral activities.)
These collateral or secondary missions include— A complete picture of the situation is developed after a
multidisciplined analysis of all categories of intelligence
• Humanitarian assistance. is completed and provided to the SF in response to their
• Security assistance. PIR.
• Search and rescue.
Each mission is an individual effort requiring—
• Counter-drugs.
• Antiterrorism. • Development and maintenance of a data base.
• Other security and special actmties.
• Continuous monitoring of pertinent crisis situations
These wide-ranging missions, which are discussed and other specific geographical Als.
below, require accurate, detailed, and timely intelligence
that can be obtained only by a multidisciplined collection • Accessibility to and coordination with national,
and analysis intelligence organization. strategic, and operational level collection systems.
4-1
FM 34-36
• Multidisciplined analysis of all information in sup- UW includes guerrilla warfare (GW) and other direct
port of the mission. offensive, low-visibility, covert, or clandestine operations,
SPECIAL RECONNAISSANCE MISSIONS as well as the indirect activities of subversion, sabotage,
intelligence collection, and evasion and escape (E&E).
SR missions require capabilities that exceed the opera- UW normally involves inserting SF elements into areas
tional capabilities of tactical collection systems in order controlled by hostile forces. These elements need out-
to obtain information not available through other means. side support.
These operations generally have the same requirements
for detailed intelligence information as DA missions. Intelligence gathering during UW comes from various
However, these missions are designed to satisfy intel- sources including those developed within the AO. SF
ligence gaps or to confirm information in the intelligence elements make effective contact with partisans and guide
base. them in operations that support US national objectives.
They conduct extensive preemployment preparation.
Operations on the ground could detect indicators that They need detailed intelligence about their geographical
help to develop the needed intelligence. Forces conduct- AO. (Refer to Appendix C for details of the information
ing these missions must understand the intelligence requirements.) This intelligence includes, among other
needs that the missions are designed to fill. Planning for things—
these missions must be accomplished jointly by the SF
unit and the intelligence agency requesting the mission. • Knowing and being able to recognize the languages
COUNTERTERRORISM MISSIONS spoken in the area.
CT missions involve offensive measures against ter- • Economics.
rorists. They include preemptive, concurrent, and puni- • Politics.
tive actions. This category of SF mission is not generic to • Climate.
all SF units. SF participation in CT is limited to those
specially organized, trained, and equipped SF units • Geography.
designated in theater CONPLANs. • Sociology.
• Ethnic groups.
Because terrorist organizations maintain a very low • Religious groups.
profile, it is extremely difficult to identify targets for
these missions. The IEW system supports these missions • Key personalities.
by providing accurate, detailed, and responsive intel-
SF elements need detailed information and all-source
ligence.
intelligence on targets and target systems in the area; the
situation within and between partisan groups; and vir-
Intelligence must identify terrorist personalities and
tually all other pertinent information that can be
locations, organizational composition, and logistical sup-
port systems; and describe their weapons, equipment, gathered. They also require the aid of indigenous sup-
port personnel prior to insertion to help them survive
training, and tactics as well as pertinent information
about any hostages. Close coordination between mission and make contact with the partisan movement.
planners and various national and military intelligence
SF teams conduct LLSO to provide security and meet
agencies is required to collate, analyze, and immediately
provide the SF unit performing the CT mission with the intelligence requirements within the UW operational
information it requires. area.
UNCONVENTIONAL WARFARE MISSIONS The local intelligence nets must be organized and
UW is a broad spectrum of military and paramilitary resourced to provide the best possible security for UW
operations against an established government or occupy- forces and to meet the intelligence requirements of the
ing power. They are normally of long duration, supported commander.
predominantly conducted by indigenous or surrogate for-
ces organized, trained, equipped, supported, and SF operational elements must receive multidisciplined
directed in varying degrees by an external source. intelligence tailored to their specific mission. This intel-
ligence must be all-source, processed, and be presented
4-2
FM 34-36
in a usable format for planning and operational employ- impact on the acceptability and success of the govern-
ment of assets. SOF uses national amd theater intel- ment.
ligence means to identify potential in-country sources.
This allows SF elements to successfully accomplish their Successful FID missions require using the IPB process
missions. to develop the following intelligence products:
Because UW operations are diverse, they need a wide • The supported host country’s defense and security
range of support. This includes everything from basic establishment’s OB.
support to a very sophisticated system using ADP and in-
telligence specialties. All-source intelligence is essential • Details on foreign intelligence organizations active
regardless of the mission. within the host country.
FOREIGN INTERNAL DEFENSE MISSIONS
• OB on insurgent groups with the potential to over-
In FID missions, SF and other ARSOF support the throw the host-nation government.
host-nation government. These missions include civic,
psychological, and military operations. • Country studies about the host nation, its people,
and its infrastructure.
US personnel must know the host nation’s population,
psychology, religions, customs, and moral attitudes to • Key personalities.
perform FID missions. They should also know sources of
friction and irritation within the host country that could
The SF detachment intelligence staffs and MI detach- • Supervises the group information, ADP, and person-
ments are the key components of the organic IEW team. nel security programs.
The SF staff plans, organizes, directs, coordinates, and
controls while the MI detachment commander executes • Advises the commander in the employment of SF
the directives. The SF MI detachment is led by the unit intelligence assets.
detachment commander who gives the team leadership,
motivation, focused perspective, and direction. • Provides intelligence support to OPSEC, EW opera-
GROUP S2 tions, and deception planning.
The group S2 is the principal staff officer for all intel- • Exercises staff supervision over the unit’s MI
ligence and security matters. Based on the commander’s detachment.
4-3
FM 34-36
• Coordinates CI activities in support of operational for administrative and logistical support. Figure 4-1
requirements. shows this structure.
BATTALION S2
• Coordinates and manages the group intelligence
training program. The battalion S2 is the battalion’s principal staff officer
for all matters pertaining to intelligence and CL The
• Exercises staff supervision over the special staff duties are similar to those of the group S2. He provides
functions of the USAF SO weather team when a special security representative (SSR) support to the bat-
weather team is attached. talion. The SSR functions are under the technical con-
trol of the supporting SSO. The supporting SSO will be
• Identifies, validates, and coordinates priorities for the group SSO only when the two headquarters are collo-
unit geographic area requirements for MC&G cated.
products to support OPLANs and CONPLANs, and
monitors and validates map requisitions. The SF battalion S2 section generally consists of the S2,
a senior intelligence NCO, an intelligence analyst ser-
• Requests topographic support through command geant, and a junior intelligence NCO.
channels for specific Als. This support may include BATTALION Ml DETACHMENT
tailored terrain products, terrain studies, and over-
The battalion MI detachment mission and organization
printed MC&G products and services.
are similar to the group MI detachment. Figure 4-2
shows this structure. Six exceptions are listed below.
• Provides integrated all-source intelligence collection
The MI battalion detachment—
management, analysis, production, and dissemina-
tion in support of group level situation and target
• Is limited in its organic capability to perform —
development. This includes DS to the ODAs.
— Intelligence collection management.
• Establishes and operates a tactical or field SCIF in
the SFOB OPCEN.
— All-source intelligence analysis.
• Provides SCI communications between the SFOB
— Production for the SF battalion and its attached
and the deployed forward operations bases (FOBs).
elements.
GROUP Ml DETACHMENT
The group MI detachment provides integrated all- • Depends on the group intelligence data base and
source intelligence collection management, analysis, other technical assistance from the group MI
production, and dissemination in support of group level detachment.
situation and target development. These functions cor-
respond to, but are much broader than, those performed • Has three organic support operations teams-A
by the tactical operations center (TOC) support element (SOT-A). They deploy with SF teams to provide
of a conventional MI unit. SIGINT and EW support.
The detachment establishes and operates a tactical • When authorized and directed, participates in active
SCIF in the SFOB OPCEN and provides SCI com- Cl operations through the Cl section.
munications between the SFOB and the deployed FOBs.
It provides interrogation and Cl support. • Does not have any organic interrogation teams.
This support is obtained from the SF group MI
The detachment commander may work for the deputy detachment or from other external agencies, as re-
group commander under the staff supervision of the quired.
group S2. When the detachment is formally detached
from the support company, the detachment commander • Works for the battalion commander under the staff
exercises normal company level command, but the supervision of the battalion S2.
detachment remains dependent on the support company
4-4
FM 34-36
SFG
Ml DET
* * SSO
DET HQ CM&D Cl COMM
ASPS INTG TM TCAE
SEC
11 SEC
TM
SF BN
Ml DET
SOT-A
LEGEND: * ASPS and CM&D sections are consolidated
with the TCAE (SOT-B) on the TOE.
4-5
FM 34-36
Based on approved plans and guidance from the base The USAF staff weather officer (SWO) serves as a spe-
commander, the OPCEN director supervises all opera- cial staff officer to the group commander on all weather
tional aspects of mission planning and execution. The matters. The team provides—
OPCEN director synchronizes S2, S3, and S5 activities
within the OPCEN. • Current and forecast weather data.
The S2 section and the MI detachment are discussed • Climatic analysis studies in support of all group mis-
below. FM 31-20, Chapter 6, discusses in detail the other sions.
sections located within the OPCEN.
• Forward area limited observing program (FALOP)
S2 SECTION
training and mission support information to ODAs
Under the staff supervision of the unit S2, the OPCEN in isolation.
S2 section is the focal point for all-source intelligence
production and collection management. This section When approved by the group commander, the SWO
consists of the S2 staff, elements of the group or battalion may attach weather team members to ODAs, operational
MI detachment, and the USAF weather team. detachments-B (ODBs), or SOT-A’s to gather critical
4-6
FM 34-36
COMMAND
GROUP
OPERATIONS MAINTENANCE
OF SECURE LOGISTICS'
INTELLIGENCE
COMMUNICATIONS PERSONNEL
PLANNING
WITH DEPLOYED SERVICE
TRAINING
TEAMS SUPPORT
PREPARATION OF TRAINING OF
TERMINATION OF
COMMITTED TEAMS UNCOMMITTED
CIRCUITS FROM
SFOBs
HIGHER, ADJACENT,
CONTROL AND AND SUBORDINATE
SUPPORT ÓF HEADQUARTERS SUSTAINMENT OF
DEPLOYED TEAMS DEPLOYED TEAMS
1 /
COMMUNICATIONS
DEPARTURE DELIVERY
SITE AGENCY
JSOA
4-7
FM 34-36
Ml CONSOUDATED S2 S3 S5
ISOFAC DET PLANS SEC SEC SEC SEC
- TERRAIN * ENGR
TM SEC
- INTERRO- - S3 AIR
GATION
IMS AVN
PLT
HQ LIAISON
COMDT SEC
LEGEND: Under OPCON of S2
weather observations from denied territory and data The MI detachment commander, as the principal intel-
sparse regions. ligence producer and executor—
Ml DETACHMENT
• Provides, through the group S2, intelligence support
The MI detachment forms the ASPS in the OPCEN
to the commander.
and provides collection management, all-source produc-
tion, and S2 support to OPSEC and EW planning and
mission management.
4-8
FM 34-36
• Establishes and operates a tactical SCIF in the • Obtains the commander’s approved requirements
OPCEN. Within the SCIF, the unit SIO provides the from the unit SIO, prioritizes them based on SIO
SSO. guidance, and translates them into collection mis-
sions.
• Responds to formal taskings from the operational
base SIO. • Prepares the unit collection plan and forwards the
unit’s PIR to the TASOSCISE and the SOC J2.
• Directs and controls the TCAE, the SSO com-
munications team, and the interrogation and Cl sec- • Tasks organic and attached MI collection assets.
tions with guidance from the S2.
• Through the S3, requests intelligence collection mis-
Proper IEW support depends on direct daily contact sion tasking of SF teams or other subordinate non-
and informal tasking and coordination between the SIO MI assets.
staff elements and the various sections of the MI detach-
ment. • Disseminates combat information and intelligence
within the command and to higher, adjacent, and
All-Source Production Section
lower headquarters.
The ASPS performs IPB and consolidates information
SSO Communications Section
from all sources to meet the SF commander’s needs. The
ASPS- The SSO communications section is located within the
SCIF. It provides—
• Processes, correlates, and integrates all-source intel-
ligence in response to taskings from the CM&D sec- • Secure communication to the SF commander.
tion.
• Secure SCI communications between the SFOB and
• Is the focal point for all situation and target its deployed FOBs.
development.
Higher headquarters provides SCI communications to
• Develops and maintains the unit’s intelligence data the SOC J2 and TASOSC ISE.
base, to mclude the intelligence journal, OB infor-
Technical Control and Analysis Element
mation, IPB products, targeting data, and the situa-
tion map. The group TCAE carries out the SIGINT and EW
management functions. It—
• Monitors the CM&D collection plan and recom-
mends revisions to close identified gaps. • Produces the SIGINT collection plan.
• Receives and processes intelligence products and • Is collocated with the ASIC in the SCIF.
combat information from higher, lower, and ad-
jacent commands. • Provides centralized technical control and collection
tasking authority over deployed SOT-A’s through the
• Prepares intelligence estimates, reports, summaries, battalion TCAE (SOT-B).
and briefs as required.
• Analyzes and correlates intercepted SIGINT traffic
CM&D Section
from the SOT-A’s with data from other sources in-
The CM&D section formulates detailed collection re- cluding TENCAP; and then passes these products
quirements and tasks collectors for required information. to the ASPS and the TASOSC’s ISE.
The CM&D section—
• Develops and maintains the SIGINT technical data
• Performs intelligence collection management for the base and the EOB data base.
SIO operations branch.
4-9
FM 34-36
• Interfaces with theater and national intelligence sys- • Prepare mosaics and terrain models to support
tems to complete the integration of technical data operational planning.
generated by tactical units with the technical data
produced by the National Security Agency (NSA). • Accomplish imagery exploitation, reporting, and
production in DS of SFOB and FOB requirements
• Provides technical support (such as SIGINT techni- from a joint or theater army imagery exploitation ac-
cal data) to the battalion TCAEs as required. tivity.
• Performs all functions of the SIGINT Collection • Prepare and maintain a decompartmented
Management Authority (CMA). The QIC performs TENCAP imagery data base for the unit’s mission
these functions, which are detailed in a separate area.
CMA directive. He also provides technical support
to the battalion TCAE as required. (The battalion • Provide technical assistance to the unit CM&D sec-
TCAE does essentially the same functions as the tion, as required.
group TCAE.)
Battalion SOT-A
CONUS-based TCAEs interface directly with the Both the battalion and group MI detachments provide
Army TCAE during peacetime for all technical support support to the SOT-A. In turn, the SOT-A provides or-
requirements and USSID-required readiness reporting. ganic SIGINT and EW capabilities to the SF group. The
SF group commander exercises technical control of
Imagery Analysts Section
SIGINT and EW operations through the group TCAE.
Imagery analysts extract information and develop intel-
ligence mainly from imagery collected from aerial The group TCAE translates each SOT-A mission task-
TENCAP sensors. Within SF units, imagery analysts are ing into a technical tasking and forwards the tasking and
assigned to the group and battalion MI detachments. A IPB products and technical data to support mission area
thorough knowledge of threat tactics and ground OB analysis to the appropriate battalion TCAE. Then the
enables them to recognize, identify, locate, describe, and battalion TCAE tasks the SOT-A to execute the mission.
report information concerning objects, activities, and ter- If no deployed SOT-A is capable of collecting the infor-
rain on a variety of imagery products. mation, the battalion S3 commits and deploys another
team to meet mission requirements.
Imagery analysts make associations between visible ob-
jects and configurations and analyze the results to deter- SOT-A’s are normally deployed with an SF team to
mine strength, disposition, and enemy capabilities. provide ESM to the SF team commander and the bat-
They— talion TCAE during the operation. This may require
SOT-A’s to-
• Analyze imagery and report specific information on
threat operations, activities, dispositions, logistics, • Deploy independently and then infiltrate to join a
communications, installations, and civilian activities deployed SF team.
and their possible effect on SF operations.
• Deploy with the SF team.
• Prepare and maintain imagery prints to supplement
and update maps for SF operational planning. • Deploy independently from the SF team.
• Brief and debrief air crews. When a SOT-A is deployed with an SF team, they com-
bine security tasks and CSS requirements. A SOT-A has
• Extract information from imagery in DS of unit mis- the capability to support an SF team with limited inter-
sion area analysis, target feasibility analysis, and rogation, translation, interpretation, and communications
ODA mission planning and target analysis. support.
• Prepare battle damage assessments (BDAs). The SOT-A team leader executes the technical aspects
of the mission. In addition to providing EW to support
4-10
FM 34-36
the SF team commander, the SOT-A transmits collected • Evaluates, if possible, the effectiveness of OPSEC
information to the battalion TCAE for decryption, measures implemented to correct identified friendly
processing, analysis, and dissemination. The TCAE for- vulnerabilities.
wards this information to the group TCAE where it is
further processed within the group TCAE and then dis- • Briefs deploying SF teams on the latest threat data.
seminated to the appropriate users.
• Provides SF teams with technical advice and assis-
The SOT-A’s are capable of operating in all environ- tance to prepare them to establish and operate
ments and across the operational continuum in support LLSOs during long-term UW and FID missions.
of special operation elements. Their small size and
ability to task organize in a variety of combat configura- • Supports SF deception operations by determining
tions supports SF commanders’ intelligence require- foreign vulnerabilities to deception.
ments.
• Provides the S3 with recommendations for decep-
Cl Section
tion measures and evaluates their effectiveness
The primary function of the Cl section is to perform through MDCI analysis.
MDCI analysis to support the ASPS and the unit’s
OPSEC and deception programs. It performs source ad- • Requests external support, when necessary, to
ministration functions in support of all group LLSOs. It evaluate foreign reactions to friendly deception
also supports the unit’s personnel security and informa- operations.
tion security functions. Its Cl teams conduct liaison with
other US and host-nation security organizations located When directed, the SF battalion’s Cl teams participate
in the vicinity of the base. in LLSOs. Also, when directed, they conduct Cl inves-
tigations of suspected sabotage, subversion, and
The Cl section manages Cl support to OPSEC and espionage activity directed against the SF group.
deception. It is located within the OPCEN and main-
Terrain Team
tains direct contact with S2 security personnel and the
ASPS. The supporting terrain team, while not part of the
group MI detachment, collocates with and functions as
Counter-SIGINT teams are able to provide com- an essential element of the OPCEN. The S2 tasks the
munications monitoring and analysis of commercial and team and controls its activities. The terrain team col-
military landlines and radio telephones at the SFOB. lects, compiles, and produces graphic and textual terrain
When authorized, orpa- - SOT-A teams can provide data to support the group’s needs. It also assists the
limited communications monitoring support. When ASPS in its IPB function by producing general and
necessary, the Cl section coordinates this and other non- detailed terrain analysis, terrain studies, overlays, and
or 'anic support with the supporting theater Army Cl ele- overprinted maps.
ment.
Interrogation Teams
T^e Cl section— The group’s MI detachment has two interrogation
teams. They normally deploy three two-person teams, as
• Conducts MDCI analysis to support ASPS situation required, to support group operations. One of the teams
and target development. may be attached to the joint interrogation facility (JIF).
SF interrogation activities include—
• Develops detailed assessments of foreign intel-
ligence and security threats near SF operational • Interrogating EPWs and debrieGng detainees,
bases and in SF operational areas. returned US personnel, and other persons of intel-
ligence interest to the supported commander.
• Recommends appropriate OPSEC measures to
reduce friendly vulnerabilities. • Exploiting documents that appear to directly satisfy
the supported commander’s SOR.
4-11
FM 34-36
• Participating in overt elicitation activities. These ac- • Assists the operations sergeant in preparing area
tivities include liaison, escort, observer, and treaty studies, briefbacks, OPLANs, and OPORDs.
verification missions.
OTHER ORGANIC SUPPORT • Processes and questions EPW.
In addition to the support provided by the OPCEN, the • Briefs and debriefs patrols.
SF company, ODA, and S3 also provide organic support.
SF Company • Conducts LLSO, as directed by higher head-
quarters; this is done with the assistance of the
The SF company technician has staff responsibility for detachment members.
the organization, training, intelligence and Cl activities,
and combat operations of the company and its operation- S3
al detachments. The S3 has primary coordinating staff responsibility for
ODA operations, organization, and training. These include or-
chestrating, developing, and tasking for EW, OPSEC,
At the ODA level, the assistant operations and intel- and deception operations.
ligence NCO supervises intelligence training, collection,
analysis, production, and dissemination activities. The Medical Section
NCO — The group and battalion medical sections are excellent
sources of information about the health threat and the
medical personnel and facilities of deployment locations.
4-12
FM 34-36
Under the staff supervision of the TASOSC S2, the resources, accurate targeting and threat data can be
ISE— obtained.
• Responds to RIIs by integrating them into the Although SOT-A’s of the battalion MI detachment
EACIC requirements list. provide an organic SIGINT/ESM capability to the SF
group, additional SIGINT support may be required. The
• Monitors RII status until the appropriate collection type of support needed depends on the target and threat
assets respond. capabilities. SIGINT support for SF missions is available
from the supported command’s MI brigade.
• Maintains an intelligence data base to support
IMINT Support
ARSOF requirements.
IMINT comes from radar, photographic, infrared, and
• Supports the targeting process by producing TIPs. electro-optic imagery. Imagery analysts use imagery to
identify and locate threat activity, installations, and
HUMINT Support
equipment for SF actions. Imagery and IA are significant
HUMINT is collected using a variety of methods. sources of information and intelligence for SF elements.
HUMINT collectors—
IMINT, which covers various seasons, conditions, and
• Interrogate EPWs and debrief or interview civilian angles of a target, provides details on terrain. To a lesser
internees, detainees, and refugees. extent, personnel movement and EOB patterns also can
be analyzed from IMINT.
• Debrief returned captured US personnel, escapees,
and evaders. IMINT tasking is done through either fragmentary or-
ders (FRAGOs) or intelligence annexes to the OPORD,
• Exploit CEE and CEM. SOP, or the RII. Formats to request support from na-
tional systems are in the J-TENS Manual, Sections 3, 4,
• Perform controlled collection operations. and 5; and in FM 34-2, Appendix C. IMINT systems
controlled by a higher headquarters, other services, or
• Conduct LLSOs. national agencies respond to approved RIIs through ap-
propriate channels.
• Conduct LRSO, patrols, and observation posts
(OPs). The channels used depend on the agency and the re-
quirement, the agency receiving the request, and com-
• Conduct liaison with local military or paramilitary mand procedures. Corps and division assets can provide
forces and the local populace. IMINT when the target area falls within the range of
their organic systems. Other services and national assets
• Obtain reports from friendly troops. also can provide IMINT in support of SF operations.
TECHINT Support
The supported command’s MI brigade or tactical ex-
ploitation battalion provides additional interrogation TECHINT consists of S&TI and battlefield TECHINT.
support for SF missions if required and authorized. TECHINT provides SF personnel with intelligence about
foreign technological developments and the performance
SIGINT Support
and operational capabilities of foreign materiel. Bat-
SIGINT is the product of information gathered when tlefield TECHINT, a subdivision of TECHINT, provides
electromagnetic emissions are intercepted, collected, the tactical commander with countermeasures to neutral-
evaluated, analyzed, or integrated with other intelligence ize and defeat enemy systems and materiel.
and combat information, and then interpreted. SIGINT
subdivisions include communications intelligence TECHINT products are produced by the Captured
(COMINT), foreign instrumentation signals intelligence Materiel Exploitation Center (CMEC) or by a battlefield
(FISINT), and electronic intelligence (ELINT). By TECHINT team. TECHINT teams provide a variety of
integrating SIGINT with intelligence from other support to SF personnel preparing to deploy. This sup-
4-13
FM 34-36
• Deception will be used to spoof the intended • Assist in meeting legal and moral obligations to the
receiver for a period of time in which to achieve an local population, families of supported indigenous
immediate objective. forces, and persons displaced by SF operations.
ECCM is also an essential element of EW in SOF • Supplement the intelligence effort by collecting in-
operations based on the vulnerability of SOF and the formation during CMO.
proximity to the threat. Detailed communications
operating procedures must be established and practiced • Act as staff focal point for cultural aspects that af-
to ensure SOF operations are not vulnerable to threat fect SF operations.
EW.
• Coordinate and integrate CA activities with PSYOP
Cl Support activities.
Cl detects, evaluates, counteracts, or prevents foreign
intelligence collection, subversion, sabotage, and ter- • Provide technical advice and assistance on civil as-
rorism. The organic group and battalion Cl sections sistance, military civic action, and humanitarian as-
primarily perform MDCI analysis. In addition, SF com- sistance programs.
manders normally receive additional Cl investigative and
technical support from the supporting Cl unit of the • Provide input during pre-mission planning and
theater army MI brigade. (See FM 34-60 and FM 34-60A preparation. This minimizes civilian interference
for details on Cl.) and reduces collateral damage to the civilian
populace and economy.
OTHER NONORGANIC SUPPORT
A working relationship between the supporting CA unit
PSYOP Support
and the SF S2 aids the commander’s mission planning, PSYOP are particularly important to SF. PSYOP units
preparation, and execution. A good relationship ensures can provide SF intelligence personnel with key informa-
information passes quickly between the two elements and tion concerning influential population segments, vul-
eliminates duplicated effort. nerabilities of hostile groups, and other information that
adds to the overall intelligence effort in the operational
4-14
FM 34-36
area. The earlier a close working relationship is estab- • Battlefield reconnaissance and surveillance, which
lished between the SF unit and the supporting PSYOP involves the use of standard patrolling tactics and
unit, the greater the chances of mission success. techniques. Such missions are often for extended
durations beyond or in the absence of conventional
SF PSYOP elements— fire support and sustainment means.
• Provide advice and assist SF units as they work to • Clandestine collection, which is complex and sensi-
obtain and sustain the support of neutral and un- tive, involves the SIGINT and HUMINT techniques
committed segments of a foreign power. normally reserved to the US intelligence community.
SF teams may conduct unilateral clandestine collec-
• Exploit hostile vulnerabilities in the operational tion missions in crisis situations, in support of na-
area. tional and theater CT forces, or in other conditions
short of war. In wartime or as a special activity, SF
• Design PSYOP for deployed SF teams to execute. teams may conduct unilateral clandestine collection
missions in hostile areas where the threat precludes
• Recommend and plan actions like civil dis- the use of other HUMINT means. Clandestine col-
obedience, rallies, and demonstrations that degrade lection may require oversight, interagency coordina-
or neutralize hostile influences on the target audien- tion, and control of SF teams by the US intelligence
ces. community.
4-15
FM 34-36
MC&G and Other Intelligence Products AC units with proper Defense Mapping Agency
(DMA) accounts obtain MC&G products from the
Each SF group and battalion has an up-to-date DIA ac-
DMA Combat Support Center, which is the OCONUS
count which ensures automatic dissemination of intel-
Army map depot. RC units in CONUS obtain MC&G
ligence products, studies, and reports based on the unit’s
products from their continental United States Army
SII recurring document list and SIGINT end product re-
(CONUSA) map depots.
quirements. The SII provides the vehicle for unit
registration of requirements for intelligence information
USASOC and its MSCs assist units to obtain special
reports (HRs), all-source nonrecurring finished intel-
MC&G products and services. When maps of a required
ligence (NRFI), and first issuance of all-source recurring
area are outdated or nonexistent, units request multi-
intelligence.
spectral imagery (MSI) or grid imagery through regular
intelligence channels.
4-16
FM 34-36
CHAPTER 5
MISSIONS
Ranger missions are diverse and are carried out on any The ranger regiment has the mission to plan and con-
terrain and under any condition. That is why accurate, duct special and light infantry operations in any opera-
detailed, and timely intelligence is critical when planning tional environment in peace, conflict, and war. These
ranger missions. Rangers need specific information that operations can be in support of conventional or other
can be obtained only through active interface with the SOF. (See FM 7-85, Chapters 6, 7, and 8; and
supporting IEW system. This is because organic intel- FM 100-25, Chapters 8 and 9; for a complete discussion
ligence assets are limited. on ranger unit operations.)
Consequently, almost all information on a potential The primary SO mission of rangers is to plan and con-
enemy or AO for planning or operational purposes must duct DA missions. Ranger operations include DA mis-
come from external intelligence agencies. Rangers have sions and special light infantry operations. DA missions
always relied upon timely and accurate intelligence sup- are short-duration strikes and other small-scale offensive
port for mission success, whether in the forests of North actions to seize, destroy, or inflict damage on a specific
America during the French and Indian War; climbing a target. They also are actions to capture or recover desig-
cliff in Normandy during World War II; or exiting an nated personnel or materiel.
aircraft at 500 feet over a Grenadian airfield.
Ranger operations include raids, interdictions, and
The ranger regiment is a unique light infantry unit. It recovery operations. Special light infantry operations in-
provides the NCA with the capability to rapidly deploy a clude many of the light infantry missions assigned to air-
lethal force to any region of the world for limited borne, air assault, or light infantry brigades and
periods. Although it is a SOF, once in combat, the battalions.
ranger regiment may fight and maneuver like other light
infantry units.
5-1
FM 34-36
• Coordinates with other elements of the IEW system. situation and target development, Cl, and support to
OPSEC activities.
• Coordinates Cl efforts in support of operational re-
quirements. • Deploys with the regimental TOC during opera-
tions.
• Coordinates closely with the regimental fire support
officer (FSO) to exchange battlefield information, • Identifies, validates, and coordinates unit
nominate targets, and coordinate fire support coor- geographic area requirements for MC&G products
dination (FSCOORD) measures. to support OPLANs and CONPLANs and to
validate map requisitions.
The S2 needs significant support from other head-
quarters and intelligence elements and agencies to Figure 5-1 shows the organization for the 75th Infantry
provide comprehensive and timely intelligence support to Ranger Regiment. The regimental S2 section consists of
the regiment. the S2 and assistant S2, tactical intelligence team, OB
REGIMENTAL S2 SECTION team, IMINT team. Cl team, and reconnaissance detach-
ment. There are also three battalion S2 sections. Al-
The regimental S2 section can be task organized to sup- though nonorganic to the regimental S2 section, they
port subordinate battalions by detaching personnel down provide coordination and information flow.
to the battalions. A flexible arrangement is necessary
due to the types of missions the regiment is assigned to Tactical Intelligence Team
perform. This section— The tactical intelligence team performs collection
management functions for the regiment. This team—
• Conducts limited all-source intelligence collection,
analysis, production, and dissemination to support
REGIMENTAL
S2
SECTION
TACTICAL*
OB TM IMINT TM Cl TM RECON DET
INTEL TM
RANGER
BN S2
LEGEND:
— Indicates coordination and information flow.
* Collocated.
5-2
FM 34-36
5-3
FM 34-36
• Tasks, through the S3, battalion elements to perform The organic fire support structure, including the fire
tactical intelligence missions supporting battalion support teams (FISTs) and battalion and regimental
operations. FSCOORD, provides valuable combat information to the
S2.
• Conducts intelligence training for battalion ele-
Weather Team
ments.
The USAF SWO serves as a special staff officer to the
• Coordinates Cl efforts supporting battalion opera- regimental commander on all weather matters. The team
tional requirements. provides current and forecast weather data and climatic
analysis studies in support of all regimental missions.
• Directs the battalion collection management The team provides FALOP training to the reconnais-
process. sance detachment, and provides mission-unique informa-
tion during operations. Weather support for ranger
• Briefs and debriefs reconnaissance teams. operations is limited to the regimental level only.
5-4
FM 34-36
coordinates with theater intelligence agencies to provide Interrogator support is available from the supported
what the regiment needs. command’s MI brigade or tactical exploitation battalion.
At brigade and above interrogators are collocated at
In theater, the main source of processed intelligence is EPW holding areas and camps. Interrogators collect
the EACIC. The EACIC provides intelligence, MDCI, against SIR that answer the commander’s PIR and IR.
and EW product support to the ranger force. Figure 5-2 Then this interrogation information or intelligence is in-
shows the intelligence support available from the EAC corporated into the all-source intelligence product.
brigade. The ranger regiment normally places an intel-
ligence liaison officer (LNO) at the EACIC or the ap- When rangers need combat information or intelligence
propriate ASPS to facilitate the necessary coordination for mission planning that only interrogators can provide,
to ensure— they either request this support through USASOC or the
appropriate TASOSC, or through other commands
• The intelligence needs of the ranger force are which have interrogators organic to their units.
relayed to the intelligence processing center.
SIGINT Support
• The resulting analysis is based on the specific needs SIGINT is the product of information gathered when
of the ranger force commander. electromagnetic emissions are intercepted, collected,
evaluated, analyzed, and integrated with other intel-
This LNO also coordinates with the corps or EAC tar- ligence and combat information and then interpreted.
geting center. Close coordination between the regiment, SIGINT subdivisions include COMINT, FISINT, and
the EACIC, and the targeting center is essential to effec- ELINT. By integrating SIGINT with other intelligence,
tively employ ranger forces. accurate targeting data can be obtained.
HUMINT Support
SIGINT support to the planning process for ranger
HUMINT support to ranger forces includes intelli- missions, including locating enemy C , is available from
gence derived from— the supported command’s MI brigade. The type of sup-
port needed depends upon the nature of the target and
• Interrogating EPWs and debriefing civilian inter- enemy capabilities.
nees, detainees, and refugees.
IMINT Support
• Debriefing returned captured US personnel, es- IMINT comes from radar, photographic, infrared, and
capees, and evaders. electro-optic imagery. Imagery analysts use imagery to
identify and locate enemy activity, installations, and
• Exploiting CED and CEM. equipment for ranger actions. Imagery and LA are sig-
nificant sources of information and intelligence for
• Performing controlled collection operations. ranger elements.
• Conducting RSO, patrols, and OPs. IMINT, which covers various seasons, conditions, and
angles of a target, provides details on terrain. To a lesser
• Conducting liaison with local military or extent, enemy OB and personnel movement patterns also
paramilitary forces and the local populace. can be analyzed from IMINT.
• Obtaining reports from friendly troops. IMINT tasking is done through either FRAGO or intel-
ligence annexes to the OPORD, or the RII. Formats to
The interrogator is one of the primary HUMINT col- request support from national systems are in the J-TENS
lectors not organic to the ranger battalion. The inter- Manual, Sections 3, 4, and 5; and FM 34-2, Appendix C.
rogator is specially trained to exploit personnel and IMINT systems controlled by a higher headquarters,
documents written in the source’s native language. Inter- other services, or national agencies respond to approved
rogators are most effective when they are employed for- RIIs through appropriate channels.
ward in support of commanders in direct contact with the
enemy.
5-5
FM 34-36
c
ECHELONS
ABOVE CORPS
HHC or HHD
INTELLIGENCE
CENTER
COLLECTION
and
OPERATIONS SIGINT EXPLOITATION TECHINT
( if no l&E and
Cl Unit)
INTERROGATION
IMAGERY COUNTER-
and
ANALYSIS INTELLIGENCE
EXPLOITATION
5-6
FM 34-36
The channels used depend on the agency and the re- Cl Support
quirement, the agency receiving the request, and com-
Cl detects, evaluates, counteracts, or prevents foreign
mand procedures. Corps and division assets provide
intelligence collection, subversion, sabotage, and ter-
IMINT when the target area falls within the range of
rorism. It determines security vulnerabilities and recom-
their organic systems. Other services and national assets
mends countermeasures. Cl operations support OPSEC,
also can provide IMINT in DS of ranger operations.
deception, and rear operations.
TECH1NT Support
Cl support to the ranger regiment is normally provided
TECHINT consists of S&TI and battlefield TECHINT.
by a Cl team from the MI group at theater army level.
TECHINT provides rangers with intelligence about
The Cl team conducts liaison support between the regi-
threat technological developments and the performance
ment and other intelligence and law enforcement agen-
and operational capabilities of threat materiel. Bat-
cies operating within the theater. Cl support is also
tlefield TECHINT provides the tactical commander with
provided through USASOC channels. (See FM 34-60
countermeasures to neutralize and defeat enemy systems
and FM 34-60A for details on Cl.)
and materiel.
OTHER NONORGANIC SUPPORT
TECHINT products, including countermeasures, are Intelligence requirements for ranger operations are
produced by the CMEC or a battlefield TECHINT team. specialized and sensitive. The USASOC ODCSINT
TECHINT is incorporated into the all-source intel- Requirements Management Division coordinates with
ligence product. Specific requests for TECHINT team theater and national level intelligence agencies to provide
support are coordinated through headquarters, echelons the information and intelligence the force needs. The
corps and above. TASOSCISE produces TIPs and other supporting intel-
EW Support ligence products for ranger operations within the theater.
See Figure 3-4 for more information on RIIs.
EW is vital to successful ranger operations and requires
the same support that conventional warfare operations CA Support
need. However, in ranger operations, ECM must be A working relationship between the supporting CA unit
closer and focused on the objective to effectively support and the ranger unit aids the commander’s mission plan-
the fighting force. ning, preparation, and execution. A good relationship
ensures information passes quickly between the two ele-
EW will require ESM or the collection, analysis, and ments and eliminates duplicated effort.
location of threat emitters and the decision which targets
will be subject to ECM. ECM will consist of both jam- In daily operations CA personnel deal with people,
ming and deception. equipment, and documentary material that may provide
valuable intelligence. This is important because ranger
• Jamming will be used to deny the intended receipt commanders must consider the impact of all of their ac-
of communications from the transmitting station to tivities on the civilian population.
deny threat C2.
In support of ranger mission planning, preparation, and
• Deception will be used to spoof the intended executions, CA elements—
receiver for a period of time in which to achieve an
immediate objective. • Identify and acquire foreign resources.
ECCM is also an essential element of EW in ranger • Coordinate with other agencies to minimize civilian
operations based on the vulnerability of ranger forces interference.
and the proximity to the threat. Detailed communica-
tions operating procedures must be established and prac- • Assist in meeting legal and moral obligations to the
ticed to ensure ranger operations are not vulnerable to local population, families of supported indigenous
threat EW. forces, and persons displaced by ranger operations.
5-7
FM 34-36
• Supplement the intelligence effort by collecting in- Ranger Support to the IEW System
formation during CMO.
Like any other unit, ranger elements can be excellent
sources of combat information. Rangers are often the
• Act as staff focal point for cultural aspects that af-
first to encounter the enemy and can confirm or deny
fect ranger operations.
friendly assessments of threat organization, equipment,
capabilities, and morale. They can bring back captured
• Provide input during pre-mission planning and
threat equipment for evaluation and repiort on the effec-
preparation. This minimizes civilian interference
tiveness of friendly weapons on threat systems. Rangers
and reduces collateral damage to the civilian
can also provide real time assessments of the target area
populace and economy.
civilian population’s psychological and physical disposi-
PSYOP Support tion for use in fine tuning PSYOP and CA plans for
follow-on forces. Ranger SIOs must be proactive in
PSYOP supports ranger operations by reducing the ef-
debriefing rangers to ensure this valuable information
fectiveness of the enemy force and enhancing and elicit-
enters the IEW system.
ing the support of the local population. Ranger PSYOP
elements— MC&G and Other Intelligence Products
The ranger regiment and its subordinate battalions
• Exploit hostile vulnerabilities in the operational
have an account with the DIA and the Army Intelligence
area.
Agency (AIA). All pertinent reports and studies are sent
to the ranger regiment and battalions, as requested.
• Design PSYOP for deployed ranger units to execute.
Maps, IMINT, and other special products are also
routinely supplied. These and other national assets
• Review ranger plans to identify potentially adverse
supply information and intelligence for quick response
effects on target audiences that could affect mission
missions under certain conditions. DIA or AIA may
accomplishment.
even dedicate assets like foreign ASTs to support specific
ranger missions.
• Provide basic and special PSYOP assessments that
add to the overall intelligence effort in the opera-
Ranger units with a proper DMA account obtain
tional area.
MC&G products direct from the DMA Combat Support
Center, which is the OCONUS Army map depot.
• Advise ranger commanders and their staffs on the
USASOC assists units to obtain special MC&G products
psychological impact of military operations on target
and services.
audiences within the operational area.
FM 34-36
CHAPTER 6
INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT TO
SPECIAL OPERATIONS AVIATION
SOA plans and conducts special air operations across In the Joint Strategic Capabilities Plan (JSCP), each
the operational continuum. Specialized SOA assets supported CINC is given SOA assets tailored to meet the
routinely penetrate hostile and sensitive airspace un- specific mission requirements of the theater CINC. A
detected to conduct and support SO and theater level typical SOA force consists of assets drawn from the SOA
operational plans. These assets operate with precise ex- regiment.
ecution over extended ranges, under adverse weather
conditions, and during times of limited visibility. The regiment consists of a headquarters and head-
quarters company (HHC), SOA regiment (airborne); a
The effectiveness of SOA depends largely on the ability special operations helicopter battalion with a light attack
of the S2 to gather and disseminate detailed operational company; an assault helicopter battalion; and a medium
intelligence to mission planners in a timely manner. The helicopter battalion (lift). (See FM 100-25, Chapter 9,
SOC J2, in coordination with the TASOSCISE, provides for details of these elements.)
NRT intelligence throughout mission planning and ex-
ecution.
MISSIONS
The most frequent SOA mission is infiltration, exfiltra- available. These types of missions, however, detract from
tion, and resupply of SOF by air. SOA units can provide the primary mission of clandestine penetration into
general aviation support to SOF where use of other denied areas.
Army aviation assets are not appropriate, feasible, or
• Using advanced terrain flight techniques. • Recommends PIR to the commander and estab-
lishes IR.
• Operating under conditions of limited visibility.
6-1
FM 34-36
SOA
REGIMENT
S2 SECTION
IMAGERY
OB TEAM CINC INTEL
INTERPRETATION
PLANNING TEAM
TEAM
• Provides accurate air defense information to sup- • Identifies, confirms, and coordinates priorities for
ported SOF units. unit geographic area requirement MC&G products
to support OPLANs and CONPLANs; monitors
• Coordinates intelligence requirements. and validates map requisitions.
OB Team
• Acquires sufficient imagery for SOA operations.
This team is responsible for foreign OB files. This
• Provides an assessment of the foreign intelligence team studies and processes information on specific
collection threat. geographical target areas. It also produces intelligence
assessments on foreign military actions. SOA OB intel-
• Prepares and implements intelligence training ligence goes beyond enemy air defense threats. It in-
programs. cludes foreign air support facilities and navigation aids
that SOA elements exploit or avoid while deep in hostile
• Exercises staff supervision of Cl personnel. territory.
Imagery Interpretation Team
• Helps the operations element prepare essential ele-
ments of friendly information (EEFI), vulnerability This team develops and maintains imagery data files on
studies, and countermeasures to be employed by the specific geographical target areas. The team’s focus goes
units in support of the OPSEC plan. beyond normal OB and ongoing target coverage. It in-
cludes foreign or hostile air support facilities that SOA
• Assists the S3 in planning operations. The S2 and elements can use while in denied territory.
S3 should maintain a single situation map with over-
CINC Intelligence Planning Team
lays.
This team is responsible for coordinating with the
• Coordinates weather information and analysis with theater CINCs to ensure that the regiment has each
the appropriate Army or Air Force weather ele- theater’s intelligence estimates and OPLANs on hand.
ment.
6-2
FM 34-36
• Relies on the theater service IEW organizations to • Conduct LRSO, patrols, and OPs.
collect, produce, and disseminate intelligence to
meet SOA requirements. • Conduct liaison with local military or paramilitary
forces and the local populace; and obtain reports
• Ihsks subordinate SOF units to collect and report from friendly troops.
information in support of SOA intelligence require-
ments. Interrogation support for SOA is available from the
supported command’s MI brigade or tactical exploitation
The SOC J6 coordinates to obtain secure SCI voice and battalion. Otherwise, interrogators are collocated at
data communications between the headquarters of the EPW collection points and holding facilities at echelons,
SOC, its component commands, and the TASOSC. division, and above. Interrogation information then is in-
corporated into the all-source product. When SOA
The TASOSC S2 provides all-source IEW support to needs information for mission planning that only inter-
all in-theater ARSOF. Complying with guidance from rogators might provide, they must coordinate their re-
the SOC J2, the DIO validates, consolidates, and quirements with the command that has interrogators.
prioritizes standing and routine IR and RIIs. He then SIGINT Support
forwards them to the TASOSC ISE collocated at the
theater Army MI brigade’s EACIC. SIGINT is developed from the collection, evaluation,
analysis, integration, and interpretation of information
Under the staff supervision of the TASOSC S2, the derived from intercepted electromagnetic emissions.
ISE— SIGINT subdivisions include COMINT, ELINT, and
FTSINT. By integrating SIGINT with intelligence from
• Responds to RII by integrating them into the other resources, accurate targeting and threat data can
EACIC requirements list. be obtained.
• Monitors RII status until the appropriate collection SIGINT support for planning SOA missions is available
assets respond. from the supported command’s MI brigade. The type of
support needed depends on the operational factors in the
• Maintains an intelligence data base to support operational area.
ARSOF requirements.
6-3
FM 34-36
IM INT Support and weapons systems, and retain friendly use of the
electromagnetic spectrum. EW also is used to support
IMINT comes from radar, photographie, infrared, and
deception operations. EW misleads the threat by
electro-optic imagery. SOA uses detailed imagery to
manipulating, distorting, or falsifying indicators; thus
develop sophisticated target folders.
persuading the enemy to react in a manner against his
own interests.
IMINT covers the target during various seasons, condi-
tions, and angles of a target, provides details on terrain.
Active jamming prevents enemy early warning radar
The SIO must be able to determine the measurements of
from detecting airborne forces or, if detected, from
buildings, spacings between buildings, and the size of any
determining their route. Also, false transmissions sup-
obstacles on roads or intersections. Within SOA’s
port SOA deception plans or feints. SOA uses selective
precision assault environment, inches can mean lives and
jamming and imitative deception to disrupt foreign C2
the difference between success or failure. IMINT is a
nets, which reduces the enemy’s ability to react to SOA
significant source of critical operational data for SOA
presence.
elements.
In CONUS, planning and coordinating elements from
IMINT tasking is done through either FRAGO or intel-
USASOC contribute to the EW program for SOA.
ligence annexes to the OPORD, SOP, or RII. Formats to
When deployed, the JTF or theater commander is
request support from national systems are in the J-TENS
responsible for planning the EW program to support an
Manual, Sections 3, 4, and 5; and FM 34-2, Appendix C.
SOA mission. The EW program must be closely coor-
IMINT systems controlled by a higher headquarters,
dinated so it does not disrupt friendly air-to-ground or
other services, or national agencies respond to approved
ground-to-ground communications, or reveal friendly
RIIs through appropriate channels.
force intentions.
The channels used depend on the requesting unit and Cl Support
the requirement, the agency receiving the request, and
Cl detects, evaluates, counteracts, or prevents foreign
command procedures. Corps and division assets can
intelligence collection, subversion, sabotage, and ter-
provide IMINT when the target area falls within the
rorism. It determines security vulnerabilities and recom-
range of their organic systems. Other services and na-
mends countermeasures. Cl operations support OPSEC,
tional assets also can be tasked to provide dedicated
deception, and force protection.
IMINT support to SOF operations.
TECHINT Support Currently, the SOA regiment has no organic Cl support
but Cl is vital to SOA mission planning, preparation, and
TECHINT consists of S&TI and battlefield TECHINT.
execution. In CONUS, the security division, USASOC,
TECHINT provides SOA personnel with intelligence
conducts liaison with US and foreign intelligence and law
about foreign technological developments and the per-
enforcement agencies as appropriate. This liaison is an
formance and operational capabilities of foreign
important element of Cl support to the SOA regiment.
materiel. Battlefield TECHINT provides the tactical
commander with countermeasures to neutralize and
Cl supports OPSEC by providing MDCI information
defeat enemy systems and materiel.
and products, such as the MDCI appendix, to the SOA
regiment OPLANs and OPORDs. Additional Cl sup-
TECHINT products are produced by the CMEC or a
port is obtained from the CONUS Cl group as required.
battlefield TECHINT team at corps. TECHINT is in-
Upon deployment, Cl support is obtained from the ap-
corporated into the all-source intelligence product.
propriate theater MI brigade. For additional informa-
Specific requests for TECHINT support are coordmated
tion on Cl and HUMINT, see FM 34-60 and FM 34-60A.
through the SOC J2 to corps headquarters or above.
OTHER NONORGANIC SUPPORT
EW Support
By their nature, SOA missions require only limited CA
Depending on the nature of the operation and threat support. However, should SOA units be required to stay
capabilities, SOA may need support from EW units. EW in one place longer than anticipated, they may require
operations disrupt or destroy the threat’s C2 of his forces support from adjacent units to include CA.
6-4
FM 34-36
CA Support In the event that SOA elements are based in an area for
extended periods of times, they will require increasing
CA elements, in support of SOA, can—
support from adjacent units, to include PSYOP.
• Train and advise members of the supported SOA
In addition to the support provided by SOA, other sup-
unit in CMO and the political, economic, social, and
port is provided by the SO weather team and MC&G
cultural factors that influence operations.
nonstandard intelligence products.
• Identify and acquire foreign resources. Weather
SOA is highly susceptible to the effects of weather,
• Coordinate with other agencies to minimize civilian
making weather a critical aspect of mission planning.
interference.
Weather support to SOA is provided by detachments of
the SO weather team. Direct weather support must in-
• Assist in meeting legal and moral obligations to the
clude, but not be limited to—
local population, families of supported indigenous
forces, and persons displaced by operations.
• Forecasts of general weather conditions and specific
meteorological data elements as described in the 24-
• Supplement the intelligence effort by collecting in-
hour forecast.
formation during CMO.
• Solar geophysical information and climatic studies
• Act as staff focal point for cultural aspects that af-
and analyses.
fect SOA operations.
PSYOP Support • Weather advisories, warnings, and specialized
weather briefmgs, to mclude flight weather brief-
SOA missions are characterized by rapid and surrep-
ings.
titious entry and exit from denied air space. Therefore,
SOA units do not require extensive PSYOP mission sup- SOA Support to the IEW System
port. PSYOP can support SOA operations by reducing
Like any other unit, SOA elements can be excellent
the effectiveness of the enemy force. PSYOP elements—
sources of combat information. SOA are often the first
to encounter the enemy and can confirm or deny friendly
• Exploit hostile vulnerabilities in the operational
assessments of threat air and ground-based air defense
area.
capabilities. They can report on the effectiveness of
friendly weapons and counter-air defense measures on
• Design PSYOP for deployed SOA units to execute.
threat systems. If possible without compromising their
mission, SOA can also provide real time updates on the
• Review SOA plans to identify potentially adverse ef-
movements and concentrations of threat units deep in the
fects on target audiences that could affect mission
enemy’s rear area. SOA SIOs must be proactive in
accomplishment.
debriefing SOA elements to ensure this valuable infor-
mation enters the IEW system.
• Identify sectors of population that would aid SOA
crews in E&E. MC&G and Other Intelligence Products
The SOA regiment has a standing account with DIA
• Provide basic and special PSYOP assessments that
and AIA. All pertinent reports and studies are sent to
add to the overall intelligence effort in the opera-
the SOA regiment when requested. Maps, IMINT, and
tional area.
other special products are also routinely supplied. Na-
tional assets can supply information for quick response
• Advise commanders and their staffs on the
missions and may even dedicate certain assets to support
psychological impact of military operations on target
SOA.
audiences within the operational area.
6-5
FM 34-36
SOA units with a proper DMA map account may or the supporting OCONUS Army map depot.
obtain MC&G products direct from the DMA Combat USASOC assists units to obtain special MC&G products
Support Center, the appropriate installation map depot, and services.
6-6
FM 34-36
CHAPTER 7
MISSIONS
PSYOP missions are planned products and psychologi- Any of the above categories of PSYOP may support
cal actions in peace or war that are directed toward more than one level of the operational continuum. That
foreign enemy, friendly, and neutral audiences. The pur- is why distinctions between the categories of PSYOP are
pose is to influence attitudes and behaviors to achieve often blurred.
national political and military objectives.
SOF, whether operating unilaterally or in cooperation
PSYOP support varied military, political, and with conventional forces across the entire operational
diplomatic actions across the operational continuum. continuum, must always consider nonmilitary factors and
These missions can be strategic, operational, or tactical objectives. PSYOP missions—
missions.
• Play a critical and integral role in achieving or ad-
• Strategic PSYOP missions are conducted at the na- dressing these nonmilitary objectives.
tional or theater level to advance broad, long-term
psychological objectives in support of national • Aid in accomplishing tactical, operational, and
psychological objectives. strategic military objectives.
• Operational PSYOP missions are conducted to • May be the only military force employed.
achieve mid-term objectives in support of theater
campaigns and major operations. • Must be integrated with all operations to prevent
contradictory or conflicting messages. See FM 33-1
• Tactical PSYOP missions are conducted to achieve for details on PSYOP.
immediate or short-term objectives in support of
tactical military operations.
ORGANIZATION
Army PSYOP missions are conducted by specifically • Is tasked to prepare and undertake the detailed
organized and trained units. The majority of PSYOP for- planning and execution of strategic and operational
ces are in the US Army Reserve. Figure 7-1 shows a type missions for all U&S CINCs when war is declared.
of RC PSYOP group (POG).
The 4th POG(A) provisional task organization, as
The 4th PSYOP Group (Airborne) (POG(A)) is the shown in Figure 7-2, consists of a group HHC, three
only Army AC POG. It — regionally oriented battalions, one tactical support bat-
talion, and one PSYOP dissemination battalion.
• Is responsible for planning and conducting Army
PSYOP activities authorized and implemented The 4th POG(A) is normally assigned to the AC of the
worldwide. unified command, but may be assigned as the joint
• Supports contingencies and open hostilities short of PSYOP task force on the unified command. It may be
declared war; it also develops, coordinates, and con- designated as the senior PSYOP headquarters over US
trols peacetime PSYOP activities. RC POGs or allied elements at EAC.
7-1
FM 34-36
PSYCHOLOGICAL
OPERATIONS
GROUP
HHC 1st PSYOP 6th PSYOP 8th PSYOP 9th PSYOP PSYOP
BN BN BN BN DISSEM BN
7-2
FM 34-36
The S2 staff elements of the PSYOP battalion or POG OTHER ORGANIC SUPPORT
are small. Each PSYOP unit’s actual production and col- PSYOP units have many specialized organic intel-
lection assets are located elsewhere in the unit. In ligence production and collection capabilities. For ex-
PSYOP battalions, companies, and detachments that ample, loudspeaker teams have linguists who can
operate independently or in support of other forces, the interview HUMINT sources. These assets are located in
SIO is usually the S2 or the chief of that unit’s PDC. In the PDC, audiovisual (AV) platoons, and foreign broad-
these situations, the PDC S2 establishes the same type cast monitoring elements of the PSYOP unit.
relations with the supporting IEW S2 as those normally
Product Development Center
established between PSYOP and the supported or sup-
porting S2s. Each battalion PDC contains threat analysis and
counter-propaganda teams. The threat team—
The PSYOP SIO-
• Examines the situation in its area of responsibility
• Accesses the IEW system to answer the and identifies trends, developments, and events that
commander’s PIR and IR. have PSYOP relevance.
• Ensures PSYOP intelligence elements can access • Conducts research on target countries, regions,
the intelligence assets and products they need to groups, or specific issues to develop detailed
support the commander. PSYOP data bases and target analyses. This re-
search is normally in depth; it examines historical,
• As an intelligence producer, ensures that the spe- political, diplomatic, social, and economic events
cialized products his intelligence elements produce and trends for PSYOP significance.
go into the IEW system to be included in intelli-
Threat and Counter-Propaganda Teams
gence data bases. PSYOP and MI assets produce
products of direct value to each other. The counter-propaganda team conducts analysis of
threat and neutral products in order to assess their im-
• Directs the intelligence effort to meet the pact and aid in developing counter-products.
commander’s needs.
The threat and counter-propaganda teams use attached
• Ihsks organic and attached intelligence assets and and organic interrogators to collect information on politi-
forwards RIIs to higher headquarters. cal, social, and other PSYOP requirements. This infor-
mation is often key to campaign assessment and product
• Integrates PSYOP intelligence efforts with other development. These teams also coordinate PSYOP col-
units and agencies. lection requirements with MI interrogation elements col-
located at EPW collection points and holding facilities
• Assesses threat PSYOP capabilities, potential throughout the theater of operations.
COAs, and potential effects.
AV Platoon and Radio Monitoring Elements
• Produces and disseminates PSYOP intelligence Other collection assets consist of the AV platoons and
products. radio monitoring elements. The AV platoons are
primarily tactical product development and dissemina-
7-3
FM 34-36
tion elements. However, due to their proximity to the the intended target audience of broadcasts as well as
local populace and threat forces, they have a secondary the PSYOP intentions of the broadcaster.
mission to collect information on the local situation when
Threat, Counter-Propaganda Analysis, and AV
disseminating activities. Information gathered by these
Teams
teams is generally local and tactical in nature. It is used
and transmitted in the same way information gathered by Elements of these teams conduct surveys, interviews,
the interrogators or ground surveillance radar (GSR) and panels to collect PSYOP intelligence. These ac-
teams is used and transmitted. tivities are different from tactical intelligence collection
because they use techniques developed for market
Some PSYOP units have radio monitoring elements. analysis and sociological research as well as HUMINT
These elements— techniques. The goal is to obtain information on at-
titudes, beliefs, behaviors, and social organizations.
• Overtly monitor threat and neutral commercial
radio broadcasts. Since the PSYOP producer must anticipate that its
products will be subjected to analysis, intelligence on the
• Are not capable of the direction finding, traffic opposing PSYOP threat will also be needed. This intel-
analysis, and cryptologic operations that IEW ligence will come from a combination of OB, MDCI
SIGINT collection and jamming assets are; however, analysis, and PSYOP data bases.
they can be significant to the IEW collection effort.
PSYOP can also provide intelligence of use to MDCI
• Record selected broadcasts and forward them to a analysis and deception planning elements. This intel-
PDC for translation, transcription, and content ligence would usually concern sociological prejudices or
analysis. These recordings can reveal a lot about predilections of a targeted force that could be manipu-
lated or capitalized upon by the deception effort.
7-4
FM 34-36
• Monitors RII status until the appropriate collection These units and agencies have extensive contact with,
assets respond. or knowledge of, the target audience. They also may
have a complete data base onhand and a collection
• Maintains an intelligence data base to support framework in place with intelligence requirements al-
ARSOF requirements. ready developed and tasked. Proper coordination for
use or access to these IEW assets saves time and assets,
OPORDs, OPLANs, campaign plans, and supporting as well as potentially producing significant intelligence to
PSYOP and intelligence annexes contain specific PSYOP support PSYOP.
intelligence requirements. Most of these requirements
INTELLIGENCE DISCIPLINES
are validated and incorporated into PSYOP and IEW
collection plans. (See FM 34-1, Appendix H; and SUPPORTING PSYOP
FM 34-2, Appendix A.) There are primarily five intelligence disciplines which
significantly support PSYOP.
In order to meet some of these requirements, SIOs may
HUMINT Support
need to reinforce or refocus available IEW assets. Often,
the PSYOP or IEW SIO needs to enter the IEW system The objective of PSYOP is to influence humans. The
to access information or intelligence from other CS units; attitudes and beliefs of the target audience are, therefore,
intelligence agencies; or sources at lower, adjacent, and important. The most effective source for this information
higher echelons or national level. Figure 7-3 shows ex- is HUMINT.
amples of sources that support PSYOP.
UNITS AGENCIES
CA State Department
MR CIA
USIA
AID
EPWs Documents
Defectors Letters
Figure 7-3. Examples of organizations and sources that can assist PSYOP efforts.
7-5
FM 34-36
HUMINT is collected using a variety of methods. FISINT. By integrating SIGINT with intelligence from
HUMINT collectors— other resources, accurate targeting and threat data can
be obtained.
• Interrogate EPWs and debrief or interview civilian
internees, detainees, and refugees. SIGINT assets support PSYOP by providing SIGINT
and EW products extracted from locating, monitoring,
• Debrief returned captured US personnel, escapees, and transcribing threat communications and by inter-
and evaders. cepting noncommunications emitters. EW assets support
PSYOP by locating and jamming threat PSYOP trans-
• Exploit CED and CEM. mitters. These assets provide information and intelli-
gence that help reveal enemy activities or plans so that
• Perform controlled collection. PSYOP can develop effective countermeasures.
• Conduct LRSO, patrols, and OPs. SIGINT support for planning PSYOP missions is avail-
able from the supported command’s MI brigade. The
• Conduct liaison with local military or paramilitary type of support needed depends on the operational fac-
forces and the local populace; and obtain reports tors in the operational area.
from friendly troops.
IMINT Support
PSYOP units use HUMINT developed from controlled IMINT comes from radar, photographic, infrared, and
collection, Cl operations, interrogations, debriefings, and electro-optic imagery.
from other defensive or offensive HUMINT operations.
To support PSYOP, HUMINT must be timely and ac- PSYOP analysts use IMINT in varied ways. IMINT
curate. helps locate and determine the capabilities and opera-
tional status of transmitters or printing plants. PSYOP
IEW intelligence and information gathered from analysts also use IMINT to locate mobile target groups.
EPWs, defectors, line crossers, and captured diaries
often provide PSYOP intelligence elements with sig- By analyzing imagery of the spatial location and ar-
nificant insights into the psychological situation in a chitecture of key structures, PSYOP analysts can deter-
specific area or within a target group. With consent and mine the ethnic or religious make-up of a town or village.
proper authority, these defectors, crews, and line Other uses for IMINT products include identifying and
crossers may also be used to develop PSYOP products. evaluating operational capabilities of transportation net-
These same sources are also valuable when testing or works, factories, and other public structures or systems.
pre-testing PSYOP products.
PSYOP analysts use IMINT to confirm or deny acts of
Interrogation support for PSYOP units is available rioting, acts of sabotage, demonstrations, and work slow-
from the supported command’s MI brigade or tactical downs that are either the original PSYOP objective or an
exploitation battalion. Otherwise, interrogators are col- impact indicator of a PSYOP campaign or specific
located at EPW collection points and holding facilities at product.
echelons, divisions, and above. Interrogation information
then is incorporated into the all-source product. When IMINT tasking is done through either FRAGO or intel-
PSYOP units need information for mission planning that ligence annexes to the OPORD, SOP, or RH. Formats to
only interrogators might provide, they must coordi-nate request support from national systems are in the J-TENS
their requirements with the command that has inter- Manual, Sections 3, 4, and 5; and FM 34-2, Appendix C.
rogators. IMINT systems controlled by a higher headquarters,
other services, or national agencies respond to approved
SIGINT Support
RIIs through appropriate channels.
SIGINT is developed from the collection, evaluation,
analysis, integration, and interpretation of information The channels used depend on the requesting unit and
derived from intercepted electromagnetic emissions. the requirements, the agency receiving the request, and
SIGINT subdivisions include COMINT, ELINT, and command procedures. Corps and division assets can
7-6
FM 34-36
provide IMINT when the target area falls within the such as the MDCI appendix, to PSYOP OPLANs and
range of their organic systems. Other services and nation- OPORDs. Additional Cl support is obtained from the
al assets also can be tasked to provide dedicated IMINT CONUS Cl group as required. Upon deployment, Cl
support to SOF operations. support is obtained from the appropriate theater MI
brigade. For additional information on Cl and
TECHINT Support
HUMINT, see FM 34-60 and FM 34-60A.
TECHINT consists of S&TI and battlefield TECHINT.
TECHINT provides PSYOP personnel with intelligence OTHER NONORGANIC SUPPORT
about foreign technological developments and the per- Many PSYOP missions are affected by weather. This
formance and operational capabilities of foreign makes weather a critical aspect of mission planning.
materiel. Battlefield TECHINT provides the tactical
Weather
commander with countermeasures to neutralize and
defeat enemy systems and materiel. PSYOP media may be degraded by severe weather.
Severe weather may enhance PSYOP campaigns if it af-
PSYOP units can use TECHINT to focus their efforts fects threat morale. PSYOP units therefore need ad-
on critical, highly technical threat units and installations. vanced notice of approaching weather systems. Weather
support required includes—
TECHINT products are produced by the CMEC or a
battlefield TECHINT team at corps. TECHINT is in- • Forecasts of general weather conditions and specific
corporated into the all-source intelligence product. meteorological data elements as described in the 24-
Specific requests for TECHINT support are coordinated hour forecast.
through the SOC 32 to corps headquarters or above.
• Solar geophysical information and climatic studies
Cl Support
and analysis.
Cl detects, evaluates, counteracts, or prevents foreign
intelligence collection, subversion, sabotage, and ter- • Weather advisories, warnings, and specialized
rorism. It determines security vulnerabilities and recom- weather briefings.
mends countermeasures. Cl operations support OPSEC,
MC&G and Other Intelligence Products
deception, and force protection.
PSYOP units with a proper DMA map account may
In CONUS, the security division, USASOC, conducts obtain MC&G products direct from the DMA Combat
liaison with US and foreign intelligence and law enforce- Support Center, the appropriate installation map depot,
ment agencies as appropriate. This liaison is an impor- or the supporting OCONUS Army map depot.
tant element of Cl support to PSYOP. Cl supports USASOC assists units to obtain special MC&G products
OPSEC by providing MDCI information and products, and services.
7-7
FM 34-36
• Operational or tactical level target analyses on mation and intelligence that is useful to the ARSOFIEW
specific target groups. community and other SOF. These products contain
diverse information on social customs, enemy morale,
• PSYOP reports and estimates. and important locations.
7-8
FM 34-36
CHAPTER 8
INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT TO
CIVIL AFFAIRS OPERATIONS
This chapter discusses the organization and mission of CA units, and the support CA operations provide to the
CA units. It addresses the IEW support MI provides to IEW system.
MISSIONS
CA units support strategic, operational, and tactical — Establish a civil administration in occupied
missions across the operational continuum. enemy territory. This will remain in effect until
the local authorities are capable of administering
In strategic missions, CA units support the NCA when a system that is supportive of US and allied ob-
conducting missions for the theater CINCs in areas such jectives. Autonomy is restored to civil authorities
as support to US nation-building efforts. CA units can as directed by the NCA.
also support US military intelligence efforts by means of
HUMINT. In tactical missions, CA units support the tactical com-
mander by—
In operational missions, CA units support the theater
CINC by— • Identifying available local resources, facilities, and
support.
• Supporting US goals in a FID role. CA units
provide advice and assistance in population and • Coordinating US requirements for and assisting in
resource control (PRC) measures, civic action, and obtaining local resources, facilities, and support.
civil assistance.
• Minimizing civilian interference with US military
• Supporting other SOF in a UW environment. CA operations.
units provide advice and assistance in PRC
measures, organization of auxiliaries, civic action, • Assisting the commander in meeting legal and moral
and political warfare. obligations to the local populace by temporarily
providing support of goods and services through the
• Conducting civil administration missions. CA host government agencies to the local population.
units—
• Supplementing the intelligence effort by being a
— Assist a host government to meet its people’s HUMINT coUector.
needs and to maintain a stable and viable civil
administration. • Acting as the staff focal point for cultural aspects
that impact on military operations.
— Support noncombatant evacuation operations
(NEO). The mission of the AC battalion is to support non-
mobilization contingency operations that are directed by
— Establish a temporary civil administration to the Joint Chiefs of Staff (JCS) and to support Army and
maintain law and order and to provide life- joint SOF.
sustaining services until the host nation can
resume normal operations. This must be done at
the request of the host nation.
8-1
FM 34-36
The mission of the RC forces is to augment AC batants during DA missions, civic action, civil defense,
capabilities and to plan and conduct CA activities as- and other developmental and stability activities in sup-
sociated with the broad range of functional specialty port of FID and UW missions. CA support to collateral
skills identified in FM 41-10, Chapter 2. SOF missions includes humanitarian assistance and
CMO in the JSOA.
CA support to the primary SOF missions includes mini-
mizing civilian interference and controlling noncom-
ORGANIZATION
The majority of CA units are in the US Army Reserve. command, and division and brigade G5. Figure 8-2
These units are the major supporting elements for each shows a type of RC CA brigade.
of the warfighting unified commands. The US Army RC
CA forces include 3 commands, 9 CA brigades or CA BATTALION (GS) (AC)
groups, and 25 CA companies. Unlike conventional for- CA battalions can be assigned to the theater army, SF
ces, CA units are area oriented and must concentrate on group headquarters, headquarters CA command, head-
a specific theater and its associated languages, cultures, quarters CA brigade (when designated senior CA unit),
and environments. There is only one CA battalion in the JTF, or joint special operations task force (JSOTP) as re-
AC. This organization is discussed below. quired. They—
CA COMMAND (RC)
• Function as a C2 element in multiple theaters for
CA commands are assigned to a theater army. They— CA units assigned or attached to US joint, service,
or functional component and combined commands
• Plan, manage, and conduct CA operations. This is for contingency and crisis.
done in support of the theater army commander
through the command of CA units and by conduct- • Can deploy rapidly into any theater to provide CA
ing required staff support to other component ser- support to US joint service, or functional com-
vices and the jomt theater staff. ponent and combined commanders.
• Provide interface between national civil authorities • Plan and conduct CA operations in support of SOF
and US military forces. in FID and UW environments, and in support of
general purpose forces.
• Establish procedures for coordination of host-
nation support to US requirements. Figure 8-1 • Provide assistance to US military SOF FID missions
shows a type of RC CA command. coordinated as a part of a US security assistance
program.
CA BRIGADE (RC)
CA brigades can be assigned to a theater army when • Facilitate the relationships between the military for-
designated as the senior CA unit in theater. They— ces, civil authorities, and people of the nations in
which the military forces are in country to execute
• Can also be assigned to a theater army area com- CA-type activities.
mand (TAACOM) or a corps headquarters.
• Plan, train, and teach foreign nation military forces
• Plan, manage, and conduct CA operations in sup- to execute CA-type activities supporting military
port of the TAACOM or corps through the C2 of at- civic action, population and resource control, civil
tached CA units, and staff support to other defense, community relations, and other programs,
component services and joint theater staff. as required.
• Provide CA units to support CMO of TAACOM, • Conduct CA activities in DS of SOF in the conduct
area support group (ASG), corps G5, corps support of UW missions; they also accompany SF teams.
8-2
FM 34-36
HHC
CO HQ
CA CMD
CMD HQ
PUBLIC SPECIAL
COMMAND G2 G4 UNGUIST
FACILITY FUNCTION
SECTION SECTION SECTION TEAM
TEAM TEAM
HHC COMPANY
CA BRIGADE HQ
BRIGADE
HQ
G1 PUBLIC SPECIAL
G3 UNGUIST
FACILITY FUNCTION
SECTION SECTION TEAM
TEAM TEAM
8-3
FM 34-36
• Train, advise, and assist other agencies about the operations to minimize adverse effects on mission
cultural environment and ways to conduct and sup- accomplishment.
port military civic action projects in which opera-
tions occur or are anticipated. • Provide humanitarian and civic assistance under US
and foreign national laws or under international
• Identify and assist in the acquisition of available agreements in coordination with the staff judge ad-
local resources, facilities, and support to enhance vocate (SJA) to allow the commander to fulfill legal
the ability of the commander to accomplish the mis- and moral obligations to the local population.
sion.
• Supplement the intelligence cycle and psychological
• Provide in-country support and assistance to the US and informational operations activities at operation-
country team and other US government agencies, as al and tactical levels.
required or directed (for example, the United States
Agency for International Development, United • Provide a regionally oriented language capability.
States Information Agency).
Figure 8-3 shows the organization of the 96th Civil
• Advise on the administration of refugee camps ex- Affairs Battalion (Airborne).
ternal but adjacent to the SF operational area in
friendly nations. The AC battalion consists of an HHC and four
regionally oriented companies. There is one company
• Support SOF in UW operations; advise and assist for each theater, with one company being responsible for
indigenous resistance forces, when directed, in two theaters.
developing political infrastructures to extend in-
fluence and legitimacy in contested areas. CA unit intelligence activities address the full spectrum
of cultural, social, political, and economic activity within
• Provide technical advice and assistance to minimize the area of present or potential operations. It is only
local population interference with US military through a coordinated effort that CA and MI assets can
operations and conduct noncombatant evacuation provide all the information necessary for the commander
to accomplish the CA mission.
CA BN
(GS)
HHC DIRECT
SUPPORT CO
T
8-4
FM 34-36
8-5
FM 34-36
Projected overlays showing the routes most likely — Current situation overlays showing routes cur-
to be used by a displacing population given a set rently being used by displacing populations, in-
of projected conditions (for example, disruption cluding the refugee camps that have developed
of the food supply or destruction of the town). or are beginning to develop.
Under the staff supemsion of the TASOSC DOI, the CA units use the information and intelligence gathered
ISE— from all the intelligence disciplines and from the EW and
• Responds to RIIs by integrating them into the Cl functional areas to meet IEW needs. The scope and
EACIC requirements list. nature of the mission determines the type of IEW sup-
8-6
FM 34-36
port required. Examples of CA needs which may require • Economic system and state of development includ-
nonorganic support include, but are not limited to, intel- ing principal industrial, scientific, and technical
ligence or information about the— capabilities; commercial processes; banking struc-
ture; monetary system; price and commodity con-
• Topography, hydrography, climate, weather, and ter- trols; and extent and nature of agricultural
rain (including land formation, drainage, vegetation, production.
and soils).
• State of technological advancement.
• Attitude of the population including ideological,
religious, and cultural aspects. • Existing conditions and programs relating all CA
functional specialities.
• Sociological factors including the real power struc-
ture in the area. • Demographics showing dominant racial, religious,
cultural, or political population densities. The SIO
• Educational philosophy, standards, and facilities; uses these overlays to template prevailing attitudes
important cultural activities; and repositories. and loyalties in nonhomogenous populations.
• Population census, location, ethnic composition, • Public utilities showing the location and capability
dietary habits, and health factors. or capacity of all public utility buildings (such as
power stations and substations, pumping stations,
• Political system, governmental structure, per- phone company switches, and waste handling
sonalities, laws, and political heritage. facilities). These overlays, when used in conjunction
with maneuver overlays, project the impact combat
• Communications, transportation, utilities, power, operations will have on the local population’s ability
and natural resources. to maintain basic living conditions.
• Labor potential, including availability by type and • Health services support showing the location of
skill; practices; and organizations. private and public health service facilities (such as
hospitals; pharmacies; and doctors, dentists, and
• Effects of war damage. veterinary offices). These overlays should reveal
details such as capacity, age, capabilities, and equip-
• Resistance movements. ment about each facility.
• Organization and operation of forces in the area and • Population displacement. These overlays include —
the extent and degree of voluntary local support.
— Projected overlays showing the routes most likely
• Structure, orientation, capabilities, and reliability of to be used by a displacing population given a set
indigenous public safety and law enforcement or- of projected conditions (for example, disruption
ganizations. of the food supply or destruction of the town).
• Foodstuffs, tobacco products, or alcoholic beverages — Current situation overlays showing routes cur-
peculiar to the area. rently being used by displacing populations, in-
cluding the refugee camps that have developed
• Documentary items including passports, visas, or are beginning to develop.
vehicle operator licenses, and birth and marriage
records. INTELLIGENCE DISCIPLINES
SUPPORTING CA OPERATIONS
• Hostile civilian activities including espionage, There are primarily five intelligence disciplines which
sabotage, and other factors of subversion and disaf- significantly support CA operations.
fection.
8-7
FM 34-36
8-8
FM 34-36
OTHER NONORGANIC SUPPORT weather patterns. Direct weather support should in-
Other nonorganic support includes weather and clude, but not be limited to—
MC&G products. Weather is often the driving force be-
hind CA missions. Severe weather such as hurricanes, • Weather advisories and warnings.
tornados, and floods often require the deployment of US
forces to assist in disaster relief efforts. Severe weather • Long-range weather forecasts.
during combat and noncombat missions may require the
diversion of resources to relief operations. • Precipitation patterns.
8-9
FM 34-36
CHAPTER 9
SPECIAL OPERATIONS FORCES TARGETING PROCESS
This chapter describes the SOF targeting process and through the joint strategic planning process, which is ex-
mission planning. The targeting process includes plained in JCS Publication 3-05.5 and FM 100-25, Chap-
developing a data base and planning and constructing the ter 6.
SOMPF.
Although both SOF and conventional mission planning
This chapter is a guide for SOF targeting. Although require all-source intelligence, SOF targeting and mis-
the procedures and end products generally apply for all sion planning depends more upon highly detailed and
ARSOF, theaters may apply different methods across the broadly focused intelligence than conventional planning.
operational continuum. However, if modifications are
made, they must not be so different that they degrade Developing these plans requires coordination among
SOF theater or service interoperability. several staff elements at various levels, particularly in the
intelligence and operations directorates or departments.
SOF commanders conduct both deliberate and adap- This coordination must extend from the SOF in the field
tive targeting missions. They receive their missions to theater and national levels.
9-1
FM 34-36
9-2
FM 34-36
©_yTARGETING
CINC’S (2) COMPONENT
W
TARGET
GUIDANCE NOMINATIONS
JOINT TARGETING
COORDINATION BOARD
CAMPAIGN COMPONENT
PLAN Mission SUBORDINATE
Feasibility SOMPF
Tasking ^ PLANS ^
Assessment Tasking
Package
9a
SUPPORTING
TASOSC
AGENCIES
ISE (IPA)
(TASOSC, AFSOC, others)
Mission Plan of
Feasibility Plan of
Tasking Execution SOMPF
Assessment Execution
Package Tasking
9b
\ SF GROUP (MPA)
(SF GROUP or RGR REGT)
9-3
FM 34-36
The JTCB then directs the SOC to prepare a SOMPF SOC ensures the MPA prioritizes these requirements
for the target. Figure 9-2 shows the SOMPF basic struc- during the deliberate and adaptive targeting processes.
ture and responsible organization.
The mechanism (both procedural and technological) of
TARGET INTELLIGENCE PACKAGE
providing suitable SO intelligence support must be
At the same time the JTCB tasks the SOC to prepare a flexible to effectively satisfy the adaptive (combat and
SOMPF, the JTCB also tasks the appropriate service crisis) and deliberate (peacetime and route) mission
IPA to produce a TIP that supports the SOMPF. The planning processes. This mechanism is the I&W system.
TIP contains details on the target, operational area, and
other aspects of the mission. (Appendix C contains TIP Adaptive targeting provides the most rigorous and
formats.) critical conditions under which to conduct effective SO
intelligence support; so the overall system must be able
All-source intelligence that is timely, detailed, and to meet urgent, short-fused requirements. Adaptive tar-
tailored is vital to the SO targeting and mission planning geting procedures should be used to energize periodic
process. The US intelligence community includes many readiness exercises and to facilitate effective transition to
agencies that support various echelons of the command actual combat and crisis support. The system’s capability
structure. These agencies differ in purpose and to the to effectively support ARSOF across the operational
degree they support tactical mission requirements of in- continuum is enhanced by realistic tasking during
dividual operational elements. peacetime.
Just as intelligence requirements for different conven- Primary sources used to satisfy SO intelligence require-
tional forces may vary, so do some of the intelligence re- ments are the respective theater service intelligence
quirements for ARSOF. However, the majority of production agencies, normally the TASOSC ISE. Only
ARSOF intelligence requirements are similar to those of the joint force commander (JFC) and theater CINCs can
conventional forces, although the degree of detail is fre- ensure SO intelligence support requirements are recog-
quently greater. nized, understood, validated, integrated, and satisfied.
Much of the intelligence required for ARSOF mission ARSOF requirements must be integrated with overall
planning is already available within the US intelligence theater objectives. This arrangement works if SO intel-
community. However, many "target specific" items will ligence requirements are defmed and the intelligence
require more collection, research, analysis, and textual community is allowed sufficient time to respond. The
elaboration than normally afforded to conventional mis- peacetime intelligence support mechanism must provide
sion planning. If target specific intelligence is not avail- support at an accelerated pace during crisis or war.
able, analogies or estimates drawn from similar targets in
the same regions should be provided. ARSOF needs immediate access to these intelligence
sources to plan and execute missions. Reliable, secure
When an ARSOF element completes an FA and for- communications between the theater intelligence or-
wards it for target validation, a crucial part of this assess- ganizations and the SOC or JSOTF must be established
ment is the intelligence requirements section. This and maintained throughout any crisis or conflict.
section modifies and amplifies the information required
to plan a mission. This becomes the RII addressed in the Secure communications must extend to other service
TIP. The TIP supports the entire mission planning SOF components (Naval Special Operations Forces
process based on the analysis provided. [NAVSOF] and Air Force Special Operations Forces
[AFSOF]); and provide for secure voice, data transfer,
A key to effective SO intelligence support is for and imagery transfer between SOF components and the
ARSOF to fully exploit the intelligence system. To do SOC or JSOTF.
this, ARSOF operators must work with the intelligence
agencies to sensitize the intelligence community to This communications system must support SOF intel-
ARSOF requirements. This should include prioritized ligence requirements as well as the needs of other intel-
requirements and explanations for detailed PIR. The ligence users.
9-4
FM 34-36
ALL PARTICIPANTS
TRANSMITTAL DOCUMENTS (assembled by the SOC)
CINC
CINC MISSION GUIDANCE
(forwarded by the SOC)
9-5
FM 34-36
This intelligence ADP and communications system also The MPA’s SIO continues to play a key role
must be structured to support ARSOF missions con- throughout the entire SOF mission planning and target-
ducted in advance of tactical theater communications ing process. The SIO must continue to perform IPB and
systems deployment. target analysis during POE development. By reducing
the operational uncertainties and analyzing the target,
Timely, effective communication from the SOC or the SIO can focus the collection effort where it is most
JSOTF through the JFC or CINC to the national intel- effective. This allows him to identify the existing intel-
ligence system is critical to ARSOF success. Maximum ligence gaps to the SOC or JSOTF so these RII can be
use of ADP products and SR reporting is important. forwarded to the TASOSC ISE. The TASOSC ISE at-
This includes ADP message processing, disseminating, tempts to answer these RII in the TIP.
and analyzing.
MISSION SUPPORT PLANS
The MPA needs the TIP before the plan of execution In coordination with the MPA, the TASOSC and sup-
(POE) can be completed. However, the POE develop- porting SOF units prepare their mission support plans.
ment can be initiated at the same time as the TIP is being These plans must identify how the supporting unit in-
prepared. tends to meet the requirements identified by the POE
planners. Depending on the nature of the mission, mis-
PLAN OF EXECUTION sion support plans and their annexes include but are not
The MPA is the coordinating authority for a mission. limited to—
The SOC commander directs the MPA to prepare a
POE. The SOC commander directs other SOF units to • Infiltration, resupply, and exfiltration.
prepare mission support plans, as appropriate. Appen- • Signal, intelligence, and other CS.
dix C contains the SOF POE format. Joint planning ses-
• OPSEC and deception.
sions between the MPA and supporting SOF units are
essential to produce quality plans. • Basing and other CSS.
ASSEMBLY OF THE SOMPF
The scope of the supported MPA commander’s coor-
dinating authority over supporting SOF units is Upon receipt of the POE and mission support plans,
prescribed in the SOC directive. Unless otherwise the SOC target panel assembles the SOMPF and for-
specified by the SOC directive, the supported MPA com- wards it to the SOC commander for review and approval.
mander has the authority to exercise general direction of Once the SOC commander approves the SOMPF, he
the supporting effort. (See JCS Publication 0-2.) may direct the MPA to conduct a POE capability
demonstration. This demonstration should simulate the
Based on the complexity of the planning, SOF com- approved POE closely, subject to OPSEC and other
manders assign actual mission planning responsibility to limitations. Following the demonstration, the MPA cor-
the lowest possible level. As the POE planners refme the rects identified shortfalls in the POE. The MPA must
mission concept (MICON), they develop a list of specific maintain at least one copy of each approved SOMPF.
operational, IEW, and support requirements. ADAPTIVE TARGETING
The MPA staff forwards requirements beyond its or- The peacetime deliberate targeting process must be
ganic capabilities to the TASOSC. At the same time, it modified to perform adaptive targeting during crisis or
also forwards these requirements to appropriate sup- war. The key to adaptive targeting is concurrent activity.
porting SOF units for them to include in their mission When the MTP is received, the MPA treats it like an
support plans. alert order under the joint operations planning system
(JOPS) crisis action procedures. The MPA commander
The POE planners regularly brief the MPA com- issues a warning order to the appropriate subunit and
mander to ensure the planning effort adheres to the begins POE preparation as soon as the FA is complete.
commander’s intent. POE development concludes with a See JCS Publication 5-02.4 for JOPS crisis action proce-
formal decision brief to the MPA commander. Then, the dures.
POE is finished and forwarded to the SOC target panel.
Figure 9-3 shows the POE development flow.
9-6
FM 34-36
Acknowledge receipt.
MISSION
PLANNING AGENT Inventory MTP.
Convene TAG.
I
TARGET Conduct initial assessment of MTP.
ASSESSMENT GROUP Develop COA.
S2/S3 PLANS OFFICER
I
SOF CDR
■ DIRLAUTH
1 COA briefed by
TASOC ISE
plans officer.
9-7
FM 34-36
CHAPTER 10
10-1
FM 34-36
ANALYSIS
BATTLEFIELD
THREAT AREA
EVALUATION
THREAT
INTEGRATION
k EVALUATION
WEATHER
¥ TERRAIN
ANALYSIS ANALYSIS
EVALUATION
WHEN
TEMPLATE DESCRIPTION PURPOSE
PREPARED
Doctinal Enemy doctrinal deployment for Provides the basis for Threat Evaluation
various types of operations without integrating enemy doctrine
constraints imposed by the weather with terrain and weather
and terrain. Composition, formations, data.
frontages, depths, equipment numbers
and ratios, and HVTs are types of
information displayed.
Situation Depicts how the enemy might deploy Used to identify critical Threat Integration
and operate within the constraints enemy activities and
imposed by the weather and terrain. locations. Provides a
basis for situation and
target development and
HVT analysis.
Event Depicts locations where critical events Used to predict time- Threat Integration
and activities are expected to occur related events within critical
and where critical targets will appear. areas. Provides a basis
for collection operations,
predicting enemy intentions,
and locating and tracking
HVT.
Decision Depicts decision points and target Used to provide a guide as Threat Integration
Support areas of interest keyed to significant to when tactical decisions
events and activities. The intelligence are required relative to
estimate is in graphic form. battlefield event.
10-2
FM 34-36
THE BULLSEYE CONCEPT The middle ring represents the mission area analysis
The buUseye concept at Figure 10-3 shows the focus of conducted at battalion or task force level. This level
ARSOF commanders by echelon. The outermost ring focuses on the JSOA assigned to the battalion or task
consists of the country and regional analysis of force within a region or country. Products associated
geographic areas of responsibility assigned to the SF with this level represent the area specific intelligence
group, ranger regiment, SOA regiment, POG, and CA necessary to support the operational elements in their
battalion. specific missions.
This general analysis and its associated intelligence The innermost circle covers the specific operational or
production efforts are accomplished at echelons above target areas; it consists of a mission-specific analysis,
group or regiment, and are provided to the subordinate which requires the development of a TIP.
elements. The analysis does not focus on any specified
area within the total region or country.
COUNTRY/REGION
STUDY/ANALYSIS
MSN AREA OF
OPERATIONS
-DIRECT ACTION
SPECIAL RECON-
NAISSANCE
MSN SPECIFIC
FOREIGN INTERNAL
DEFENSE
UNCONVENTIONAL
WARFARE
10-3
FM 34-36
Theater army intelligence assets develop the TIP and In SF, ODAs also contribute to the development of this
other supporting intelligence products for ARSOF inner circle of intelligence by applying CARVER target
operational elements. The TIP focuses directly on the analysis during isolation. (See Appendix C.)
operational elements’ target site or area. The TIP
contains answers to specific operational intelligence re-
quirements.
10-4
FM 34-36
CIVIL
■PB SPECIAL FORCES RANGERS SOA PSYOP
AFFAIRS
CLIMATOLOGY
ANALYSIS (FID/UW)
• A TAI for SR. The SOA AO extends from the initial staging base
(ISB) to the forward staging base (FSB) to the SR TAI
• A "bullseye" from 10 to 20 NM from the target for or DA target and back again. The PSYOP AO is tied to
DA (with greatest emphasis 5 to 10 kilometers from its targeted populations, and may comprise a country, a
the target). part of a country, or an international region. The CA
AO normally is that part of a country in which CA opera-
• The infiltration and exfiltration corridors to and tions are actually taking place.
from the target or TAI.
Area of Interest
The ranger AO is the same as the SF DA AO (includ- The commander selects the AI based on the staff esti-
ing routes to and from home station), except that the tar- mate of the situation. It covers future threats to the com-
get normally covers a much larger area than for SF DA mand and supports future operations. The AI includes
missions. For example, a ranger battalion may target an E&E corridors, and serves as a guide for supporting in-
entire airfield, whereas an SF team may target airframes telligence requirements.
and crew billets.
10-5
FM 34-36
The SF AI for FID and UW normally includes It is here that key data is developed and tailored to the
countries or areas that actually or potentially provide specific operational area and mission. It is also during
military, political, economic, psychological, and social aid this procedural step that the SIO fine-tunes the limits of
to threat forces. the AOs and Als, including those in the electromagnetic
and psychological spectrums. SF OAEs for SR and DA
The SF AI for SR normally covers areas which pose missions focus on the location of the target and defenses
military, political, psychological, and social threats to the or obstacles and specific orders and requirements
mission. (SOR).
The SF AI for ranger DA missions normally covers The SF SIO conducts micro-infrastructure evaluations
those areas outside the target bullseye and access and using 1:12,500 scale or larger maps, blueprints, floor
egress routes from which tactical military threats to the plans, or photographs. Natural terrain is examined down
mission can emanate. The SOA AI — to individual square meters of ground. OAE for FID and
UW missions is more complex than for SR and DA.
• Encompasses threat airfields, refueling and rearm- During the OAE for a FID mission in a counterinsurgen-
ing points, surface-to-air missile (SAM) sites, and cy (COIN) environment, the SIO should raise and
air defense early warning radar and ground-control- answer the following PIR:
led intercept (GCI) sites.
• What is the insurgent political or military structure
• Extends upward to the maximum altitudes of friend- and key personalities and leaders?
ly and threat air defense systems.
• Where can we expect to find threat and nonbil-
The PSYOP AI comprises areas from which operation- ligerant third parties applying the elements of power
al and strategic threats to mission accomplishment can (military, informational, economic, and political)?
emanate. The CA AI normally includes areas from
which threats to mission accomplishment can emanate. • Where can we expect to not find the insurgents ap-
plying the elements of power?
BAE for Special Forces. SF concerns include and go
beyond the tactical battlefield. This is particularly true in • What forces within society can be expected to apply
FID and UW. Thus, the SF SIO begins the IPB effort the elements of power independently of the insur-
with an operational area evaluation (OAE), which covers gents or government; and where, when, and how will
the SF AO and AI. During this function, the SF SIO they apply these elements?
begins to collect data to fill basic intelligence require-
ments in the following areas: BAE for Rangers. Rangers begin the BAE with a
specific target area evaluation (TAE). It is focused on
• Political. answering the following types of questions:
• Military.
• What are the threats on or near the objective?
• Economic.
• Social. • What are the size and dimensions of the target?
• Climatology.
• Geographic. • How does the target correspond to other selected
targets in terms of criticality and importance?
• Psychological.
• Cultural. • What is the importance of this target to the threat or
• Friendly forces. host country?
• Hostile forces.
• Is the environment permissive, semipermissive, or
• Nonbelligerent third-party forces.
nonpermissive?
10-6
FM 34-36
• What is the physical layout and functional organiza- • Literacy rates and levels of education.
tion of the target?
• Types and proportions of media consumed by the
• What is the construction of key components of the community.
target, including dimensions, materials, and entry
points? • Any concentrations of third-country nationals in the
AO, and their purposes and functions.
• What are the primary and alternate energy supplies
for the target? During the OAE, the PSYOP SIO prepares a matrix
identifying groups, their leaders, preferred media, and
• What and where are the fuel supply and storage key issues that need to be developed. This supplements
facilities on the target? population overlays. Based on the population makeup of
the AO, the SIO —
• What are the lighting and detection systems on the
target? • Determines what groups to focus on.
• What is the reaction time, size, and location of • Locates mass media facilities in the AO that aid in
threat reinforcements? the dissemination of PSYOP products and identifies
their operational characteristics.
BAE for SOA. During the BAE function, SOA SIOs
evaluate threat ground, air, and naval forces which are • Evaluates studios and transmitters for AM and FM
expected to operate within the battlefield area (including radio and television and their operational charac-
routes to and from a target or TAI). They are evaluated teristics (wattage, frequency, programming).
to determine their capabilities in relation to the weather,
terrain, and friendly mission. Particular attention is paid • Evaluates heavy and light printing facilities, includ-
to air bases (including ships carrying aircraft), refueling ing locations, types, and capacities of equipment
points, LZs, DZs, and air defense weapons, radars, and that can supplement the capabilities of PSYOP
other sensors operating within the battlefield area. units.
BAE for PSYOP. PSYOP units, like SF, begin IPB with • Evaluates accessibility of such facilities to PSYOP
an OAE. It is initially comprised of the basic and special forces (for example, who controls them and whether
PSYOP studies and assessments of the AO. These they will cooperate with the US).
studies and assessments are produced by the PSYOP
units and are listed in the DIA RIP. These studies are BAE for CA. Like other ARSOF units, CA units begin
augmented with additional intelligence data in prepara- IPB with OAE. CA OAE in FID consists of—
tion for the PSYOP mission. PSYOP analysts doing
OAE also focus on, but do not limit themselves to, iden- • An evaluation of host-nation civic action programs.
tifying— • Population and resource control.
• Civilian labor.
• Ethnic, racial, social, economic, religious, and lin-
guistic groups of the area, their locations, and their • Materiel procurement.
densities.
The CA SIO also evaluates future sites and programs
• Key leaders and communicators in the area, both for civic action undertaken in the AO by the host nation
formal (such as politicians and government officials) unilaterally or with US support. In making this evalua-
and informal (such as businessmen and clergy). tion, the SIO often relies primarily on local and regional
HUMINT assets of the host nation and the supported
• Cohesive and divisive issues within a community (for command to get an accurate feel for the insurgency or
example, what makes them a community, what lawlessness and other major aspects of the operational
would split the community, and attitudes toward the environment.
US).
10-7
FM 34-36
CA OAE in UW evaluates hostile government CA provide because they operate in environments and per-
operations for strengths, weaknesses, and vulnerabilities form diverse missions.
that can be exploited by US-supported insurgents. This
evaluation forms the basis for alternative programs con- ARSOF missions may require the SIO to perform what
ducted by the insurgents. is called geographic analysis; this consists of terrain
analysis and population analysis. Geographic analysis
The CA OAE support of DA focuses on identifying the and component parts are discussed later in this chapter.
location, number, and disposition of civilians in and
around the target for CA operators and supported SOF Key Terrain
and conventional forces. The OAE also identifies poten- Mission requirements and the commander’s intent
tial sites for noncombatant assembly areas. These areas determine ARSOF selection criteria for key terrain. Key
provide a place where civilians who have information of terrain is an area or locality in which the seizure or con-
potential intelligence value can be protected and trol will afford a marked advantage to threat or friendly
debriefed. units. Key terrain applies during DA missions. How-
ever, it is not so cut and dried in FID or UW.
The primary role of CA when supporting DA missions
is to minimize civilian casualties and interference. The In FID, for example, key terrain may include a hilltop
CA SIO identifies procedures to safeguard PWs and overlooking a host-nation military installation. The
noncombatants, and cultural factors which should be seizure or control of that hilltop is key to the security of
considered by tactical unit commanders. For example, the installation. However, the local population living
CA OAE should identify churches used as a primary along the approaches to the hilltop are key to an insur-
gathering site for religious functions as well as social gent force trying to reach the hilltop to reconnoiter or at-
events. tack the installation.
In NEO, CA OAE identifies the location and number While the local population is not terrain, their presence
of US and third-country nationals to be evacuated. This is key to the insurgent force which counts on direct or
is done on the basis of the State Department’s F-77 tacit civilian support for free movement. Take away that
report, contained in the embassy Contingency Support civilian support, and insurgent movement towards the
Package (CSP). The CSP also includes imagery of all key terrain becomes more difficult.
planned and potential AAs and evacuation points for of-
ficial and US personnel. In disaster relief operations, Physically seizing and controlling these people by
CA OAE identifies the type and geographical limits of voluntary or forced relocation can solve the immediate
the disaster. When dealing with DCs, the CA OAE es- problem, but may ultimately create new ones. However,
tablishes the location, number, and status of all DCs in "seizing their hearts and minds" through PSYOP and CA
the AO. The OAE also includes identifying— operations will deny the insurgents free access to the
hilltop. An alert and cooperative population is an excel-
• Displaced civil measures to apply. lent early warning device against insurgent movement.
• Where the DCs are living. Obviously, people are not key terrain; but their presence
• How they are getting their food. on a terrain feature can make that location key terrain to
threat or friendly forces.
• Sanitary conditions and afflicting diseases.
TERRAIN ANALYSIS The SIO must use caution when recommending key ter-
rain. For example, the control of coca crop areas may
The second step in IPB is terrain analysis. Terrain
deny its use to the drug cartels, but will alienate local
analysis is performed to reduce the uncertainties and ef-
farmers from the government.
fects of natural and synthetic terrain, and to assess the ef-
fects of the population on military operations. Terrain Overlays
As part of IPB, all ARSOF units employ the factors of Normally, ARSOF use the five basic terrain overlays
OCOKA. However, ARSOF units often must have more that are developed from geographic and terrain analysis.
details on the total environment than OCOKA can These terrain overlays are prepared in the terrain
10-8
FM 34-36
analysis step but are used and updated throughout the depict concealment and cover from the ground as well as
IPB process. from the air.
Population Status Overlay. Figure 10-5 reflects the In areas with a significant threat of aerial attack or ob-
results of the population analysis subset of geographic servation, overhead concealment and cover may be im-
analysis. It depicts the population—an often critical fac- portant for threat selection of base camps, mission
tor in ARSOF operations—especially in FID and UW support sites, drug laboratories, and the like.
environments. While population is not specifically a
terrain feature, the presence of people and their asso- Surface configuration primarily determines cover, in-
ciated activities in a given geographic area often deter- cluding natural and synthetic features (such as mines,
mine the importance of that terrain to friendly and threat bunkers, tunnels, and fighting positions). Vegetation is
operations. the primary feature that provides concealment. Some
vegetation may provide concealment from both aerial
The population can provide support and security to and ground observation, while other types will provide
friendly and threat forces. For example, the failure of the concealment from only the air or ground. Canopy
November 1989 insurgent offensive in San Salvador, El closure data is critical for the determination of areas that
Salvador, was largely a result of the insurgents’ inability offer concealment from aerial observation, particularly in
to mobilize the urban masses against the government. tropical rain forests.
This inability resulted in a tactical and operational
military failure and severely undermined the credibility This information is incorporated into the concealment
of the insurgents’ claim to be representing the will of the and cover overlay for rural and other forested areas. In
people. built-up areas, synthetic structures are also assessed for
the concealment and cover they offer.
Figure 10-5 also shows the sectors of the population
that are pro-government, neutral, and pro-insurgent. A When used with the population status overlay, the con-
generic graphic may also show education, religion, eth- cealment and cover overlay can be used to determine
nic, or economic aspects of the population. dwelling and work places, safe houses, routes of move-
ment, meeting places and others. For FID, UW, DA,
A more refmed graphic in an urban environment would CT, and SR missions, this can also narrow the area of
show the homes and work places of key friendly or threat search for key personnel and other C2 elements.
military or civilian personnel and their relatives. In this
instance, large-scale maps and imagery are used to ac- Logistics Sustainability Overlay. Figure 10-7 shows
curately plot the information by marking rooftops of the location of items essential to friendly and threat
buildings. This refmed graphic should be cross- operations. Detecting and locating supply lines and
referenced to OB files, such as personality files and fac- bases are critical to finding and defeating hostile ac-
tion or organization files. This graphic— tivities. Attention is given to basic food, water, medicine,
and material supply. In rural areas, this overlay shows
• Assists the commander to see the AO or target area potable water supplies, farms, orchards, growing seasons,
and to develop his mission plans. and the like. In built-up areas, this overlay shows super-
markets, food warehouses, pharmacies, hospitals, clinics,
• Enables the commander to determine the prospects and the residences of doctors and other key medical per-
for attacking or securing a key node in a built-up sonnel.
area and then factors in the possibility of collateral
damage to the population and to property. (This In counter-drug operations, this overlay identifies the
tool is valuable in counter-drugs operations.) locations of supply outlets offering precursor chemicals.
In FID and UW environments, this overlay is used to lo-
Concealment and Cover Overlay. Figure 10-6 shows cate businesses offering PVC tubing used to produce in-
the availability, density, type, and location of conceal- digenous mines and booby traps, and retail or wholesale
ment and cover to friendly and threat elements. It should outlets that sell printing materials necessary to produce
PSYOP products. Key to preparing this overlay is
knowledge of threat and friendly forces, their logistical
10-9
FM 34-36
Huáíhuaa
-r¿ ¡Tr* i—: ^ i -7 7'~r! "
_
POPULATION STATUS
'^r 60 f F * tir
/• *
AV.
99 + I3i0
c
; a ï
A ^ -^9 és 66./^ ^>7 7, 68
i \/ta
IV*/
¡í in/ i*»
a .u • .S.“A
/,î !R
! 7
V. -
tv/ib
LibbÿvAi my Aiflifw
ca.
a 1317
94
/456
•39
ACHIU
kr
/✓ VMS MrtMl
Starrei v
■•4L)u* rtpnâ
//
/srr
/y/ t't
te
îï£ r-
i 4?6
n 'T
VUi PRO-GOVERNMENT
NEUTRAL w
i 1 2
/✓///
•'i *///*
/✓//✓
. /✓✓✓/ PRO-'INSURGENT ft7
68
10-10
FM 34-36
il " ^ H
Âa
^'Jl
i CONCEALMENT and COVER
;' ,/r -.,....^*rrc „
^99 + H^;
■* v
> ***-.'4 ts ÿ^\ V. ft
..’C
5/7! te
V '■’.w
~y
/.J ú ^••*A :
94
à /J77
Last
r W. V'
-j 1*56 9 l i
&
/J9
I ACHU(7
4-«
S tairai V
vina Untat
■bin (ti
MO
Root
lat
Irffc
•—\
g 4^6
=?
Kici
ru
5^F ^+87
À ^‘
68
10-11
FM 34-36
HuAlhu
?
60^Wr J
99 + Æ//1 ■ Í W 13*0
7Z
■'■g i v V Ai
LOGISTICS SUSTAINABILITY
AA, / ÍV
te 1333
V" »« V
w
'W
iri/ .*
a \u •.
5 *. ♦
-V %,
" 4,(
* i
» i
*.
##*BM 13*
' ,**S *k
^ Tl
Libb^Ai ny A<r(i^td
O. 1*2?// « 2. r W
rWAV
«
es CW■jaS,
1377.4’
94 'U
East\*
rä/ ^
/456
•W
/J9
33 PT**®
I / ■‘■F ACHUC7
Snrr* VM Airfwl
,
DcnW^str,
f lF /1 ;;
/Fia «wn ".PJ
mñ
mß H !
" I
Trallff
sourf
#íf te L Aï
W 1 Tow
A//'/
y w/6 ^ ^
'Hii.VV % >i
WELL or POND
7*5/
AA
K- •7
7ñ
m /¿¡sí
NOTE: DRY SEASON ONLY
'ÉájH
10-12
FM 34-36
requirements, and the availability and location of servable from the air and may require specific map track-
materiel and personnel to meet these requirements. ing debriefs of SR teams and other patrols.
Trap or Key Facilities Overlay. Figure 10-8 graphically The extent and regularity that a trail is repaired or im-
portrays the location of possible threat targets within the proved can indicate the pattern and type of threat ac-
AO. In FID environments, this overlay shows— tivity, and may in itself indicate preparations for
large-scale movement or attack. In many situations,
• Banks. LOC products are readily available from the host nation
• Bridges. or other local sources.
• Electric power installations. Terrain Analysis for Special Forces
• Bulk petroleum facilities.
The terrain analysis step for SF is called geographic
• Friendly military and government facilities. analysis in FID and UW, and microterrain analysis for
• Residencies and work places of key personnel. This SR and DA. Because of its universal applicability,
overlay requires particular refinement for threat DA population analysis is discussed later. In SF geographic
and SR missions against large facilities and in- analysis, the SIO —
frastructure systems (such as air bases, rail yards,
and bulk electric power supply grids). • Considers subcategories of terrain, microterrain,
and population.
This graphic overlay is used to determine the points
most susceptible to attack based on threat capabilities • Analyzes the political, military, economic, social,
and intentions. For example, the threat to a large air psychological, and cultural factors of the AO and AI
base may focus on air frames, crew billets, and POL under the category of population.
storage; instead of runways, aprons, and the control
tower. • Determines how they separately and collectively af-
fect friendly, threat, and nonbelligerent third-party
The trap overlay is significant to the friendly com- capabilities, vulnerabilities, and COAs.
mander’s defense planning because it shows him where
to concentrate his defenses and, conversely, where his SF SR and DA microterrain analysis cover all mission-
defenses can be more diffused. The trap overlay utilizes essential aspects of the terrain. Each individual mission
Cl personnel to focus on indicators of threat preparation will dictate the level of focus and the specific factors the
for attack, such as the discovery of an indigenous worker SIO will consider. This requires the use of 1:12,500 scale
pacing off the distances between perimeter fences and maps when these maps are available. Factors to include:
critical nodes. The trap overlay is also useful in disaster
relief and counter lawlessness operations by identifying • OCOKA factors in a radius (to be determined by
likely locations for rioting, pilfering, or looting. the mission and operational considerations) of the
target or TAI, such as threat air, ground, and water
Lines of Communications Overlay. Figure 10-9 high- AAs and infiltration corridors; vegetation, foot
lights transportation systems and nodes within the AO trails, mountain passes, small wadis, steep slopes,
(such as railways, roads, trails, navigable waterways, and thickets, and elevations in excess of 50 meters in
airfields). In urban environments, mass public transit height and potential OPs, LPs, and cache sites.
routes and schedules, as well as underground sewage,
drainage and utility tunnels, ditches, and culverts are • All significant synthetic features in the AO. (Ex-
shown. Where applicable, this overlay also shows amples would be military garrisons, installations, air-
seasonal variations. fields, and seaports; rail facilities, bridges, and
tunnels; petroleum, oils, and lubricants (POL) com-
Care is taken to compare recent aerial imagery and plexes; electric power and telecommunications
map products to ensure new LOC are added to the final facilities; villages, nomadic camp sites, and artesian
product. If operating in tropical rain forests and con- wells; shacks and towers; surveillance cameras and
ducting a FID mission, freshly cut trails may not be ob- other early warning devices; churches, mosques,
10-13
FM 34-36
0
1
River
• RADIO TOWER
J
Figure 10-8.
Trail
/
□ □□ □ □ □□□ C □ □ □ □ □
□ □□□□□ □ □□□□ □ □ □□□
□ □ □□ □□ □
□ □ □P □ ■ RADIO STATION
□ □□□□□□□□
□ □ □ □ □□□□1=1
POLICE STATION □
□
DDD
un □□ □
□□ □ □
« □ □ □ □□□□□ □ □□□□ □□□□□ □□ □
□ □□ □□□□
□□ ■D□□□
□ BANK D □
□□□□
□
□ □ □□
BRIDGE
□□ □ □
□ □ □□□ □ □ □ □ □□ □□□ □
□ □ □□□ □ □□□□ □ □ □ □□□□□
□ □□ □ □
□ □□ □ □□
□
□ □ □ □
□
D
□
° □
River
FM 34-36
Huachuca,
4 City i
60 h** • *r
P
L i
99 + )Sri
LOCs ROAD and TRAIL
59 62 66 ' ' 67 68
I.
1 J3
+
m s*
Libt i nv Atrfi
'~r
94
m
<39
m
Sierrai VMU
V Airtwl
nêdi
• fîalh
Sv ! " > «un
te
' l
■N - ROAD
- UNPAVED ROAD
- TRAIL
- STREAM
v<J.Á¿T
: -V- V P4- + 87'
m ’ 68
10-15
FM 34-36
cemeteries, and monuments; utility poles and gas flight routes to the target. The SIO uses the combined
stations.) obstacle overlay to determine flight routes for infiltration
and exfiltration. This overlay is the basis for input to the
• LOCs in the AO that could support friendly or hos- SOA requirements section of the TIP.
tile forces.
When preparing to support DA and SR ground mis-
• Air corridors for extraction, reinforcement, or fire sions, SOA terrain analysis must equal or surpass the
support aircraft. detail of the ground force terrain analysis. Due to the
low altitudes that SOA aircraft fly, features that are
• Potential LZs, DZs, and beach landing sites (BLSs) obstacles to ground forces may also be obstacles to SOA.
for extraction or for additional SF deployments or
reinforcement. For example, SOA terrain analysis requires the SIO to
measure buildings, poles, trees, wires, streets, open
• Food and water sources suitable for human con- fields, and anything else that could be in an LZ, pickup
sumption in the AO (including capacities by zone (PZ), or obstacle to flight during insertions and ex-
season). tractions. Following are some considerations.
• Cross-country mobility (in overlay form) for friendly • Slope is an obstacle to fast rope assault operations.
and hostile dismounted personnel and wheeled and
tracked vehicles. • Open fields and rooftops provide viable insertion
and extraction points for ARSOF personnel.
• Elevation contours (in overlay form) of the AO, in-
tegrated with digitized computer terrain graphics • Streets in urban areas or trails in wooded areas can
for a ground perspective of the AO. be used for ultra low-level flight to hide the aircraft
from detection and fire.
Terrain Analysis for Rangers
Terrain Analysis for PSYOP
Ranger SIOs conduct microterrain analysis and con-
sider the same basic factors as SF microterrain analysis CA SIOs conduct PSYOP terrain analysis focusing on
within a larger target area. This includes specific air cor- how geography affects the population of the AO, and the
ridors for ranger airborne and air assault operations. dissemination of PSYOP products. This step includes
preparing a line-of-sight (LOS) overlay for radio and
Terrain Analysis for SOA television stations derived from an obstacle overlay that
SOA SIOs conduct in-depth studies of each optional shows elevations and other LOS information. For
flight route during the terrain analysis step of IPB. This PSYOP, terrain analysis will, for example, focus on
study is imagery intensive because target areas are often determining the respective ranges and audibility of sig-
inaccessible by ground or are behind enemy lines. SOA nals from the most significant broadcast stations iden-
operate primarily at night and under limited visibility. tified during OAE.
Therefore, identifying and measuring terrain features are
Terrain Analysis for CA
often critical to the success of the SOA mission.
CA SIOs conduct terrain analysis in support of DA
Imagery with highly detailed mensuration is used for missions to aid the commander in accomplishing his mis-
detailed pre-flight planning. For SOA’s flying long in- sion while minimizing civilian interference and reducing
filtration and exfiltration routes, critical terrain consists collateral damage.
of identifiable reference points that aid in navigation, as
well as terrain features that can mask friendly aircraft In FID and UW environments, the CA SIO conducts
from detection and hostile fire. geographic analysis to identify critical government and
insurgent food, water and resupply routes, and potential
SOA terrain overlays depict all the obstacles to flight, locations of insurgent base areas. In FID and UW, the
reference points, check points, masked areas, and danger SIO primarily determines how terrain affects the ability
zones. These factors are used to determine the best of the supported group to conduct civic action and civil
10-16
FM 34-36
10-17
FM 34-36
product, foreign trade balance, per capita income, SIO must determine the true functional system by
inflation rate, and annual growth rate. comparing it. For example, is the government
nominally a democracy but really a political dic-
• National production performance. Examples of in- tatorship?
dicators are public and private ownership patterns;
and the concentration, dispersal, and distribution of • The legal and illegal political parties and their
wealth in agriculture, manufacturing, forestry, programs, strengths, and prospects for success. The
information, professional services, transportation, SIO also studies the prospects for partnerships and
mining, and the like. coalitions between the parties.
• Public health. Some indictors are birth and death • The nonparty political organizations, motivating is-
rates, diet and nutrition, water supply, sanitation sues, strengths, and parties or programs they sup-
and health care availability, and endemic diseases. port, to include political action groups.
• Foreign trade patterns. Some examples are domes- • The nonpolitical interest groups and the correla-
tic and foreign indebtedness (public and private) tions of their interests with political parties or non-
and resource dependencies; analysis of economic party organizations. These can include churches,
benefit, how wealth is distributed, what is the level cultural and professional organizations, and unions.
of poverty, and where does it occur.
• The mechanism for government succession, the in-
• National education programs. Some factors to tegrity of the process, roles of the populace and
determine if the educational policies of the country oligarchy, regularity of elections, systematic ex-
meet national needs are how accessible it is to clusion of identifiable groups, voting blocks, and
groups and individuals; grouping by scientific tech- patron-client determinants of voting.
nical, professional, liberal arts, and crafts training;
and skill surpluses and shortages. • The independence, subordination, and effectiveness
of the judiciary. To determine this, the SIO answers
• National employment patterns. Indicators of the following questions: Does the judiciary have the
employment are unemployment, underemployment, power of legislative and executive review? Does the
and exclusion of groups; and horizontal and vertical judiciary support constitutionally guaranteed rights
career mobility. and international concepts of human rights?
• National revenues. Indicators are taxing authorities, • The independence or control of the press and other
rates, and how rates are determined. mass media, and the alternatives for the dissemina-
tion of information and opinion.
• Population dispersal patterns. Indicators are
population shifts and their causes and effects (for • The centralization or diffusion of essential decision
example, rural to urban, agriculture to manufactur- making and patterns of inclusion or inclusion of
ing, and manufacturing to service). specific individuals or groups in the process.
10-18
FM 34-36
favorable to friendly groups. In evaluating the history of • The organizational structures and patterns used by
the society, the SIO specifically looks at — the threat, any variations and combinations to these
structures or patterns, and any shifts and trends.
• The origin of the incumbent government and its
leadership. To determine this, the SIO answers the • The stage and phase of the threat and how far and
following questions: Was the government elected? long it has progressed and regressed over time.
Does it have a long history? Have there been multi-
ple peaceful successions of government? • The unity and disagreement with front groups,
leadership, tactics, primary targets, doctrine, OB,
• The history of political violence. The SIO analyzes training, morale, discipline, and materiel resources.
the political history of the country and asks: Is
violence a common means for the resolution of • External support.
political problems? Is there precedent for revolu-
tion, coup d’etat, assassination, or terrorism? Does • Whether rigid commitment to a method or ideologi-
the country have a history of consensus building? cal tenet, or other factor, constitutes an exploitable
Does the present threat have causes and aspirations vulnerability and weakness on which the government
in common with historic political violence? can build strength.
In evaluating the nature of the threat, the SIO looks • Organization and methods for strategic and opera-
at— tional planning and execution of plans, strengths,
weaknesses, resource requirements and constraints,
• External support to the threat, including direct and reality of priorities.
military intervention by third-party nations.
• Population and resources utilization, and the effects
• The desired end state of the threat, the clarity of its on each group.
formulation, the openness of its articulation, the
commonality of points of view among the elements • Organization, equipment, and tactical doctrine for
of the threat, and the differences between this end security forces. How does the government protect
view and the end view of the government. its economic and political infrastructure?
• The groups and subgroups supporting the general • Areas where the government has maintained the in-
objectives of the threat. itiative.
• The cleavages, minority views, and discord within • Population and resource control measures.
the threat.
• Economic development programs.
• The groups that might have been deceived or duped
by the threat about the desired end-state of the
threat.
10-19
FM 34-36
10-20
FM 34-36
• Weapons effectiveness. The SOA SIO and his analyst use much of the same
• Deployments or reaction times. data as SF and ranger SIOs. Ground and air ARSOF
sometimes operate together; therefore, to achieve rapid,
For rangers, weather analysis concentrates on the ef- thorough, and accurate analysis for all mission partici-
fects of weather on— pants, coordination—and even consolidation—of intelli-
gence during terrain analysis and other stages of IPB are
• Airborne and air assault operations. critical.
• Troop morale. Weather Analysis for PSYOP and CA
• Weapons effectiveness.
Weather and climate can play an important role in the
• Rotary-wing lift capabilities. development of a PSYOP plan or CA mission. In FID
• Ground movement of light infantry. and UW missions, particularly, weather and climate af-
• Observation limitations. fect CA projects, PSYOP media, and dissemination
operations. For example, wind direction and speed at
• Fields of fire.
500 feet above ground level (AGL) increments are re-
quired for leaflet operations; recruitment of locals in sub-
Light and lunar data are pertinent to ranger operations.
zero weather is extremely difficult; periods of drought
Lunar data influences the efficiency of night vision gog-
may force farmers to become bandits or insurgents; and
gles (NVGs).
flooding can interfere with food and medicine distribu-
Weather Analysis for SOA tion.
Within the target area, last minute weather conditions Threat Evaluation for SF
may be a critical element of the target analysis. Soil com-
Because SF often operate in fluid environments where
position combined with weather can severely affect
opposing sides may not be well-defined or may change,
operations.
the SIO focuses on correlating the interaction of friendly,
threat, and nonbelligerent third-party forces in the AO.
• Moon illumination and angle are important for flight
Figure 10-10 shows the correlation of forces in FID and
operations with NVGs.
UW. The SF SIO —
• Visibility, wind speed, and wind direction can sig-
• Identifies the threat, friendly, and nonbelligerent
nificantly affect light helicopter operations.
third-party forces and develops a detailed OB data
base.
• Conditions of sand or snow in a moderate wind;
loose rock and gravel in a high wind; and sudden
• Determines their strengths and weaknesses in rela-
brown-out or white-out can render SOA operations
tion to each other.
ineffective.
Unlike non-ARSOF SIOs, who look two echelons up
• Sea and water conditions are also important to know
and one down, the SF SIO must look at all echelons of
for survivability and for combat search and rescue
forces that can affect the mission, regardless of echelon.
(CSAR) operations when SOA work over water.
10-21
FM 34-36
GOVERNMENT INSURGENT
FORCES FORCES
NONBELLIGERENT
THIRD PARTIES
(POPULATION)
In SF DA and SR operations, predictive templates are • Threat, friendly, or nonbelligerent third-party forces
produced during the threat evaluation step. Predictive status; out to 25 kilometers from the target or TAI.
templates portray known and suspected threat activity on
or near a target or TAI. They can be general sketches, In FID and UW operations, SF SIOs pay particular at-
photographs, or imagery products. These templates are tention to military and paramilitary police forces on the
in addition to the doctrinal overlays and other traditional government side, and the regular and irregular forces
products. The SIO pays special attention to — and infrastructure (auxiliary and underground) on the
threat side. SF correlation of force evaluation in these
• Security and reaction force capabilities, weapons, environments includes analysis of the following factors
fortifications and barriers, morale, uniforms, and for friendly, threat, and nonbelligerent forces:
communications.
• Threat indirect fire weapons coverage. • Key personalities.
• Point and area air defense. • Composition.
• NBC and other special weapons or hazards that may • Strength.
be present or used on the target or in the TAI. • Logistics.
• Training (individual, unit, and special).
10-22
FM 34-36
• Other situation-specific data such as— • Local militia present and their status.
— History and lineage of threat organization and
factions. • Uniforms, equipment, and weapons (and associated
— Cultural peculiarities. capabilities) used by threat forces.
— Dialects.
• Target fortifications, barriers, and point air defenses.
— Religious peculiarities.
— Ethnic. • Morale and likely reactions of target defenders.
— Drug use.
• Reactions and status of the onsite work force.
The SFSIO-
• Threats from indirect fire, air, and NBC to rangers
• Determines how the friendly, threat, and nonbel- on target.
ligerent forces can use geography, offensive actions,
security, surprise, and cross-country mobility to • Locations of arms rooms and caches.
allow the S3 to develop locally superior applications
of the elements of power. • Data on the local populace (for example, their lan-
guage, whether they are armed and support the
• Identifies strengths and weaknesses of friendly, government, and their feelings toward the US).
threat, and nonbelligerent forces.
• Other historical background data.
• Determines the political, social, economic, and
Threat Evaluation for SOA
psychological effects of each side’s COA, tactics,
and countertactics. For SOA threat evaluation is often difficult and com-
plex because of the environment in which SOA aircraft
• Analyzes the COA and makes recommendations to work. Many of the systems presenting a threat to SOA
the S3 to optimize the application of the elements do not affect conventional commanders. Since the mis-
of combat power by the friendly side. sion for SOA in DA and SR missions is undetected in-
filtration and exfiltration, the primary threat is anything
Threat Evaluation for Rangers that can detect and report aircraft movements.
For rangers, the amount of detail studied during threat
evaluation is generally greater and is focused on a much Civilian and commercial systems may be as dangerous
smaller AO. HVTs are identified during this step. to SOA as threat soldiers and military systems. Detec-
HVTs are based on the commander’s guidance, specific tion and early warning from civil air traffic control
target area evaluation, and knowledge of threat radars, navigational radar on fishing vessels, or others are
capabilities en route and at the target location. In con- as harmful as early warning by a military air defense
ducting threat evaluation, data on the threat’s composi- radar.
tion, disposition, organization, and tactics are gathered
and evaluated. In addition, rangers determine and Unique vulnerabilities of SOA aircraft must also be
evaluate— considered. A rocket-propelled grenade (RPG) is more
dangerous to a low-flying helicopter than an SA-7 or
• Foreign forces on the target; this includes all OB SA-14. The SOA SIO must assess potential threats that
(air, ground, electronic, naval) and C3! systems. range beyond standard OB files on the objective country
and neighboring countries.
10-23
FM 34-36
During threat evaluation, the SOA SIO also examines • "Inoculate" its personnel against US PSYOP efforts
communication links. A threat that can detect the mis- (defensive counter-products).
sion aircraft but cannot report its presence in a timely
manner is not a major concern to the SOA element. On • Counteract US PSYOP efforts by exploiting weak-
the other hand, a lone rifleman with a radio or a tele- nesses in US PSYOP campaigns (offensive counter-
phone can ruin an SOA mission. Terrain masking is a products).
critical factor in determining the threat’s detection and
reporting capabilities. • Conduct active measures or "dirty tricks" campaigns.
Threat evaluation of the SOA target site itself is also • Conduct ECM against US or allied PSYOP broad-
complex and goes beyond the usual OB available or tar- casts.
get area. SOA elements need to know nearly as much as
the ARSOF DA ground element about security forces. Threat Evaluation for CA
They also need information on aerial patrol reaction for- During threat evaluation, the CA SIO must determine
ces, lighting at the target, and so on. When SOA and the noncombatants during military operations. This is
other ARSOF work together, close coordination—or especially critical where the opponent is not a standing
even consolidating their threat evaluations—is necessary. military force or if the force is not equipped with stand-
ard uniforms and weapons, like guerrillas or terrorists.
Threat Evaluation for PSYOP
These military forces can often blend into or intermingle
For PSYOP, threat evaluation serves two purposes. with the civilian community. Threat evaluation for CA
First, it gives the JPOTF commander an understanding units identifies threat OB and the modus operandi of
of the existing and potential opposing products in the these threat forces.
AO. It is a safe assumption that US PSYOP will be
countered by the threat. Opposing PSYOP may be Threat forces use social, religious, and other types of
"products of the deed," like civic actions. This opposing forums to employ the elements of power and methods of
product may come from governments, political parties, countering them.
labor unions, or religious groups. US PSYOP forces in
the AO must anticipate and be able to counter or prevent Doctrinal Templating
threat products directed at US and allied forces and the Where possible, the ARSOF SIO uses doctrinal
local populace. templates to graphically show the results of threat evalua-
tion. These templates depict the force structure, deploy-
Second, the supported unit commander depends upon ment, or capabilities of hostile, friendly, and
the JPOTF commander for advice on any PSYOP conse- nonbelligerent third-party doctrinal deployment.
quences of US operations, and for recommended alter-
native measures within each COA. This is shown for various types of operations without
the constraints imposed by climatological conditions and
To conduct threat evaluation, the SIO and staff must geography. It is used as a comparative data base to inte-
determine the capabilities of hostile organizations to con- grate what is known about threat, friendly, and nonbelli-
duct product operations and to counteract US and allied gerent third-party forces. Military operating systems,
PSYOP. The demographics of any threat military and like artillery, air defense, or engineers, may also be
paramilitary forces should be evaluated at this step; if templated.
they were not considered during OAE. These organiza-
tions may be within the AO or AI, and even in another Pattern Analysis
country. Specific capabilities to be evaluated include the
In the absence of identifiable doctrine, pattern or trend
ability to—
analysis is used. Insurgent or terrorist threat operations,
for example, can be shown at the operational level by
• Conduct offensive product operations targeting US,
flow charts showing the essential steps, with time win-
allied forces, or the local populace.
dows of typical operations, like assassinations.
10-24
FM 34-36
At the tactical level, diagrams can show how the threat Other Threat Evaluation Templates
forces have executed type operations in the past, such as
ARSOF SIOs may employ a combmation of standard
abductions from vehicles. In the latter war-of-movement
and nonstandard doctrinal templates.
stage of insurgency, types of data displayed are—
For COIN operations, a recommended technique for
• Composition.
templating the reactions of threat forces is to use the
• Formations. reactive doctrinal template (RDT). The RDT is simply a
• Frontages. series of concentric circles keyed to time-distance as-
• Depths. sumptions. Figure 10-11 shows an example of an RDT.
• Equipment numbers and ratios.
The RDT is a variant of the doctrinal template. It
• HVTs (subclassified as movers, emitters, shooters, depicts how insurgent groups usually react to friendly ac-
and sitters). tivity in their area. Like the standard doctrinal template,
4 HR
HR
HR
HR
10-25
FM 34-36
the RDT does not take terrain and other external factors used with pattern analysis, additional NAIs can be pin-
into consideration. pointed.
THREAT INTEGRATION Event Template
The final step in IPB is threat integration. SF, PSYOP, Event templates show locations where critical events
and CA SIOs refer to this step as data base integration. and activities are expected to occur and where critical
However, because of the relatively narrow range of fac- targets and opportunities will appear. The SIO uses the
tors considered by ranger and SOA, this function event template to predict time-related events within criti-
remains threat integration in ranger and SOA IPB. This cal areas. It provides a basis for collection operations;
is the final stage in the development of a TIP. In turn, predicting threat, friendly, and nonbelligerent third-party
the TIP supports development of the POE for the intentions; and locating and tracking HVTs.
ARSOF element. At this step, all of the factor analysis
performed in the preceding steps are integrated that This type of template assists the SIO in—
presents the total picture to the SIO, commander, and
staff. Templates play a key role in presenting this picture • Wargaming each threat, friendly, and third-party
to the commander. COA.
Situation Template • Depicting NAIs and the relationship of events.
• Providing a means for analyzing the sequence of ac-
The SIO uses situation templates to show how threat,
tivities and events that should occur for each COA
friendly, and nonbelligerent third-party forces might
and how they relate to one another. The SF SIO in
operate and communicate within the constraints imposed
FID, for example, attempts to identify the significant
by specific meteorological conditions and geography.
actions the insurgents may take (for example, to
engage in nationwide economic sabotage, assas-
The situation template is basically a doctrinal template
sinate mayors in contested regions, and negotiate
with geographical and meteorological constraints ap-
with the government). As the force is visualized,
plied. It is used to identify critical threat, friendly, and
critical areas become apparent. Within these areas,
nonbelligerent activities and locations, and provides a
significant events and activities will occur and tar-
basis for situation and target development and HVT
gets and opportunities will appear.
analysis.
Figure 10-12 shows insurgent planning for an opera-
A situation template is a snapshot of what a particular
tion. These NAIs are points or areas where human ac-
force might do at a certain time and place. In FID, this
tivity or lack of activity will confirm or deny a particular
template might be substituted for a target analysis over-
COA. Events within NAIs can be analyzed for indicators
lay that displays—
that the SIO can direct intelligence and target acquisition
resources against. NAIs and SIR are incorporated into
• All the potential targets (people and places) within
the collection plan.
the AO.
• Insurgent ambush points on friendly avenues of ap- The SF SIO may have to correlate types of events with
proach. historical or insurgent commemorative dates. In this #
H
• Possible locations for sighting indirect fire and an- case, the SF SIO first—
tiaircraft weapons.
• Infiltration corridors. • Identifies an historical or commemorative day or
timeframe when the insurgents are likely to conduct
• Post-attack escape routes.
an operation.
Situation templates are very important for ranger
• Identifies the types of training, logistics, intelligence,
operations, but in contrast are only important for SOA
and tactics the insurgents would likely employ in the
where the SOA element is called on to perform sustain-
operation.
ment operations. When the target analysis overlay is
10-26
FM 34-36
GOAL and
TARGET
TARGET
DECISION
TARGET
SELECTION SURVEILLANCE
CAPABILITY
ASSESSMENT
PLANNING
TARGET
RECRUITMENT
ACCESS and LOGISTICS and
EGRESS
PLANNING TRAINING
FINAL PREPARATION
STAGING ACTION EGRESS
TARGETSURVEILLANCE
TIMING
10-27
FM 34-36
For example, a possible insurgent COA may be to seize A TAI is an area or point along an infiltration route or
a small district capital on a significant national holiday mobility corridor (MC), where successful interdiction
and hold it for at least 24 hours with the hope of trigger- will cause hostile forces to either abandon a particular
ing an insurrection among the inhabitants. COA or require the use of unusual activity and support
to continue. Examples of TAIs include —
Insurgent planning for such an operation would require
detailed HUMINT, deception, psychological preparation • Key bridges.
of the populace, and pre-attack target surveillance. • Road junctions.
Selected key nodes would have to be identified and tar-
• Chokepoints.
geted by specialized assault teams in the opening stage of
the assault. Examples would be police stations and the • DZsandLZs.
military garrison headquarters, government radio and • Known fording sites.
television station, telephone exchange, power plant, and • AAs.
fuel depot.
Figure 10-13 shows a TAI within an NAI. TAIs which
The insurgents would need a battalion-sized assault are essential to the uninterrupted progress of threat for-
force supported by indirect fire and antiaircraft, weapons, ces may become HVTs. The identifying TAI is a joint ef-
and the employment of product teams, population fort between the intelligence and operations staffs. In
screening, and control measures for the actual operation. FID, population groups can be TAIs for targeting by
PSYOP, CMO, and other nonlethal means.
Therefore, the insurgents must designate AAs and
routes to the objective. All of these insurgent activities Decision points (DPs) are geographical and chrono-
can be observed by establishing NAIs and TAIs. It takes logical points where and when the commander must
detailed knowledge of the threat in a particular area for make decisions in order to seize or retain the initiative.
this template to be useful. Tactics, organization, and DPs can be NAIs or TAIs. Their selection is primarily
political or military objectives can change periodically an operations officer function.
and from area to area.
Decisions must be made early enough to ensure that
Decision Support Template
they can be implemented in time to achieve the desired
The SIO uses the decision support template (DST) to effects.
show decision points that are keyed to significant events
and activities. The DST is the intelligence estimate in Decisions cannot be made until there are indications
graphic form. It does not dictate decisions to the friendly that particular events will occur and their locations can
commander, but identifies critical events and human ac- be determined with a high degree of confidence. DPs
tivities relative to time and location that may require tac- are determined by comparing times required to imple-
tical or operational decisions by the commander. It is, at ment decisions, doctrinal movement rates (adjusted to
best, the SIO’s in-progress review for intelligence, and is compensate for the effects of meteorological conditions,
determined as part of a decision briefing provided to the geography, and human action on mobility), and distan-
commander by his entire staff. ces. For example, if it requires 2 hours to implement a
friendly decision, the decision must be made while the
DSTs identify where and when targets can be attacked threat force is at least 2 hours from the TAI where the
or other opportunities exploited to support the event is expected to occur.
commander’s concept for executing the mission. The
DST for SF, ranger, and SOA DA missions shows critical Time phase lines (TPLs) are based on doctrine, pat-
nodes, HPTs, and target components within the objec- tern, and trend analysis. TPLs help to determine where
tive. The DST for SF in FID, for example, shows areas of the threat, friendly, or nonbelligerent third-party force
likely insurgent or government activity or influence, will be and what it will look like. A TPL is drawn across
potential future insurgent targets and objectives, and an AA or MC to show potential threat advance at
TAIs. doctrinal or historical rates, as modified by geography
and meteorological conditions. TPLs project where a
10-28
FM 34-36
L.
Ford
TAI 2
✓ N
Insurgent 1
Base
\ /
/ TAI 3
ÉÉOT
V/ 1
TAI 6
City
%\
Ford
LEGEND Highway
River
Trafl
• Reactive situational templates (RSlfc). Reaction Event Template. The RST becomes the RET
• Reaction event templates (RE'ß). when the SIO adds NAIs and TAIs to it. Figure 10-15
shows an example of an RET.
• COIN DSTS.
10-29
FM 34-36
Q
267
«S «
*a.
i
i Q
S:
67
S
Q
c
\y
»i
■N
IS
7, 26 X
% O a
? æ 1
Si ¿7
700
Ï'J
a
/V Sí
LEGEND: HR - Hour
10-30
FM 34-36
I S 237
ê
vyJA im
r
m
^9.
'S 5 m
~KZ7
@3
67
c
O
z: SOÍ
1 C
y
m s? 23> y
«
%
23
í O o
? I
il
300 S3 0
k c¿ sí
LEGEND:
HR - Hour
I—I . NAI
10-31
FM 34-36
COIN DST. The COIN DST is the RET with TAIs and During this function, the SIO develops the event, situa-
DPs added. DPs, in the context of FID or COIN, would tion, and DSTs, as well as other products to clarify the
indicate when reaction and blocking forces would be in- situation in the operational area for the commander and
serted into the TAI. For UW, RETs with TAIs and DPs staff. These products become the basis for tactical intel-
constitute the DST. In this case, TAIs would be areas for ligence operations and associated command decisions.
harassment and delay (for example, with direct and in-
direct weapons fire); DPs would indicate the timing of In DA and SR missions, SF requires templates with
key decisions (for example, abandonment of an insurgent TPLs that depict the probable approach of threat forces
base). Figure 10-16 shows a reactive DST for COIN. from their known location to the target area, and in pur-
suit of the operational element. The SIO develops and
NEO Event Template. The event template for NEO adds NAIs along likely AAs to indicate threat reactions.
portrays— From the event template, the SIO develops the DST by
adding TAIs, where a threat reaction force can be
• Any events that pertain to the safety of US citizens delayed; and by adding DPs where the SF operational
in the country. element must decide on a COA (for example,
withdrawal).
• Movements of threat forces.
Threat Integration for Rangers
• The status of all other forces involved in the opera- For rangers, threat integration is based on known and
tion, including nonbelligerent third parties. suspected threat locations at a specific installation or
piece of terrain. It takes the known information of the in-
This template should show the location, number, and stallation and the surrounding area and attempts to show
status of all potential COAs, NAIs, TAIs, and DPs. where threat forces could be located.
NAIs will be potential assembly areas for evacuation to
take place, potential chokepoints for roads, and possible The SIO develops a situational template from predic-
locations for critical installations. tive templating to help the commander visualize
suspected threat intentions. This could include
Disaster Relief Template. Overlays for disaster relief suspected OB or AAs for reaction forces. He then draws
show the locations of critical facilities and of key per- the situational template over the predictive template in a
sonalities within the national and local governments. Key different color to contrast known and potential threat
personalities are people who can be mobilized to rees- locations and intentions, especially for air and ground
tablish law and order, get government functioning again, reaction forces within the target areas. The ranger TAI
and stabilize the situation. normally does not extend beyond 10 kilometers from the
target, because of the rangers’ limited fire support assets.
Graphic overlays for DC operations include informa-
tion on the location of existing and potential DC camps, The next step for the ranger SIO conducting threat in-
LOC, and destinations. Critical installations and facili- tegration is event templating. During terrain analysis, the
ties also are templated and analyzed for potential use. SIO uses the LOC overlay with the cross-country move-
ment overlay to assist the analyst in determining NAIs
Threat Integration for SF that are crucial to accomplishing the ranger mission.
In UW or FID environments, the SIO applies threat, During the analysts’ briefing, the commander will deter-
friendly, and nonbelligerent third-party data to the con- mine where to deploy reconnaissance assets based upon
straints imposed by the weather and terrain. This is to the threat and terrain and their influence on the target.
determine how the friendly, threat, and nonbelligerent Not all NAIs will have rangers observing for threat ac-
forces might actually operate in the AO. This lets the in- tivity.
telligence analyst identify significant military, political,
psychological, economic, and social events in the AO and Ranger battalions have a 12-person reconnaissance
to predict probable COAs. detachment. The only intelligence collection asset
assigned to the ranger regiment is the regimental
reconnaissance detachment which can be deployed 48
hours prior to the main assault force. AC-130 gunships
10-32
FM 34-36
ZL
« O
9
TC/J
a
{i
té
267
BS
Wk
n
ÍV Q6
3S
/Q
67
«is O
■L.
Ss
b-
1 m c
îl
°o
l >s
3 « 7â
t
m Ö
•/Oo yj (y
^-cr\ J ZE
LEGEND:
HR - Hour
□ ^
v™
10-33
FM 34-36
providing fire support can also provide visual For SOA, this is the final step in the development of
reconnaissance on and near the target area. Through their target folder. The threat as it relates to flight route
direct communications between the reconnaissance options is the final factor in deciding which option
detachments and the AC-130, threat reaction forces can provides the best route. Threat integration helps deter-
be monitored and engaged. By observing pertinent mine the best approach and final assault paths into the
NAIs, rangers are able to detect and respond to enemy target area. It provides the necessary visual products for
reaction forces. the integration of coordinated assault fires if needed.
Situation templates become important for SOA only if
For rangers, the last step in threat integration is the the element is called upon to perform sustainment opera-
DST. The DST concentrates on the most critical targets tions.
and answers the following type PIR:
Threat data is integrated with the target terrain data,
• What are the critical nodes or HPTh within the which includes information on where every building and
objective? telephone pole is located and measured. This final
product—
• Is the CP more critical than the ammunition supply
point? • Depicts the best insertion or extraction points.
The ranger SIO develops TAIs in conjunction or in • Identifies targets for destruction by support attack
proximity to NAIs on the event template. As reaction helicopter fire.
force installations are identified, key routes or AAs be-
come evident from microterrain analysis products. • Helps reconcile multiple flight routes in very limited
Based on these products, the SIO identifies TAIs that air space.
will affect the reaction, organization, or movement of
threat ground forces. Observing these TAIs allows Finally, threat integration results in the DST for SOA
rangers to monitor or confirm target destruction by aerial when in the form of—
fire support assets.
• Air defense zone coverage overlays.
Since ranger reconnaissance and fire support assets are
not deployed more than 10 kilometers from the target, • Threat aircraft reaction times.
the friendly reaction events from the threat to the objec-
tive occur in a matter of minutes. • Combat radii overlays.
10-34
FM 34-36
• Identify trends or patterns of activities that can be TPLs are not used in the traditional sense, if at all, for
exploited by either US or threat forces. CA in UW. A DP for when and where a CA mission
should be conducted is stated in terms of months or years
• Identify ongoing product campaigns harmful to rather than in terms of hours or minutes.
friendly forces and threat situations, and highlight
those events that are important to PSYOP. Graphic overlays that aid the CA commander during
decision making for a DA operation are related to loca-
The DST is seldom done entirely as an overlay. In tions and numbers of civilians in and around the objec-
some instances, a map is not used at all. Normally, NAIs tive. They show the locations of critical facilities and
and TAIs are terrain-oriented. However, for PSYOP, installations such as hospitals, water sources, power sour-
NAIs and TAIs are people-oriented. ces, sanitation facilities, railroads, airports, and govern-
ment buildings that must be protected and avoided
For PSYOP- during the attack. CA units do not normally conduct
operations in support of SR.
• NAIs are people or groups of people (audiences)
that could affect the outcome of friendly operations. In data base integration in support of FID missions,
PSYOP intelligence collection efforts are targeted event templates and insurgent leader profiles and
against these NAIs. NAIs can be converted to TAIs matrixes are valuable. A well-organized insurgency
as the situation changes. operates with some sort of doctrine and methodology.
Although there may be readily apparent doctrine, the
• TAIs are the NAIs the PSYOP SIO and PSYOP S3 plotting of events may yield consistent patterns.
recommend to the commander as targets for a
PSYOP campaign. The PDC conducts a detailed The CA SIO must also consider the actions of the host-
analysis of these TAIs to develop PSYOP cam- nation government and host-nation military in countering
paigns. TAIs may be categorized as HVTs or HPTs. the insurgency. US military operations should be consis-
tent with the efforts of the host nation and represent a
When PSYOP SIOs conduct data base integration, the unified effort spearheaded by the host nation, not by the
event template reflects friendly, threat, and nonbel- US. The DST includes NAIs that are possible locations
ligerent third-party situations and highlights events that of insurgent bases, as well as potential sites for future
are important to PSYOP. TPLs and DPs may be days, civic action activities. TAIs must be examined from a
weeks, or months before the beginning of the supported reactive standpoint. The site of a CA program could be-
operation or PSYOP campaign. These are best repre- come the target for the threat. DPs and TPLs are in
sented as timelines on a calendar, with milestones. terms of when and where to concentrate CA activities
and when and where not to conduct them.
Only in the later stages of a PSYOP campaign in sup-
port of active combat operations are TPLs tied to terrain UW does not normally lend itself to doctrinal templat-
or the movement of forces on the ground. In this case, ing, so doctrinal and situation templates are usually not
DPs and TPLs are used to synchronize PSYOP campaign used in CA UW intelligence preparation of the battle-
implementation within the supported operation. field. The event template is used and must be kept ac-
curate and current. Through careful analysis of the event
Threat Integration for CA template, patterns and trends of the threat emerge.
For CA operations, threat integration is called data
DISSEMINATING AND USING
base integration. The products of data base integration
are several graphic overlays that the CA SIO uses when The ARSOF SIO produces a variety of templates, over-
briefing the commander on the situation and potential lays, association and event matrixes, and flow charts, as
COA. NAIs and TAIs for CA operations focus on appropriate, to support and illustrate METT-T. As
people and facilities rather than on terrain or units. these products are completed, the SIO provides them to
the commander and S3 for approval and guidance. After
The DST consists of areas where civic action projects the commander approves them, the S3 integrates IPB
or civil defense training are most valuable and necessary. with other staff products and applies them to mission
planning and execution.
10-35
FM 34-36
As a follow-up, the SIO must— • Advise and coach nonintelligence MOS personnel in
appropriate use of products.
• Ensure that the right products are promptly
provided to the right consumers, and are adequate • Use his IPB products to identify gaps in the intel-
for and properly used by them. ligence data base and redirect his collection effort.
10-36
FM 34-36
APPENDIX A
Figure A-1. Some examples of standard collection plan PIR and IR.
A-1
FM 34-36
>
■
N>
CLASSIFICATION
Figure A-2.
UNIT: 1 Bn 9SFG(A)
COLLECTION PLAN PERIOD COVERED: FROM P+1 TO D±A-
NAI insurgent
changes in
10km NA recruitment. ®®® ®®®®® S>
1
COORDINATES
AVENUE OF APPROACH FM AGENCIES TO BE EMPLOYED
FM TQ 5901
MOBILITY CORRIDOR NO BneAy state specific information
TO TQ A220
to be sought that will substantiate
NAMED each indication.
SPECIFIC ORDERS OBSERVED
AREA OF Specific information needs
INTEREST OR REQUEST TIME become the basis for orders and
requeststo collect information.
(List all available units that can be
employed mine collection of
required information)
Place an 'X' under each unit that
can acquire the specific
information sougnt. Circle the "X"
under the unit actually selected
that will be assigned collection
action.
CLASSIFICATION
y .
FM 34-36
COLLECTION AGENCIES
INSTRUCTIONS
List PIR and IR. List indica- Then, if necessary Place an *X* under each Place may be a Include means of
Leave sufficient tors that will list specific agency that can collect headquarters or reporting; for
space to list satisfy each information the required information. unit example, via spot
indicators for PIR. required to satisfy Circle the *X* when an report format.
each PIR and the indicator. Key agency has been selected Time may be
in IR column 2. requirements to and tasked. specific, periodic, Include established
NAI on the event or as obtained. communications;
template if for example,
possible. These multichannel, FM,
requirements form RATT, or state
the basis for ■by SOP" if SOP
specific orders criteria apllies
and requests. for responding to
collection require
ments.
EXAMPLE
A-3
FM 34-36
A-4
V-
NON UNEAR BATTLEFIELD COLLECTION PLAN AGENCIES and AGENCY COLLECTION PRIORITY
SIR PIR/IR SIR CP sor-fl SOT-ft sor-ft Cl
NO.
TIME SPECIFIC INFORMATION REQUIREMENTS
NO. PRI Sir U) (2) (3) rm
REO-B flUL
POG CR ÏL
NAI PU TWO FIVE SIA RED Gm* RLL Btl RU
SREEC-
REP7:
INDEF nu uftcxpIfiiveJ /V» yAc n*£n J,S ZO
n m3m m m m X
Figure A-4.
REPT.' n»y pRE$BNlE oF f*uu£S, booby iO^
IR0£F PU Ô
n m m m m m n»i8(r sä ff~i r r l
tuaps attg oisfades giV, i*t the ftkeA 1>S ZL
REFT.*loCfi+iaiJS «P suspected Nóñ-
IHDEF flU ^y/ejuinteuf 6 & 3
s\te& the. BiC
IS
c~i n rn n n rm s_s S_I S_Œ
nppfto*. Vo. oPpensotirtet /Xe
rn n n n n rn
Nonlinear
&\te. CAá/ support a ix
n rn rn rn rn rn rn rn rn xx
n rn rn rn rn rn rn rn rn xx
ixixixi Ein xi n X
ï>
I
at 1 IX
FM 34-36
PIR ‘l- Where and in what strengths are the insurgent forces?
2
- Will insurgent forces attack US forces; if so; where, when and in what strength?
3. Where can the insurgent forces conduct main force operations; if so, when
and in what strength?
4. Where, how, and in what strength are insurgent forces air defense capable ?
A-6
FM 34-36
IND INDICATOR
NO. INDICATOR PIR/IR NO PRIORITY
A-7
FM 34-36
— Indicator 1 answers PIR 1 and 5 and IR A, B This process maximizes the use of limited collection as-
and C. sets against an array of collection targets. After in-
— Indicator 2 answers PIR 1, 2, and 5 and IR B dicators and SIR are prepared, the ASPS passes them to
and C. the CM&D section for collection action.
— Indicator 3 answers PIR 1 and 2 and IR, A, B,
The collection manager prioritizes the SIR and tasks
D,and E.
appropriate sources to answer them. The list of taskings
for each source should also be prioritized. All of this can
Therefore, indicator 1 would be the 17th priority, num-
be completed in step 3.
ber 2 the 2d, and number 3 the 3d priority.
DETERMINE SPECIFIC INFORMATION The nonlinear battlefield collection plan format
REQUIREMENTS provides the collection manager with an effective format
In the third step, the ASPS analyzes the prioritized in- to organize and monitor this task.
dicators and target characteristics to determine SIR. COLLECTION PLAN INSTRUCTIONS
SIR are the basic questions that need to be answered to
Figure A-7 is a sample of a completed nonlinear bat-
confirm or deny the existence of an indicator.
tlefield collection plan format. Instructions for using this
format follow:
For example, the first PIR is where and in what
strength there are insurgent forces. (See Figure A-5.)
• SIR NO. Use as a reference point. Label each line
Some indicators that may assist in answering this require-
numerically to orientate personnel to SIR on the
ment are—
worksheet.
• The location of enemy base camps.
• TIME. List the start and stop times the correspond-
ing SIR should confirm or deny a particular SIR.
• The establishment of new and unexplained agricul-
(These SIR may be extremely time sensitive, such as
tural areas or recently cleared fields.
reporting a reaction force leaving its post to rein-
force a SOF target; or the indicator may remain in
• The size and location of insurgent forces.
effect throughout the entire operation, such as
reporting the avoidance of a specified area by the
• Any unexplained firing or explosions in the
local populace. In this case, list indefinite.)
countryside.
• NAL NAI can be shown vertically or horizontally
All the above indicators can assist in answering the first
on the chart. The NAI listed in the vertical NAI
PIR.
column indicates where the SIR should be observed.
An NAI may pertain to one or more SIR or vice
Then these indicators are analyzed to develop SIR.
versa. List the NAIs that each particular source is
Some examples of SIR for indicator 1—Where are
responsible for in the horizontal NAI column. An
enemy base camps located—could be:
ODA may be responsible for only one NAI, while a
SOT-A may monitor several NAIs.
• Report the location, quantity, and type of unex-
plained firing in the area.
• SIR. In this column the CM&D section lists the SIR
they believe will confirm or deny particular in-
• Report any presence of mines, booby traps, and
dicators and which help to answer one or more PIR
obstacles in the area.
and IR. It is not uncommon to develop several SIR
from one indicator or for each SIR to provide infor-
The accurate determination of indicators and SIR is es-
mation on several indicators and PIR and IR.
sential for effective collection management. Knowing
where, when, and what to look for helps in selecting what
• PIR/IR NO. Here, members of the CM&D section
to look with.
record the PIR and IR munbers or letters that can
be answered by the corresponding SIR.
A-8
1
«*•
UNEAR BATTLEFIELD COLLECTION PLAN UNIT: 1 BN 9SFG(A) AGENCIES AND AGENCY COLLECTION PRIORITY
SIR PIFV GRP SOT- SOT SOT 4th 90h TASO- SOC HNlst HN2d Other HV
NO TIME SPECIFIC INFORMATION REQUIREMENTS IR NO M DET A(1) A (2) M3) CITM B930 A931 A933 A934 POG CA SCISE police BDE BDE Agencies
RED-A BLACK
ALL TWO Green-A ALL RED BLACK GREEN ALL ALL ALL ALL
(Q
¿2&JSÍ
Report location, quantity and type ol unexplained 11 11
MDEF ALL
firing in the area
LZL B.3 r
Report any presence oi mines, booby traps
MOEF AU 1.5
AU
Report connections with ponbcai
ÍA.RC.C 13 16
parties, labor unions, schools, churches, etc. 3D CH EH 3D CH as EH ED
Report increased domesbc/fqreign media
AU coverage of insurgent activities and insurgent I.5AD.E
sensitivilies to public attitudes and reactions CD ca ID CD n 2D
cr Report propaganda effort’s fmdicate. type,
AU targets, location, time encountered, theme and 1.2.3.0. E
3
awenveness) ra a33 IS 35 2D CD 23 ID
Report the use of new words, phrases or 12.4 AD
AU
symbols in the area £_J aü \zi (5 íl CH
Report sabocaoe attempts against supply depots.
Q. 1,2
ALL ASPs, oommo facilities or LOCs
Rpt location and contents of thefts that could
ALL support activities (bulk food, clothing 1.2.B
boots, end road taxes) LH *
eg 1
Rpt significant movements of civilians & refugees 1.2,5, A
ALL CH
to include the avoidance of certain areas ID
Report the use of air defense weapons or small HN AF
AU arms fire at aircraft to include the type and I.4.D
locations of weapon CD CD C3 EH CD CD CH ED CH EH 1 ft
NOEF AU Rpt damage to roads, airfields & other structures 1.3
CH 2D CD CH 2D C3 23
Report unexplained trails or increased activity or
WDEF AU iwtnhfnfml roads, trails, rivers or streams t.5.ac CH 115
CH E5 EH eD CH 2H
Report unusual, public gatherings, strikes, note
MDEF AU or demonstrations
10
HD CH ID CH »I 12
MDEF AU
Rpt any significant changes m tactics 12 17 14 14
techniques, or procedures
2.3AD
ED CH LH EH □D CH IH
FM 34-36
a ca
<0
FM 34-36
• SIR PRIORITY. In this column each SIR is Example: (Refer to Figure A-7.) The CM&D section
prioritized. The collection manager determines determines that the Cl team, the CA unit, and host-na-
which SIRs answer the most important PIR and IR tion police are capable of answering SIR #4—Report
and rates them accordingly. sightings of groups of strangers in and around the opera-
tional area.
• AGENCIES AND AGENCY COLLECTION
PRIORITY. Listed across the top of this section • The collection manager places a mark (check or
are all organic and supporting collection agencies. asterisk) in the square located in the lower left
In the block below them, their respective NAIs are corner of the block that corresponds to that par-
listed. ticular SIR and each of the three capable agencies.
Before a particular agency or unit is selected to collect • After further consideration he determines that the
on a SIR, the collection manager determines what assets host-nation police can best answer the SIR, followed
are available and capable of collecting the information by the CA unit, then the Cl team. He then puts the
needed. This includes assets in organic, supporting, and number 1 in the square located in the lower right
higher collection agencies. corner of the block that corresponds to SIR #4 and
the host-nation police, the number 2 in the CA unit
To do this, the collection manager needs to know the block, and the number 3 in the Cl team block.
capabilities and availability of each available asset, such TASKING LIST
as—
In the final step the CM&D section prepares a
• Frequency ranges for SOT-A team radios. prioritized tasking list for each collection agency that is
easy to understand. To do this, he reviews the SIR each
• Aircraft mission durations.
agency is tasked to answer and then prioritizes them ac-
• Number of flights, mobility, linguistic capabilities. cording to the SIR priority column.
This information is essential to determine which asset Example: (Refer to Figure A-7).
or agency is capable of collecting information to answer
SIR. The DOD capabilities handbook has profiles of sys- • The SOT-A (1) is tasked with SIR #1,6, and 28.
tem capabilities. Host nation or HUMINT resources
• IR #1 has an SIR priority of 20, SIR #6 a priority of
capabilities must be obtained from the parent organiza-
10, and SIR #28 a priority of 3.
tion. Figure A-8 shows a capability and requirement cor-
relation chart.
This means the collection manager must provide the
SOT-A (1) with a prioritized tasking list as follows:
After determining asset capability and availability, the
collection manager places a mark (check or asterisk) in
1-
the small square in the lower left corner of the block that
radio traffic or EW activity (SIR #28).
corresponds to the SIR that a particular agency or asset
can answer. Next, he determines which agency or asset
2-
can best answer the SIR and prioritizes them. To do this,
and time of suspected insurgent patrols in the area
he considers the location, range, and threat to the collec-
(SIR #6).
tor, as well as other mission requirements. This step is
shown on the worksheet by placing the appropriate num-
3-
ber in the small square in the right corner of the block.
firings in the area (SIR #1).
A-10
FM 34-36
OTHER CONSIDERATIONS
The only exception to this procedure is when the col- other, before the subject understands and can answer the
lection manager tasks interrogators. Interrogators need question.
verbatim PIR and IR. This is in addition to the in-
dicators or SIR containing specific intelligence or com- Example: CM&D tasks interrogators to "... report in-
bat information requirements. stances of dead foliage." This SIR is specific. If the sub-
ject is not native to the area, he may not have noticed
Interrogators need this information because their dead foliage. However, if the interrogator knows the
primary source of information and intelligence comes larger PIR is to ". . . locate insurgent supply caches . . ."
from people who have different levels of understanding he can rephrase or ask different questions to secure this
and background. This means interrogators must tailor information. By knowing the larger question, the inter-
their questions so that the subject can understand what is rogator is able to quickly secure the information or intel-
being asked. Often, interrogators must ask a subject ligence the commander needs and spot report it back
several different questions, all seemingly unrelated to the immediately.
A-11
FM 34-36
APPENDIX B
CLASSIFICATION
COPY OF COPIES
UNIT
LOCATION
DATE
c. Limiting factors. Identify factors that limit the completeness or accuracy of the area study.
2. GEOGRAPHY, HYDROGRAPHY, AND CLIMATE. Divide the operational area into its various
definable subdivisions and analyze each subdivision as follows:
b. Strategic locations.
CLASSIFICATION
B-1
FM 34-36
\¡T
CLASSIFICATION
c. Climate. Note variations from the norm and the months in which they occur. Note any extremes
in climate that would affect operations.
(1) Temperature.
(4) Light data. Include beginning morning nautical twilight (BMNT); ending evening nautical
twilight (EENT); percent of illumination, sunrise, sunset, moonrise, and moonset.
d. Relief.
(1) General direction of mountain ranges or ridge lines and whether hills and ridges are dissected.
(5) Location of area suitable for guerrilla bases, units, and other installations.
(1) Former heavily forested areas subjected to widespread cutting or dissected bypaths and roads.
Also note the reverse, pastureland, or wasteland that has been reforested.
(2) Former wasteland or pastureland that has been resettled and cultivated and is now being farmed.
Also note the reverse: Former rural countryside that has been depopulated and allowed to return to
wasteland.
CLASSIFICATION
V- \h 1
B-2
FM 34-36
A/ V \A 'y
CLASSIFICATION
(3) Former swampland or marshland that has been drained; former desert or wasteland now ir-
rigated and cultivated; and lakes created by dams.
(2) Characteristics of rivers and streams (include widths, currents, banks, depths, kinds of bottoms,
and obstacles).
(4) Large lakes or areas with many ponds or swamps (include potential LZs for amphibious aircraft).
h. Geological basics. Identify types of soil and rock formations (include areas for potential LZs for
light aircraft).
(2) Types, characteristics, and significant variations from the norm at different elevations.
CLASSIFICATION
A V \A ^
Figure B-1. Outline for a general area study (continued).
B-3
FM 34-36
"V -V y
CLASSIFICATION
k. Subsistence.
3. POLITICAL CHARACTERISTICS. Identify friendly and foreign political powers and analyze
their capabilities, intentions, and activities that influence mission execution.
a. Hostile power.
(2) Identifiable segments of the population with varying attitudes and probable behavior toward the
United States, its allies, and the hostile power.
(5) National capital and significant political, military, and economic concentrations.
c. Political parties.
(2) Nationalistic origin and foreign ties (if a single dominant party exists).
CLASSIFICATION
V- V \A ^
Figure B-1. Outline for a general area study (continued).
B-4
FM 34-36
-v A/V
CLASSIFICATION
(1) Documentation.
(2) Rationing.
4. ECONOMIC CHARACTERISTICS. Identify those economic factors that influence mission ex-
ecution.
a. Technological standards.
d. Monetary system.
e. Black market activities. Note the extent and effect of those activities.
CLASSIFICATION
B-5
FM 34-36
CLASSIFICATION
^—V
f. Agriculture and domestic food supply.
(1) Railroads.
(2) Highways.
(3) Waterways.
m. Industry, utilities, agriculture, and transportation. Note the control and operation of each.
5. CIVIL POPULACE. Pay particular attention to those inhabitants in the operational area who
have peculiarities and who vary considerably from the normal national way of life.
c. Ethnic and/or religious groups. Analyze these groups to determine if they are of sufficient size,
cohesion, and power to constitute a dissident minority of some consequence.
CLASSIFICATION
-V \A \
CLASSIFICATION
d. Attitudes. Determine the attitudes of the populace toward the existing regime or hostile power,
the resistance movement, and the United States and its allies.
(2) Class structure. Identify degree of established social stratification and percentage of populace in
each class.
CLASSIFICATION
\f V \A ^
Figure B-1. Outline for a general area study (continued).
B-7
FM 34-36
CLASSIFICATION
b. Personnel Strength.
m. Logistics.
CLASSIFICATION
B-8
FM 34-36
CLASSIFICATION
V- V
o. Vulnerabilities in the internal security system.
s. Psychological vulnerabilities.
u. COIN activities and capabilities. Pay particular attention to reconnaissance units, special troops
(airborne, mountain, ranger), rotary-wing or vertical-lift aviation units, Cl units, and units having a
mass NBC delivery capability.
v. Guard posts and wartime security coverage. Note the location of all known guard posts or ex-
pected wartime security coverage for all types of installations. Pay particular attention to security
coverage along the main LOC (railroads, highways, and telecommunications lines) and along electri-
cal power and POL lines.
w. Forced labor and detention camps. Note exact location and description of the physical arrange-
ment (particularly the security arrangements).
x. Populace and resources control measures. Note locations, types, and effectiveness of internal
security controls. Include checkpoints, identification cards, passports, and travel permits.
a. Guerrillas.
CLASSIFI CATION
VA
Figure B-1. Outline for a general area stuuy ^uiumueu;.
B-9
CLASSIFICATION
c. Logistics capability.
(1) Availability of food stocks and water. Include any restrictions for reasons of health.
(4) Types and location of civilian services available for manufacture and repair of equipment and
clothing.
8. TARGETS. (The objective in target selection is to inflict maximum damage on the foreign power
with minimum expenditures of soldiers and materiel. Initially, a guerrilla force may have limited
operational capabilities to interdict or destroy foreign targets.)
CLASSIFICATION
'V
»
CLASSIFICATION
c. List targets in order of priority by system and in accordance with mission requirements.
CLASSIFICATION
B-11
FM 34-36
APPENDIX C
The MTP consists of tasking and transmittal docu- • Is it within the command’s capability, unilaterally or
ments, target identification data, and CINC mission as a joint operation, to accomplish the mission
guidance. Figure C-l shows the format for the MTP. within an acceptable degree of risk?
SOF FEASIBILITY ASSESSMENT Figure C-2 shows the format for a SOF FA. Detailed
planning and the selection of a preferred COA is
The FA is a target feasibility analysis conducted by reserved for the development of a POE should the FA
SOF commanders on nominated SOF targets. The FA is indicate that the mission is viable. All existing shortfalls
used by the MPA to analyze the viability of the target. that would preclude development of the FA must be
The purpose of the FA is to address the following ques- identified immediately. At a minimum, imagery, area
tions: study, maps, and OB are required to produce the FA.
The OB must be updated prior to deployment. The
• Is this a valid ARSOF mission? process outlined in this format may be compressed
during adaptive targeting.
The TIP is tailored for the particular SOF mission. sions. Figure C-4 shows the format for SOF FID or UW
Figure C-3 shows the format for SOF DA or SR mis- missions.
The POE is a detailed plan of how the assigned SOF also developed by the unit responsible for infiltration or
will carry out the validated mission assigned to them. exfiltration to and from the target area. Figures C-5 and
The POE, in conjunction with mission rehearsals, is the C-6 show the formats for SOF POE.
end result of the mission planning process. POEs are
C-1
FM 34-36
a. Name.
d. Mission tasks.
f. Country.
a. Mission statement.
b. Specific objectives.
c. Commander’s guidance.
d. C2.
C-2
FM 34-36
SECTION I-MISSION
a. Feasibility as a target.
c Recommendation.
SECTION III-ASSUMPTIONS.
(1) Weather.
(2) Terrain.
b. Situation.
c. Enemy situation.
(1) Composition.
(2) Disposition.
(3) Strength.
C-3
FM 34-36
-v V
(6) Vulnerability to deception.
(a) Defensive.
(b) Offensive.
SECTION V-COA.
a. Identify COA.
b. Analyze COA.
c. Compare COA.
(1) Advantages.
(2) Disadvantages.
(3) Risks.
d. Recommended COA.
a. Personnel.
c. Other.
C-4
FM 34-36
(1) BE#.
(2) Category.
SECTION III-THREAT.
b. Paramilitary and indigenous forces (including intelligence, security, and police services).
d. Air Forces.
f. EOB.
g. Space-based assets.
h. Other.
c. Social conditions.
d. Religious factors.
e. Political characteristics.
f. Economic conditions.
a. Airfields.
b. Railways.
c. Roadways.
d. Waterways.
e. Ports.
f. POL.
g. Power grid.
h. Telecommunications.
V
Figure C-3.
V TIP format for SOF DA or SR missions (continued).
C-6
FM 34-36
A/
SECTION VI-INFILTRATION AND EXFILTRATION. Potential LZs, DZs, BLSs, and helicopter
LZs.
(1) Population.
(3) Location.
(4) Approaches.
b. Survival data.
(1) Food.
(2) Water.
(3) Shelter.
(4) Medical.
(a) Diseases.
\f v Vv
\b V
C-7
FM 34-36
V *+ V
APPENDIX A: BIBLIOGRAPHY.
APPENDIX B: GLOSSARY.
APPENDIX C: IMAGERY.
c-s
FM 34-36
SECTION III-THREAT.
(4) Naval forces (including Coast Guard and Maritime Border Guard).
(5) Airforces.
(7) EOB.
(9) EW.
(10) C’CM.
(11) W
C-9
FM 34-36
A/v
(17) PSYOP.
(6) I&W.
EEI MUST BE ANSWERED FOR BOTH OBJECTIVE COUNTRY AND OPPOSITION AND
RESISTANCE FORCES. (EEI and OIR are joint terms. United States Army uses PIR and IR.)
-v -V- \>——
Figure C-4. TIP format for SOF FID or UW missions (contlriued).
C-10
c. Social conditions.
d. Religious factors.
e. Political characteristics.
h. Medical capabilities.
j. Economic conditions.
a. Airfields.
b. Railways.
c. Roadways.
d. Waterways.
e. Ports.
f. POL.
g. Power grid.
h. Telecommunications.
Figure C-4. TIP format for SOF FID or UW missions (coni led).
FM 34-36
"v
m. Stockpiles.
n. War-sustaining industries.
o. War-sustaining resupply.
SECTION VI--INF1LTRATION AND EXFILTRATION. Potential LZs, DZs, BLSs, and helicopter
LZs.
(EEI MUST BE ANSWERED FOR BOTH OBJECTIVE COUNTRY AND OPPOSITION AND
RESISTANCE FORCES.)
f. US support.
APPENDIX A: BIBLIOGRAPHY.
APPENDIXE: GLOSSARY.
APPENDIX C: IMAGERY.
C-12
FM 34-36
SECURITY CLASSIFICATION
Issuing
Headquarters Place
1. References:
SECTION I-MISSION.
(1) Topography.
(2) Hydrography.
(b) Transportation.
(c) Telecommunications.
(d) Politics.
(e) Economics.
(f) Sociology.
C-13
FM 34-36
V Vv
2. Relative combat power.
(a) Enemy.
(1) Strength.
(2) Composition.
(4) Reinforcements.
(5) Logistics.
(b) Friendly.
(1) Strength.
(2) Composition.
(4) Reinforcements.
3. Assumptions.
V Vf
Figure C-5. Format for an SOF POE (continued).
C-14
FM 34-36
• p- P
(1) Statement of COAs.
d. Decision (recommended C
a. Overall schedule.
(1) Preparation.
(2) Rehearsal.
(3) Rendezvous.
(4) Transit.
(5) Execution.
(6) Recovery.
d. Deception.
g. Deployment.
V V*
Figure C-5. Format for an SOF POE (continued).
C-15
FM 34-36
h. Weaponeering.
i. Target recuperability.
j. Resupply.
k. Exfiltration.
l. SERER.
m. Command relationships.
a. Intelligence.
b. Weather.
c. Equipment.
d. Tactics.
f. Personnel.
g. Training.
h. Supporting forces.
i. C3.
k. Other factors.
(Signed)
C-16
SECTION I—MISSION.
b. Mission statement.
a. Mission tasking.
b. Objective area.
c. General concept.
SECTION III-ASSUMPTIONS.
a. Launch bases.
NOTE: This will represent the entire infiltration or exfiltration route from launch to recovery on a
suitable scale chart annotating all information deemed necessary by the planning cell for portrayal of
the mission. This should include, but is not limited to, the following:
d. Recovery bases.
f. Air refueling tracks forward arming and refueling point (FARP) (aircraft and boats).
■v AA-
Figure C-6.
A/V
Format for SOF POE-Inflltratlon and exflltratibn.
C-17
FM 34-36
"V A/V-
g. Routes.
1. Ingress.
2. Egress.
5. Strip charts, navigation logs, global positioning satellite receivers, and other aids (as required).
b. Prelaunch requirements:
1. Updates to OBs.
2. EEIs.
d. C3.
1. Security preparations.
b. SOCC.
6. GO or NO-GO point.
A/
Figure C-6.
V- \A
Format for a SOF POE—Infiltration and exfiltration (continued).
y
C-18
FM 34-36
-v A/V
7. Publish signal operation instructions (SOI).
8. Deception.
e. Emergency procedures.
2. Weather.
3. Faulty intelligence.
b. Maintenance problems.
c. Battle damage.
d. Platform destruction.
e. Bump plan.
1. Crew responsibilities.
3. Evasion movement.
5. SAFE.
-v V- \h 'b
Figure C-6. Format for a SOF POE—Infiltration and exfiltration (continued).
C-19
FM 34-36
-v
6. Evasion team communications.
a. Intelligence.
b. Weather.
c. Equipment.
d. Munitions.
e. Tactics.
g. Personnel.
h. Training.
i. Supporting forces.
a. Target coordinates.
b. Maximum and minimum distances the LZs or DZs can be from the target.
e. Type of delivery and recovery required (for example, jump, land, fast rope, seal delivery vehicle
[SDV] or zodiac) and platform preferred.
"V
Figure C-6.
v-
Format for a SOF POE--infiltration and exfiltration (continued).
'V
C-20
FM 34-36
'V \A W
r
g. Approximate size and weight of additional equipment.
NOTE: Some of the information may not be readily available. Information onhand will normally suf-
fice to conduct the POE. However, all efforts should be made to obtain the above information and in
corporate it into the POE.
C-21
FM 34-36
APPENDIX D
D-1
FM 34-36
• Movement from the point of entry to the target or varies with the sources and type of targeted components
objective. and the availability of spare parts availability. Factors
• Movement to the target’s critical element. which should be considered when assessing
• Exfiltration. recuperability include, but are not limited to, the
availability of—
Factors considered when evaluating accessibility in-
clude but are not limited to— • Onhand equipment such as railroad cranes, dry
docks, and cannibalization.
• Active and passive early warning systems. • Restoration and substitution through redundancies.
• Swimmer detection devices. • Onhand spares.
• Air defense capabilities within the target area. • Equivalent OB equipment sets that back up critical
• Road and rail transportation systems. equipment or components, and the effects of
economic embargoes and labor unrest.
• Type of terrain and its use.
• Concealment and cover. Table D-3 shows how recuperability values are assigned
• Population density. on CARVER matrixes.
• Other natural or synthetic obstacles and barriers.
Table D-3. Assigning recuperability values.
• Current and climatic weather conditions.
CRITERIA SCALE
The analysis along each critical path to the target
should measure the time it would take for the action ele- Replacement, repair, or substitution requires 9-10
ment to bypass, neutralize, or penetrate barriers and 1 month or more
obstacles along the way. Accessibility is measured in
terms of relative ease or difficulty of movement for the Replacement, repair, or substitution requires 7-8
operational element and the likelihood of detection. The 1 week to 1 month
use of standoff weapons should always be considered in
such evaluations. Table D-2 shows how accessibility Replacement, repair, or substitution requires 5-6
values are assigned on CARVER matrixes. 72 hours to 1 week
Table D-2. Assigning accessibility values. Replacement, repair, or substitution requires 3-4
24 to 72 hours
CRITERIA SCALE
Same day replacement, repair, or substitution 1-2
Easily accessible, standoff weapons can be 9-10
employed VULNERABILITY
A target is vulnerable if the operational element has the
Inside a perimeter fence but outdoors 7-8
means and expertise to successfully attack the target.
When determining the vulnerability of a target, the scale
Inside a building but on ground floor 5-6
of the critical component needs to be compared with the
capability of the attacking element to destroy or damage
Inside a building but on second floor or in 3-4
it. In general, the attacking element may tend to—
basement; climbing or lowering required
• Choose special components.
Not accessible or inaccessible without 1-2
extreme difficulty • Do permanent damage.
• Prevent or inhibit cannibalization.
RECUPERABILITY
• Maximize effects through the use of onsite
A target’s recuperability is measured in time; that is, materials.
how long will it take to replace, repair, or bypass the
• Cause the target to self-destruct.
destruction of or damage to the target? Recuperability
D-2
FM 34-36
Specifically, vulnerability depends on— a successful air or missile nuclear strike against the
defender. Effects can also include—
• The nature and construction of the target.
• The amount of damage required. • The triggering of countermeasures.
• The assets available; for example, personnel, exper- • Support or negation of PSYOP themes.
tise, motivation, weapons, explosives, and equip- • Unemployment.
ment. • Reprisals against the civilian populace.
• Collateral damage to other targets.
Table D-4 shows how vulnerability values are assigned
on CARVER matrixes.
Possible effects can be speculative and should be
Table D-4. Assigning vulnerability values. labelled as such. Effects of the same attack may be quite
different at the tactical, operational, and strategic levels.
CRITERIA SCALE For example, the destruction of a substation may not af-
fect local power supply but cuts off all power to an ad-
Vulnerable to long-range laser target 9-10 jacent region. Table D-5 shows how effect values are
designation, small arms fire, or charges assigned on CARVER matrixes.
of 5 pounds or less
Table D-5. Assigning effect values.
Vulnerable to light antiarmor weapons fire 7-8
CRITERIA SCALE
or charges of 5 to 10 pounds
Overwhelmingly positive effects; no 9-10
Vulnerable to medium antiarmor weapons 5-6
significant negative effects
fire, bulk charges of 10 to 30 pounds, or very
careful placement of smaller charges
Moderately positive effects; few significant 7-8
negative effects
Vulnerable to heavy antiarmor fire, bulk 3-4
charges of 30 to 50 pounds, or requires
special weapons No significant effects; neutral 5-6
For example, the primary effect of the destruction of Other factors which influence recognizability include
the size and complexity of the target, the existence of dis-
two adjacent long-range radar sites in an early warning
system may be to open a hole in the system that is of suf- tinctive target signatures, the presence of masking or
ficient size and duration to permit the attacker to launch camouflage, and the technical sophistication and training
D-3
FM 34-36
CARVER MATRIX
These CARVER factors and their assigned values are evaluated, add the values for each potential target. The
used to construct a CARVER matrix. This is a tool for sums represent the relative desirability of each potential
rating the desirability of potential targets and wisely al- target; this constitutes a prioritized list of targets. Attack
locating attack resources. those targets with the highest totals first.
To construct the matrix, list the potential targets in the If additional men and/or munitions sire available, allo-
left column. For strategic level analysis, list the enemy’s cate these resources to the remaining potential targets in
systems or subsystems (electric power supply, rail sys- descending numerical order. This allocation scheme will
tem). For tactical level analysis, list the complexes or maximize the use of limited resources. The SIO can use
components of the subsystems or complexes selected for the CARVER matrix to present operation planners with
attack by your higher headquarters. (Figure D-l shows a a variety of attack options. With the matrix he can dis-
sample matrix for a bulk electric power supply facility.) cuss the strengths and weaknesses of each COA against
the target. Having arrived at conclusions through the
As each potential target is evaluated for each rigorous evaluation process, the SIO can comfortably
CARVER factor, enter the appropriate value into the defend his choices.
matrix. Once all the potential targets have been
SITE RECONNAISSANCE
During target systems analysis, it is advantageous (in a intelligence personnel. This analysis seeks to answer
permissive environment) to have a reconnaissance ele- PIR, IR, and SIR in the categories of CARVER.
ment perform a site survey. This reconnaissance can
take place at the specific target site or at a similar site in Target analysis is the responsibility of the SIO, but a
a more accessible location. reconnaissance team can often be used to answer SIR
that cannot be satisfied by any other means. Preparation
Preparation for reconnaissance and analysis of an in- for a site reconnaissance requires review and under-
dustrial establishment or other technically sophisticated standing of the following process. Site reconnaissance—
complex is one of the more difficult missions for the
ARSOF SIO. Reconnaissance could be done in support • Can be overt, covert, or clandestine.
of DA missions or to assist a host nation to defend a
potential target in a FID environment. Target analysis is • Can be conducted as part of a larger area assess-
a cooperative effort between the operational element and ment or a distinct mission activity.
D-4
FM 34-36
FUEL TANKS 41
FUEL PUMPS 10 34
BOILERS 10 31
TURBINES 10 45
GENERATORS 10 41
CONDENSERS 34
FEED PUMPS 33
GENERATOR STEP UP 10 10 10 53
TRANSFORMER
• Can take place across the operational continuum. SIO and are examined, as appropriate, in light of the mis-
sion and the PIR and IR.
• Is often more than a traditional reconnaissance and
less than a full-scale analysis. Comprised of four An initial CARVER report and targeting folder that
cyclic steps. highlights gaps in the data may be prepared at this step.
The folder is used to develop a detailed collection and
SIO AND RECONNAISSANCE
reconnaissance and surveillance (R&S) plan
TEAM REVIEW
The first step is a joint SIO and reconnaissance team SURVEY THE TARGET
review of the commander’s guidance and stated require- The third step is a survey of the target by the reconnais-
ments. This sets out what is to be accomplished regard- sance team. The team—
ing the target. In a FID environment, this includes an
evaluation of the threat to the target. • Gathers information validating data gathered and
GATHER, ORGANIZE, AND EVALUATE
conclusions drawn up to this step.
INFORMATION
• Satisfies intelligence and information requirements.
The second step is to gather, organize, and evaluate
available information about the target; and to identify • Gives the supported targeting analyst and/or opera-
gaps in the data. Maps, photographs, flow charts, tional element a "feel" for the target.
blueprints, diagrams, and other data are provided by the
D-5
FM 34-36
If the survey is overt and with the cooperation of per- • Do not volunteer any more information about your-
sonnel working at the site, the operational element fol- self or your purpose than is necessary to accomplish
lows these basic rules: your mission.
• Look for those things that would be important if the • Avoid immature discussions concerning sabotage or
site had to be attacked in the future. Note layout, destruction of components onsite. Hosts are often
construction, location, and composition of key com- concerned about security and, fearing widespread
ponents, security, and communications. dissemination of their vulnerabilities, may prevent
them from offering useful information or hosting
• Dress neatly but not conspicuously. return visits in the future.
• Get permission before taking any photographs.
• Find out what the key components of the site are
likely to be by pre-visit research; check this against COMPLETE THE RECONNAISSANCE
what you see or are told on the site. Note manufac- REPORT
turers and model numbers of key components. Find The fourth step is to complete the reconnaissance
out which, if any, of these components are made by report and transmit it to the SIO. The following are min-
cast methods or are otherwise difficult to replace. imum recommended data requirements for a reconnais-
Determine who the key personnel at the site are and sance report prepared by a reconnaissance team:
what they do.
• R&S plan employed.
• Be conscious of where you are on site at all times in
relation to key components; notice what type of • Site, system, or complex layout diagram with north
machinery or equipment is in your immediate arrow and scale.
vicinity.
• During the CARVER assessment, the operational
• Discern how the site is similar to other sites in its element normally focuses on accessibility, vul-
class. Note any significant differences. nerability, and recognizability.
• Take brief but good notes. • Map coverage of 1:250,000, 1:50,000, and 1:25,000
extending out from the target and including sig-
• Be polite and attentive when someone from the site nificant installations and activities noted by the team
is speaking. Direct questions, one at a time, to your that are inside the AO and AI.
host. Do not badger guides with persistent ques-
tions about subjects they are unsure about or do not • High-angle overhead, oblique overhead, and ground
want to discuss. photography of the target with annotations of instal-
lations, activities, and differences observed by the
• Avoid making comments about perceived lax operational element.
security.
• Site communications and electronics data can be
• Do not wander away from the tour group or into gathered by an attached SOT-A.
restricted areas: such conduct will offend your host.
• Locations of the nearest fixed-wing capable airstrip
• Do not smoke where there is even a remote fire and fixed-wing capable instrumented airstrip;
hazard or without the permission of your host. ground distances from each of the above airstrips to
the target; and the nearest DZs, LZs, and BLSs.
• Ask for informational handouts, such as illustrated
public relations literature, that provide technical in- • Summary of local human and material resources
formation about the site. Be especially alert for available to support special operations.
flowcharts and layout diagrams.
• List of sources used.
D-6
FM 34-36
D-7
FM 34-36
GLOSSARY
abn airborne C2 command and control
AA avenue of approach C3 command, control, and
AC Active Component communications
ACofS Assistant Chief of Staff C^CM command, control, and
ACP Army country profile communications countermeasures
ADA air defense artillery C3! command, control, communications,
ADP automatic data processing and intelligence requirements
AFSOC Air Force Special Operations management
Command CA civil affairs
AFSOF Air Force Special Operations Forces CAA command arrangement agreements
AGL above ground level CARVER criticality, accessibility, recuperability,
AI area of interest vulnerability, effect, and
AXA Army Intelligence Agency recognizability
AID Agency for International Development CCIR commander’s critical information
AMPS amplification requests requirements
AO area of operations cdr commander
AOB air order of battle C-E communications and electronics
ARNGUS Army National Guard United States CG commanding general
ARSOC Army Special Operations Command Cl counterintelligence
ARSOF Army Special Operations Forces CIA Central Intelligence Agency
ASD (SO/LIC) Assistant Secretary of Defense for CINC commander-in-chief
Special Operations and CINCSOC Command-in-Chief, Special
Low-Intensity Conflict Operations Command
ASE aircraft survivability equipment CIR continuing intelligence requirements
ASG area support group CI/SEC counterintelligence/security
ASIC all-source intelligence center CM&D collection management and
ASPS all-source production section dissemination
AST area specialist team CMA collection management authority
ATTG automated tactical target graphic cmd command
AV audiovisual CMEC Captured Materiel Exploitation Center
AVN aviation CMO civil-military operations
co company
BAE battlefield area evaluation COA course of action
BDA battle damage assessment COCOM combatant command
bde brigade COIN counterinsurgency
BE basic encyclopedia col collection
BLS beach landing site col rqmts collate requirements
BMNT beginning morning nautical twilight COMINT communications intelligence
bn battalion comm communications
BPS basic PSYOP studies COMMZ communication zone
Glossary-1
FM 34-36
Glossary-2
FM 34-36
Glossary-3
FM 34-36
Glossary-4
FM 34-36
Glossary-5
FM 34-36
Glossary-6
FM 34-36
REFERENCES
SOURCES USED
FM 34-81. Weather Support for Army Tactical Operations. AFM105-4. 31 August 1989.
JCS Publication 1-02. Department of Defense Dictionary of Military and Associated Terms. 1 June 1987.
JCS Publication 0-2. Unified Action Armed Forces (UNAAF). 1 December 1986.
JCS Publication 3-05.5. Joint Special Operations Targeting and Mission Planning Procedures (Test Publication).
May 1991.
JCS Publication 5-02.4. Joint Operations Planning System, Volume 4 (Crisis Action Procedures). 8 July 1988.
JTENS Manual. Joint Tactical Explorations of National Systems. December 1985, with Change 3,15 March 1989.
Army Publications
References-1
FM 34-36
DOCUMENTS NEEDED
DA Form 2028. Recommended Changes to Publications and Blank Forms. February 1974. A
References-2
FM 34-36
INDEX
all-source intelligence
ARSOF. See Army Special Operations Forces.
definition of, 1-6
IEW products, 1-6
ASPS. See all-source production section.
All-Source Intelligence Center
assets in support of PSYOP, 7-5 through 7-7
responsibilities of, 3-11
Index-1
FM 34-36
ç collecting
2 definition of, 2-4
C . See command and control.
part of intelligence cycle, 2-3
Index-2
FM 34-36
communications intelligence (COMINT), 1-5 decision support template (DST). See also templates,
use of, 10-26
concealment and cover overlay. See also overlays,
used in IPB process, 10-10 deliberate targeting process
definition of, 2-7
counterintelligence (Cl) in support of target development, 2-7,9-4
CI/security division functions, 3-10
functions, 2-8 direct action (DA)
IEW mission task, 2-8 AFSOF mission, 1-1
in support of CA, 8-8 in support of SFG(A), 4-1
in support of SOA, 6-4
operations, 2-8 direct liaison authority (DIRLAUTH)
ranger regiments functions, 5-3,5-7 command arrangement agreements, 3-1
SFG(A) functions, 4-11,4-14
support, 4-14, 5-7 directing
definition of, 2-1
counterterrorism (CT) intelligence estimate, 2-1
ARSOF mission, 1-1 MDCI support, 2-4
in support of SFG(A), 4-2 part of intelligence cycle, 2-1
Index-3
FM 34-36
E F
ECCM. See electronic counter-countermeasures. FA. See feasibility assessment.
electronic support measures (ESM). See also electronic fire support, 5-4
warfare.
definition of, 2-8 FISINT. See foreign instrumentation signals intelligence.
graphics
used in IPB process, 10-1
Index-4
FM 34-36
group MI detachment. See also organic IEW support. imagery interpretation team
part of S2 section, 6-2
group S2. See also organic IEW support. function of regimental S2 section, 5-3
Index-5
FM 34-36
intelligence estimate. See also intelligence cycle, JPOTF. See joint psychological operations task force.
purpose of, 2-1
JSOA. See joint special operations area.
intelligence preparation of the battlefield (IPB)
definition of, 10-1 JSOTP. See joint special operations task force.
distinctive tool for SOF, 10-4
equivalents for ARSOF, 10-4 JTCB. See joint target coordination board.
factor analysis process, 10-17
for SOF, 10-1 K
in support of ARSOF, 10-1,10-4
key terrain. See also OCOKA.
OCOKA, 10-8
ARSOF criteria for, 10-8
process of, 1-7,1-10
SIO responsibilities, 10-1
use of terrain overlays, 10-8
L
liaison national elements (LNE). See collection
interrogation teams management.
as part of SFG(A) MI detachment, 4-11
lines of communication (LOC)
IPB. See intelligence preparation of the battlefield. maps and overlays, 2-6,10-19
TIP data, 2-6
IR. See information requirements.
LOC. See lines of communication.
IROL. See imagery reconnaissance objectives list.
logistics sustainability overlay. See also terrain overlays,
J used in IPB process, 10-16
Index-6
FM 34-36
nonbelligerents
mission, enemy, terrain, troops, and time available
evaluation factors for, 10-22
(METT-T)
SIO evaluation of, 10-30
edge in combat, 1-4
exploitation of, 1-6
noncombatant evacuation operations (NEO)
templates in support of, 10-35
event template, 10-29
in support of CA operations, 8-1,10-8
mission support plan (MSP). See also SOMPF.
preparation of, 9-6
nonlinear battlefield indicator worksheet
instructions for preparing, A-10
mission tasking package (MTP)
format, C-2
nonorganic IEW support
used to nominate targets, 9-1
of CA elements, 5-7,8-6,8-9
of PSYOP elements, 5-8,7-4,7-7
mission tasks. See intelligence and electronic warfare,
to ranger regiments, 5-4,5-7
to SF, 4-12
missions
to SFG(A), 4-12
collateral and secondary, 4-1
to SOA regiments, 6-3,6-5
MSP. See mission support plan.
NSA. See National Security Agency.
Index-7
FM 34-36
index-8
FM 34-36
Rangers
RET. See reaction event template.
ARSOF mission, 1-1
operations and missions, 5-1
RFI. See request for information.
Index-9
FM 34-36
Index-10
FM 34-36
TASOSC. See Theater Army Special Operations Theater Army Special Operations Support Command
Support Command. (TASOSC)
function of, 3-8
TECHINT. See technical support. ISE functions, 3-8,3-9
SIO responsibilities, 3-9
TCAE. See technical control and analysis element. USACAPOC responsibilities, 3-10
technical control and analysis element (TCAE) threat and counter-propaganda teams, 7-3
in support of SFG(A), 4-9
threat, counter-propaganda analysis, and AV teams, 7-5
technical intelligence (TECHINT)
definition of, 1-6 threat evaluation. See also templates,
in support of CA, 8-8 fourth step in IPB process, 10-21
in support of ranger regiments, 5-7 for CA, 10-24
in support of SFG(A), 4-13 for PSYOP, 10-23
in support of SOA, 6-4 for Rangers, 10-23
for SOA, 10-23
templates use of doctrinal templates, 10-24
for threat evaluation, 10-21,10-24
for threat integration, 10-24,10-26,10-29 threat integration. See also templates,
types of: final step in IPB process, 10-24
COIN decision support template, 10-29 for CA, 10-34
decision support template, 10-26 for PSYOP, 10-34
disaster relief template, 10-29 for Rangers, 10-29
event template, 10-25 for SF, 10-29
NEO event template, 10-29 for SOA, 10-33
reaction event template, 10-29 SIO responsibilities, 10-25
reactive doctrinal template, 10-24 templates used for, 10-24 through 10-29
Index-11
FM 34-36
time phase line (TPL) USASFC. See US Army Special Forces Command
purpose of, 10-28 (Airborne).
TIP. See target intelligence package. USASOC. See US Army Special Operations Command. , r
trap or key facilities overlay. See also terrain overlays, UW. See unconventional warfare.
used in IPB process, 10-10
trend analysis. See also pattern analysis, V
use of, 10-24
vulnerability. See also CARVER,
Index-12
FM 34-36
30 SEPTEMBER 1991
GORDON R. SULLIVAN
General, United States Army
Chief of Staff
Official:
PATRICIA P. HICKERSON
Brigadier General, United States Army
The Adjutant General
DISTRIBUTION:
3000017474
r
«
#
I ^
y*
}
}■
m
PIN 068671-000