You are on page 1of 158

S û -3/ ÍJ I

■ i ■

; • v
/ / • v/
'O'
#
Í . I '

FM 30-31
y-

FIELD MANUAL

STABILITY OPERATIONS-INTELLIGENCE

I \
RETURN TO ARMY LIBRARY
ROOM 1 A 518 PENTAGON
\

\
\
HEADQUARTERS, DEPARTMENT OF T\H E ARMY
m TAGO 7334A
JANUARY 1970

\
*

m
FM 30-31
Cl

CHANGE HEADQUARTERS
DEPARTMENT OF THE ARMY
No. 1 WASHINGTON, D.C., 28 August 1972

STABILITY OPERATIONS-INTELLIGENCE

FM 30-31, 8 January 1970, is changed as follows:


1. This change reflects new or revised doctrine and procedures for intelligence personnel engaged in
internal defense and internal development operations.
2. New or changed material is indicated by a star.
3. Remove old pages and insert iiew pages as indicated below.
•J-
Remove Pages*
/
insert Pages—
1-1, 1-2 1-1, 1-2, 1-2.1
2-1, 2-2, 2-5, and 2-6 2-1, 2-2, 2-2.1, 2-5, 2-6, and 2-6.1
5-3, 5-4 5-3, 5-4
8-3, 8—4 8-3, 8-4, 8-5
10-1

4. File this change sheet in front of the publication for reference purposes.

By Order of the Secretary of the Army:

BRUCE PALMER, JR.


;\ General, U.S. Army,
Official : l Acting Chief of Staff
VERNE L. BOWERS,
Major General, United States Army,
The Adjutant General

Distribution :
To be distributed in accordance with DA Form 12-11 requirements for Combat Intelligence.

RETURN TO A®’
518 ENTftG0N
ROOM 1 A P
&U.S. GOVERNMENT PRINTING OFFICE: 1972—510-853/3105A
r 1

/
i.

i
i

*
Cl, FM 30-31

CHAPTER 1

INTRODUCTION

Section I. GENERAL

'Arl-1. Purpose and Scope ire. Additional information on intelligence acti-


vities in stability operations may be obtained from
+a. This manual provides guidance on doc-
the following sources :
trine, tactics, and techniques for intelligence sup-
port to US Army stability operations. It is in- FM 30-5 Combat Intelligence
tended for use by commanders, staff officers, and FM 30-17 Counterintelligence
intelligence specialists. It is applicable to major Operations
commands and subordinate units and will serve (C) FM 30-17A Counterintelligence
as guidance for intelligence planning, training, Special Operations (U)
and operations (unilateral and combined). (S) FM 30-18 Intelligence Collection
★6. This manual addresses intelligence require- Operations (U)
ments in support of US Army stability opera- (S) FM 30-31A Stability Operations-
tions, encompassing US internal defense and in- Intelligence Collection
ternal development assistance operations where (U)
US personnel advise, assist, and train host country1 FM 31-16 Counterguerrilla
(HC) military intelligence personnel. For this Operations
reason, the scope is not limited entirely to stabil- FM 31-22 US Army Counterin-
ity operations but includes a description of the surgency Forces
overall internal defense intelligence system, its (S) FM 31-22A US Army Counterin-
management, and its unique aspects in stability surgency Forces (U)
operations, including those involving collection FM 31-23 Stability Operations, US
and production agencies. A discussion of intelli- Army Doctrine
gence training requirements for stability opera-
tions and a proposed intelligence training pro- FM 31-73 Advisor Handbook for
gram also have been incorporated in this manual. Stability Operations
FM 33-1 Psychological Operations,
★c. The contents of this manual are based on US Army Doctrine
the broad guidance and doctrine found in FM FM 33-5 Psychological Operations,
100-20, FM 31-22, and FM 31-23. The manual Techniques and Pro-
applies primarily to Army forces employed in in- cedures
ternal defense and internal development opera- FM 41-10 Civil Affairs Operations
tions. FM 30-5 contains the established conven-
tional intelligence doctrine for—
'A'l—2. Recommended Changes
(1) Nuclear and nonnuclear environments.
(2) Chemical, biological, and radiological en- Users of this manual are encouraged to submit
vironments. recommendations to improve its clarity or accur-
acy. Comments should be keyed to the specific
itd. Guidance on doctrine, tactics, and techni- page, paragraph, and line of the text in which
ques for intelligence interrogation, counterintelli- the change is recommended. Reasons will be pro-
gence operations, and aerial surveillance and re- vided for each comment to insure understanding
connaissance operations in support of stability and complete evaluation. Comments should be
operations is contained in FM 30-15, FM 30-17, prepared using DA Form 2028 (Recommended
FM 30-20, and FM 32-10. Changes to Publications), and forwarded direct
1-1
Cl, FM 30-31

to the Commanding Officer, US Army Combat Virginia 22060. This action will facilitate review
Developments Command Intelligence Agency, Fort and followup.
Huachuca, Arizona 85613. Originators of pro-
posed changes constituting significant modifica- 'Arl-3. Definitions
tion of approved Army doctrine may send an The terminology used in this manual is consist-
information copy, through command channels, to ent with terminology contained in AR 310-25, FM
the Commanding General, USACDC, Fort Belvoir, 31-23, and FM 100-20.

Section II. BACKGROUND

★ l—4. General as a means of expanding their sphere of influence


and/or control.
jfa. Recent history has been characterized by
the frequent occurrences of insurgencies which
have usually taken place in developing and/or 'A'l—5. United States Policy
emerging nations as a result of having obtained i^a. The United States has long viewed an in-
independent status from a Colonial power. Fre- ternational community of independent, stable,
quently, such insurgencies have been Commun- peaceful, progressive, and free nations as the best
ist inspired or have become subversive in na- guarantee of its own security. For this reason
ture as Communist elements manage to gain con- the United States Government has undertaken to
trol of the movement and its leadership and ex- assist, upon request, certain newly-emerging na-
ploit the movement for their own purposes. Any tions in their development toward political stabil-
forecast of the future must consider the probable ity and economic and social progress. Many of
further spread of insurgencies among other these nations, however, are confronted with la-
newly-emerging and developing nations of the tent, incipient, or active insurgencies which in-
world. hibit their national growth and often threaten
their very existence. Such nations seek and re-
■^b. Insurgencies usually develop when discon-
ceive internal defense and development assistance
tent among the population of a country is not from the United States and other allies to protect
alleviated by appropriate government action. Gov- their societies from subversion, lawlessness, and
ernments, pérhaps unwittingly, may not respond insurgency as well as to free them from condi-
to such discontent in time to prevent its develop- tions which foster this unrest and instability.
ment into real or imagined grievances. Skillful
agitators may capitalize on existing conditions ★6. In response to requests for internal de-
and develop grievances when none originally ex- fense and development assistance, the United
isted. With organization and leadership, growing States provides selected nations a wide range of
discontent within a country may develop into assistance through its various governmental agen-
insurgency. (See appendix E for Insurgent Ac- cies and private enterprise. However, the assist-
tivity Indicators.) ance provided is predicated upon the require-
ment that any country whose security is threat-
■fac. An insurgency is often used as a tool to
ened and who requests assistance must assume
achieve power by the use of military, political, primary responsibility for providing the man-
economic, sociological, and psychological means power for its own defense. US Army resources
in an integrated attack on weak governments. may vary from provision of a few selected ad-
Insurgency must be properly recognized as a visors to provision of combat support and com-
major form of political/military conflict often re- bat service support elements.
quiring a major commitment of effort for success-
ful resolution. The main objectives of insurgen- ■jfc. Internal defense involves all measures taken
cies are the control of the people and the destruc- by a government to free its society from subver-
tion and replacement of the existing government. sion, lawlessness, and insurgency. While these
A combination of persuasion and frequent terror- measures will most probably involve some form of
ism is used to gain control of the people while military participation, internal defense is not
the government is destroyed by subversion, sabo- purely a military operation. Political, economic,
tage, and, if necessary, armed conflict. In recent and sociological factors influence military opera-
years the Communists have instigated or sup- tions at all levels. Consequently, all US military
ported insurgencies in many parts of the world intelligence personnel and agencies and their host
1-2
*FM 30-31

FIELD MANUAL HEADQUARTERS


DEPARTMENT OF THE ARMY
No. 30-31 WASHINGTON, D.C., 8 January 1970

STABILITY OPERATIONS-INTELLIGENCE

Paragraph Page
CHAPTER 1. INTRODUCTION
Section I. General 1-1—1-3 1-1
II. Background 1-4—1-7 1-1—1-4
CHAPTER 2. THE ENVIRONMENT
Section I. The insurgent armed elements 2-1—2-5 2-1—2-4
II. .Weather 2-6, 2-7 2-4
III. Terrain 2-8, 2-9 2-5
IV. People 2-10—2-13 2-6, 2-7
CHAPTER 3. INSURGENT CAPABILITIES
Section I. General 3-1—3-3 3-1
II. Basic capabilities 3-4—3-8 3-1—3-3
III. Supporting capability 3-9—3-13 3-
IV. Reinforcement capability 3- 3-4
CHAPTER 4. POTENTIAL INSURGENT VULNERABILITIES 4- 4-
CHAPTER 5. INTELLIGENCE REQUIREMENTS
Section I. General 5-1, 5-2 5-1
II. Requirements for preparedness 5-3—5-5 5-1, 5-2
III. Operational intelligence requirements 5-6—5-9 5-2, 5-3
CHAPTER 6. THE INTERNAL DEFENSE INTELLIGENCE SYSTEM
Section I. General 6-1—6-6 6-1, 6-2
II. Host country organization for internal defense operations 6-7—6-9 6-2, 6-3
III. U.S in-country intelligence structure 6-10—6-13 6-4, 6-5
CHAPTER 7. PRODUCTIONS OF INTELLIGENCE FOR STABILITY
OPERATIONS
SECTION I. General 7-1—7-3 7-1, 7-2
II. Planning the collection effort 7-4—7-10 7-2—7-6
III. Collection of information 7-17—7-22 7-11—7-14
IV. Processing of information 7-11—7-16 7-6—7-11
V. Dissemination of intelligence 7-23—7-25 7-19, 7-20
CHAPTER 8. COMBAT SURVEILLANCE AND RECONNAISSANCE
SECTION I. General 8-1—8—4 8-1, 8-2
II. Ground surveillance and reconnaissance 8- 8-3, 8-4
III. Aerial surveillance and reconnaissance 8-8—8-10 8-

CHAPTER 9. INTELLIGENCE TRAINING 9- 9-

CHAPTER 10. INTELLIGENCE COLLECTION OPERATIONS 10-1

APPENDIX A. REFERENCES ; A-l

B. TYPE COMMUNIST INSURGENT ORGANIZATION B-l—B-14 B-l—B-18

C. INTELLIGENCE REQUIREMENTS LISTING FOR


STABILITY OPERATIONS C-l—C-9 C-l—C-3

D. FORMAT OF AN INTELLIGENCE ESTIMATE FOR


STABILITY OPERATIONS D-l

E. INSURGENT ACTIVITY INDICATORS E-l—E-3 E-l—E-3

(g> \
*This manual supersedes FM 30-31, 12 September 1967.

AGO 7334A
I
FM 30-31

Paragraph Page

F. EXAMPLE OF A PARTIALLY COMPLETED


COLLECTION PLAN F-l
G. COMBAT SURVEILLANCE AND RECONNAISSANCE
REQUIREMENTS FOR STABILITY OPERATIONS G-l
H. TYPE INTELLIGENCE TRAINING PROGRAM FOR
STABILITY OPERATIONS H-l—H-2 H-l
INDEX Index-1

M AGO 7334A
Cl, FM 30-31

country counterparts are confronted with many ★&• Phase I. Subversion.


intelligence tasks which must be accomplished if ★ (1) Phase I insurgency varies from situa-
stability operations are to make a valuable con- tions in which subversive activity is only a po-
tribution to the success of the overall internal tential threat to situations in which subversive
defense and internal development effort. incidents and activities occur with rising fre-
quency in an organized pattern. Subversive acti-
vities are those actions designed to undermine the
★1—6. The Nature of the Insurgency military, economic, psychological, or political
ifa. General. In order to contribute to the de- strength of a regime. No major outbreak of vio-
struction of insurgency, the military intelligence lence or uncontrolled insurgent activity occurs
staff officer and military intelligence specialists during this phase. The beginnings of an insur-
must have a thorough understanding of the evolu- gency are difficult to recognize. Insurgent activi-
tionary development of insurgent movements. ties may appear as one of many legitimate party
While the nature of insurgencies varies in some activities or movements, such as loyal opposition
respects from country to country, certain pat- or social or religious reform. However, during
terns and similarities have been discerned. (See this development period, when forces of the
appendix E for Insurgent Activity Indicators.) movement are few, resources limited, and organi-
Three frequently overlapping phases have been zation and leadership uncertain, the insurgency
utilized as an aid in analyzing insurgencies. They is most susceptible to counteraction. Although
are discussed in b through d below. each particular
FM 30-31

insurgency will develop in its own way, a general (2) The insurgents embark upon a long range
pattern providing clues to its progress will exist. effort to alienate the people from the government
(2) Grievances, whether real or imagined, and to prevent the government from maintaining
will exist together with a lack of faith in the law and order and continuing nation-building pro-
ability or desire of the government to improve grams. The basic strategy is to force the govern-
conditions. A leadership appears which is capable ment to do everything everywhere at once so that
of crystallizing this discontent into an impulse for its means will be more quickly dissipated. The in-
action. An organization is established that is ca- surgents will concentrate their efforts to gain
pable of planning, coordinating, and executing ac- startling local successes at times and places of
tions. If the organization is outlawed, it goes un- their own choosing by enticing the government to
derground and continues to function. Equipment spread itself thinly across the land. They will seek
and supplies are stockpiled and hidden. Produc- to exploit every government weakness and to un-
tion or fabrication facilities are established for dermine or circumvent every government
future use. Such diverse items as food, firearms, strength. If the insurgency continues, the insur-
communications-electronics equipment, drugs, gents will seek to interrupt and frustrate the na-
leaflets, clothing, and fuel may be stockpiled, tion-building process while pointing to the govern-
locally or in adjacent countries. Literature is dis-ment’s lack of progress in this area as proof of
tributed and speeches are presented to arouse the government incompetence or insincerity. Like-
population and incite unlawful actions. Strikes, wise, the insurgents attack public safety and at-
work stoppages, demonstrations, parades, and tempt to break down effective law and order. This
other actions occur in the hope of intimidating the breakdown of law and order is very important to
government and further alienating the people the rate of spread of the insurgency. It creates
from the government. Riots and mass actions doubts concerning the government’s ability to per-
(which include violence) are planned to increase form its functions, injects fear into the minds of
the vehemences of feeling, to further intimidate people who want to support the government, and
the government, or to goad the government into encourages the active or passive support of the
responses which will alienate the people. Martyrs insurgency on the part of persons who fear for
may be created in the process. their own safety or who wish to be on the side of
(3) An attempt often will be made to over- the eventual winner of the struggle. The break-
throw the government through mass demonstra- down of effective law and order, provides the
tions and riots. Overthrow of the government is proper climate for successful insurgency.
easier if the insurgents gain adherents among the (3) Expansion into more violent and criminal
government elements, the military, the police, or acts against the government and the people re-
among other powerful government officials. The quires the formation of local militia-type military
insurgents may temporarily settle for achievement elements to engage in open guerrilla warfare. The
of some amount of representation within the gov- leadership element of the movement and the mass
ernment in the belief that the remainder of gov- of the insurgent organization will continue to
ernment leadership could be purged at a later remain hidden. This part of the movement has
date. Insurgent effort at this stage usually is or- been compared to the submerged portion of an ice-
iented against the existing government rather berg while the militia forces constitute the portion
than toward the population. If the insurgency is visible above the surface of the water. Military
not successful and develops into Phase II—addi- elements are used to accelerate the spread of the
tional organizational effort is required in prepara- underground organization, while the underground
tion for the ensuing long hard struggle. in turn accelerates the building of the militia
forces. The underground portion of the movement
c. Phase II: Guerrilla Warfare. directs political activities, consolidates control of
(1) Phase II occurs and
the populace, when the insurgent
reestablishes move-forces when
militia
ment, having developed sufficient organization, they are destroyed. The general pattern of the in-
leadership, and local or external support, initiates surgency during this stage is apparent in the fol-
organized guerrilla warfare and related forms of lowing activities :
violence against the established authority. The in- (a) Acts of sabotage will occur against
surgents concentrate their efforts toward the selected public and private facilities and will in-
people whom they must win over to gain more crease in magnitude and frequency.
support in the struggle. (b) Terrorism will spread and become se-
AGO 7334A 1-3
FM 30—31

lective in order to demonstrate to the people the (4) Insurgent, control of land areas will
merits of cooperation with the insurgent move- spread and the numbers and sizes of base areas
ment. will increase.
(c) Small bands of guerrillas appear in the (5) Foreign support of the insurgents may
countryside, particularly where the forces for law increase in volume and may become overt.
and order are weak and where the basic griev- (6) The insurgent political organization map
ances against the government are most pro- surface and appeal- for international-recognition.
nounced. Quick support of this movement by foreign coun-
(d) Guerrilla bases, (e.g., safe havens, tries who have been sponsoring the insurgency
storage points, training centers) begin to appear. can be expected.
(e) The pattern of gerrilla activity will in-
dicate that insurgent infiltration of the govern- 1-7. The Dynamics of Insurgency
ment has occurred and that the underground is
• a. The insurgency may not pass through each of
spreading its influence.
the three mentioned stages (para l-6b-d). When
(/) Guerrillas will attempt to infiltrate large elements of trained military and paramili-
radio stations for the purpose of broadcasting tary forces of the government are converted to the
propaganda.
insurgent cause, the insurgent leadership may
d. Phase III: War of Movement. The situation have the necessary strength to challenge the re-
moves from Phase II to Phase III when the insur- mainder of the government forces in open battle.
gency becomes primarily a war of movement be- The insurgents may train a well-equipped combat
tween organized forces of the • insurgents and force in foreign sanctuary and, thus, move quickly
those of the established authority. By this time into Phase III with little or no Phase II effort.
regular type military forces have been organized Furthermore, different phases may occur simulta-
on a regional and sometimes nationwide basis. The peously in different parts of the host country.
forces are larger and better equipped than the mil-
b. The insurgent leadership can reduce the level
itia although they often continue to use unconven-
of intensity'quickly and temporarily for tactical
tional guerrilla tactics in their military opera-
advantage. Such action may be taken to confuse
tions. The insurgents continue, to expand and per-
the government, to. make government efforts
fect their military organization and tactical capa-
appear ridiculous in the eyes of the people or to
bilities in order to eventually - achieve the capa-
reduce government pressure. Such action, how-
bility of standing up to the government in open
ever, may undermine the confidence of the sup-
combat. When strong enough, the insurgent forces
porters of the insurgency and be interpreted as a
may not always flee and hide from government
military forces, but may deláy in position for con- favorable government accomplishment by the
siderable periods of time and even deny' entry to people. Insurgent leadership, in retaining flexi-
particular areas to all but the' very strongest of bility and in view of the situation, may find it
government forces. Eventually, the insurgent may necessary to regress from Phase III to II, or from
engage the government fqrces in a decisive cam- II to I.
paign, or the insurgents may establish complete j c. The insurgency can be defeated at any stage
control in some portion of the country, and seek of its development. However, the earlier resolute
international recognition and the status of bellig-
internal defense and development programs are
erency for their government. The general pat-
established, the easier the insurgency can be pre-
tern of, activities and achievements during this
vented or destroyed. All insurgent movements have
phase includes the following : ■ '
exploitable weaknesses and vulnerabilities. Ener-
(1) Insurgent military forces, armed with
more sophisticated weapons and possessing im- getic nation-building programs combined with
proved means of communication and transporta- sound internal security measures can produce an
tion, will operate in larger units than previously. environment in which it will be impossible for in-
(2) Insurgent activities involving both small surgent activities to continue. (Nation building in-
and large unit operations will become bolder and volves a complex of interdependent economic, psy-
of longer duration. chological, political, and social changes. It includes
(3) Insurgent ability to coordinate many dis- thé development of the economic substructure nec-
persed activities and' to react quickly to dangers essary to meet the material needs of the people. It
or to exploit opportunities will increase. consists of the development of a social organiza-

1-4 AGO 7334A


FM 30-31

tion wherein people work in unity to achieve quently, any one insurgent effort may be less apt
common goals. This means, in many cases, a to take .antigovernment actions that could benefit
change in habits, loyalties, and thought processes other movements. A situation of this type offers
of people.) many possibilities for government exploitation.
When the insurgents lack the means to force a
d. It should be noted that several insurgencies final decision and the government is equally inca-
may exist simultaneously in the same country and pable or disinclined to defeat the insurgents, the
may operate at cross purposes to each other be- movement may continue over a number of years.
cause each maj^ desire to control a single national Such a situation is particularly characteristic of
movement. Each movement seeks to demonstrate movements by minority groups which are seeking
its own particular superiority over others. Conse- to separate from the established state.

AGO 7334A
1-5
I
il
!
Si

Á\

«I

t
\
II

i
Cl, FM 30-31

CHAPTER 2

THE ENVIRONMENT

Section I. THE INSURGENT ARMED ELEMENTS

★2—1. General scale, and “hit-and-run” tactics are deemphas-


★a. With the possible exception of the leaders, ized.
the insurgent is likely to be poorly educated and +0. The insurgent often is highly motivated be-
a part of the underprivileged group of a nation. cause of the nature of the cause for which he is
The low standard of living to which he is ac- fighting, excellent leadership, or because of the
customed has adapted him to privations. Al- intensive and continual political indoctrination
though he can be well-trained and disciplined, he he receives which promises relief from real or
will normally require strong leadership and su- imagined grievances and injustices. If the in-
pervision. He is intimately familiar with the ter- surgent’s tactics are successful, his morale will
rain on which he fights and has learned to use it remain at a relatively high level, particularly in
to his best advantage. His knowledge of the area the early phases of an insurgency. The insurgent
and its people together with his skill at melding may or may not be a Communist. The nature or
into his surroundings generally keeps him from directions of the insurgent cause may or may not
having to fight pitched battles. He is almost al- have a connection with a Communist cause and
ways a native of the country, and he generally may or may not in fact be connected with com-
relies on the populace for supplies, information, munism. In the case of a Communist supported
and other support. Outwardly, he is usually in- or instigated insurgency, the individual insurgent
distinguishable from the populace; he has the may not even know whether or not the Com-
potential of hiding his weapon and melding into munists are supporting his effort for their own
his environment. purposes.
★&. During the early stages of an insurgency d. The individual insurgent is distinguished
(latter portion of Phase I and during Phase II), chiefly by his skill at his own sort of fighting, his
the insurgent’s tactics emphasize a “hit-and-run” superb knowledge of the environment in which
technique; he masses sufficiently to insure suc- he lives and fights, and his devotion to the in-
cess, hits his target where least expected, and surgent ideal or cause. It must be remembered,
disperses immediately thereafter. The insurgent however, that the validity of any generalities
relies on flexibility and the use of surprise to concerning the insurgents will vary with the
compensate for his lack of numbers and equip- state or degree of education, training, organiza-
ment. His tactical doctrine demands that the ini- tion, equipment, and leadership which exists in
tiative be maintained. The insurgent doctrine the country concerned. Insurgent regular force
further requires that his intelligence be com- units may be introduced into the conflict in the
prehensive and accurate, for intelligence is con- late Phase II or early Phase III stages of the
sidered the key to success. If unexpected resis- insurgency. The organization and mission of these
tance is encountered during an operation, the forces may closely approximate the characteris-
mission is aborted and foreseeable defeat pre- tic of conventional forces.
cluded. Movement normally is accomplished dur-
ing the hours of darkness or during other condi- ★2—2. Organization
tions of poor visibility. The insurgent keeps his At the heart of some insurgency movements,
operations simple, thus reducing considerably the a tightly disciplined party organization may be
burdens of administration and logistics. In Phase found, structured to parallel the existing govern-
III (war of movement), the guerrilla will and mental organizations. In most instances this struc-
must accept battle in a relatively conventional ture will consist of committee organizations at
2-1
Cl, FM 30-31

levels paralleling the existing legitimate political terests, such as youth affairs, agriculture, civilian
structure. Intermediate echelons may be deleted proselyting, and materiel procurement. General,
from the party structure if the party leadership long-range strategic planning usually is performed
believes that it can adequately supervise and co- by the secret directing apparatus. The results of
ordinate the activities of subordinate committees this long-range planning are usually transmit-
from a national level. (See appendix B for an ted to the individual insurgent force in the form
example of a Communist insurgent organization.) of written orders. Operations are characterized
■feb. During a latent insurgency, the demands by surprise, swift attack, and rapid dispersal,
placed upon a typical political party, so far as and usually occur under conditions of reduced
administration and tactical adaptability are con- visibility. Much of the tactical training takes
cerned, warrant a relatively simple internal poli- place during actual operations, but considerable
tical organization. The party organization could attention is given at small unit level to pre-attack
consist of little more than the committee system rehearsals. Ideological indoctrination receives a
itself, plus such agencies or specialized personnel high degree of emphasis whenever the insurgents
as might be required for intelligence collection, reach a relatively safe position.
agitation, propaganda, and occasional strong-arm -&(4) Insurgent military forces often have a
activities. As the insurgency develops, however, much less sophisticated logistics system than con-
the need to establish a mass civil organization and ventional forces. When the insurgents are supplied
a military force dictates the creation of new through clandestine channels, the supply problem
echelons of authority and new organizations to may be complicated by the need for security;
accommodate them. Details concerning a type in- however, supply operations are made as simple
surgent organization can be found in appendix B. as possible. Insurgent military forces rely on
the people for logistical support and also obtain
supplies or equipment by successful attacks on
■^râ—3. Ê@mmeiifiidl smdl Staff
government forces or from external support pro-
a. The insurgent military organization is aus- vided by a sponsoring power.
tere and its structure simple. An actual physical (5) Insurgents may have an immediate and
installation for a headquarters may be nonexist- near total dependence on close and continuous
ent or of the most primitive type. The headquar- contact with the population. Winning popula-
ters personnel often fight alongside the rank and tion support is the key to success or failure of
file of the military force. The staff structure is an insurgency. Civilian proselyting sections or
often informal, but individuals within the force equivalent organizational elements are continu-
are assigned to perform roughly the same func- ally engaged in extensive political activities.
tions required of any military staff. Differences
between staff functions necessary in insurgent (6) Special staff activities of the insurgent
force organizations and conventional force or- armed elements can range from the austere to
ganizations generally are as follows : the complex. While medical care is often scarce
and primitive, extensive field hospital facilities
-&(!) The insurgents generally place little may still be found. Construction is kept simple
emphasis on the broad spectrum of personnel or avoided when possible. It is possible, however,
functions, however, recruitment and replacement that the insurgents will establish vast tunnel net-
do receive significant attention. The personnel works and underground facilities. Other insurgent
records maintained are limited, and the required
administration is conducted informally. The in- activities may be highly sophisticated. Financing,
surgent personnel functions dealing with disci- for example, can attain a degree of complexity
pline and morale are politically oriented. that includes formal taxation, issuance of war
bonds, and the printing of money.
(2) The intelligence function, on the other
hand, receives even more attention in insurgent (7) Insurgent communication will vary from
units than in many conventional military units. the use of couriers to modern radios. The com-
This is due to the clandestine, conspiratorial way munication nets will be relatively simple in op-
in which insurgents must live and operate. erations and procedures in the initial stages of
-5Îr(3) Insurgent planning often emphasizes insurgency. Subsequent stages normally will evi-
areas outside normal tactical planning. Even at dence more sophistication.
local levels the party chapter often maintains 'fab. One of the major characteristics of leader-
formalized sections dealing with long-range in- ship in an insurgency is its high quality and ex-
2-2
Cl, FM 30-31

treme degree of loyalty to the movement. This surgent force are exploited effectively without de-
key leadership is often provided by foreign pow- stroying the command structure of the estab-
ers for operations in the specific insurgency be- lished organization. Replacement of local leader-
ing developed. When a recognized major insurge ship with personnel from outside the area, how-
ent force leader lacks a military background, a ever, may create exploitable morale and disciplin-
sponsoring power may infiltrate qualified person- ary problems. Often, promising native leadership
nel to serve as his military and technical advisors. candidates are recruited, trained over extended
By so doing, the military capabilities of the in- periods of time, and then returned to

2-2.1
FM 30-31

their natural locale to assume responsibilities in (4)


the insurgent organization. Successful insurgent units, the insurgent forces are extremely flexible.
campaigns invariably have been characterized by They formulate short-range goals based on targets
intelligent and dedicated leadership. of opportunity or react to immediate necessity.
This flexibility permits the insurgents to adapt to
2-4. Tactical Advantages changing situations. They lose much of this flexi-
a. The advantages which insurgents hold in bility, however, when fighting in coordinated,
larger scaled actions. This loss of capability is
fighting against conventional forces arise from the
nature, composition, and organization of the in- brought about by the generally slow and primitive
surgent forces, as well as from the situations in communications systems which do not facilitate
which they operate. These strengths, or advan- rapid tactical adjustment to changing battlefield
situations. Thus, commitment of component ele-
tages, generally can be divided into two categories
—operations and intelligence. ments of larger units often is based bn detailed,
preconceived plans rather than on the tactical
b. The operational advantages of insurgents in- needs of the situation.
clude mobility, elusiveness, and flexibility.
c.
( 1 ) The small number of guerrilla forces and gence section of the insurgent armed elements
the lack of heavy equipment usually enhance their may be rudimentary, usually an excellent informa-
ground mobility. Because they have little equip- tion collection capability éxists. The fact that the
ment which they cannot carry with them, head- daily life of an insurgent is clandestine emphà-
quarters units can be moved readily. Their lack of sizes to each individual the need for information
vehicles does not hinder them, for they usually collection and security. The insurgent main forces
operate in areas not favorable to vehicular traffic. normally maintain close coordination with guer-
Their intimate knowledge of the terrain allows rilla and local force units to obtain intelligence. In
them to easily frustrate pursuers by choosing addition, the insurgent regular forces collect, pro-
routes especially difficult or hazardous for the op- duce, and disseminate this same intelligence in a
posing, often road-bound, government forces. manner similar to that of conventional military
(2) Unless modern communications equip- forces.
ment is obtained from outside sources or as a
result of capture of government equipment or 2-5. The Base Area System
equipment from other sources, the insurgents
usually rely on couriers or primitive signals for a. The insurgent must have resources, facilities,
communications. Examples of primitive signals and routes of communication, but, when the gov-
are the opening and closing of windows, the loca- ernment armed force is relatively strong com-
tion of tethered animals, or the arrangement of pared to the insurgent force, the insurgent must
laundry on rocks, bushes, and clotheslines. These design a system which makes him less vulnerable
signals are difficult for outsiders to detect, since to government attack. The insurgent solution is
they blend so completely with the environment. the development of a base area system.
Furthermore, they are quite flexible. The signal b. A base area is an element of a system of
which serves one day as a danger signal may be an urban and rural bases tied together into'a func-
all-clear signal the next day. tioning whole by a network of roads, paths, com-
(3) Insurgents are usually native to the areas munications, couriers, and radio links. This
in which they fight and have many contacts among system may extend to neighboring countries and
the population.' Thus, many of the populace can be may remain in use throughout the insurgency. It
expected to serve as sources of information and has flexibility so that the loss of a singular base or
warning, as well as provide members of the insur- section does not jeopardize or compromise the
gent forces with hiding places, food, and cover entire system. It provides lodging and rest areas
stories. This permits insurgent forces to disband for units in motion, cached supplies of food and
and merge with the civilian population when nec- munitions, routes, communications, transit points,
essary. The headquarters equipment and records, staging areas, and medical facilities. In the more
along with weapons, may be cached while the in- remote regions, facilities for training and for
surgents are not active, using their knowledge of weapons manufacture and repair are included.
the area and the help of the people to elude their The urban insurgent has all these services around
opponents. him and requires only minimal other facilities
AGO 7334A
2-3
FM 30-31

such as a basement or small cache site. On the mary operating system functions within and near
other hand, the secretive movement of bodies of the populated areas where support and assistance
troops, the need for assembly areas, the span of is provided as a result of the insurgents’ carefully
time required to mass foot-mobile elements, and prepared plan to avoid prolonged conflict. The con-
the need for communications systems to relay figuration of the terrain is used to advantage, par-
orders and intelligence require a labyrinth of re- ticularly those features which handicap govern-
sources, areas, and control. The routes are an or- ment forces. While the insurgent fighting unit
ganic part of the overall system. They do not nec- may have both time and manpower, when it fights,
essarily connect by the shortest route, but rather, it does so in or near a base area, wherein any
by a secure one. given tactical engagement, it is generally bound
c. In order to maintain sustained operations, a by time and space limitations. It is therefore im-
base area is obviously necessary. Further, because perative to the insurgents’ survival to avoid deci-
the population is the object of the insurgency, the sive engagement with superior government forces
base area system must allow access to the popula- unless his battlefield has been thoroughly pre-
tion and must, sooner or later, incorporate popu- pared. Tedious hours are spent on plans and re-
lated areas, the so-called “liberated areas.” Once hearsals for attack, withdrawal and counterat-
the insurgency is underway, the government and
the insurgent are competing for the same re- tacks. Positions are prepared well in advance and
sources. The effect of this competition on the gov- thoroughly camouflaged. These elaborate prepara-
ernment is powerful. If resources accrue to the tions require a scale of manpower available only
insurgent, the relative strength ratio between the in the local population. When he has support of
government and the insurgent changes signifi- the population, he enjoys decided advantages over
cantly. The base area system is far more elaborate the government forces, particularly in the field of
and complex than is normally realized. While intelligence. To a large extent, therefore, the rela-
myths grow about secret bases in remote moun- tively high degree of mobility of the insurgent is
tainous areas and impenerable jungles, the pri- dependent on the base area systems.

Section II. WEATHER


2—6. General and use such effects to his advantage. Harvest
A wide variation of climatic and weather condi- time, whether once or twice a year, influences both
tions may be found among developing nations. The the insurgency and internal defense operations.
economics, customs, and traditions of developing The production of food is important and large
nations are strongly influenced by climatic condi- forces are often required for harvesting as well as
tions. For example, in some areas of the world, a protecting the harvest. The internal defense
rainy season extending over a number of months target analyst must consider these factors in de-
adversely affects the economy. During this period termining such objectives as when to destroy the
little, if anything, is done to improve economic insurgent’s food crops.
conditions or to satisfy the basic needs of the so- 6. Many likely areas of insurgency have two
ciety. Lethargy may be prevalent among the predominant seasons—dry and rainy. This per-
people and their leaders. On the other hand, in mits more accurate and reliable long-range
weather forecasting. It also requires constant
some areas of the world, the rainy season makes
possible the planting and growing of basic food réévaluation of terrain trafficability because ter-
crops. In these areas the wet season is a boon to rain which may support tank traffic during the
the economy. dry season may not even support human traffic
during the rainy season.
2—7. Considerations c. A weather advantage enjoyed by the insur-
a. Tropical or hot and arid climates are charac- gent, for example, will appear to opposing forces
teristic of many counties which are considered as as a disadvantage and an increase in the number
likely areas of insurgency. Tropical-type weather of nonflying days or days in which vision will be
gives a particular advantage to an insurgency. It limited to some degree. The impact of these non-
usually permits the insurgent to live off the land flying days, or days of limited visibility, will di-
the year around and minimizes the effects of expo- rectly affect the use of visual observation by the
sure. Because the insurgent fights when and where opposing forces and, in so doing, increase the reli-
he chooses, he can exploit the effects of weather ance which must be placed on other sensory

2-4 AGO 7334A


Cl, FM 30-31

•^■means. Since climatic conditions vary from na- upon request through the command Weather Of-
tion to nation, National Intelligence Summaries, ficer from the USAF Air Weather Service.
area handbooks, and USAF Air Weather Service i^d. Hot and extremely humid weather may
climatic summaries should be consulted to deter- weaken personnel and have an adverse affect on
mine the details of weather and climatic extremes materiel. Hot, dry climates in desert areas may
which will affect the employment of US forces also have weakening effects on personnel and
present serious problems in equipment mainten-
and planning assistance programs to the host ance. Health hazards, such as malaria, dysentery,
country. Also, special climatic studies for specific parasitic infections, and others, present addi-
countries, areas, or operations can be obtained tional difficulties.

Section III. TERRAIN


2-8. General so that the insurgents cannot reestablish or con-
tinue insurgent activities.
ifa. Insurgent forces exploit the geographical, as
well as the political, sociological, economic, and
psychological conditions of the environment. Of-
ten the terrain is rugged and difficult to negotiate. 'A'2—9. Environmental Considerations
Inaccessible mountains, swamp areas, rain for- Terrain characteristics which must be consid-
rests, or uncharted wastelands affect internal de- ered during stability operations planning include
velopment as well as military operations. Com- the following:
munications and transport systems in most de- a. Dense jungle with undergrowth and can-
veloping nations rarely are equal to the require-
ments of internal defense and internal develop- opy overgrowth reduces ground vehicular mobil-
ment operations. Thus, insurgents are able to ity, adversely affects aircraft operations, and pro-
capitalize on these geographical conditions by vides concealment for insurgent forces from
their small lightly equipped operational units ground and aerial observation and cover from
which are not dependent on sophisticated logis- superior firepower. In order to attack the in-
tical supply lines. surgent effectively, friendly forces have a heavier
burden of finding and fixing the insurgent than
b. A host country may in conventional
contain a wide
warfare.
varietyThe navigation of ob-
of terrain features. Operations must be conducted servation or reconnaissance aircraft to target
in areas which vary from high mountain ranges areas will be difficult. The determination of the
to inundated areas, from desert to thick jungles geographical location of detected targets also will
and rain forests, and from relatively open be difficult.
plains to rugged mountain ranges. The terrain
in each area presents significantly different prob- b. Swampland, river deltas, and valleys which
lems in supply, transportation, maintenance, are flooded during the rainy season, and dense
medical support, and other logistical services. networks of rice paddies in river valleys and low-
land areas may be difficult to traverse. Canals
j^c. Efforts should be constantly directed to- and rivers are the “roads” and “highways” of
ward gaining and maintaining familiarity with this type of area.
the region. Such efforts include habitually em-
ploying forces in the same area, integrating as- c. Poor trafficability for vehicles and heavy
sistance activities into the activities of the popu- weapons which limits cross-country movement
lation, and continually collecting information to may prohibit or severely reduce the use of
obtain complete intelligence of the area. sophisticated equipment. Limited roads and ter-
rain approaches may also channelize trucks and
★Æ In the early phases of an insurgency, opera- tracked equipment.
tions are rarely conducted to seize and hold ter-
d. Terrain and atmospheric conditions may
rain objectives. Internal defense and internal de-
velopment operations are conducted to destroy the limit radio communications.
insurgent organization and to control and secure e. Mountainous terrain with rain forest type
the population. When population centers are vegetation may prevent ready accessibility to an
seized, every effort must be made to secure them area.
2-5
Cl, FM 30-31

■&/. The vegetation of an area may not only problem to movement over glaciers and ice cap
provide concealment to the insurgent, but, to- areas is crevasses, special crevasse detection
gether with the animal life, increase the ability equipment, should be used.
of the insurgent to live off the land.
The following field manuals should be con-
Forested areas often present an obstacle to sulted for detailed information on the respective
movement, particularly in deep snow cover. terrain :
FM 31-25 Desert Operations
■fch. In arctic or subarctic areas, tundra, FM 31-35 Jungle Operations
ice, muskeg, grassland, semi-desert or mountains FM 31-71 Northern Operations
provide challenges that affect military operations FM 31-72 Mountain Operations
in a variety of ways. Since the most serious FM 31-75 Riverine Operations

Seefîi@irD IV. PIOPIU

2—1! ©eraeraD strate economic progress. Civil affairs opera-


tions and psychological operations in support of
•fea. Control of the populace is a primary aim of
this objective are important aspects of stability
insurgent organizations. Once this is accom-
operations.
plished, the government usually will fall. Con-
versely, government internal defense efforts have
the purpose of separating and protecting people 2—11. Considieiraiteins
from the insurgent. The success or failure of an a. The developing nations are undergoing rapid
insurgency depends substantially upon the atti- changes associated with modernization. The proc-
tude of the population. The possible effect on the ess is often a source of tension. The people who
people of any action must be carefully assessed resent the loss of traditional ways and values
and immediate gain versus long-term loss evalua- may become alienated from the government.
ted. Those portions of the population, not benefited
by the change, envy those of the same element
'¿V&. Subversive organizations exploit the dis-
content of the population. Consequently, most within the population who are benefited. The
upper strata of society who anticipate loss of
insurgencies are supported by the disenchanted
status may resent the new developments. Seg-
elements of that society. Because of this identity
factor, the organized cadres of full-time military ments of society which favor change in a differ-
and paramilitary insurgent units frequently are ent manner, or by different processes than those
able to blend into the population when necessary. proposed or accomplished, may press for their
own programs. For these reasons, while the na-
c. Insurgent activities, including terrorism, tional government process brings the promise of
sabotage, subversion, espionage, raids, and am- eventual internal peace and a common national
bushes, are conducted by the insurgent from identity, its short-term impacts usually involve
within the structure of society. For this reason, the further increase of internal pressures. The
detailed knowledge of the population in an in- potential for insurgency lies in these dissatisfac-
surgency area is a definite requirement in order tions and grievances.
to analyze and evaluate insurgent activity.
b. People residing in sparsely settled areas are
i^d. There is often no mutually shared national strongly influenced by their immediate environ-
identity between the government and the popula- ments—such factors as family relationships and
tion in areas affected by insurgencies because factors related to obtaining food, clothing, and
some governments are new and undergoing shelter.
rapid change. There is seldom a national tradi-
tion or heritage to act as a unifying force. It is c. The racial stock and physical characteristics
necessary, therefore, that a strong and proud of the area population are important considera-
national identity be quickly developed to provide tions. A tendency exists among the populations
a cohesive force for unifying the government of developing nations to fear and distrust per-
and the population. Governments seek to accom- sons who are not of their own race.
plish this by implementing measures that will d. Ethnic groups, especially those constituting
develop political and social cohesion and demon- minority factions, are of prime consideration.

2^^
Cl, FM 30-31

Ethnie groups may be either a source of discon- United States and allied nations may create addi-
tent or of major assistance depending upon the tional social and economic problems and antagon-
amount of discrimination or persecution which isms.
exists. Where the antagonism between the govern- /. Some developing nations are reaching, or
ment and minority faction is not immediately have gone beyond, the population saturation point.
reconcilable, the US or allied forces may provide Many of these nations cannot feed, clothe, employ,
advisory elements to assist in gaining the support or otherwise satisfy even the basic subsistence
of these groups. However, the ultimate solution needs of their populations. Compounding this
to this complex problem must be a lasting re- problem is the fact that the econmic growth rate
conciliation between the government and minority normally does not keep pace with the rate of pop-
groups. ulation increase.
e. The introduction of large numbers of mili- g. The population saturation point may occur
tary and civilian assistance personnel from the in certain geographical areas within a developing
/■
FM 30-31

nation. For example, local, primarily urban areas The government leaders in many developing na-
frequently are overpopulated because of the mi- tions may not take positive actions to increase the
gration of rural populations or refugees to urban confidence of their people in the government’s
areas seeking employment or refuge. ability to correct poor social/economic conditions
and to provide security from insurgent attack and
h. Government structure is frequently poorly
intimidation.
organized at the local (village, hamlet) levels.
Community organizations usually are incapable of 6. Poor sociological and economic conditions in
coping with the process of modernization. Civic the nation foment dissatisfaction among the poor-
leaders adequate to handle the operations of gov- class population. Insurgents promise change in
ernment in the traditional society, usually are prevailing conditions and a batter way of life in
unable to function in a developing society. These general. These promises may include the supply of
leaders often lack the education and motivation basic needs, food, and land reform.
required to effectively govern their transitional so-
cieties. Subversive insurgency movements pose c. Traditionalism often will adversely affect eco-
particularly acute threats at the local levels be- nomic progress and social reform in developing
cause of the lack of native expertise and resources nations. Governmental departments may formu-
to counter such threats. late adequate general plans for economic progress,
but take little effective action to achieve goals. In-
i. Varying problems concerning religion may dividuals may undertake the management of
also afflict a developing nation. In some developing public enterprises only because they see them as
nations, one religious organization predominates; means of benefiting their relatives and friends.
in others, religious fragmentation prevails. In What may seem like graft is, to them, the fulfill-
most of these nations, religion and religious or- ment of traditional family loyalties and moral ob-
ganizations exert an extremely strong influence on ligations. Other individuals are earnest, but lack
their adherents and through them can have a con- initiative because they have traditional, unques-
siderable effect on national affairs. Religious or- tioning respect for the opinions and ways of their
ganizations may substitute for, supplement, or elders. Additional factors affecting attitudes may
compete with, the established national political, include—
economic, military, and social organizations. If re- (1) A widespread sense of injustice; lack of
ligious friction already exists between different means of redressing individual injustices.
religions or between religions and government,
(2) Lack of a dynamic ideology.
the insurgents may attempt to expand and nurture
this discontent. (3) Low national morale.
(4) Poorly motivated civil and military es-
j. Most developing nations contain numerous tablishments.
minority groups, who may speak a language or (5) Dislike and distrust of government au-
dialect different from one another and from the thority as alien and remote to their vital interests.
language of the majority. Although the urban elite
may be multilingual (as a result of having been
educated outside the country), the more remote 2-13. Insurgent Exploitation
rural segments of the population probably will not a. In conventional warfare the intelligence
be multilingual. effort is directed primarily against the enemy mil-
itary forces. The enemy is easily recognized by his
k. A majority of the population is likely to be uniform, is called a prisoner of war, and is
illiterate. National education programs may direct granted protection under the articles of the
children to attend school (partly to instill national Geneva Convention. He is of value to intelligence
consciousness), but other considerations such as personnel because of his ability to provide, among
lack of teachers, facilities, and transportation, and other things, order of battle information. Nor-
the need for youth to help in the production of mally, the nature of conventional warfare re-
food usually will reduce the effectiveness of these stricts the civilian population’s ability to gain in-
programs. formation on the enemy’s forces, capabilities, and
objectives. Victory is dependent upon seizing and
2-12. Psychological Consideration holding terrain, superiority in firepower, destruc-
a. In some developing nations, the people may tion of the enemy’s military organization, and his
not be motivated to fight subversive insurgency. capability to wage war. The civilian population in

AGO 7834A 2-7

/]
FM 30-31

such a conflict is considered of secondary impor- taxation, kidnapping, terror ; various forms of aid,
tance for intelligence exploitation, although it is rewards, and promises; and the stated belief of
of value to the counterintelligence effort. sonie that he, the insurgent, offers a “better life.”
b. In an insurgency, however, the civilian popula- To foster unrest and mistrüst, he plays ethnic, re-
tion is the primary objective, and in the final anal- ligious, linguistic, and socioeconomic differences
ysis, victory or defeat is totally dependent upon of people against each other. The insurgent first
the degree of support of the people to one side or attempts to organize in those areas where the gov-
the other. The political struggle is born within the ernment has failed to associate or identify itself
population and is fed by the population’s griev- with its people. He initiates actions to force a com-
ances against the defactd government. This polit- plete breakdown of the governmental apparatus,
ical struggle is organized and directed by those and then proceeds to fill the vacuum thus created
seeking power through the destruction of the gov- with his own political organization. The insurgent
erning political organization. Basically, the face of will constantly attempt to impress the population
insurgency is national rather than international, with his superiority over the established govern-
although external support may be provided. The ment. He directs his efforts to changing the social
inhabitants participate in, as well as suffer from, structure initially at the grass roots level and then
the hardships of the struggle. attempts to assume the role of the government
c. Insurgent organizations in their “wars of lib- through control of the primary groups within the
eration” have defined as the highest priority the social structure since they have the strongest in-
gaining of support of the rural population. fluence on attitudes within the total society. The
insurgent attempts to control existing primary
d. The people represent the insurgents’ logis- groups (such as teachers, political, religious, trade
tical base, intelligence system, and military and union organizations, etc.), destroy those that
political organization. He motivates them and ob- cannot be controlled or used, or create primary
tains their support through propaganda, illegal groups as control mechanisms.

2-8 AGO 7SS4A

k
FM 30-31

CHAPTER 3
INSURGENT CAPABILITIES

Section I. GENERAL

3-1. Introduction mount large offensive operations will still exist al-
though insurgent operations may continue for
a. Intelligence planning must permit assessment
weeks or months at a lesser degree of tactical ac-
of insurgent capabilities as well as a determina- tivity. Intelligence planning in de-escalation situa-
tion of insurgent vulnerabilities. This chapter will tions must be thorough and accurate and fully
discuss insurgent capabilities. Chapter 4 discusses support government efforts leading to the ultimate
insurgent vulnerabilities or weaknesses. All insur- destruction of the insurgency.
gent courses of action will have the ultimate goal
of destroying the existing government. However, 3—2. Analysis of Insurgent Capabilities
during Phase I the insurgent movement may at-
tempt to establish a united front government and Any analysis of insurgent capabilities must meet
progress to an overt or conventional military pos- the following criteria :
ture in Phase III if the attempted “peaceful” over- a. The capabilities must be presented in relation
throw of the government fails. It is essential that to the mission of the host government and allied
internal defense intelligence agencies gain infor- forces.
mation on the political party or parties that the
insurgent movement supports, the amount of in- b. The capabilities must encompass all possible
fluence which the insurgent exerts, and the sub- insurgent courses of action, whether directed at
stance of the insurgent movement in overt nonvi- the people or the forces of the government.
olent attacks against the government. While intel- c. The capabilities must be described completely
ligence efforts are directed primarily toward the and in sufficient detail to permit planning for in-
obvious area of direct insurgent activity, efforts ternal defense and development operations.
should also include other areas in which insurgent
influence may appear indirectly. 3—3. Capabilities
b. Intelligence planning must also consider situ- For the purpose of analysis by intelligence per-
ations in which resolute friendly actions have re- sonnel the capabilities of the insurgent can be
duced insurgent capabilities and a de-escalation of classified into three broad areas : basic, supporting,
insurgent warfare takes place, i.e., from a Phase and reinforcing. Activity aimed directly and
III to Phase II, or a Phase I situation. Such a immediately toward the destruction of the govern-
de-escalation must be carefully distinguished from ment is termed a basic capability. Supporting ca-
one in which the insurgent movement deliberately pabilities are those which pertain directly to
reduces its actitivy for a temporary period to suit maintenance of insurgent’s activities and only in-
its own purposes. In the first situation, the insur- directly to the downfall of the government. The
gents may no longer have the capability, for ex- insurgent’s ability to protect his organization
ample, to mount regimental sized tactical opera- from government penetration is an example of a
tions because of combat losses sustained in earlier supporting capability. Reinforcing capability is
engagements with friendly forces. In the latter the ability of the insurgent to concentrate on or
situation, the capability of the insurgents to reinforce his efforts in one area of activity.

Section II. BASIC CAPABILITIES

3-4. General elude nonviolent action, terroristic activities,


Basic capabilities available to the insurgent in- guerrilla operations, and conventional tactical op-
AGO 7S84A (
3-1
FM 30-31

erations. If one course of action becomes ineffec- the improved economy. The national and local tax
tive, the insurgent will attempt another. These ac- structure, mqnetary policies and import-export
tions will tend to be cumulative, however, rather tariffs may be subverted in order to provide
than a substitution of one for another. In the later sources of revenue for insurgent operations or to
stages of an insurgency the enemy will be capable provide a basis for characterizing the existing
of conducting all four types of activity simulta- government as inefficient and corrupt. Insurgent
neously, with variations, in different parts of the psychological operations may be used, to reduce
country depending on the comparative strengths popular confidence in the existing currency. Actual
of both sides and other environmental influences. counterfeiting of the currency may also occur.
c.
3—5. Nonviolent Action to exploit those traditional social and behavioral
Nonviolent actions will be directed toward patterns of the people which further their inter-
bringing about changes in the political, economic, ests. When such measures fail, the breakdown of
and social framework of the society—frequently these patterns normally will be attempted in order
through psychological means. In t-Jiis manner the to create instability. A rising crime pattern or in-
insurgent will attempt to influence the opinions, surgent agitation to create religious unrest is to be
attitudes, feelings, and drives of friendly, hostile, expected. Social organizations may be infiltrated
and neutral individuals to bring about behavior to gain close contact with the people and to exploit
favorable to his objectives. During Phase I (sub- both the resources and influence of those organiza-
version) mental and emotional persuasion is the tions which can further insurgent objectives. Ex-
primary weapon of tlie insurgent. Nonviolent isting grievances are identified and new ones
action, however, can be expected to continue created in the minds of the people. Unrest is pro-
throughout the life of the insurgent movement, moted through agitation and propaganda. The in-
i.e., throughout Phases II and III. surgents may engage in actions in direct opposi-
tion to the rules of society for the specific purpose
a. Political. The insurgents will attempt to. in- of breaking down cultural values, thus bringing
fluence the direction, control, and authority exer- about instability.
cised over the nation as a whole and the adminis-
tration of the political system. Insurgents will be 3-6. Terroristic Activities
active in areas of political appointments, politifcal If nonviolent methods do not accomplish the de-
organizations, political education, and judicial en- sired goals, the insurgents may resort to harsher
actment. They may resort to subverting the gov- measures to bring about submission and coopera-
ernment through elections in which the insurgents tion with their demands. Terroristic activities are
cause the replacement of an unfriendly'govern- particularly useful for gaining control over the
ment official with one favorable to their cause. In- populace. Terror may be applied selectively or in-
surgent activity will include provision of cam- discriminately. Selective terror is directed toward
paign funds, provision of publicity, assistance in an individual or a small segment of the society.
membership drives, and organization of political Indiscriminate terror, on the other hand, involves
rallies for their candidates. Bribery may be' at- the whole population and serves to further dis-
tempted, and informants máy be placéd in key credit the government while at the same time
areas to counter government action. Propaganda giving a magnified aura of power to the insurgents.
attacks may be launched to.discredit and ridicule Confidence in the government is undermined when
political leaders or government officials. In addi- no protection is provided. The capability of the
tion, insurgent leaders may enter political contests insurgent to engage in terroristic activities may
as candidates for government office. ’ be one of the direct determinants of the govern-
b. Economics. The insurgents will attempt to ment’s internal défense policy. Aside from the ob-
affect the production, distribution, and consump- vious use of torture, murder, extortion, and kid-
tion of resources within a country in an effort to napping, the use of sabotage is one of the most
further impair the effectiveness of the govern- effective methods of creating havoc. Terroristic
ment. Economic influence may emerge in the form activity is extremely difficult to prevent.
of boycotts, strikes, riots, or it may be in the form
of civic action designed - to improve a local 3-7. Guerrilla Operations
economy with the purpose of winning the alle- a. The insurgents normally will use terror as
giance of the people or to share in the products of one of their main weapons during any phase of
3-2 AGO 7334A
FM 30-31

the insurgency, but insurgents do not engage in government’s ability to close with and destroy the
guerrilla operations until they have developed a insurgents. The ability to temporarily withdraw
military'capability of at least squad or platoon from contact, regroup, and redirect effort to an
size. This growth in strength usually indicates the area where government forces are weak is one of
beginning of Phase II of insurgency development. the inherent advantages of guerrilla warfare and
Often activities will be initiated against transpor- must be considered along with each of the previous
tation arteries. Their primary effect is to inter- capabilities discussed.
rupt supply and communications lines to prevent
adequate supply of government forces. By cutting 3—8. Conventional Tactical Operations
telephone lines, stealing wire, and destroying tele-
phone poles in places to which1 access is difficult, The insurgent’s capabilities in the field of conven-
the insurgent may deny communication through tional tactical operations can be considered from
an area as effectively as if he were occupying and the viewpoint of his ability to attack, defend, or
defending that terrain with a large body of sol- withdraw when opposed by conventional host gov-
diers. Roads may be blocked or damaged, bridges ernment or allied forces. Each of these capabilities
destroyed, and railroads and airfields damaged.. can be further divided into more specific courses
cf action as stated in FM 30-5. The insurgent’s
b. While harassment, destruction, and interdic- capability of conventional tactical operations is
tion operations are of an aggressive nature, the determined in the light of the current intelligence
insurgent’s capability of dispersion enables him to on the insurgent, the capabilities of the govern-
avoid contact with superior government forces. ment forces, and the effect of the characteristics
This in itself is an operation in that it is as care- of the environment upon both of these. In general,
fully planned as the aggressive tactics that pre- the employment of large insurgent forces in con-
cede it. If correctly implemented, this insurgent ventional tactical operations would indicate that
capability directly and significantly defeats the the insurgency has progressed to Phase III.

Section Ilf. SUPP ING CAPABILITIES


i
f

3-9. General strive to attain an optimum balance between this


The support capabilities of the insurgents can be requirement for expansion and the necessity of
categorized into five general areas—intelligence maintaining security. This will involve varying’
and security; recruitment and retention; organi- the sizes and patterns of organization of their
zation and training; finance and logistics; and forces.
communication. The insurgent’s basic capabilities
are directly dependent upon his ability to commu- 3-11. Organization and Training
nicate; gain intelligence; and protect, develop, and The insurgent leaders must possess the ability to
supply his own organization. create an effective organizational structure. Once
nuclei have been firmly established and member-
3—10. Intelligence and Security ship in the insurgent movement increases, expert
abilities are required to unify the efforts of the
a. General. Intelligence and security are abso- different elements of the movement into a single
lutely essential for the insurgent’s survival. The complementing force. In addition to continuous
insurgent must gain intelligence of his enemy and political indoctrination and' leadership training,
secure himself from capture and neutralization. training programs are required for specific seg-
As the conflict progresses the insurgent’^ needs ments of the insurgent movement, such as political
become more detailed. . ■• activists, intelligence personnel, propaganda speci-
r '

b. Recruitment and Retention. The insurgent alists, and saboteurs. Basic subversive, terroristic,
possesses a capability of recruiting and retaining and guerrilla techniques are taught to all elements
personnel. As the scope of insurgent, operations with emphasis on the techniques of most current
widens, the conflicting needs of security and ex- importance.
pansion cf the organization become more acute.
Aggressive recruitment is essential for the attain- 3—12. "Finance and Logistics
ment of expanded objectives, while security is es- Through finance and logistics activities the insur-
sential to survival. As a result, the insurgent must gent develops a capability of supplying and
AGO 7334A
3-3
FM 30-31

moving his forces. Supply items to include food, taxation of the population and sale of food crops
paper for written propaganda, communication in areas under insurgent control, to extortion of
equipment, weapons and ammunition, clothing, business and shop owners.
and medical supplies must be obtained. The insur-
gent has many techniques to obtain financial as- 3-13. Communications
sistance both from within and outside the country.
His capability to effectively employ these tech- The ability of the insurgent to communicate is es-
niques provides the foundation of his logistical sential to the success of his mission. At least a
ability which in turn provides the necessary mate- small nucleus of insurgents must be well trained
riel to enable the insurgent to engage in specific in communications. The communications equip-
courses of action. The insurgent’s financial sources ment employed by the insurgents varies in quality
from within the country may range from special and use.

Section IV. REINFORCEMENT CAPABILITY

3—14. General 3-15. Reinforcement


The insurgent’s reinforcement capability is predi- Reinforcement can be made for any activity,
cated on the mission and the availability of man- whether it be basic or supporting. During a time
power and other resources. At any given time the when nonviolent techniques are being employed
insurgent may increase his effort in any limited the insurgent may reinforce his political action
number of activities—by either increasing the elements. However, the effect of such reinforce-
manpower devoted to these activities, giving them ment on his economic, sociological, organizational,
greater attention, or devoting more material and and logistical activity must be considered. De-
supplies to those actions. pending on the insurgent’s resources, and the rela-
tionships among the above activities, action in
these areas may be severely limited during the
period of reinforced political action.

AGO 7834A
3-4
FM 30-31

CHAPTER 4
POTENTIAL INSURGENT VULNERABILITIES

4—1. Exploitative Weaknesses 4—3. Insurgent Intelligence Needs


a. The detection and exploitation of insurgent Timely and accurate intelligence is always of
weaknesses are necessary to success during great importance to an incipient insurgent move-
internal defense intelligence operations. This ment, but it is especially critical during Phase I
chapter presents in broad form the common, in- when the movement is weak and most vulnerable.
herent weaknesses of insurgent forces and dis- During Phase I, the major insurgent efforts are
cusses their potential for intelligence exploitation. directed toward subverting neutral or progovern-
The insurgent is often conscious of such weak- ment people and organizations, establishing bases
nesses and may partially correct them or attempt of operations, developing an intelligence collection
to conceal them, but no matter what form his de- system, and strengthening insurgent leadership
fensive measures take the insurgent’s basic weak- and control elements. The insurgents’ success in
nesses cannot be completely eliminated. winning adherents to the cause will be directly
related to their ability to collect information they
b. It is not possible to comprehensively list
every weakness associated with'insurgent forces. need to further the growth of the movement. At
this stage, the insurgent intelligence system is de-
For this reason the matters discussed in this
chapter are general rather than definitive in pendent almost entirely on human sources as a
nature. Details of insurgent weaknesses which means of collecting information. The information
is gained more through simple, unobtrustive ob-
pertain to a specific region of the world must be
servation by nets of spies, informers, and agents
developed by intelligence officers assigned for duty
rather than by sophisticated means such as radar,
in that region. When considered individually, cer-
aircraft, and photography.
tain insurgent weaknesses may not seem to be ex-
ploitable. The intelligence officer can narrow the
4-4. Insurgent Intelligence
search for hard evidence through analysis of pat-
Communication System
terns of behavior.
The insurgent intelligence communications system
4-2. Insurgent Base Area System uses couriers or messengers and intermediaries or
hiding places to securely transmit information, in-
a. The base area system itself is a vulnerability. telligence, operational documents, and funds.
The physical characteristics of the system and Friendly counterintelligence activity must first be
known insurgent activities can be mapped and, directed to identify and locate these couriers and
given sufficient knowledge of insurgent methods sites and then to neutralize them. Neutralization
and tactics, deductions can be made about insur- —severing the links between its echelons—will se-
gent courses of action. verely damage the entire insurgency movement.
COMINT exploitation of insurgent wire and radio
b. The insurgent mobility is less a matter of
light equipment and fleetness of foot than it is the communications is performed to gain insight into
the intelligence apparatus.
use of sound plans offering multiple courses of ac-
tions because the ground has been prepared. The
simple fact that the insurgent commander knows 4—5. Insurgent Organizational Structure
where to go while the government forces do not is a. Command and control over the insurgent mil-
a decisive advantage to the insurgent. The insur- itary structure usually is exercised by political or-
gent loses this advantage to the degree that the ganizations at each operational echelon. This type
government commander is able to deduce and re- of organizational doctrine is discussed in detail in
strict the insurgent’s options in using the facilities appendix B. An interlocking structure in which
of the base area system. key personnel hold dual or multiple positions in
AGO 7834A 4-1
FM 30-31

several organizational elements of the movement, populace may tend to alienate the insurgents from
tends to defeat insurgent practices of compart- the people. Internal defense intelligence can ex-
mentation for security purposes. Intelligence on ploit such a situation. Information on supply re-
one cell in the party can often lead to intelligence sources, identity of supporters, supply shortages,
on parallel cells. caches, and supply bases and routes can be ob-
b. Frequently the leaders of each echelon of an tained more readily.
insurgent organization are better trained and b. During Phase III the insurgent forces may
better qualified than those of the government. require considerable logistical support from ex-
Their removal will have a detrimental effect on ternal sources to meet the demands caused by
the functioning of the units. The identification of large scale combat operations. Many items must
the commander, then, is a prime goal for internal be transported illegally into a target country.
defense intelligence operations. Intelligence anal- Points of entry for such materiel are often limited
ysis of the leadership of insurgent organizations in number. The illegal goods arriving through
may develop information which could be used to these entry points are vulnerable to counterin-
discredit and lessen popular support of the telligence checks and inspections. Illegal ground
leaders. Detection and disruption of logistical sup- routes or paths for bringing in supplies are sus-
port operations may be complicated by the fact ceptible to detection by aerial reconnaissance and
that many of these facilities will be located in photography and other intelligence means.
areas adjacent to the recognized borders of the c. Insurgent logistical support facilities such as
insurgency affected country. Access to these areas bases of supplies, way stations, caches, factories,
may be limited by separate international agree- and farm plots will increase in size and number
ments. concurrently with force expansion. The resultant
increase in trail patterns, diggings, thermal emis-
4—6. Communications Requirements sions, disturbances of natural terrain features or
As the insurgency progresses, a rapid means of vegetation and other signs of increased human ac-
communications and a large, complex communica- tivity will make the insurgent support facilities
tions system may become necessary for the insur- more vulnerable to detection.
gent leadership to exercise command and control.
The insurgent may also maintain contact with an 4-8. Tactical Operations
outside sponsoring country in order to receive di- a. During Phase I and the early part of Phase
rection and assistance. Insurgent intelligence, II, insurgent tactical operations against the gov-
counterintelligence, security, and propaganda ernment, its military and police forces, and its pop-
functions also increase and demand a greater var- ulation normally are limited to isolated acts car-
iety of communications means. As the need for a ried out primarily to entrench their positions in-
rapid means of communications progresses, the in- country. In the latter stage of Phase II and during
surgents may be forced to resort to less secure Phase III insurgent operations increase in scope
systems such as telephone, telegraph, radio, and and ferocity. Attempts are made to defeat internal
postal service. This will enhance insurgent com- defense military forces by conventional combat
mand and control, but at the same time, make the operations which results in occupancy of larger
communications system more vulnerable. ground areas, requires supplies and equipment,
and requires more storage facilities. Insurgents
4—7. Logistical Requirements will rely heavily on communications for command
a. The insurgents usually obtain a large portion and control. Communications equipment will begin
of their logistical needs from the immediate areas to appear in greater numbers, and communica-
of operation. Procurement of supplies, equipment, tions nets will become more sophisticated.
and services is by local purchase, volunteer contri- b. As the insurgent forces expand in size, a dis-
butions from supporters, theft, levies on the popu- tinction between the local population and the in-
lace, raids, and combat operations against govern- surgent force becomes evident. Base areas are
ment forces. Expansion of the insurgent armed created which must be closed to civilian movement
forces results in a step-up of tactical operations and defended with field fortifications. These base
and in a corresponding increase in requirements areas are vulnerable to discovery and exploitation
for logistics support. Some of the increased sup- by combat surveillance and reconnaissance
port is obtained by intensification of procurement sources. Long-range patrols can penetrate the in-
from the people. This increased demand on the surgents' territory and observe trails and insur-
4-2 AGO 7334A
FM 30-31

gent activity and base camps. The use of aerial tion of armed elements from external sources. The
photographs and other aerial sensors will help to requirement to rapidly increase the size of armed
identify new camps, cache sites, field fortifica- elements is in conflict with the leadership’s con-
tions, and training areas. Intelligence personnel cern for extreme caution in the assesssment of the
can secure information on the location of insur- loyalty of recruits. It is extremely difficult to
gent base areas from local people who have seen achieve a rapid expansion of forces while at the
activity or have been denied áccess to the area. same time maintain high recruitment security
c. Detailed planning is vital for all of the insur- standards. During such an expansion phase, the
gent’s combat operations. Insurgents normally insurgents are especially vulnerable to govern-
follow up their detailed, precise, planning with ment intelligence penetration efforts.
“dress” rehearsals. This preparation often entails b. Labor requirements for insurgent base area
marking of routes in and but of the battle area as buildups usually exceed the capability of the in-
well as stockpiling of supplies and equipments. surgent force itself. The insurgents must depend
These patterns of preparation for military opera- upon voluntary or involuntary local civilian labor
tions constitute yet another vulnerability to intel- to meet the requirements. Thus, specific knowl-
ligence reconnaissance and surveillance activity. edge concerning base locations may be possessed
by large numbers of local people. This knowledge
4-9. Dependence Upon the Population con be exploited by internal defense intelligence
forces. Information concerning insurgent activity
To succeed in his phased development the insur- may be willingly given by some individuals. Other
gent relies on the population as the major source individuals will require inducement of some sort.
for expansion and replacement of his military No matter what their motivation for providing
forces; the framework for establishment and op- the information all will require that their in-
eration of his warning and collection nets; the former roles not be compromised and if compro-
labor resources necessary to build up his base mised that they and their families will be pro-
areas and training camps; the main source for tected from insurgent reprisal. The requirement
consumable supplies; medicines, and construction for secrecy must be respected in all collection ac-
materials; and the cover he requires to meld into tivities.
the local environment. Insurgent dependence Upon
the population is critical during all phases of in- c. The insurgent’s supply needs will require that
surgency. The importance of this factor is height- he contact certain local people such as commodity
ened as the insurgent extends the scope and mag- brokers and merchants. When persuaded to act as
nitude of his organization and operations. informers, such people can be used to identify in-
surgent contact men. Surveillance of identified
a. In order to achieve the men
contact ultimate
may aim.
lead of
to over-
the uncovering of identi-
throwing the government forces, the insurgents ties of other key insurgent personnel as well as
usually organize regional and regular armed insurgent base locations. Information relating to
forces which possess the actual or potential char- insurgent purchases can also be used by intelli-
acteristics of conventionally organized military gence analysts when assessing insurgent force
forces. These forces can be achieved by expansion strengths, critical supply needs, and probable op-
of the civil base of the insurgency or by infiltra- erational plans.

AGO 7334A
4-3
FM 30-31

CHAPTER 5
INTELLIGENCE REQUIREMENTS

Section I. GENERAL

5—1. Introduction (5)


a. Intelligence requirements are formulated by c.
commands and staffs based on analysis of assigned forms. Members of the U.S. Army may act in an
missions and represent information and intelli- advisory capacity with host country, other U.S.
gence needed for the successful completion of the agencies, or the combat forces of the U.S. Army
missions. Requirements will be specific or general, may be committed.
short or long range, depending on missions. A de-
tailed discussion of intelligence requirements is 5-2. Types of Intelligence Requirements
contained in FM 30-5.
a. Stability operations intelligence requirements
b. A discussion of U.S. Army missions in sup- are of two types :
port of internal defense and internal development
assistance operations is contained in FM 31-23. (1) Preparedness—those requirements for
These missions, which must be understood by in- contingencies.
telligence personnel involved in stability opera- (2) Operational requirements—those needs
tions, include— generated at, and after, actual commitment of
(1) Advisory assistance. U.S. Forces in any capacity.
(2) Psychological operations. b. Intelligence requirements for preparedness
(3) Intelligence operations. are separated into two categories—basic intelli-
(4) Civil affairs operations. gence and current intelligence.

Section II. REQUIREMENTS FOR PREPAREDNESS

5—3. Basic Intelligence c. These categories should be covered in detail at


national, regional, and local levels. For example,
a. The first requirement is for a detailed, com-
prehensive, and up-to-date intelligence documen- in the political field, biographic data on key per-
tary data base on all countries and areas of the sonalities of every province, district, and village
are required in addition to data on the top political
world which are susceptible to insurgency. A doc- figures of the individual countries. This require-
umentary data base is essential for long- and
ment for comprehensiveness in all of these basic
short-range contingency planning and for the
training and use of personnel and units assigned subject areas is of considerable importance.
readiness responsibilities on a geographical basis. d. Documentary intelligence on such insurgency
subjects as the background of the insurgency, its
b. The data base must contain six broad cate- known leadership, its extent of development, its
gories of detailed intelligence regarding likely actual or potential strengths and weaknesses, its
host countries: internal organization and structure, and its sup-
(1) Political. port from within and without is included in the
(2) Economic. data base. Since many of these detailed data are
(3) Sociological. needed prior to the commitment of U.S. military
(4) Geographic. forces, military intelligence relies to a large extent
(5) Military. on external agencies for the documentary data
(6) Insurgency intelligence. base it requires. It is then the task of the ap-
AGO 7334 A
5-1
FM 30-31

propriate Army intelligence element to immedi- coverage should be filled through priority collec-
ately request such data and convert them to mean- tion tools such as those discussed in chapter 7.
ingful documents which the user can apply to his e.
operational environment.
contingency responsibilities to acquire the perti-
nent segments of the national data base for their
5—4. Sources for the Data Base respective geographic areas of interest.
a. Estimates, surveys, studies, area handbooks,
analyses, and reports published by various agen- 5—5. Current Intelligence
cies serve as the basis for the initial development a. In addition to the documentary data base a
of the documentary data base. All possible con- requirement exists for timely and accurate cur-
tributory agencies are queried for available in-
formation to contribute to the data base. rent intelligence for day-to-day monitoring of the
extent of subversive activities and the develop-
b. One method of obtaining this data is the use ment of insurgencies. Such warning data is essen-
of the Statement of Intelligence Interest (SII) tial for the refinement of contingency plans, the
which may be forwarded from subordinate to reorientation of training, and the initiation of pre-
higher levels. The SII is a standing request for the liminary operational requirements. Current intel-
dissemination of the full range of intelligence pro- ligence must cover the most recent, significant de-
duced by the entire national intelligence commu- velopments in areas of interest in each of the six
nity within suitable classification and need-to- categories of intelligence (para 5-3b) in as much
know restrictions. detail as possible.
c. Because of the broad scope of stability opera- b. Current intelligence, when combined with the
tions, the data base requirements differ greatly documentary data base, will provide an opera-
from those needed for convëntional military oper- tional data base. Spot reports ; routine, daily, and
ations. Stability operations require elaborately de- weekly summaries ; and other special reports from
tailed intelligence concerning sociological, polit- national agencies and from unified and component
ical, geographic, and economic information and commands, normally in abbreviated telegraphic
usually a minimal amount of scientific and techno- format, comprise the bulk of the current intelli-
logical intelligence. This difference often is dicated gence support available to commands with in-
by the depth of involvement with the civil popula- ternal defense missions.
tion during stability operations.
c. Current intelligence and information must be
d. A suggested coverage of the data base is provided to the users in an expeditious manner.
listed in appendix C. The list should be viewed as Commanders and intelligence staffs must insure
minimum subject coverage intended for use as a that current intelligence is disseminated to the
guide for specific operational planning. Gaps in lowest practical level.

Section III. OPERATIONAL INTELLIGENCE REQUIREMENTS

5—6. General Army’s role basically will be in the form of advi-


sory and training assistance by military assist-
The basic documentary data and the current hold- ance advisory groups, missions, military groups,
ings available at the time of commitment of Army and mobile training teams. Of the five missions
forces represent the base from which the opera- listed for Army participation in stability opera-
tional intelligence requirements for the specific tions, four are the inherent responsibilities of the
mission are formulated. As noted, initial commit- host country. The one exception is the advisory
ment of Army forces may take many forms and assistance mission. Nevertheless, intelligence re-
occur during any phase of the insurgency. Army quirements will exist for all four missions at the
units will, therefore, orient their efforts on their inception of thfe military assistance program.
specific missions, because it is the mission which When host country efforts, combined with military
determines intelligence needs. assistance, fail to meet the insurgent threat,
greater participation by forces can be expected.
5—7. Phase I
b. U.S. advisors may be furnished, at the na-
a. During Phase I of an insurgency, theatU.S.
tional level least, early in the assistance effort

5-2 AGO 7334A


Cl, FM 30-31

for civil affairs operations, intelligence operations, if-c. Tactical requirements are concerned with
and psychological operations. These advisors will finding, fixing, and destroying the insurgent
have some requirements in common in the six armed forces. FM 31-6 considers the specific re-
intelligence subject areas; however, each will quirements for these operations in great detail.
have his own special interest which must be met Intelligence requiremnts for combat support and
by operational intelligence. Intelligence advisors combat service support units participating in the
must continually bear in mind that their status tactical counterguerrilla effort are adequately es-
may shift at any time from primarily an advis- tablished in appropriate field manuals. The com-
ory to a basic operational role, and that their bat intelligence requirements for tactical opera-
basic intelligence requirements will increase ac- tions in an insurgency differ little from those of
cordingly. Thus, even though there may be no other types of warfare. However, what is distinct
current indications of such a shift in their sta- in counterinsurgency operations is the require-
tus and its accompanying requirements, their ef- ment for the other Army missions directly associ-
forts concerning buildup of the documentary data ated with stability operations in counterinsurg-
base should be shaped around that eventuality. ency operations. As part of the stability opera-
ifd. Consideration should also be given to the tions effort during Phase II, intelligence units,
utilization of tactical cover and deception mea- psychological operation units, and troops en-
sures during Phase I. Because of the insurgent’s gaged wholly or in part in civil affairs and popu-
heavy dependence upon accurate intelligence dur- lation and resources control operations may be
ing this phase, many insurgent activities can be utilized. This requires detailed, comprehensive,
compromised and frustrated by the deliberate in- and current data concerning the six categories of
troduction of false or misleading information. intelligence (para 5-3b). With the involvement
This in turn can significantly degrade the of US combat units, the entire Army intelligence
growth and effectiveness of the insurgency. For support capability becomes active.
additional guidance on tactical cover and de-
ception, refer to FM 31-40. 5-9. Phase III
ita. US Army participation in Phase III may
5-8. Phase I! involve only support personnel and units, or it
ifa. Intelligence requirements generated at the may involve combat forces in tactical opera-
initiation of the military assistance program for tions. With such involvement it can be expected
the use of advisors will continue to be applicable that the entire spectrum of the stability opera-
as US military efforts are expanded during Phase tions mission will be encountered. Where US
II. The US military assistance program may be buildup is gradual from the initial phase into
greatly enlarged with more effort at the provin- Phase III of an insurgency, the intelligence
cial and lower level of the host country. US Army requirements for Phase I and Phase II will have
support units may be committed in Phase II to been formulated based on advisory and support
provide direct technical and specialized assistance needs. In such a situation the involvement of
to host country military forces. Army aircraft, Army units in support of host country military
communication, transportation, ordnance, mili- forces will have little effect on requirements, ex-
tary police, and medical units are examples of cept for an obvious increase in the collection-
such support. US Army combat units may also production resources. Where Army involvement
be committed in the later stages of Phase II. begins with little or no advance warning or
buildup, an intelligence' program to support all
In the determination of operational intelli- missions, tactical and internal development, will
gence requirements for the Army forces during be required immediately. Tactical intelligence re-
this period, a significant factor is that the US quirements in Phase II should be expanded to
Army may become involved, in some capacity, in meet the expected larger insurgent force struc-
all of the major missions associated with stability ture.
operations. Requirements may include combat in-
telligence forces and intelligence to support op- ifb. During Phase IIII, US Army intelligence
erations in the other missions: civil affairs, in- staffs, specialists, and units will be helping to
telligence, advisory assistance, psychological, and provide all tactical and nontactical stability op-
population and resources control operations, erations intelligence needs. Working in coordina-
which are conducted concurrently with tactical tion with host country and other US and allied
operations. intelligence agencies, the US Army will collect

5-3
Cl, FM 30-31

and process information, and diseeminate the re- Additionally, establishment of the following types
sulting intelligence necessary to support tactical, of combined intelligence facilities will assist in a
civil affairs, intelligence, psychological, popula- fully coordinated effort to exploit all available in-
tion and resources control operations on a con- telligence assets :
tinuing basis. (1) Interrogation Center (for details, see
FM 30-15).
+0. As discussed in paragraph 6-2, combined
military intelligence operations with the host (2) Document Exploitation Center (for de-
country are the most effective in stability op- tails, see FM 30-15).
erations. Early development of such combined (3) Materiel Exploitation Center (for de-
operations should lead to the establishment of tails, see FM 30-16).
combined intelligence production centers during (4) Imagery Interpretation Center (for de-
Phase III at both national and subnational levels. tails, see FM 30-20).

5-4
FM 30-31

CHAPTER 6
THE INTERNAL DEFENSE INTELLIGENCE SYSTEM

Section I. INTRODUCTION

6-1. General host country activity receiving advisory assistance


The internal defense intelligence system consists from U.S. elements. In some cases, U.S. represen-
of all host country military and civilian intelli- tation may be for liaison purposes only. When the
gence systems plus all U.S. and other allied intelli- activity has sufficient U.S. participation to be con-
gence resources which are committed in-country sidered a combined activity, i.e, U.S. elements
to assist in preventing or defeating insurgency. have an operational mission in the internal de-
The host country’s intelligence structure is the fense program, then it is desirable that the man-
base of this system. It normally includes a na- agement of the activity also be handled on a com-
tional intelligence directorate (NID) or com- bined basis with objectives and procedures devel-
parable agency at the top level and includes the oped by common agreement. Combined military
intelligence elements of area commands at subna- intelligence operations facilitate the quick estab-
tional levels. Intelligence systems of tactical forces lishment of effective collection and production ca-
are integrated with the overall intelligence pabilities. Whereas the host country contributions
system. are detailed area and language knowledge and ac-
cessibility to all levels of society, U.S. Army intel-
ligence can provide professional and technical ex-
6—2. U.S. Army Intelligence Participation pertise as well as managerial talent and advice. Of
a. The nature and extent of U.S. Army intelli- particular importance is the requirement for the
gence participation in an internal defense intelli- U.S. Army to initiate as early as feasible com-
gence system is dependent upon the level of sup- bined counterintelligence operations in the field of
port being provided by U.S. military forces in the countersubversion. Although, according to ex-
furtherance of U.S. internal defense and internal isting national policy, combined intelligence oper-
development assistance operations. Generally, U.S. ations of the U.S. Army normally pertain to a
Army intelligence operations should be initiated coordinated effort with host country military in-
as soon as a U.S. military advisory effort is com- telligence and security agencies, U.S. Army intelli-
mitted to conduct internal defense operations with gence must be prepared to provide assistance in
a host country which is threatened by an insur- intelligence roles outside those defined by major
gency. Such operations should begin as soon as policy as a consequence of mission default by
possible after it is determined that an incipient other U.S. agencies or by virtue of peculiar roles
insurgency situation exists or is developing. This and missions of particular host country civilian
participation should extend to the entire spectrum and military intelligence and security agencies.
of intelligence production and collection activities
which should be conducted on a combined basis 6—3 Unilateral Requirements
with the host country. For additional guidance,
see FM 100-20. There usually are some unilateral intelligence re-
quirements imposed on both the U.S. and HC in-
b. A fundamental premise of U.S. internal de- telligence personnel by their respective countries.
fense policy is that U.S. assistance will be chan- When time and subject matter permit, the com-
neled primarily through the HC structure. This is bined intelligence resources should be drawn upon
basic doctrine for U.S. intelligence operations as in meeting these requirements; however, there
well as for other U.S. programs. A determination may be times when mutual effort will be impos-
should always be made as to whether a particular sible, as in the case of independent estimates or
activity is a combined activity or basically only a when contingency planning is required by the re-

AGO 7334A 6-1


FM 30-^31

spective national authorities. In such cases inde- that the intelligence and security resources of both
pendent U.S. or host country action will be re- the U.S. and the.host country are employed effec-
quired. tively and efficiently. There should be no unneces-
sary competition or duplication of effort between
6—4. Determination of Objectives the various echelons and agencies involved. There
The U.S. and host country intelligence authorities must be sufficient organization of effort to insure
should coordinate, in detail, to determine mutual that each essential function is handled in a thor-
long-range obj ectives and basic organizational and ough manner. Staffing must come primarily from
operational procedures and policies required. within the total in-country capability. However,
Long-term plans developed by U.S. and host thorough planning and management action to
country intelligence authorities must provide' for define basic responsibilities, specific tasks, and al-
intelligence efforts related to the possible further location of resources between the various agencies
growth of the insurgency, possible external inva- and echelons comprising the intelligence system
sion, and possible third country active or passive should insure the most effective and efficient use of
support of the insurgents. In an internal defense all available intelligence assets.
environment it is at times difficult to determine
relative priorities for various intelligence require- b. Centralization, pooling, and control of critical
ments. U.S. and host country intelligence per- intelligence resources by higher echelons are fre-
sonnel must reach an agreement as to the major quently required. This may necessitate control of
personnel, funds, and other resources at national
programs and activities to be undertaken and
level to insure that efforts at lower levels remain
their relative priority for accomplishment within
subject to the desired degree of centralized super-
available resources. Actual organization and
vision and control.
procedures adopted are tailored to the operational
situation and environment. Combined U.S./host
country planning is the key to progress in the de- 6—6. Intelligence Support Available
velopment of in-country intelligence capabilities. from U.S. Theater Army
The theater army intelligence structure has the
6—5. Employment of Resources principal mission of developing intelligence re-
a. Planning, centralization of control, and flexi- quired for theater missions which is not satisfied
bility are all related factors which contribute to from U.S. national intelligence agency sources.
the ability of the internal defense intelligence Particularly during Phase I of an insurgency, in-
system to make the best possible use of available telligence advisory elements are normally aug-
personnel and materiel. Care must be taken to see mented from theater army intelligence resources.

Section II. HOST COUNTRY ORGANIZATION FOR


INTERNAL DEFENSE OPERATIONS

6—7. General close integration between intelligence and opera-


tional acivities assists in the achievement of a
a. Coordination centers should be organized at
national and subnational levels of government united effort against insurgency. This integration
of effort, coupled with the skillful use of aggres-
down to province, district, and even township.
sive tactics imaginatively applied, creates a situa-
Their purpose is to provide an integrated ap-
tion in which the effectiveness of insurgent activi-
proach to the planning and direction of all aspects
of the government’s program of internal security. ties will be seriously impaired.
They s.erve to coordinate and control the planning b. Organizations, to be effective, must have
and direction of the efforts of the country, to structural patterns familiar to people of the host
achieve unity of effort, and to obtain rapid re- country. Two countries that have evolved from de-
sponse to any indications of insurgent activity. pendence on the same colonial power may follow
Composition of these coordination centers depends similar organizational concepts; however, only in
on local conditions and the desire of government rare cases when U.S. Forces are likely to be em-
leaders; however, the four functional areas such ployed would American organizational concepts be
as intelligence, operations, administration, and lo- dominant. U.S. personnel, therefore, must expect
gistics, must be met by the internal structure se- to adapt themselves to indigenous organizations.
lected. Use of the coordination centers to achieve Actual titles of host country internal defense coor-

6-2 AGO 7334A


FM 30-31

dination centers may vary from one country to sible that the commander of the major supporting
another: However, for clarity of reference in U.S. operational intelligence unit and the intelligence
Army doctrine, the national level center is identi- head of the area coordination center may be the
fied as the National Internal Defense Coordination same individual.
Center (NIDCC) with subnational centers being
termed as Area Coordination Centers. (For de- 6—9. Local Area Coordination Centers
tails, see FM 31-23.) a. The organizational and operational features
of the area coordination center at local levels will
6-8. The National Intelligence Structure vary according to the local geographical, political,
a. The national intelligence structure of the host sociological, psychological and military factors
country should be established to direct informa- present in the area. The local area coordination
tion from all sources into a single channel. This center has three missions :
channel, leads to a central body whose responsi- (1) To provide integrated planning, coordina-
bility it is to produce a composite intelligence pic- tion, and direction to all of the governmental
ture for the country as a whole. This body is the effort imtheir area of responsibility.
intelligence branch of the NIDCC, organized spe- (2) To insure an immediate, coordinated re-
cifically to direct and coordinate the collection, sponse to operational requirements.
production, and dissemination of intelligence in- (3) To communicate with the people and
formation. Intelligence operations of the area invite their participation in programs designed to
coordination centers at major subnational level improvè the economic, social, and political well-
are performed by intelligence branches with being and security of the area.
format and function similar to that of the NIDCC.
b. Prior to, or during, the initial stages of insur-
The composition of each of these intelligence ele-
gency it is likely that the intelligence chief of a
ments will vary according to the level and circum-
local area coordination center will come from the
stances, but to be effective they should be estab-
civilian police organization in the area. Some ad-
lished on the following guidelines :
vantages and disadvantages in selecting a police
(1) Single directorship. official for this position are as follows :
(2) Incorporation and integration of all civil (1) Advantages.
and military intelligence agencies at all levels.
(a) They have intimate contact with the
(3) Staffing by trained professional intelli- population which permits them to gain valuable
gence personnel. intelligence concerning the existence and extent of
(4) Access to a secure, rapid system of com- insurgency in their area.
munication. (b) They usually are accepted by the people
(5) Functioning to— as the government organization at local level with
(а) Review all local activities and external enforcement prerogatives.
influences that may affect the security of the area (c) They are best suited to exploit the in-
or country and the campaign against the insur- surgents’ dependence on the local populace.
gent. (2) Disadvantages.
(б) Provide intelligence assessments of in-
(a) In times of stress, younger, healthier,
surgent programs and ádvise on the security poli-
more energetic policemen normally are called to
cies and actions necessary to combat these threats.
military service. Civilian police forces are under-
(c) Review the effectiveness of the intelli- manned or replacements are less able and less
gence effort and originate methods of improving trained auxilaries. “Usual” police duties (traffic
it. and curfew controls; licensing; civilian crimes
b. Close integration must be maintained be- against property and person; complaints of mis-
tween the intelligence elements of the coordination conduct by civilians and military persons against
centers and the intelligence, units which provide the other) increase progressively. Thus, the chief
them operational support. This integration should of a police force of reduced capability already
be extensive enough to permit the interchange of faced with increased work, cannot undertake a
personnel between the two elements and should major additional reponsibility.
serve as an excellent source-of trained intelligence ■ (b) The police chief, or key members of his
manpower for staffing of -the area coordination force, may be allied with or intimidated by insur-
centers. Depending’on the local situation, it is pos- gents, organized criminals, or legitimate enter-
AGO 7334A
6-3
FM 30-31

prises (business, religious, cultural, etc.) whose coordination center area of responsibility which
interests are adverse to the intelligence program. has some type of activity devoted to the collection
(c) The police and/or processing
chief may beofclosely
intelligence
asso- information. The
ciated with a local faction and as a result of dis- area coordination center provides a pooling of all
trust by the opposition may not be effective in his available intelligence for use in operations against
role as chief of police. the insurgent.
c. If insurgent strength grows, several causes (2) Basic functions of the intelligence ele-
may contribute to the government’s relative ina- ment of the local area coordination center parallel
those of the higher level coordination centers of
bility to maintain itself. One possible element of
the national system. Some of the more important
government weakness is the intelligence effort. All
of these functions are to :
facets of the military intelligence/counterin-
(a) Determine intelligence objectives.
telligence program, including economic, political,
(&) Integrate local intelligence programs
and sociological intelligence, must be scrutinized
with those of the national intelligence system.
for areas of possible improvement. Indigenous at-
(c) Evaluate intelligence resources.
titudes, host government and United States poli-
(d) Organize and train new intelligence ac-
cies, and other factors may indicate changes in
staffing organization, mission, or procedures of tivities and forces.
(e) Formulate intelligence operational
area coordination centers.
plans.
d. The local area coordination center is com- (/) Establish priorities and allocate re-
posed of the same elements as the coordination sources for intelligence attack of selected insur-
centers of the national system—i.e., intelligence, gent targets.
operations, administration, political, and logistics. (g) Establish and conduct an active liaison
For details on a type area coordination center at program with intelligence elements of other area
province level, see FM 31-23. coordination centers.
(1) The intelligence element is composed of e.
two sections—collection and production. It is posed of both governmental and influential private
staffed by representatives from each intelligence citizens should be formed to assist the area coordi-
organization and each agency within the area nation center.

Section III. U.S. IN-COUNTRY INTELLIGENCE STRUCTURE

6—10. Country Team tional development and internal defense assistance


In order to coordinate its multifunctional pro- programs which are mutually interdependent.
Continuous assessment of the effectiveness of op-
grams of advice and assistance to host countries
threatened by insurgency, the United States has erations, modified as necessary, is inherent in
country team activities.
established a flexible organizational concept to
support those countries. The primary center of op-
erations is the “country team” which, when uti- 6—11. Pre-Commitment Planning
lized, is the senior in-country U.S. coordinating U.S. Army commitment in stability operations
and supervising body, headed by the chief of the may occur suddenly, or gradually, over a long
U.S. diplomatic mission, usually an ambassador, period of time. Major commitment of combat
and composed of the senior member of each repre- forces is contemplated only on a contingency
sented U.S. department or agency. Included are
basis. The intelligence staffs of MAAG and mis-
members of the State Department, U.S. Informa-
sions assist in the development of the intelligence
tion Service, U.S. Agency for International Devel-
portion of country team contingency plans for ex-
opment, Defense Attache, other key personnel,
and the senior military officer of the advisory or pansion of U.S. assistance. This requires an un-
assistance program. The country team operates to derstanding by Army intelligence officers of re-
insure that there is a close, continuing cooperation sponsibilities of the U.S. in-country intelligence
between the various agencies implementing U.S. staff and its relationships with the host country
military, economic, social, and political assistance intelligence system in order to determine the total
programs. It maximizes the total contribution to- intelligence requirements. To accomplish this it is
wards internal stability by balancing both na- necessary for the intelligence staffs to :

6-4 AGO 7834A


FM 30-31

a. Evaluate the intelligence documentary data selected Combat, combat support, and combat
base and develop a program for data base expan- service support units of the host country—both
sion. military and paramilitary. Intelligence programs
b. Determine overall intelligence collection re- of instruction are established. Buildup of the U.S.
quirements ; prepare U.S. collection plans, orders, in-country military intelligence effect also includes
and requests; recommend allocation of collection U.S. Army intelligence participation on intelli-
tasks to NIDCC and area coordination center ele- gence staffs of the NIDCC and area coordination
ments ; and asisst in the development of the HC centers at major subnational level, as well as pro-
collection plan. vision of advisors to the host country military in-
telligence organizations which directly support the
c. Determine overall intelligence production re- NIDCC and area codrdination centers. These facil-
quirements, establish production standards and ities serve as a focus for issuing requests for in-
formats, assign production tasks to U.S. func- formation, receipt and evaluation of collected
tional staffs, assign intelligence input require- data, and rapid dissemination to all agencies, par-
ments to U.S. agencies in-country, propose com- ticularly those which can readily exploit the infor-
bined intelligence production programs to the host mation. Overall planning and supervision on an
country, and determine dissemination policies. integrated U.S./host country basis of intelligence
d. Resurvey periodically projected U.S. intelli- collection, processing, and production programs is
gence personnel requirements. necessary to insure an effective and efficient effort
e. Task out-of-country resources, such as com- that meets the U.S. and. host country intelligence
munication intelligence. requirements. This is accomplished by the intelli-
gence director and integrated staff at each level.
6—12. Expansion of internal Defense Special benefits of an integrated U.S./host
Intelligence Support country staff are to :
(1) Reduce misunderstanding and confusion
a. An increase in U.S. participation in the in- between U.S. and host country intelligence author-
ternal defense programs of any insurgency-af- ities.
fected country usually will be accompanied by a
(2) Eliminate gaps and undue duplication of
significant expansion or reorganization of U.S.
in-country forces. Existing U.S./host country in- intelligence effort.
tegrated organizations, such as may exist as the (3) Make available specialist personnel and
NIDCC and area coordination center levels, will expertise necessary for the production of required
similarly expand or reorganize. This growth will intelligence estimates or for rapid, accurate evalu-
be required due to the expanded missions which ation of estimates prepared by others.
U.S. organizations must undertake. When reor- (4) Improve supervision over intelligence
ganizing, care is taken not to unduly disturb ex- personnel management through better evaluation
isting relationships between U.S. elements or indi- of tasks to be accomplished and resource availa-
viduals and their host country counterparts. bility.
Every effort is made to maintain the rapport and (5) Establish and supervise activities to sup-
mutual trust and respect which already exist. port in-country intelligence requirements for cen-
tralized intelligence data processing, storage, and
b. U.S. civilian and military intelligence support retrieval. r
to the internal defense intelligence system may
consist of advice, financial and material aid, provi- 6-13. Relation of U.S. Tactical Forces
sions for professional education, and development to the Area Intelligence System
of an intelligence documentary data base. Most of a. U.S. Army tactical units, introduced into a
this effort is directed at the host country national country where the combined U.S./host country
level, but mobile training teams and advisors may area intelligence system is already developed,
be sent throughout the country to subnational work with thé area intelligence elements on a
levels. Some military intelligence advisors may mutual support basis. This relationship is shown
also be required to assist nonmilitary elements. schematically in figure 6-1.
c. U.S. Army involvement in the internal de- b. U.S. tactical forces arrive in-oountry with at-
fense intelligence system gradually may branch tached military intelligence support detachments.
out into subnational areas. Intelligence advisors The makeup of these detachments is similar to the
may be sent to assist commanders and staffs of structure of standard MID ; however, strengths of
AGO 7334A
6-5
FM 30-31

ACC
(REGION)

COMBINED INTELLIGENCE
ACTIVITIES AND FACILITIES

US INTEL HC INTEL
OFFICER OFFICER

HC 1 ACTICAL
US TACTICAL
FORCES INTEL UNITS AND M FORCES
IN AREA
si OTHER AGENCIE Ul IN AREA

zz

ORGANIC ORGANIC
INTEL CAPABILITY INTEL CAPABILITY

US TACTICAL 1^1 HC TACTICAL


FORCES IN PROVINCE (PROVINCE) FORCES IN PROVINCE

1
LEGEND Direct excnonge of info intel

Figure 6—1. Relationship of tactical units to area intelligence system at subnational level.

their functional intelligence elements are based their respective tactical forces, but the wide-
upon predetermined intelligence needs of the tac- ranging nature of tactical operations results in
tical forces. These attached MID provide most of some dependence upon the area coordination cen-
the intelligence specialist support required by ters for current intelligence and additional spe-

6-6
FM 30-31

cialist support required for each specific mission tribute significantly to short-term collection and
within their current areas of operation. production efforts in support of area coordination
c. When tactical forces are deployed in such a center intelligence programs.
manner whereby they are subj ect to frequent and
sudden change of locations, they should not be d. Details regarding functional intelligence sup-
given responsibility for long-term, area-oriented port arrangements with tactical forces are found
intelligence programs. However, they may con- in subsequent chapters of this manual.

AGO 7334A 6-7


FM 30-31

CHAPTER 7
PRODUCTION OF INTELLIGENCE FOR STABILITY OPERATIONS

Section I. GENERAL

7-1. Introduction be met only by reporting minute details on a great


variety of subject areas. Each one of these details
a. The primary responsibility of intelligence may appear unrelated to others and insignificant
personnel engaged in stability operations is to pro- by itself, but when painstakingly mapped and oth-
duce intelligence aimed at preventing or defeating
an insurgency. To defeat an insurgency, informa- erwise chronologically recorded over long periods
of time and analyzed in the light of other details
tion must be collected and intelligence produced reported, they may lend to definitive and predict-
on virtually all aspects of the internal defense en- able patterns of insurgent activity.
vironment. When insurgents are known to be re-
ceiving aid from an external power, it will be nec- b. The insurgent recognizes his shortcomings in
essary to obtain information on the role of the his military posture and must, therefore, minimize
external power in the insurgency. the weaknesses inherent in employing and sup-
porting isolated, unsophisticated forces, using a
b. The scope of the intelligence cycle described ponderous and primitive communication and logis-
in FM 30-5 differs only in its application to the tical system. He must make maximum use of the
production of intelligence for stability operations. weather, terrain, and the population, employing
In planning, for example, information is not only
secrecy, surprise, and simplicity. But to be imple-
needed on the armed insurgents but also on their mented by their forces, the plans must be simple,
underground organization and their relations with comprehensive, and repetitive. Therefore, the so-
the populace as well. In collecting information, the lution to a given problem is composed of a system
local population represents one of the most lucra- or systems which together are complex, but apart
tive sources of information. In processing infor- are independent, having simple, logical, and uni-
mation into intelligence, sociological, economic, form characteristics. Because of the interaction of
and political requirements may have equal or even the various systems and the educational level of
higher priority with conventional military needs.
the individuals employed, the systems and planned
Governmental and private agencies, military and
nonmilitary, host country and allied, may all rep- solutions are not conducive to change; instead,
resent valid users of the intelligence products. they remain organically inflexible until disturbed
by an unanticipated activity or influence. In devel-
This section of the manual is designed to supple-
ment the contents of FM 30-5 regarding intelli- oping a pattern analysis, it is important that not
gence production by covering those aspects of the only insurgency actions and activities are charted
internal defense environment which do or can resulting from the insurgents’ own initiative, but
affect the production of intelligence for stability also those actions and activities which result from
operations. friendly tactical operations. As actions of friendly
forces disturb the environment and patterns of
insurgent activities, it forces the insurgent into
7—2. Pattern Analysis Techniques unanticipated and unrehearsed situations which
a. A sound collection program and proper utili- can be exploited tactically. COMINT may be used
zation of the various collection agencies and to obtain direct insights into insurgent operations
sources of information will result in a very heavy and plans by exploiting insurgent communications
volume of information which flows into the re- sytems. The basic objective of the pattern analysis
spective intelligence staff’s processing element. technique should aim to answer the two basic
The very nature of the insurgent environment, his questions : ( 1 ) Where can the enemy be expected
base area system and his political and military to be found? and (2) Where would the enemy nor-
tactics, dictate that intelligence requirements can mally not be expected to be found ?
AGO 7334A
7-1
FM 30-3H

c. The data to be developed the world


and compiled
as a consequence
by of present insurgency
subject matter vary considerably with the inten- situations. Intelligence estimates should thus be
sity of the insurgent’s operations. The types of accompanied or followed by assumptions as to sit-
overlays and categories of subjects plotted thereon uations which may result in the event a given
will, therefore, vary extensively according to the enemy insurgency operation proves to be suc-
needs. The use of a graphic keying system and cessful and the effects such successes might have
color schemes in conjunction with large scale on U.S. security and strategy. Such an analysis
maps will greatly facilitate data analysis when su- has great potential in guiding U.S. training and
perimposing transparent overlays. operational policy for future commitments.
c. The initial intelligence estimate will serve to
7—3. Dmiiïellügeraœ IsîDmgaî© point out the gaps which exist in intelligence hold-
a. Upon completion "of the study of an area, an ings. Gaps which exist in general knowledge will
intelligence estimate of thé' insurgency is pre- be combined with more specific requirements and
pared. There are certain differences between these will be the subjects of initial intelligence require-
estimates and those used in conventional military ments. The informational requirements must be
operations. The main difference is in the matter of readily available to the area coordination center so
relative emphasis given to the various component that intelligence operational plans can be formu-
parts. The statement of the mission, for example, lated and detailed collection guidance provided the
may be a more complicated process than is gener- collectors. Collection planning must insure that re-
ally involved in estimates concerned with conven- quests for information are valid, clear, and concise
tional battlefield situations because of the wide so that the specific requirements are fulfilled.
scope of stability operations and its relationships d. A basic requirement in stability operations is
with other portions of the internal defense pro- a thorough understanding of the target area in all
gram. In the body of the estimate a chief differ- its aspects. Knowledge of the nature of the target
ence from conventional estimates is in the relative society must be augmented by a complete under-
emphasis accorded nontactical considerations, standing of the internal and external forces at
such as psychological, political, sociological, and work, those supporting the integrity of the society
economic factors. The number of factors to be con- as well as those engaged in subverting it. Only
sidered in the deliberative process of comparing when these factors are thoroughly understood can
advantages and disadvantages of various courses apropriate programs be effected. All available
of action may also make the process considerably assets must be utilized to provide this intelligence.
more complicated than conventional intelligence
estimates, where terrain, weather, and a visible, e. Commanders, intelligence staffs, and intelli-
tangible enemy are the chief factors to be consid- gence specialists must recognize the impact which
ered. The intelligence estimate for a stability oper- political, economic, and sociological factors have
ation, as in any situation, is based on all available on tactical operations of the insurgent and
intelligence and considers everything of opera- friendly forces. This applies even to a very
tional significance. A format of an intelligence es- narrow, confined, and localized situation. There-
timate for stability operations is contained in ap- fore, an intense and continuing study must be
pendix D. made of local history and developments, contempo-
rary personalities, aspirations, and motivations.
b. In addition to assessing the operational situa- Because political, sociological, and economic fac-
tion at hand, the intelligence estimate should be tors are overlapping and interdependent, colla-
used by research and analysis staffs at ap- tion and interpretation of such data are extremely
propriate levels for considered speculation as to intricate and can seldom be reduced to formuliza-
eventualities which may develop in other areas of tion similar to order of battle.

Sedfeira OIL PLÂNNDN© TTIKIE COLLECTD0N EIFFOKT

7-4. leiraee such as weather and terrain, and the subjective


factors comprising the enemy situation. The intel-
a. In conventional military operations, intelli- ligence needs for stability operations are based
gence staffs assess the objective factors in an area, upon broader considerations of the insurgent situ-

7-2 AGO 7334A


FM 30-31

ation and the operational environment. The latter stability operations. Developed requirements must
consists of both the geography and the people of give purpose and direction to the collection system
an area. Once the mission is understood, valid in- to obtain needed information. Planning must
telligence requirements are determined by consid- result in efficient utilization of the available intel-
ering these two variables. ligence resources. No intelligence system can be
effective without this management; nor can any
b. Stability operations which are directed satisfactory system be developed without consid-
against the insurgents generate intelligence re- ering how the available means and resources can
quirements based primarily on insurgent capabili- work toward a clearly definable end requirement.
ties. The operational environment is considered It is essential that intelligence requirements be
primarily only to the extent that it influences in- clear and concise and that they continuously be
surgent capabilities. In an incipient insurgency revised and updated to meet the commander’s need
where minimal violence is occurring, requirements as the situation changes.
will be obtained primarily from a consideration of
the nonviolent insurgent capabilities in the politi- 7—5. Intelligence Priorities
cal, economic, social, and psychological fields, and a. The terms “essential elements of information
from the insurgent’s support capabilities (intelli- (EEI)” and “other intelligence requirements
gence and security, recruitment and retention, or- (OIR)” represent a priority system for arranging
ganization and training, and finance and logistics). critical elements of information required by a
Intelligence gaps in each of these areas are deter- commander, with the EEI having the highest
mined and become intelligence requirements, i.e., priority. (For a discussion of these terms, see FM
the information needed to produce the intelligence 30-5.) These requirements are arranged in a de-
necessary for operations against the insurgents. scending order of priority in the collection plan.
The purpose of the priority system is to insure the
c. In addition to considering the capabilities of most effective use of the collection means avail-
the enemy, whether they be basic or supporting, able ; because, in most instances, the requirements
cognizance must also be taken of the operational exceed the capabilities of the means available.
environment. Nonviolent insurgent activity at- b. EEI and OIR are formulated for stability
tacking the economic structure of the country operations by the same careful considerations as
would, for instance, be strongly affected by the are present for conventional intelligence require-
climate of the region and the terrain. Terrain con- ments. However, the collection planning process in
siderations may materially affect the insurgent’s stability operations must make provision for polit-
capability in the sociological field. For example, ical, economic, and sociological data collection, and
terrain often determines the location of people and the intelligence officer must be concerned with a
their degree of isolation from the rest of society. wide variety of nontactical data to support the
The people themselves will have a strong influence mission of the command.
on insurgent capabilities. If they refuse to give
c. The following listing shows examples of EEI
logistical support to the insurgents, for instance, which may have application in an insurgency situ-
the entire insurgent effort will be significantly ation :
hindered. Stability operations aimed at internal
(1) Are there any legal political organiza-
development programs are based primarily on the tions which may be a front for insurgent activi-
operational environment as it is influenced by in- ties?
surgents. For example, internal development plans
(2) What are the salient geographic, demo-
for improving agricultural production in a certain graphic, social, political, and economic character-
area will generate requirements concerning ter- istics of the urban and rural areas ?
rain, climate, and existing agricultural conditions.
Also, there is a requirement for determination of (3) Are the political boundaries established
ways in which the insurgents may influence the by the insurgent the same as those established by
people and affect any government effort in the the government?
area. (4) What psychological operations activities
are being conducted by the insurgent? What are
d. Positive management is essential to the effec- the indications of its effectiveness?
tiveness of the intelligence system in support of (5) What is the nature of national and local
AGO 73S4A
7-3
FM 30-31

communication media (radio, TV, newspaper, timidation, kidnapping, propaganda, taxation, bri-
etc.) ? Does it support national objectives? bery, sabotage, rallies) ?
(6) What social problems (juvenile delin- (22) Has the insurgent force established pat-
quency, narcotic addiction, unemployment, pov- terns of deployment?
erty, etc.) are, or may become, significant? (23) Are insurgent redoubts, safe houses,
(7) What public assistance programs are of- factories, hospitals, caches, liaison sites, mission
fered, upon what basis is assistance granted, and support sites, control points, and the like being
to whom ? Are there significant weaknesses in the pinpointed geographically ?
programs ? (24) Are routes within operational areas con-
(8) Is the public education system vulnerable stantly used by the insurgents ?
to infiltration by insurgent agents (with a long (25) Are these routes and alternates de-
term aim of gaining control of the population fended ?
through the youth of the country? (26) Are movements conducted in mass or
(9) What is the influence of politics on sporadically in small groups?
teachers, textbooks, and students, conversely, (27) Are certain units characterized by their
what influence does the education system exercise method of movement?
on politics? (28) What type of transport is used ?
(10) What is the nature of labor organiza- (29) Where is this transport procured?
tions; what relationships exist between these or-
ganizations, the government, and the insurgents?
7—6. Determination of Indicators
(11) What general economic conditions and
problems of the nation (limited human or naturàl a. An indicator is any positive or negative evi-
resources, low per capita income, savings, con- dence of enemy activity or any characteristic of
sumption, national goals, etc.) are vulnerable to the area of operations which points toward enemy
insurgent attack ? vulnerabilities or the adoption or rejection by the
(12) What general conditions and problems insurgent of a particular capability which may in-
exist in the national transportation system (rail, fluence the selection of a course of action.
vehicular, water, air) ? b. FM 30-102 discusses indicators pertaining to
(13) What relationships exist among orga- various courses of action. These will have general
nized and unorganized religious and religious application primarily in the later stages of an in-
leaders (indigenous and missionary), the estab- surgency. In the earlier phases, indicators will be
lished government, and the insurgents? developed based on an analysis of insurgent opera-
(14) What are the principal nonindigenous tions and activities such as raids, ambushes, out-
sources of support for the insurgents? What form post attacks, assassinations, and sabotage. The in-
does this support take and what are the channels telligence officer’s experience and background
through which it is transmitted ? knowledge of insurgent operations and order of
(15) What urban and rural social stratum or battle will play an important role in developing
strata provide the greatest support to the insur- these important indicators. Appendix E is a
gency? What form does support take (food, listing of indicators for application in stability op-
clothing, shelter, etc.) ? erations. The determination of indicators is fur-
ther discussed in FM 30-5.
(16) In what areas are insurgent forces lo-
cated ?
7—7. Sources of Information and
(17) In what areas are government controls
Selection of Collection Agencies
most effective ? Why ?
(18) In what areas are the people in sym- a. The appropriate selection of agencies and of
pathy with the insurgent forces? Why? sources is discussed in FM 30-5, and that doctrine
is generally applicable to stability operations. The
(19) In what areas are insurgent forces in one significant difference arises from the much
full or partial control ? wider variety of sources and agencies available to
(20) In what areas are insurgent forces the intelligence officer in stability operations. His
active? collection effort should reflect the flexibility that
(21) What activities are most evident in spe- additional sources and agencies give him. The
cific areas (subversion, attacks, assassinations, in- sources and agencies used will depend on require-
AGO 7334A
7-4
FM 30-31

ment priorities, and these in turn are dependent subversion operations have the best capabilities to
on the insurgency phase. Another factor to be con- satisfy a wide range of high-priority intelligence
sidered is the capabilities of the sources and agen- collection requirements. In conjunction with their
cies. While the principles are valid and the selec- mission to penetrate the insurgent infrastructure
tion process is the same as in conventional war- and the maintenance of area coverage-type in-
fare, the possibilities for collection will be in- formant networks, these agencies are also in a po-
creased. sition to develop considerable information of po-
tential intelligence value in the political, economic,
6. During an insurgency, almost all government
and sociological fields.
agencies, whether or not their primary function
pertains to intelligence, are called upon to collect
information. Therefore, a close liaison must exist 7—8. PSYOP/Intelligence Relationships
between all nonmilitary collection agencies. In- a. The impact of the internal defense environ-
surgents use widely divergent methods in their at- ment on psychological operations (PSYOP) has
tempts to exploit government weaknesses and pop- far reaching implications to intelligence planners.
ular discontent. Government agencies involved in The role of PSYOP is of particular importance to
activities ranging from public health to communi- internal defense programs and requires extensive
cations should be called upon to assist in the col- intelligence support beyond that normally de-
lection of information relating to their fields of manded of PSYOP conventional missions (FM
interest. The finished intelligence will be useful to 33-1 and FM 33-5).
these same agencies for further planning as well
as to military planners. &. Military psychological operations are com-
pletely dependent upon timely, accurate, and
c. Orders and requests for specific information useful intelligence at all levels of command where
are based on indicators. Collection agencies are PSYOP are employed. The success of such opera-
directed or requested to supply the information tions depends in great measure on their timing,
which will confirm or deny the indicators. FM which in turn depends on the relevance and scope
30-5 contains a discussion of the formulation and of available intelligence. No two groups of insur-
dissemination of these orders and requests. In sta-
gents have identical environments, attitudes, be-
bility operations, emphasis should be placed on havior, or motivations. It is also quite likely that
value of negative reports since a lack of enemy factors present in the everyday life of different
activity may be a significant indication of the in- groups within an insurgent movement would
surgent’s course of action in a particular area or a change the psychological approach to individual
shifting of emphasis to another area.
elements within the same insurgent force. Intelli-
d. FM 30-5 contains a discussion and an ex- gence to support PSYOP against the insurgents
ample of a collection plan. Appendix F is an ex- will not necessarily be adequate for psychological
ample of a collection plan for stability operations. operations directed towards the population as a
The EEI and OIR shown are based upon insurgent whole. Psychological operations can have little
capabilities. The portion of the plan listing the hope of success in trying to influence the minds of
collection agencies has been expanded to show the audiences without the benefit of all intelligence
additional sources and agencies which are avail- available to give the psychological operators the
able for the collection of information. The collec- needed insight into what makes these audiences
tion agency shown simply as “military” is actually think and act the way they do. These extensive
a composite of all the collection agencies available intelligence requirements in support of PSYOP
within the military organization. It can be ex-
place a heavy burden on host country and U.S.
panded as appropriate by the intelligence officer in
intelligence organizations.
much the same manner as is shown in FM 30-5.
e. One of the significant variations to the overall c. Intelligence staffs and personnel responsible
collection program and the selection of collection for planning and directing the collection effort in
agencies in stability operations is the heavy reli- the internal defense environment must establish
ance on police, security, and counterintelligence and maintain close and continuous contact with
units and agencies, particularly in the early the civil-military operations officer or staff and op-
phases of an insurgency. As a result of the subver- erational PSYOP elements to insure that the nec-
sive nature of an insurgency, these agencies which essary intelligence is obtained to support psycho-
are normally charged with the conduct of counter- logical operations. Coordination and liaison be-
AGO 7334A
7-5
PM 30—311

tween intelligence and PSYOP operational ele- 7—110. Mîliicairy Polüee/initellligenœ


ments must be maintained at all echelons and in- a. Internal defense operations are characterized
formation obtained in response to high priority by “frontline” involvement of host-country police
requirements should be passed laterally to ap- elements (both civilian and military) in identi-
propriate PSYOP operational elements. PSYOP fying and neutralizing insurgent and other sub-
operational elements must also be included in the versive organizations and movements, particularly
dissemination of all information and intelligence in the early stages of an insurgency. In fact, in
reports pertinent to PSYOP use. In considering some host countries, the police elements my rep-
possible sources for intelligence requirements, resent the only significant and cohesive defense
planners should include PSYOP personnel as con- or security forces involved in countering a devel-
tributors to the overall collection effort. oping or existing insurgency. -
b. U.S. Military Police assist host country police
7—®. Êîvôl Aii?ea5irs/liraîell5geiniee KeDafloonslhiDips forces in providing training and advice in internal
defense operations. They also participate in com-
a. In the internal defense operational environ- bined host country-U.S. police operations in sup-
ment the country subject to insurgency is often a port of coordinated military stability operations
poorly administered country and the government’s as well as civilian internal defense operations. Ad-
activities and influences may reach certain remote visory or operational support to host country ci-
areas of the country only infrequently. Military vilian police agencies is provided upon request for
and paramilitary forces often may be utilized in assistance to appropriate U.S. civilian agencies
such regions to correct this deficiency. More intel- which have primary responsibility for advising ci-
ligence support is required for such a mission than vilian police and internal security agencies.
that associated with conventional civil affairs re- c. As a result of the military police mission,
quirements. As with psychological operations, in- their close association with host country police
telligence planning staffs must establish and main- forces, and daily contact with the population, mili-
tain close and continuous liaison with the civil- tary police elements can provide significant infor-
military operations officer or staff and civil affairs mation on an impending or existing insurgency.
operational elements to insure proper intelligence Furthermore, current information of potential in-
support to these activities (FM 41-5 and FM telligence value is frequently obtained on a bi-
41-10). Close coordination between intelligence product basis through an active police intelligence
collection effort and wide use of police informants
and civil affairs operational elements should be oriented at countering criminal activities or in
maintained down to the lowest tactical echelon support of populace or resources control opera-
where such personnel are deployed; information tions. Military intelligence elements may be able
obtained in response to high priority requirements to provide timely military, political, economic, and
should be passed laterally to appropriate civil af- sociological intelligence information which will
fairs elements. assist military police elements in the performance
b. Military civil affairs in stability operations of their mission. Close coordination between mili-
make it necessary for civil affairs personnel to de- tary intelligence and military police elements
velop a close relationship with representatives of should be maintained down to the lowest tactical
echelon where such elements are operating. Intelli-
the civil community. This requirement places civil
gence staffs should also consider military police
affairs personnel in a very favorable position to elements as a collection agency which may be ca-
collect information vital to the command’s inter- pable of fulfilling certain intelligence require-
nal defense intelligence needs.. In considering pos- ments in support of the respective command or the
sible sources for intelligence requirements, plan- tactical unit commander. For details on military
ners should include such civil affairs personnel as police operations in support of stability opera-
contributors to the overall collection effort. tions, see FM 19-50.

¡eeí5®im DID. COILlLECïl®^ ©F DNF©fôMÂ¥l@W

7—H Ï. ©emeirsiD tion of information from sources by military and


Collection of information is the systematic extrae- government agencies.

7-6 AGO 7384A


FM 30-31

7-12. Individual Sources ■e. <Medical personnel (doctors, nurses, hospital


During an insurgency, and particularly in its ear- employees) who may be able to identify insurgent
liest stages, the most abundant source of informa- personnel, their plans, and their need for doctors,
tion available.to government collection agencies at nurses, and medicine. The insurgents will need
the local level.is the people. Many people, and par- medical personnel and supplies to treat their pa-
ticularly members of dissident groups and their tients.
leaders, possess, informationlabout insurgent per- ' f. Ordinary citizens who are typical members of
sonnel, their .intelligence collection activities, and organizations or associations which represent pre-
their local supporters. Still larger segments of the dominant local occupations, such as farming, in-
local population will have first hand knowledge of dustry, labor unions, farm cooperatives, social or-
insurgent psychological operations and propa- ganizations, political parties, religious groups, and
ganda. To deal effectively with the people, the in- other organizations which play an important role
telligence officer needs to know the political, eco- in the local society.
nomic, and sociological .conditions and the existing g. Insurgents who are recruited or who volun-
or .potential causes of popular dissension. Some teer to work for friendly forces, become infor-
examples of individuals who, because of their mants, and can provide detailed, firsthand, and
work or position, should receive primary consider- current information. Such information will enable
ation among collection planners in attempting to early offensive action against the insurgents
select specific sources of information are— rather than simple defensive reaction.
a. Leaders of Dissident Groups (minorities, reli- h. Insurgent defectors who can also provide de-
gious sects, labor unions, political factions) who tailed, firsthand information concerning insurgent
may be able to identify insurgent personnel, their organization and activities. However, much of the
methods of operation, and local.agencies the insur- information they possess may be valid only up to
gents hope to exploit. The insurgents will attempt the time of their defection or shortly thereafter.
to contact these groups and their, leaders in order To effectively exploit defector-supplied informa-
to— . . ' tion, it must be acted upon quickly, before the
(1) Determine the principal causes of discon- insurgents discover the defection and take coun-
tent which can best be exploited to overthrow the termeasures.
established government.
(2) Recruit loyal supporters. i. Captured insurgents who possess most of the
attributes of informants and defectors with
b. Merchants who will have detailed informa-
tion on local economic conditions and the attitudes regard to their ability to provide information. The
greatest difference between informants, defectors,
and grievances of the people. Such knowledge will
and captured insurgents lies in their willingnses to
result from daily contact and business dealings.
provide information. Most informants and defec-
They may also be able to identify insurgent per-
tors want to provide information in order to assist
sonnel and their specific needs such as money,
in the defeat of the insurgent and/or to benefit
clothing, food, weapons, and drugs if they' have
themselves. Captured insurgents, on the other
been contacted by the insurgents to provide these
hand have come under government control invol-
items.
untarily, and because they may have been highly
c. Bar owners and bar girls who may be able to trained and indoctrinated with an insurgent ide-
identify insurgent personnel, their intelligence ology, normally will be unwilling to provide any
targets and information requirements, and their information.
methods of operations. Bar; girls are frequently
employed by insurgents to collect information, .'and 7—13. Insurgent Inspired Activities and
bars are used as meeting places. Their Effects
d. Native religious leaders and foreign mission- a. Insurgent inspired activities and their effects
aries who will have detailed information about may provide the intelligence officer with detailed
people belonging to their sects—attitudes, prob- information to support stability operations. Fac-
lems, grievances and their attendant causes, such tors to consider include the following :
as local economic, sociological, and political condi- (1) Strangers appearing in urban and rural
tions. Native religious leaders and missionaries areas may be insurgents, particularly if the areas
are familiar with local geography by virtue of are remote and not normally visited by strangers,
having lived and traveled throughout the area for or if the areas are undergoing a period of unrest.
many years. (2) Unscheduled meetings among the people
AGO 7S34A
7-7
I
FM 30-31

may indicate that insurgents have recently en- faction throughout the local government and mili-
tered an area and are beginning their attempts to tary, its activities, plans and personnel. Other en-
win the support of the people. ervating activities include instigating riots,
(3) In rural areas the discovery of unex- strikes, and demonstrations to cause government
plained trails, recently used campsites, small farm or military forces to react violently resulting in
plots, caches of food, clothing, and weapons may mistreatment or death of some of the individuals
indicate that insurgents have recently moved into involved. In countries where there are several reli-
an area but do not yet want to make their pres- gious groupings, insurgent propaganda may cause
ence known. religious unrest by making one religous sect feel
that another is receiving preferential treatment
b. Insurgent intelligence collection activities from the government.
will be of two types—overt and clandestine. Overt (2)
activities involve open collection of information by ances typifies activity carried on to win support of
insurgents who circulate among the people and the populace. Strangers who spend most of their
those who attempt to procure local maps, publica- time mingling with the people and who become
tions containing information about the area, and popular by showing the people practical ways to
official government and military publications improve their living conditions often are an indi-
available to the general public. Clandestine activi- cation of activity to win popular support. Terror-
ties involve secret collection of information by in- istic acts (assassination, kidnapping, mutilation)
surgent agents who may join mass organizations, against unpopular government agencies signify
government agencies, the police, and military in- that the insurgents are attempting to win the sup-
telligence units. Unusual activity by government port of the people by eliminating individuals and
employees, such as unexplained absences, overtime agencies they consider to be oppressive. The for-
or weekend work when the workload does not j us- mation or resurgence of organizations whose aims
tify it, and taking official documents home over- are to alleviate local grievances is still another
night may mean that they are providing informa- indication of activity to win the support of the
tion to the insurgents. Government workers who people.
are living beyond their normal means may be able
to do so because they are receiving money or other d. Newly formed organizations or reappearance
material rewards fom the insurgents in exchange of formerly inactive organizations, attacking local
for information concerning their agencies. When government or stressing immediate social,'polit-
information received from established sources is ical, or economic reform may be an indication that
consistently false, misleading, or of no value, these the insurgents have gained a significant degree of
sources are likely to be under insurgent control. control.
When all government efforts fail to identify and e. Insurgent recruitment and training of new
apprehend insurgents known to be in the area, personnel is a continuous process. Insurgent
this is an indication that insurgent informants are movements make it a practice to give continuous
likely to be present in the government forces and political indoctrination, leadership training, and
are able to anticipate government actions. training in the methods of revolution to selected
key members of the movements. Some typical in-
c. Insurgent psychological operations have two surgent recruitment and training activities and
general aims—to weaken the established govern- their effects are as follows :
ment and to win the support of the people. Often (1) The unexplained disappearance of young
both these aims are achieved by a single act. The men may indicate insurgent recruitment and de-
following indicates types of insurgent psycholog- parture to receive training at another location.
ical operations, their effects on the local popula- (2) Reports from people concerning contacts
tion, and the information that can be derived from by strangers to join new movements or under-
them : ground organizations may indicate that insur-
(1) Activities togents weaken
are the established
actively engagedgov-
in recruitment. These
ernment are antigovernment propaganda ; assassi- reports may also indicate patterns and targets of
nation and kidnapping of local government insurgent recruitment.
leaders ; breakdowns in government provided (3) Radical and hostile changes in the atti-
public services; use of influential organizations, tude of the people toward the government may
groups and individuals, knowingly or unknow- indicate that the people have been subverted by
ingly, to create or spread statements of dissatis- the insurgents.

7-8 AGO 7334A


FM 30-31

(4) Unexpected shortages of doctors, print- (4) Captured insurgent documents regarding
ers, and other specialists may indicate that they s u ch su bj ects as—
have been recruited or forced by the insurgents to (a)
work for the movement. supporters (both foreign and local).
(5) Travel by individuals to foreign areas or (ft) The insurgent organization.
local areas under insurgent control may indicate (c) The insurgent routes of communica-
that these individuals are receiving training and tion, camps, caches, and “safe houses.”
indoctrination or are somehow engaged in insur- (d) Local insurgent targets.
gent activities. (e) Insurgent plans.
(/) Insurgent doctrine and methods of op-
(6) The apprehension of individuals engaged eration.
in subversive activities, clandestine information (g) Adjacent insurgent units.
collection, or sabotage, is usually a clear indication
that they are part of the insurgent movement. (5) Propaganda reveals targets (government
agencies, official programs, unpopular local condi-
/. Insurgents depend in varying degrees upon tions) which the insurgent intends to attack.
local sources for financial and logistical support. Analysis of the propaganda message may reveal
Their procurement needs during any particular segments of the local populace to which the propa-
period may indicate a financial and material weak- ganda is addressed and may help to determine the
nesses or it may indicate their future intentions origin.
(large scale procurement of arms, ammunition, (6) Photographs are excellent sources of in-
and medical supplies indicate that the insurgents formation, alone or as supplements to oral or
are preparing for guerrilla warfare). The prin- written reports. Typical photographs which pro-
cipal items which the insurgents may procure vide valuable information are—
locally are— (a) Photos of insurgents which provide
(1) Money. positive identification.
»
(2) Food. (b) Photos of known insurgent bases,
(3) Clothing and field equipment. caches, and meeting sites.
(4) Weapons, ammunition, and explosives. (c) Chance or intentional photos of insur-
(5) Medical supplies. gents engaged in illegal activity.
(6) Printing material and equipment for (d) 'Photos of demonstrations, riots, and
propaganda purposes. strikes which may provide positive identification
of insurgent agitators present at these events.
7-14. Objects as Sources of Information (e) Photos of the results of insurgent ter-
roristic acts which provide vivid pictorial evidence
The final category of sources of information con-
that can be used psychologically against the insur-
sists of objects. This category is broad, ranging
from objects which provide specific information gents.
on the identity and plans of the insurgents, (e.g., b. Documents Concerning the Local Situation.
captured documents) to objects which provide ( 1 ) Maps. Detailed topographic maps will in-
general information on local, social, political, and dicate the local areas best suited for insurgent
economic conditions (e.g., area studies). Some spe- bases and routes of communication. If the loca-
cific objects used as sources of information are— tions of the insurgents’ activities are known, they
a. Physical Evidence. Before the insurgent be- may be plotted on maps to enable the intelligence
officer to deduce patterns and thus anticipate
comes firmly established in an area, he craves an-
future insurgent moves.
onymity. Indicators which betray his presence,
however, are— (2) Official publications. Official publications
prepared by government agencies or private or-
(1) New trails and campsites in remote ganizations under government contract, provide a
areas. wealth of information to stability operations plan-
(2) Apartments or homes which are occupied ners. Examples of publications which may exist
at irregular intervals by strangers who keep odd are—
hours or act in a suspicious manner. (a) Statistical studies concerning the crime
(3) Caches of food, weapons, ammunition, rate and types of crimes committed.
transceivers, clothing, and medicine. (ft) Studies of the local economic situation.
AGO 7334A
7-9
FM 30-31

(c) Reports on local public health and sani- edgeable of insurgents as well, and interrogation
tation. of known or suspected insurgents may yield de-
(3) Books. Books written about the local area tailed information on aspects of the insurgent
should not be overlooked as possible sources of movement. Searchers of suspected buildings and
information, particularly if they are factual texts. locations, and seizure of their contents, may pro-
These books may be useful as background material duce individuals and/or items of intelligence
for more detailed area studies or may explain the value. Finally, police checkpoints, both stationary
causes of racial, religious or other tensions. and mobile, may detect the movement of insurgent
(4) Newspapers. Newspapers may contain personnel and supplies and lead to the discovery of
valuable information which has not yet come to insurgent routes of communication, bases, and
the attention of the government. Newspaper re- caches.
porters frequently have an excellent informant (3)
network which enables them to obtain new infor- lecting a great deal of information, certain factors
mation as early as possible. often limit their information collection capability.
Good relations with the people are often lacking
and local police forces frequently do not have suf-
7—15. Indigenous Government Collection ficiently trained manpower to operate effectively.
Agencies Adequate funds usually are not available to sup-
a. Most indigenous government agencies collect port operations effectively. Also, police forces
information in the performance of their govern- usually lack sufficient equipment to provide mo-
mental functions. All national and subordinate bility and rapid communication ; police records
level governmental agencies, therefore, with a ca- and files usually are rudimentary.
pability to collect information should be consid-
ered by internal defense intelligence planners in c. When a national intelligence service exists
planning the collection effort. apart from police and military intelligence, it may
have the best human, finanial, and material re-
b. At the local level the police are often the best sources to enable it to engage in overt and covert
information collection agency. In performing their information collection.
law enforcement role they develop a thorough d. Other specialized government agencies will
knowledge of the local environment. The type and often possess a useful collection capability. Exam-
quantity of information the police can collect is ples of such agencies are—
almost limitless. This collection capability is more ( 1 ) The Ministry of Agriculture.
easily understood when one recognizes that police (a) Agricultural agents can obtain such in-
units usually are recruited from the local popula- formation as—local agricultural conditions and
tion and remain assigned to the same area. By problems ; irregularities such as theft or diversion
operating in the same area for years, police accu- of crops and livestock from the open market to the
mulate detailed data on such useful information as insurgents; and the attitudes and grievances of
the local social, economic, political, and religious local farmers. This information may be collected
conditions, the attitude of the people concerning in the following ways: personal observation of
the government and the insurgents, and insurgent local conditions by field representatives, inter-
organization and activities. They also are usually views with local farmers and agricultural speci-
completely familiar with terrain features of the alists, and casual conversation with local farmers
areas in which they are stationed. while providing them assistance.
(1) Routine patrols afford the police an excel- b) The limitations based on the above ca-
lent opportunity to collect information by asso- pabilities and employment are that sufficient agri-
ciating with the people, observing events along the cultural specialists usually are not available to
patrol route, and investigating suspicious activity. cover all rural areas, and these specialists, when
Surveillance of suspected persons, places, and they exist, must be trained to collect the type in-
things discloses the existence of insurgent activi- formation needed by internal defense forces.
ties and reveals the identities of those engaged in (2) The Ministry of Public Health.
such activities. Investigation of crimes may also (a) Representatives of this organization
reveal a relationship between the crimes and the can collect data on local health and sanitary condi-
insurgents. tions, theft of drugs and other medical supplies
(2) Informants, routinely employed by the from government facilities by insurgents, the atti-
police to detect criminal activity, are often knowl- tude of the people toward government health and

7-10 AGO 7334A


FM 30-31

sanitation programs, and the effectiveness of these time often pose as legitimate workers, refugees,
programs. Information of this type can be col- and settlers. They will be extremely security con-
lected by field representatives of the Ministry of scious and organized into small cells which often
Public Health in the f ollowing ways : personal ob- will not openly associate with one another. Insur-
servation of local conditions, interviews of local gent communications will be covert, and almost all
medical personnel and patients, and casual conver- insurgent information collection activities will be
sations with medical personnel and patients. conducted clandestinely. Insurgent propaganda
(5) The limitations of the Ministry of will be so worded as to disguise the relationship
Public Health are the same as those of the Min- between the propaganda and the insurgent move-
istry of Agriculture. ment; front organizations established by the in-
(3) The Ministry of Communications. This surgents may appear as legal organizations whose
ministry can be a source of information on estab- stated aims openly support—but covertly subvert
—the government.
lishment of new commercial and amateur radio
stations ; evidence of use of unauthorized frequen- b. Insurgent activities such as assassination and
cies, and unusual traffic patterns on commercial robberies may be executed in such a way as to
communication systems. appear to be the work of common criminals. In-
surgent installations in urban areas will be dis-
7-16. Insurgent Countermeasures guised or hidden. In rural areas insurgent bases,
To Deny Information caches, and supply routes will be located where
they are not likely to be discovered by patrols or
a. Insurgent cadre entering an area for the first aerial reconnaissance.

Section IV. PROCESSING OF INFORMATION

7-17. General gence workbook. FM 101-5 gives an example of a


Processing is the step in the intelligence cycle staff journal. Variations in recording devices
whereby information becomes intelligence and which are unique to stability operations occur in
consists of recording, evaluation, integration, and the use of annotated maps and working files.
interpretation. The processing of information is These are discussed below:
discussed in FM 30-5. There are certain consider- a. Annotated Maps. Depending on the echelon of
ations, however, which are unique to the internal responsibility, the state of insurgent activity in
defense environment. In order to properly deter- the area, and the degree of knowledge of the
mine insurgent capabilities and courses of action enemy, thé" graphic representation of current in-
and to provide the intelligence necessary for all telligence will require the maintenance of at least
facets of stability operations, the intelligence of- two annotated maps—the incident map and the
ficer must be guided by an awareness of these con- insurgent situation map. Each of these recording
siderations. devices normally will take the form of a trans-
parent overlay covering a large scale topographic
map of the area. Unlike the workbook, which is
7-18. Recording
maintained for individual use, the incident and
As in conventional tactical situations, stability op- situation maps provide a ready guide to associates
erations will be characterized by the accumulation and a meaningful aid for briefing the commander,
of vast amounts of information on a continuous the civil authorities, or other interested parties- If
basis which must be promptly compared with ex- activity in a particular area is limited, considera-
isting information and intelligence in order to de- tion may be given to the combination of these two
termine its significance. The extent of the re- maps. Other annotated maps may be valuable aids
cording effort will depend to a large degree upon for the recording of information or intelligence,
the insurgent activity in the area, and the per- depending on the needs of a particular headquar-
sonnel available to maintain and analyze the ters’ tactical area of responsibility. These special-
recorded information All of the recording aids purpose maps may include records of mining and
mentioned below, however, serve a unique and boobytraps incidents; enemy names or codes for
useful purpose in the overall intelligence produc- local terrain features, villages, areas, trails, etc. ;
tion effort. FM 30-5 gives a detailed description of and reports of other enemy activity. It may be
the journal file, intelligence journal, and intelli- necessary to enlarge certain areas of interest
AGO 7334A
7-11
FM 30—31

either by drawing portions of the map to a larger (4) Population status map. This may consist
scale, with the addition of significant detail, or by simply of an overlay in the situation map. Essen-
making a mosaic from aerial photos. The impor- tially, this map will portray the attitudes of the
tant factor is that past, present, and potential in- population whether disaffected, loyalist, or
surgent activity must be visible in terms of a de- doubtful. Colors can be used effectively to desig-
tailed and thorough understanding of the environ- nate these conditions.
ment. Comparison of the several annotated maps (5) Personalities and contacts map. What is
maintained will often assist the intelligence officer known initially about the insurgent situation may
in estimating the enemy’s intentions and capabili-
consist primarily of information concerning loca-
ties or to establish trends. tions and activities of individual agents of es-
(1) Incident map. The incident map provides pionage, agitation, organization, and liaison. The
historical cumulative information to trends and appearances, movements, meetings, and disap-
patterns of insurgent activity. Properly main- pearances of these personalities should be re-
tained, the distribution of entries will enable the corded on a ^personalities and contacts map. A
intelligence officer to make judgments as to the large-scale map will be required for this purpose
nature and location of insurgent targets in the (a city street map or town plan if an urban area is
area, the relative intensity of insurgent interest in involved). Deviations from regular patterns of
specific areas, insurgent control over or support movement can be detected in this manner. De-
from the population, and potential areas of insur- pending upon the number of personalities under
gent operations. Judgments concerning the latter surveillance, the regularity of their habits, and the
also require knowledge of terrain factors and in- variety or reports received on them, it may be
surgent limitations. necessary to maintain a separate overlay for each
(2) Insurgent situation map. The situation subject. Old overlays should be filed for compar-
map represents finished intelligence, much of it ison. Each subject’s route should be portrayed in a
built around the information recorded on the inci- different color, and regularly traveled routes dis-
dent map. It will be difficult to pinpoint insurgent tinguished from new routes. Observations should
installations and dispositions with the same be dated and incidents noted by symbol, if pos-
degree of confidence as in a conventional tactical sible. Depending upon the amount of insurgent ac-
situation. The insurgents can displace on short tivity in the area of responsibility, this map may
notice, making a report outdated before it can be be combined with the incident map.
confirmed. While the situation map presents an un- b. Working Files. The intelligence worksheet
certain and hypothetical picture, composed less of
and the annotated maps serve to isolate problem
firm information than of reports or fleeting tar-
areas and formulate relationships among the in-
gets, estimates, and abstractions, it may sub-
formation and intelligence collected. Extensive re-
stantiate in graphic terms the trends or patterns search material is required, however, to analyze
derived from the incident map resulting in im-
these problem areas. In the early phase of an in-
proved economy and effectiveness of the surveil-
surgency, the enemy is building his own organiza-
lance and reconnaissance effort.
tion. His organizational procedures and tactics
(3) Trap map. This map is used if the insur- will, therefore, be unique, and familiarization of
gent has a capability for sabotage or terrorist the part of the intelligence officer will require
action. It can be constructed by direct annotation study of personalities and painstaking analysis of
of the map on which the situation overlay is
incidents. This necessitates the keeping of exten-
placed, or it can be kept separately. This map will
sive working files, types of which include :
portray locations in the area of responsibility
which present particularly attractive targets for (1) Hot file. The most important working file
insurgent sabotage or terrorism, such as road and will be the hot file. This will include all available
railroad bridges, communications centers, theaters material pertaining to an incident or groups of
and assembly halls, and places where the terrain possibly related incidents which are of current in-
favors ambushes and raids. Such areas should be terest. Also included will be material relating to
identified and analyzed as part of the area study, persons or places likely to be involved in insurgent
but they should also be plainly marked on this activity, together with material on agents or sus-
map with attention directed to possible insurgent pects who may be involved. A reported sabotage
access and escape routes. Photographs which are plot, for example, could initiate a hot file on the
keyed to the map can also supplement this effort. subject. The hot file remains active until the

7-12 AGO 7334A


FM 30-31

report is refuted, the incident occurs, or the atten- cident files, inactive personality and organization
tion of the insurgent is diverted elsewhere. files, and photography. The latter material may be
(2) Current propaganda and PSYOP file. If particularly useful. Air or ground photographs of
propaganda constitutes a major part of the insur- places of interest should be arranged chronologi-
gent effort in the area, a file maintained by the cally by location and should be readily available
analyst should contain all pertinent literature, for use in conjunction with hot files, incident
background material and analyses available, to in- maps, trap maps, and the like.
clude copies of propaganda literature, transcripts (6)
of propaganda speeches, and analyses of local maintained of reference publications such as man-
grievances being exploited or subject to exploita- uals on doctrine and method, books on the area
tion by the insurgents. and on the insurgent threat, files of newspaper
(3) Personality and organization files. At- and magazine clippings, and any other material
tempts should be made to develop and maintain as which may be of use. This material may be kept at
detailed a local file on each insurgent personality a central library serving the entire staff and lo-
as is possible. If surveillance is carried out by the cated at the area coordination center.
local police, basic identifying and biographical in-
formation can be transferred from police dossiers 7—19. Evaluation
to a card file. This file will support training of Evaluation involves the examination of informa-
friendly surveillants in their ability to recognize tion to determine its intelligence value. In evalu-
key personalities on sight. The organization sec- ating information the knowledge and j udgment of
tion of this file should include information on the the intelligence analyst play a major role. In con-
history and activities of the insurgent organiza- sidering whether a fact or event is at all 'possible,
tions in the area and on fronts or other subversive it must be realized that certain events are possible
or suspected groups. Officers and memberships, despite the fact that they have not previously oc-
overlapping directorates and memberships, and curred and have been deemed unlikely to occur.
liaison among these organizations should all be re- While confirmation of information by other
corded and kept up to date. sources and agencies is always desirable, it is not
(4) Area study files. Area study files should always possible to obtain. Initially, intelligence
be established to maintain up-to-date and perti- production commences with unconfirmed informa-
nent data in the geographic, political, sociological, tion which is subsequently supported, confirmed,
economic, and cultural fields. In stability opera- or denied by the collection of additional and re-
tions, even the lower echelon tactical commander, lated information. As more information is ob-
particularly when operating in the same general tained, the insurgent situation, capabilities, and
operational area over extended periods of time, probable courses of action become increasingly
has a definite requirement for such information. clear. As the body of intelligence expands, infor-
The intelligence staff officer should, therefore, mation that is not compatible with the current in-
have ready access to such data. The topical break- surgent situation and is not consistent with the
down of such files should be oriented toward recent pattern of insurgent activity is suspect.
events and activities of continuing significance. The process of evaluating information is discussed
Thus, for example, if rice is the basic staple in an in detail in FM 30-5. Procedures governing the
economy, the topical breakdown in the economic assignment of evaluation ratings to sources and
portion should include files on rice production, dis- agencies have equal application in the internal de-
tribution and marketing, price levels, black fense environment.
market and pilferage, etc. Since this key economic
indicator will have continuing influence on 7—20. Integration
friendly military operations as well as on the in- a. Evaluated information becomes intelligence
surgent forces who depend on this staple for sur- only after it has been integrated with other infor-
vival, careful analysis of this data over a period of mation and interpreted to determine its signifi-
time may provide patterns based on which insur- cance. Integration involves the combining of se-
gent actions could be anticipated and their capa- lected data in order to form a pattern which will
bilities predicted. have meaning and establish a basis for interpreta-
(5) Resource file. A resource file should in- tion (see para 7-2). It is important that the intel-
clude all material which may be of importance but ligence analyst be sufficiently perceptive to recog-
not of immediate value. It can include inactive in- nize all the possible patterns that may be formed.
AGO 7334A
7-13
FM 30-31

An example will serve to illustrate the mental pro- the insurgents and, finally, there is a fourth possi-
cess of integration. The intelligence section of the bility that both the labor leader and his murder
area coordination center receives information that are unconnected with the insurgency.
a prominent labor leader has been murdered. In a
search for related information the intelligence an- 7-21. Interpretation
alyst checks the incident file, the friendly and sus-
a. Interpretation is the result of making deduc-
pect personality files, and the organization file.
tions as to the probable meaning of new informa-
(1) The incident file reveals a series of mur- tion and determining its implications with respect
ders that have been linked with the insurgent, to future insurgent activity. The meaning of the
with the primary victims being government information is determined in relation to the insur-
officials, prosperous merchants, and large land- gent situation and the insurgents’ probable
holders who opposed insurgent objectives. courses of action.
(2) The suspect personality file reveals the b. For example, in the case mentioned above, if
labor leader’s controlling position within a union the labor leader was loyal to the government and
that has recently intensified its criticism of the was murdered for opposing insurgent control of
government. The personality file also reveals the the union, it may reasonably be expected that fur-
labor leaders’ close association with several gov- ther consolidation of insurgent control over the
ernment officials and his recent extensive travel union, increased antigovernment agitation by the
throughout the nation. union, and possibly an extension of insurgent ter-
(3) The organization file indicates that the rorist activities will take place.
union has recently begun to disseminate antigov-
c. If however, the labor leader was a member of
ernment leaflets and has threatened to call a strike
the insurgent organization and was murdered by
if demands for representation in a popular front
the insurgents, it may be conjectured that he was
government are not met. The organization file also
eliminated because he was considered unreliable
indicates that a struggle for power has been
or was progressing too slowly toward the achieve-
taking place within the union. The other primary
ment of insurgent objectives. In this case, the
contender for union leadership is a relatively un-
prompt emergence of another insurgent union
known newcomer.
leader who will insure more rapid progress
b. Once the intelligence toward
analyst hasinsurgent objectives may be expected. It
obtained all
related items of information from the intelligence may also be inferred, however, that the labor
files, he begins to assemble the available informa- leader was murdered as a result of a struggle for
tion to form as many logical pictures or hy- power within the insurgent organization. In this
potheses as possible. Alternative methods of as- case, weaker insurgent control of the union may
sembly are an essential prerequisite to any valid be expected due to the dissension among the insur-
interpretation. Assembly of information to de- gents.
velop logical hypotheses requires good judgment d. Finally, if the labor leader had no connection
and considerable background knowledge. In for- with the insurgent organization and was mur-
mulating hypotheses the intelligence analyst must dered for reasons unconnected with the insur-
avoid the limitations which result from precon- gency, this event has no significance from an intel-
ceived opinions. In the example of the murdered ligent standpoint.
union leader, the new information can be inte-
grated with existing intelligence in several dif- e. Additional discussion of the interpretation
ferent ways. By combining the murder with one function to include analysis, deduction, and
set of facts, the labor leader might be pictured as bearing on the current intelligence estimate of the
a loyal supporter of the government who became situation can be found in FM 30-5.
the victim of a campaign of selective terror under-
taken by the insurgents. On the other hand, by 7—22. Order of Battle
combining the murder with another set of facts, a. The production of order of battle intelligence
the labor leader might be portrayed as a membe- is discussed in FM 30-5. There are certain order
of the insurgent organization who was murdered of battle considerations, however, which are
for reasons unconneced with the insurgency. As a unique to the insurgent enemy. Order of battle
third possibility, he may have been a member of intelligence is equally as important in an insur-
the insurgent organization who was eliminated by gency as in conventional combat operations. How-

7-14 AGO 7334A


FM 30-31

ever, some differences in nomenclature and ap- to include their organization and chain of com-
proach must be recognized. The applicability of mand. The degree of sophistication encountered
the various order of battle factors will differ will be indicative of other factors, such as training
somewhat in an insurgency from conventional op- logistics, strength, etc. Armed platoons or small
erations and there will also be differences in appli- terrorist cells would indicate that the overtly mili-
cability between Phase I and Phase II insurgency tary portion of the insurgents’ plan is just begin-
situations. The elements of order of battle intelli- ning; armed battalions and large urban terrorist
gence (order of battle factors) are not inde- groups indicate that there is a serious menace to
pendent of each other ; they are closely related and the government in power.
must be considered as a whole. Information on one (c) Political structure. At the center of
of the elements will often lead to a re-evaluation some insurgent movements may be found a tightly
or alteration of information previously received disciplined party organization formally structured
on another element. Furthermore, the general to parallel the existing government hierarchy in
rule, whereby order of battle intelligence is devel- the country. In most instances this organizational
oped and maintained down to and including two structure will consist of committed organizations
echelons below the analyst’s own level of com- at the village, district, province, interprovincial,
mand, does not apply to stability operations. Due and national levels. Within major divisions and
to the nature of the insurgency and the phased sections of an insurgent military headquarters to-
development of the insurgent forces, order of tally distinct, but parallel, command channels
battle intelligence must be produced in much exist. These are the military chain of command
greater detail and pertain to much lower echelons and the political channels of control. Whether it is
(even down to squad) than in conventional combat through a political division of an insurgent mili-
operations. tary headquarters, a party cell or group in an in-
b. A listing of the order of battle factors fol- surgent military unit, or a unit political officer, the
lows, together with a brief explanation of their party insures complete domination over the mili-
applicability and means in the context of insur- tary structure by use of its own parallel organiza-
gency situations. tion.
(d) Combat forces. The organization of in-
(1) Composition. In some insurgent move-
surgent combat forces is dependent upon the need,
ments, military force is only one of several instru-
the tactics to be employed, and the availability of
ments through which the insurgent movement
personnel and equipment. Frequently, subordinate
seeks power. Development of a military force has
the lowest priority during the early stages of an elements of insurgent units are employed inde-
pendently. The intelligence analyst who receives a
insurgency. As long as the party core and civil
organizations are established and move effectively confirmed report of a subordinate element of an
insurgent unit operating in his area cannot, there-
toward the goal of the insurgency, the military
for, assume that the parent unit is also present.
arm may either lie dormant or simply exist in
Identification of insurgent units may be by
cadre form until needed as a supporting force. See
number, commander’s names, nickname, code des-
appendix B for further details on the composition
ignation, and/or the name of the area in which it
of a type insurgent armed force organization.
operates. Further, designations are frequently
(a) Phase I considerations. Rather than in- changed and multiple designations are used to
formation on the identification and organization confuse friendly intelligence. It follows that the
of specific enemy units, we are concerned with the intelligence analyst may not be able to make a
types and internal workings of insurgent activity determination of the size and strength of an insur-
groups. Knowledge of the composition of insur- gent unit merely by obtaining a unit identification.
gent groups can be a key to the entire planned
course of the insurgency. Details of composition (2) Disposition.
may include the appearance of new organizations, (a) Insurgent forces. Determination of the
the relative amount of enemy effort expended in disposition of the insurgent involves the location
rural and urban operations, the internal chain of of his operational bases, training bases, supply
command and control, and the manner in which bases, lines of communication, and areas of polit-
insurgent groups are organized for operations. ical control. The intelligence analyst can arrive at
(b) Phase II considerations. The intelli- potential dispositions of the insurgent combat
gence analyst will be concerned here with deter- forces by developing patterns of activity based
mining the composition of insurgent combat units, upon map study and knowledge of insurgent tac-

AGO 7334A
7-15
FM 30—31

tics. Insurgent base areas, for instance, normally multiple designations for a single element. Re-
are located near areas politically controlled by the ports from the populace concerning the strength
insurgents, thereby providing an early warning of the insurgent forces should be viewed with cau-
system. By plotting insurgent sightings and com- tion and the importance of actual counts of enemy
bining this information with weather conditions, personnel stressed. Certain insurgent initiated in-
time factors, detailed investigation of insurgent cidents can provide useful indicators of the
incidents, and after action reports', the analyst can strength of the insurgents in a particular area.
best select possible enemy dispositions as well as Examples of these are an increase in kidnapping
possible areas of tactical deployment. Considera- or an increase in raids with subsequent loss of
tion should also be given to areas where no insur- weapons. The determination of popular support
gent activity has been reported. These areas, while for the insurgents is a more difficult task and can
appearing to be under the control of internal de- be stated best in terms of the percentage of an
fense forces, may be under the political control of area under government control as opposed to the
the insurgents. percentage under insurgent control, with both
(b) Phase I considerations. The location, viewed together in terms of population density. A
deployment within this location, and any move- useful indicator of the extent of insurgent polit-
ments of insurgent organizations or personnel are ical control is the willingness of the populace to
of concern here. The enemy’s strength and tactics report information concerning the insurgents.
may be revealed to some extent by discovering (by Phase I considerations. The cadre who
whether this effort is concentrated in a few places are used to organize and activate the movement
or dispersed throughout the target nation. If his usually are highly trained, aggressive profes-
effort is initially concentrated in one city or in one sionals who exercise an influence out of proportion
rural area, then the extent and rapid spread of the to their actual numbers. The analyst is also con-
insurgent organizations are a key to how long he cerned with the number of enemy units in exist-
has been operational, how successful he has been, ence, which in Phase I means identifying and eval-
and, in part it is an indication of his appraisal of uating new groups and organizations »which have
friendly strength. In a nation which he considers a appeared in the nation and any changes in the size
relatively easy conquest he may begin with many of existent groups. While weapons are not a
operations rather than a few. By studying the matter of paramount interest, other equipment is.
other available elements of order of battle intelli- A printing press in Phase I may be a deadlier
gence the intelligence analyst may determine such weapon than a battalion.of artillery.in Phase III.
things as whether the movement of an enemy . • (c) Phase II considerations. The actual
cadre or group is an advance toward new goals or number of men available to the insurgent now as-
a retreat from an unprofitable operation. sumes the importance it lacked to some degree in
(c) Phase II considerations. The manner in Phase I. By knowing also the amount of weapons
which the insurgent forces are deployed can indi- and equipment he possesses, estimates of capabili-
cate whether the enemy is making a widespread ties against friendly forces can be formulated. The
show of strength with units scattered about the degree of popular support for the insurgent will
country or is concentrating them around a few manifest itself in such areas as recruiting for his
key targets. It can also show whether he is going forces.
to concentrate on such activities as interdicting (4) Tactics.
transportation or actively seeking battle with gov- • (a) Insurgent forces. Tactics include both
ernment forces. enemy doctrine and his conduct of operations in
(3) Strength. accordance with that doctrine. Insurgents may be
(a) Insurgent forces. The strength of the more flexible in their application of doctrine than
insurgents must be thought of in terms of the regular military organizations. The doctrine
combat forces, political cadres, and popular sup- which guides the insurgent must be known and
port. Conventional methods of strength computa- understood by friendly forces if they are to effec-
tion can be applied in the determination of insur- tively counter enemy efforts. The careful examina-
gent strength. The analyst should be aware, how- tion of his tactics, or actual operational tech-
ever, that the insurgent will attempt to have his niques, may reveal changes in doctrine as well as
strength overestimated by stability operations indications of the personality and competence of
forces. In order to give this false impression, he the insurgent leader. Again, his choice and appli-
will employ rapid movement of his units and use cation of tactics is a reflection of insurgent ap-
7-16 AGO 7334A
FM 30-31

praisal of friendly strength as well as of his own. mined to some degree by any observed increase in
A continuing .estimate of relative strengths is a the effectiveness or size of the insurgent move-
very basic part of Communist operational plan- ment. Some training normally will be conducted in
ning and has an immediate effect on tactics. Tac- another country and may be indicated by a change
tics of the insurgent will involve political, mili- in number and type of personnel traveling to that
tary, psychological, and economic considerations, country.
all closely integrated. They will vary with the (c) Phase II considerations. Much atten-
phase of the insurgency. The political' goal of the tion must now be devoted to locating training
insurgents will be to undermine and discredit the camps and areas, identifying training cadres, and
established government. Military tactics are char- interdicting the movement of insurgents to' and
acterized by speed, surprise, and heavy application from out-of-country training areas. Some insur-
of firepower and mobility.. The capabilities and gent units may be identifiable as having been
vulnerabilities of the insurgents are discussed in trained for special missions such as reconnais-
detail in chapters 3 and 4. , , r sarice or demolition.
(b) Phase I considerations. Phase I insur- (&) Logistics. .
gency is characterized by an absence of strictly (a) Insurgent forces..\r\ an insurgency, as
military operations and an emphasis on subver- in a- conventional warfare situation, the effective-
sion and organizational development. Although in- ness of the insurgent is very much dependent on
stances of terrorism may begin to occur in the his logistical support. In the early stages of an
later stages of Phase I, military activity usually is insurgency the requirements for military equip-
limited to recruiting and establishment of military ment and supplies are less than in the later stages.
cadres. Accurate intelligence on the insurgent’s sources
(c) Phase II considerations. An increased and availability, of supplies and equipment is es-
emphasis on the study and evaluation of the insur- sential to determine his capability to maintain and
gent military tactics is required during this phase. expand the.insurgency.
Tactics during Phase II'generally are limited to
(ö) Phase I considerations. Two particular
ambushes, raids, sabotage, and terrorism. These
items, have always been essential to the Phase I
activities provide the insurgent with supplies, ex-
insurgent—money and a printing press. If the in-
perience, and self-confidence, while at the same
surgent is highly successful in the establishment
time they erode friendly morale .and reduce and motivation of his power base, he may never
friendly economic and military capabilities. really hajve a requirement for the usual items of
(5) Training. - . < military “supply. Money is often supplied from
(а) Iñstirgent forces. Insurgent training abroad, but such occurrences as bank robberies,
will be closely related to the tactics being em- unusual or .excessive fund drives, payroll deduc-
ployed and will include vigorous indoctrination in tion requests, or sudden affluence among suspect
political affairs. Both the combat forces and the government officials are cause for suspicion.
people within an area under the political domina- Equipment for the production and dissemination
tion of the insurgents receive training. Individual of propaganda, such as printing presses and radio
operations and phases of movement are carefully sets, is of a special nature, and its purchase and
planned and trained for by the insurgents. A use can be controlled by the friendly government
careful analysis of an area with respect to the to a large degree.
type of training taking place can provide a useful
(c) Phase II considerations. Logistics is
indicator of the probable courses of action that
now a larger and more elaborate requirement for
will be employed against stability operations
the insurgent. He must now procure, store, trans-
forces.
port, and maintain such items as weapons, ammu-
(б) Phase I considerations. During Phase I nition, explosives, signal equipment, and medical
the insurgent will train and indoctrinate his own supplies. A much larger number of people are re-
cadre as well as newly accepted or recruited indig- quired to operate the logistical system. Insurgent
enous personnel. Training will consist of a great supply caches and supply lines become items of
deal of political indoctrination along with tech- critical .concern to friendly forces. Borders and
niques of propaganda, communications, and intelli- coastlines must be controlled and aerial surveil-
gence collection. Training and effectiveness go lance of remote areas or areas known to be used
hand in hand ; the type, amount, and validity of by the insurgents' must be instituted in order to
training received by the insurgents may be deter- detect or deter his movement of supplies.
AGO 7334A
7-17
FM 30-31

(7) Effectiveness. at least set back its progress. Unfavorable public-


(a) Insurgent forces. Effectiveness de- ity attached to the movement as a result of the
scribes the qualitative ability of the insurgent to exposure of the insurgency renders its success less
achieve 'his politicail or military purposes. likely. The apprehension, compromise, or exposure
(b) Phase I considerations. In Phase I the of its leaders may destroy the insurgency com-
term “combat effectiveness” usually is not appli- pletely. Knowing who the insurgent leaders are
cable. While words such as “struggle” and “front” can also furnish a valuable indication of how tac-
are used by the insurgent, they do not connote the tics and training will be conducted and how effec-
use of armed force. The overall effectiveness of the tive the overall effort will be.
insurgent effort is sometimes made very obvious (c) Phase II considerations. As in Phase I,
by spactacular successes (antigovernment victory personalities are important enough to warrant
in an important election) or failures (collapse of a being considered a separate factor. Many insur-
new factory-workers organization known to have gent units will be called by their commander’s
been backed by the insurgent). A continuing de- name, rather than having a conventional designa-
cline of governmental influence in a certain area tion.
or among a certain group of people may well indi- (9)
cate a corresponding increase in insurgent influ- (a) Insurgent forces. Any other items
ence. The leaders may forbid overt or easily de- which contribute to knowledge of the insurgent,
tectable actions until they feel that their move- his goals, and methods are considered here.
ment is in position to make a serious bid for (&) Phase I considerations. This category
power ; in this case, the insurgent’s real effective- can include such items as historical studies of
ness may remain unknown until it is too late for people and parties involved in the insurgency,
anything but a historical account of it. There code names or numbers, and any other informa-
usually will be overt indications of the effective- tion which does not fit under the other eight cate-
ness of the insurgent operation, and information gories. This type of information should not be
on it may be gathered by careful observation of slighted, as seemingly superfluous items may well
organizations, movements, and elections at all become useful and important.
levels. Penetration of these activities by govern- (c) Phase II considerations. Several miscel-
ment agents is very desirable and can make a sig- laneous items now come to the fore as vital ad-
nificant contribution to the order of battle picture. juncts to the other factors. Weapons, insignia,
(c) Phase II considerations. The factor of code names and numbers, types and colors of uni-
effectiveness now expands to include combat forms and flags—all these things aid in the identi-
efficiency of insurgent military forces. By care- fication of enemy units, the source of outside aid,
fully evaluating the other order of battle factors, the source of weapons and equipment smuggled
plus taking note of actual combat experience, we into or purchased in the target nations, and the
can evaluate the insurgent’s combat effectiveness morale and effectiveness of the insurgent armed
or lack thereof. We can determine his strengths forces.
and weaknesses and from this calculate his capa- c. There are several points to remember in the
bility to follow various courses of action. application of order of battle factors to an insur-
(8) Personalities. gency.
(a) Insurgent forces. Personalities are not (1) Insurgents’ methods may change, but
listed as a separate order of battle factor in a their principles are unchanging.
conventional situation. They are of greater impor- (2) The nine order of battle factors pre-
tance in an insurgency, however, and are there- viously discussed are closely interrelated and
fore listed as a separate factor. cannot be analyzed separately.
{b) Phase I considerations. In Phase I per- (3) When an insurgency escalates to a Phase
sonalities are an extremely important factor. II situation, the order of battle effort must be ex-
During this phase, when the insurgency is just panded considerably. The enemy combat units
beginning to organize, function, and attempt to must now be considered in addition to the various
spread its influence, the loss of a comparatively Phase I organizations and activities which will
small number of men can practically destroy it, or still be active.

7-18 AGO 7334A


FM 30-31

Section V. DISSEMINATION OF INTELLIGENCE

7-23. General which invalidates existing information and intelli-


gence. Insurgent activity or the lack thereof may
Factors which influence the ultimate selection of a
be significant in the determination of insurgent
method for the dissemination of intelligence are
weaknesses, capabilities, and probable courses of
discussed in detail in FM 30-5. The most secure
action. An example of a format for an estimate of
means of dissemination which is consistent with
the insurgent situation is contained in appendix
the need for timeliness should be chosen. There D.
are three general methods of dissemination—per-
sonal contacts, messages, and intelligence docu- c. The following documents will assist the intel-
ments. The latter will be discussed in further ligence officer in determining the type intelligence
detail. documents needed.
(1) Police reports are especially valuable
7-24. Intelligence Documents during the early phases of an insurgency because
a. In the initial phase of an insurgency, govern- detectable insurgent activity at this time will take
ment agencies require documents containing large the form of murder, theft, kidnapping, extortion,
amounts of specific intelligence to serve as a basis rioting, formation of subversive organizations,
for their estimates, plans, and operations. In all terrorist acts, and dissemination of antigovern-
stages intelligence documents represent an impor- ment propaganda. Each criminal act will have to
tant means of disseminating current intelligence. be examined to determine in what way, if any, it
Documents used in the dissemination of intelli- is related to insurgent activity.
gence and information are discussed in detail in (2) Biographical data on suspected insur-
FM 30-5. gents, information concerning subversive organi-
zations, and a listing of dissident groups permit a
b. Certain basic documents should be prepared close watch to be maintained on potential insur-
in all cases when an insurgency condition exists. gents and their supporters and provide the oppor-
(1) The area study. A document which is tunity for their neutralization.
basic to all government agencies involved in in- (3) Lists of suspected insurgent targets,
ternal defense operations is the local area study. whether they be individuals, organizations, gov-
This document describes in a general manner all ernment agencies, buildings, or other features,
conditions within an area related to the geog- permit stability operations forces to plan for, and
raphy, topography, weather, economy, sociology, implement, programs aimed at providing adequate
system of government, political institutions, and defense for these targets against any insurgent
insurgent organization and activities. The area attack.
study serves the following purposes :
(a) Familiarizes newly assigned personnel d. Intelligence documents which support nontac-
with the prevailing conditions within an area. tical stability operations will be closely related
(b) Aids collection planners by indicating since all internal defense programs and operations
areas in which more detailed information is re- have basically the same goals.
quired. (1) Intelligence documents which take the
(c) Aids those involved in the production form of studies of local economic, social, and polit-
of intelligence by allowing a comparison of infor- ical conditions are necessary for the planning and
mation in the area study with newly obtained in- execution of successful civil affairs, internal con-
formation. trol, and psychological operations. These studies
(d) Aids those involved in stability opera- should present an objective view of the local situa-
tions by pinpointing conditions exploitable by the tion, with respect to strong points and weak
insurgents. points, and should contain recommendations for
(2) The estimate of the insurgent situation. operations aimed at the elimination of the causes
This document has utility even during the early of discontent.
stages of insurgency when there is limited insur- (2) Detailed reports reflecting the status and
gent activity and little may be known of insurgent effectiveness of government projects are required.
organization and plans. To be effective, the esti- Unless the causes of discontent within a society
mate must be kept current. Updating should be are eliminated by effective government action, in-
accomplished when significant activity occurs surgents will continually regroup and resume
AGO 7334A
7-19
FM 30-31

their subversive activities despite severe losses reports not covered in the SOP would be directed
and defeat by government forces. to the chief of the intelligence element of the
center for a determination as to recipients and
7—25. Dissemination by the Area priority of dissemination, since he will be most
Coordination Center familiar with the intelligence needs of the various
a. The area coordination center should contain a organizations. Reports handled by a minimum
number of personnel will help promote rapid dis-
communications section which has secure commu-
nication facilities for the dissemination of infor- semination with a minimum of errors. Higher of-
mation and intelligence reports to higher, adja- ficials within the area coordination center are re-
lieved of the burden of personally reviewing all
cent, and lower organizations and a message
center which distributes information and intelli- reports in order to determine proper dissemina-
tion.
gence to sections within the area coordination
center. c.
Small organizations such as a village level area
b. When the area coordination center is staffed
by a large number of people it will be necessary to coordination center might have a much less formal
have simplified procedures in order to achieve procedure for dissemination, while large organiza-
timely and proper dissemination of information tions such as a regional level center or the NIDCC
and intelligence produced by the center. A possible would require detailed regulations and procedures
governing dissemination due to the wide variety
method would be to have all information and intel- of information and intelligence reports which they
ligence reports coming from the production sec- must disseminate to many subordinate organiza-
tion given directly to the communications section tions. In order to achieve timely and proper'dis-
for dissemination both internally and externally. semination, individuals at all levels who are placed
The communications section would then dissemi- in charge of dissemination must be thoroughly fa-
nate according to an SOP listing the recipients miliar with all internal defense and development
and priorities of all reporte normally produced by organizations as well as operations requiring in-
the area coordination center. Special or unusual formation and intelligence. *

7-20 AGO 7884A


FM 30-31

CHAPTER 8
COMBAT SURVEILLANCE AND RECONNAISSANCE

Section I. GENERAL

8—1. Introduction mize their value as a target for internal defense


forces.
Methods and techniques for combat surveillance
and reconnaissance during stability operations are c.
basically no different than any other type of war- indirect, as well as direct, evidence of their pres-
fare; however, their scope is broader. Battlefield ence. Direct evidence—such as easily recognized
surveillance in the internal defense environment is uniforms, equipment, military-type vehicles, de-
extended over thé entire area of interest, possibly liberate field fortifications, logistical facilities, and
the entire host country, rather than being pri- large troop movements—normally is difficult to
marily limited to the battle area. Except for this gather in stability operations. Probably the first
enlarged area of coverage, all other doctrine for indication of insurgent presence will be furnished
combat surveillance and reconnaissance as defined by indirect evidence. £>ome examples of indirect
in FM 30-5 and FM 30-20 remains valid. evidences are—
(1) Ostensible civilian activity in isolated
areas or in areas where activity normally has not
8-2. Factors Affecting Combat Surveillance been observed.
and Reconnaissance During (2) Unexplained increase in dwelling densi-
Stability Operations ties of villages.
a. It cannot be assumed that all villagers are (3) Built-up areas not shown on official maps
insurgents, nor should they be treated as such or which newly appear in comparative photog-
simply because they live where insurgents are raphy of the area.
active. Thus, insurgents become much more diffi- (4) Unexplained movement of local inhabi-
cult to identify. Techniques of surveillance em- tants from one location to another or across inter-
ployed, therefore, vary with the degree of loyalty national boundaries.
of the people to the government and with the de-
(5) Unexplained abandonment of villages,
gree of insurgent pressure on the area. Valuable
cultivated areas, equipment, or food sources.
information is derived from watching the actions
and attitudes of the people. Any observed varia- (6) Isolated open areas being prepared for,
tion from their normal pattern of living, their or under cultivation with, food crops or small
willingness to cooperate, the presence or absence areas of forest being cleared of underbrush and
of children and young men in the villages, or the thick foliage for no apparent reason.
presence of people in areas where they normally (7) Logging and charcoal production in areas
are not found should be reported to the intelligence previously unworked or not easily accessible to
element as quickly as possible. people of the area.
b. Elements of the insurgents’ village militia are (8) Roads, cart trails, and footpaths that are
much more difficult to detect and identify than inconsistent with the population and the agricul-
elements of main force and regional force units tural practices of the area.
because the village militia attempt to remain in- (9) Other unexplained disturbances to the
distinguishable from the general public by taking normal vegetation cover of the area.
on the appearances, habits, and common practices (10) Fires in remote or burned out areas that
of the people of the area in which they are oper- have not been caused by local ground clearing op-
ating. In fact, they usually are indigenous to the erations or indigenous cultivation.
area in which operating. They also normally (11) Fishnets located in isolated areas or
remain dispersed to avoid detection and to mini- areas previously unfished.
AGO 7384A
8-1
FM 30-31

(12) Abnormal traffic on established roads or (1) Tactical targeting throughout the area of
waterways. interest.
(13) Unidentified or suspicious activity de- (2) Continuous improvement of host country
tected by infrared (IR), radar, or other sensory comm .nications facilities.
devices. (3) Combat surveillance and reconnaissance
training of both host country and U.S. personnel,
d. Bad weather limits all surveillance and recon-
naissance means. When the weather permits aerial with emphasis on—
observation, the insurgent usually will act in a (а) Calling for and adjusting friendly fires.
way that makes his presence unknown. When the (б) Map reading and land navigation.
weather precludes normal aircraft operations, the (c) Employment of long-range and stay-be-
insurgent force will move and strike more openly. hind patrols in gathering intelligence information.
Because weather conditions change rapidly, air- (d) Visual aerial surveillance; photo-
borne and ground surveillance measures are pre- graphic interpretation.
planned so they can be implemented as scon as the (e) Communications equipment and proce-
weather breaks. In this way insurgent forces are dures.
exposed or caught in activities they reserve for (/) Use and maintenance of surveillance
periods when they think they cannot be observed. equipment available to the host country.
Because visibility and air and ground vehicular
(fif) Proper reporting procedures.
movement are adversely affected by bad weather,
(4) Tasking out-of-country resources such as
alternate foot-mobile reconnaisance is planned.
COMINT.
Good communications are required for an effective
surveillance plan. Communications problems
caused by bad weather should be anticipated and 8-4. Requirements for Effective Combat
alternate plans developed to cope with them. Surveillance and Reconnaissance
a. Combat surveillance and reconnaissance is re-
e. Terrain frequently limits line-of-sight obser-
quired throughout all phases of an internal de-
vation. In addition, insurgents use natural cover
fense program. Requirements differ at each level
and concealment to hinder friendly observation.
—national (NIDCC), subnational (Area Coordi-
To overcome these obstacles, aerial and ground ob-
nation Center), and tactical unit—according to
servation are extended in variety, depth, and fre-
the particular phase of insurgency involved. When
quency of coverage. Often it will be necessary to
put personnel on the ground who can travel be- more than one phase is in effect simultaneously,
neath jungle canopy and across areas that cannot surveillance requirements are more numerous and
be watched from observation points. Reconnais- varied than in single-phase situations. The min-
sance missions will include the requirement for imum requirements for combat surveillance and
patrols to stay in an area for extended periods of reconnaissance, by phase at each level, are shown
time and to react positively to any insurgent ac- in appendix G.
tivity encountered. Increased emphasis must be
b. The role of combat surveillance and recon-
placed on remotely monitored sensors.
naissance in stability operations is much broader
than in other types of warfare. Since the enemy
8—3. Development of Combat Surveillance does not occupy fixed positions or fixed terrain,
and Reconnaissance Capabilities locating him will depend in large part on the full
a. Basic intelligence data must be gathered to utilization of the capabilities of the collection
support combat surveillance and reconnaissance means that are sent out to locate him. During sta-
operations. The minimum intelligence require- bility operations, mission requirements are
ments to support stability operations are listed in broadly stated to allow units engaged in siirveil-
appendix C. These requirements must be satisified lance and reconnaissance maximum initiative and
in as much detail and accuracy as possible to responsiveness to changing situations.
insure an effective surveillance and reconnais-
sance effort. c. Combat surveillance and reconnaissance func-
tions are under the staff supervision of the intelli-
b. The following actions and special training are gence officer. By close coordination and coopera-
begun in Phase I, to be continued, as required, so tion he makes certain that combat surveillance
long as the insurgency lasts. and reconnaissance is integrated into the overall

8-2 AGO 7334A


Cl, FM 30-31

intelligence collection plan. Further, he closely ordination personnel, host country civilian,
coordinates with sources of information other paramilitary and military personnel, and other
than intelligence collection agencies. This coor- US military and civilian organizations and agen-
dination includes operations and fire support co- cies in-country.

Section II. GROUND SURVEILLANCE AND RECONNAISSANCE

8-5. General edge of insurgent delaying devices, the use of de-


a. Ground surveillance integrates all available ception and knowledge of enemy deception prac-
means of surveillance (both human and mech- tices, tracking techniques, and procedures for re-
anical) to cover the area of interest. Mechanical questing fire support.
surveillance devices are employed to take advan- ★ (2) Patrolling in stability operations in-
tage of their all-weather, day-and-night capabil- volves much more than just looking for the enemy.
ity. It also involves making contact with the people
who inhabit the area of interest. Patrols will be
ifb. Ground reconnaissance utilizes most of the required also to contact local police, local authori-
same human and mechanical means as ground ties, and friendly paramilitary units as part of
surveillance. However, reconnaissance missions their missions. They must be able to observe and
are directed to satisfy commander’s intelligence report on the items of intelligence interest enum-
needs in special geographical areas. Reconnais- erated in paragraph 8-2. Contact with civilians
sance missions collect in response to specific EEI will require that patrols include personnel who
or OIR ; surveillance missions have a much are language trained. When available, qualified
broader scope. US military linguists who are language trained
can be used; however, often this type of per-
8-6. Agencies sonnel will not be available for everyday opera-
a. Combat Units. Ground surveillance recon- tions. In that case maximum utilization should be
naissance is part of the unit mission. It will be made of host country soldiers who are proficient
accomplished as part of the unit SOP or as a ’in the English language and have been fully
result of the commander’s specific intelligence trained in all aspects of insurgency patrolling
needs. Effective ground surveillance and recon- procedures. Employment of indigenous civilians
naissance in stability operations is more difficult or members of allied forces to serve as interpre-
to provide because units frequently fight in rela- ters and translators should be exercised with
tive isolation without flank support. (For details caution. Utilization of such personnel hinges on
on the role of armor and infantry units in recon- proper security checks or clearances as well as
naissance and security operations, see FM 31-16, other appropriate qualifications. See FM 30-15
FM 17-1, and FM 7-20.) for guidance on use of interpreters.
b. Patrols. ★ (3) The Airborne Infantry Ranger Company
(Corps), operating under the staff supervision
(1) Patrolling is of paramount importance
in stability operations. Regardless of the type of of the G2, makes important contributions to the
patrol or mission assigned, the collection and ground surveillance and reconnaissance plan by
reporting of intelligence information is a con- reporting information concerning remote portions
tinuing responsibility for all patrols. Combat of the area of interest. Insurgency terrain inac-
patrols as well as reconnaissance patrols should cessible to other surveillance or reconnaissance
be trained to observe and report negative as well means can be exploited to some degree by long-
as positive evidence of past or present enemy range reconnaissance patrols (LRRP). Indigen-
activity; newly developed trails; vacated assem- ous LRRP, clothed and armed like the insurg-
bly areas ; locations of fortified and boobytrapped ents, are dispatched to work close to or among
areas ; cache sites, whether active or not ; current insurgent troops. Indigenous LRRP are requested
effects of weather on terrain; trafficability and on a support or attachment basis and should be
the location of potential landing zones and drop under the operational control of the commander
zones. Patrol training should place emphasis on requesting them. In stability operations this is at -
the detection and attack of enemy ambushes, the a tactical level lower than in other types of war.
detection and disarming of boobytraps, knowl- LRRP units should be formed and commence op-

8-3
Cl, m 30-31

erations in Phase I. The number of LRRP should excellent source of information. Police intelligence
be increased as necessary in Phases II and III relies heavily on information supplied by inform-
to satisfy requirements of US major tactical ants. Many of these informants represent the
units. lowest order in the society, particularly in the
more densely populated areas. The police, by their
c. Other Sources. Other intelligence sources very nature, must maintain contact with this
furnish excellent ground surveillance and recon- element of society to collect information. Planned
naissance support. They assist in gathering in- surveillance, observation reports, and infiltration
formation for future requirements as well as of subversive organizations are other techniques
make available information already in their which contribute to police intelligence. As a mini-
possession which may be of value. Available in- mum, these files should include the city or village
telligence sources are indicative in (1) through building and street plan ; subterranean sewer and
(8) below. transportation systems; location of suspected in-
(1) Counterintelligence units can
surgents, provide a and criminals by build-
sympathizers,
good source of contact with local civilians and in- ing or house ; known establishments used for crim-
vestigate suspicious activity that occurs both in- inal or insurgent activities; shops, businesses,
side military areas and within civilian communi- and plants that handle commodities of critical
ties. They also maintain files on people and or- value for criminal or insurgent activities ; and an
ganizations that may serve as further contacts up-to-date census of the area to include names
for ground reconnaissance elements. and number, by sex and age of personnel in
■JV (2) Agent operations can provide a source each building or house. (See FM 19-50 for de-
of information from within the enemy area. Of- tailed information.)
ten agents can penetrate an area and gather in- d. Specialized Organizations. There are other
formation not otherwise obtainable or which specialized organizations that can furnish assist-
could only be procured by indigenous personnel. ance in gathering information. While their
(3) Interrogation efforts by interrogation primary mission is not intelligence, their opera-
sections on prisoners, suspects, defectors, and tions do place them in strategic positions. Some
refugees can produce much new information or of these organizations are—
can assist in confirming or refuting information (1) Special Forces units in-country which
gathered from other sources. may be strategically located astride LOG, adja-
-5^(4) Stay-behind units can observe in- cent to border crossing points, and near identified
surgent forces and furnish scheduled reports of or suspect insurgent areas of operations. They
their sightings. In addition, stay-behind units usually are placed within or adjacent to civilian
may be able to maintain observation for extended occupied areas. One of their major missions
periods and provide highly reliable information. is to advise indigenous troops on patrols and
-£(5) Technical intelligence specialists and combat operations within their local area. Con-
document translators can provide valuable infor- stant contact with the land, its people, and the
mation gathered from enemy documents and ma- various insurgent forces makes these units a
teriel. Items brought back from reconnaissance lucrative source of current intelligence informa-
patrols may furnish additional information once tion.
it has been identified and analyzed by one of (2) US aid-type missions that provide assist-
these specialists. ance to the indigenous personnel of an area.
■5Îr(6) Recovered US personnel can provide These organizations have contact with all types
valid information when properly debriefed by in- of civilians at each level down to the local village
telligence personnel. The fact that he has been and hamlet. Their own personnel are actively en-
trained to observe and retain information of in- gaged in travel around the country. Their refer-
telligence value, and has physically passed ence material, contacts, and personnel all provide
through insurgent territory, makes the US re- a vast amount of useful information.
turnee an excellent source.
(3) The host country government has many
(7) Communications intelligence resources of its own sources of information. The most im-
can provide an all-weather, day and night surveil- portant of these sources are those which extend
lance of enemy communications. through all echelons of the governmental struc-
-fciS) Police intelligence files can provide an ture. The major organizations in this category
Cl, FM 30-31

include host country military and paramilitary AO on a temporary basis to conduct tactical op-
forces, civilian police, local governmental organi- erations. Once these operations are accomplished,
zations, and religious groups. participating units return to their TAOR or de-
part directly to a new AO outside the TAOR for
'À'8-7. Security Considerations further operations. However, even when the bulk
■fra. Frontlines and secure rear areas usually are of a unit is physically separated from its TAOR,
not established during stability operations. Tac- the unit remains responsible for its security. Rear
tical areas of responsibility (TAOR) are as- elements of the unit continue operations within
signed to units within which a base camp is their capabilities, or they may be augmented by
established and permanent responsibility for mili- other forces, to prevent deterioration of the se-
tary control and security is assigned. Subelements curity situation in the TAOR.
are assigned an area of operation (AO) within
the TAOR. All terrain within the TAOR cannot c. Security for a TAOR or AO requires all-
be physically occupied due to the vast size of the around coverage, mostly by visual observation
area involved. Nor is occupation of terrain an and patrolling especially during periods of re-
objective of stability operations. As an alterna- duced visibility. Special sensors and mechani-
tive to physical occupation of the ground, aggres- cal devices, such as ground surveillance radars,
sive ground surveillance and reconnaissance must anti-intrusion devices, night vision scopes, and
be utilized to effect security. searchlights can complement this effort, but all
such equipment has certain limitations, the most
★6. For military operations outside of a unit’s common of which is the requirement for ground
TAOR, another area of operation may be assigned, line-of-sight. Ground surveillance plans will re-
which may or may not be at some distance quire the coordination and employment of all
from the TAOR. A unit moves into this type of available surveillance

8-5
fl
FM 30-31

means, with the preponderance of emphasis on entire area of interest. Tactical operations con-
human resources. ducted to locate insurgent forces, such as search
and seize operations, clearing operations, and se-
d. Tactical stability operations are oriented on curing operations are either ground reconnais-
the enemy rather than on the terrain. Their main sance type operations or depend largely on aggres-
purpose is that of defeating the enemy and al- sive ground reconnaissance to achieve success.
lowing for the extension of friendly control into Their effectiveness will be greatly enhanced if all
the area. A large insurgency area precludes a con- means of ground reconnaissance are employed by
tinuous and complete surveillance coverage of the the troops engaged or in a direct support role.

Section III. AERIAL SURVEILLANCE AND RECONNAISSANCE

8-8. General lance and reconnaissance operations in an internal


a. Aerial surveillance and reconnaissance is the development environment are discussed in detail
in chapter 11, FM 30-20. As indicated in para-
means whereby the Army extends its capability to graph 8-4 above, aerial surveillance and recon-
perform surveillance and reconnaissance opera-
tions over large areas beyond the ground line-of- naissance operations should be conducted as early
as possible in Phase I. Maximum use must be
sight limitations imposed on both the human eye made of comparative cover through integration of
and ground sensory equipment by distance, moun-
tainous terrain, dense j ungle, adverse weather, all sensors and sensor modes over a period of time
and poor illumination. A general definition of up to several years of duration. During Phase I,
aerial surveillance and reconnaissance missions the insurgent is likely to develop the physical as-
and a discussion of those agencies which support pects of his base area system without much fear of
the Army's aerial surveillance and reconnaissance host government reprisal arising from discovery
requirements in stability dperations remain the by aerial observation. For example, photographs
same as presently described in FM 30-5 and FM taken of unpopulated and isolated areas during
30-20. Phase II may not disclose any insurgent activity
b. Basic Army operational concepts for aerial
or presence of insurgent installations. A compar-
surveillance and reconnaissance do not change iii ison with identical aerial photo coverage flown
stability operations; but available assets may be several years earlier during Phase I, however,
used in unique ways. In general, aerial surveil- may disclose signs of construction, excavation,
lance and reconnaissance techniques apply with and tracks which, due to the vegetation regrowth,
equal validity to stability operations and other tac- can no longer be identified in Phase II.
tical situations.
8—10. Airborne SIGINT Operations
8-9. Aerial Surveillance and The use of airborne SIGINT operations is consid-
Reconnaissance Operations ered during all phases of stability operations.
General considerations and peculiarities of plan- Their use usually provides a highly effective com-
ning, conducting, and coordinating aerial surveil- munications surveillance system.

AGO 7334A
8-5
í
FM 30-31

CHAPTER 9
INTELLIGENCE TRAINING

9—1. General country duty normally performed by U.S. Army


Intelligence • training guidance provided in FM personnel, limits the opportunities for gaining the
30-5 is as valid for stability operations as it is for requisite knowledge through on-the-job training.
other U.S. Army operations. It is important that Thus, intelligence personnel who are intended for
the established intelligence training requirements such duty should undergo intensive training in
are strictly observed since heavy emphasis is those subjects prior to their arrival in-country.
placed on intelligence activities during a subver-
sive insurgency. 9—3. Training for Intelligence
Advisor Personnel
9-2. Fundamental Requirements Intelligence advisors frequently will find them-
a. The range of intelligence training require- selves in situations requiring a professional knowl-
ments for the internal defense environment will edge of the full range of intelligence functions and
vary with the levels of responsibility and specific duties. In fact, this normally will be the rule
duties of the personnel to be trained. But what- rather than the exception, and it underscores the
ever their duties or levels of responsibility, there requirement for development by the individual of
are certain fundamental points requiring em- a broad base of professional knowledge, extending
phasis in the training of all intelligence personnel : beyond that normally acquired through study and
experience in only one or two intelligence specialty
(1) Intelligence personnel must acquire a areas. Intelligence advisor training programs
working knowledge, commensurate with their in- should recognize this need by incorporating orien-
tended duties, of the host country, its people, its tation periods covering the full range of the intel-
culture, its principally spoken language, and its ligence field. But this offers only a partial solution.
geography. An adjunct to this training should in- Full satisfaction of this professional requirement
clude familiarization with “in-being” U.S. and can only be made through individual efforts of the
host country intelligence SOP, as well as the per- personnel concerned.
missive and restrictive features of existing bilat-
eral agreements as they affect in-country intelli-
gence operations. 9—4. Intelligence Training for
(2) Intelligence personnel must gain a thor- Host Country Personnel
ough knowledge of the insurgent enemy, his doc- a. An intelligence training program for host
trinal concepts, his organizational structure, and country military and paramilitary personnel is de-
his phase of development within the host country. scribed in appendix H. The program is designed
(3) All personnel, whether assigned intelli- for application in the training of host country per-
gence duties or not, must be made aware of the sonnel, but it may be adapted for the training of
insurgent’s prime requirement for intelligence and U.S. Army personnel as well. When implemented
must become imbued with the firm knowledge that for host country training, the program should be
it is only through strict observance of basic secu- supplemented with orientation lectures and
rity practices that the insurgent can be denied conferences covering the basic conceptual and or-
stisfaction of that key requirement. This point de- ganizational features of the government of the
mands emphasis through integration in all types United States, U.S. Army organization and
and levels of training. methods of operation, and other material which
would better allow host country personnel to un-
b. Acquisition of the knowledge prescribed in derstand and work with U.S. intelligence per-
a(2) above, is time consuming. This factor, cou- sonnel. When adapted for U.S. Army use, the
pled with that of the relatively short tours of in- training program should be supplemented, as ap-
AGO 7334 A
9-1
FM 30-31

propriate, with subjects outlined in paragraph of the government in much the same manner that
9-2 military police operations, military tactical opera-
tions, military civic action, and military psycho-
b. During the training program an under-
standing must be developed of what intelligence is, logical operations must be integrated within the
and what it can and must do to assist in the pre- overall government program. The intelligence ca-
vention or defeat of subversive insurgency. It pabilities of the military and paramilitary forces
should be used to augment and supplement the
should focus particular attention upon the nature
and scope of intelligence needed to support the intelligence capabilities of the police and other ci-
vilian agencies during the first phase of insur-
various operational programs of the host country
which are designed to maintain or restore internal gency. Maximum integration of the intelligence
security. In order to build this common under- effort is necessary in order to prevent gaps in cov-
standing of intelligence, training programs should erage, avoid duplication of effort, and produce in-
include consideration of the basic axioms de- telligence that will meet the needs for all opera-
scribed below. tional elements.
(1) Intelligence is essential to internal secu- (4)
rity. Intelligence can provide advance warning of superior to that of the insurgent.
insurgent activity. It can provide the requisite de- (a) The struggle between a subversive in-
tailed knowledge of the insurgent organization, its surgent organization and the constituted govern-
personnel, its plans, and its tactics. It can pinpoint ment of a nation is in every sense an intelligence
the roots and mechanisms of subversion while at war. Throughout the entire development of insur-
the same time identify the causes of popular dis- gency, the insurgent relies heavily upon intelli-
content which the insurgent traditionally exploits. gence to plan and execute measures designed to
It can ascertain popular reaction to both insurgent disrupt, paralyze, and overthrow the constituted
activity and governmental programs. In short, in- govérnment. In fact, effective use of intelligence
telligence provides the critical information which by the insurgent is the key to his survival. The
the government needs to prevent or detect insur- government must not only deny the insurgent the
gency. intelligence he needs to succeed, but it must also
(2) Intelligence is essential to all operations. obtain positive intelligence concerning the insur-
The government of a nation faced with subversive gent organization and all factions within the popu-
insurgency must initiate a carefully planned, fully lation in order to identify and locate subversive
coordinated, and intensively executed program to elements.
maintain or restore internal security. ( b ) From the standpoint of government in-
(3) Intelligence is a responsibility of all gov- telligence and counterintelligence activities, it is
ernmental agencies. most important to detect the first phase of insur-
(a) The clandestine nature of subversive gency. The earlier the government intelligence
insurgency requires a thoroughly coordinated and effort is mobilized and directed toward defeating
controlled intelligence effort on the part of the insurgent activity, the greater will be the proba-
government. All government agencies must con- bility of success. Superior intelligence during the
tribute to the intelligence effort to collect the de- first phase of insurgency can enable the govern-
tailed information and produce the comprehensive ment to eliminate the insurgent movement before
intelligence that is required for internal defense, it erupts into open violence and to initiate reforms
internal development and psychological opera- designed to alleviate popular discontent.
tions. Much of the information requiréd for intel- ( c ) It must be noted that the results of any
ligence purposes can best be provided by civilian intelligence effort are cumulative. If the govern-
governmental agencies which are primarily con- ment intelligence effort is organized and coordi-
cerned with public administrative activities such nated during the first phase of insurgency, the
as law enforcement, public health, public educa- proper groundwork for further expansion of intel-
tion, and revenue collection. ligence activities during the second phase of insur-
(b) Military intelligence activities must be gency will have been provided in the event this
integrated within the overall intelligence program becomes necessary.

9-2 AGO 7S34A


FM 30-31

APPENDIX A
REFERENCES

A—1. Army Regulations (AR)


1-75 Administrative Support of Military Assistance Advisory Groups, Joint
United States Military Advisory Groups and Similar Activities.
10-17 U.S. Army Intelligence Command.
(010-122 United States Army Security Agency (U).
(0105-87 Electronic Warfare (Electronic Countermeasures and Electronic Counter-
Countermeasures) (U).
310-25 Dictionary of United States Army Terms.
320-50 Authorized Abbreviations and Brevity Codes.
380- series
Military Security.
381- series
Military Intelligence.
551-50 Training of Foreign Personnel by the U.S. Army.
(S)580-5 Project PARASOL: Support of Paramilitary
Forces in Special Operations (U).
604-series Personnel Security Clearance.
633-50 Prisoners of War; Administration, Employment, and Compensation.
633-51 Civilian Internees; Administration, Employment, and Compensation.

A—2. Department of the Army Pamphlets (DA Pam)


27-1 Treaties Governing Land Warfare.
(S)30-20-series Counterintelligence Trends and Development (U).
(FOUO) 30-40 Communist Guerrilla Tactics (U).
380-1 Commander’s Handbook on Security.
(C)381-1 Combat Intelligence Field Army, 1965-1975 (U).

A-3. Field Manuals (FM)


3-10 series Employment of Chemical and Biological Agents.
3-12 Operational Aspects of Radiological Defense.
5-20 Camouflage.
5- 30
Engineer Intelligence.
6 - Field Artillery Target Acquisition.
121
19-20 Military Police Investigations.
19-30 Physical Security.
19-40 Enemy Prisoners of War and Civilian Internees.
19-50 Military Police in Stability Operations.
21-26 Map Reading.
21-30 Military Symbols.
21-31 Topographic Symbols.
21-40 Chemical, Biological, Radiological, and Nuclear Defense.
21-75 Combat Training of the Individual Soldier and Patrolling.
21-76 Survival, Evasion, and Escape.
(S)21-77A Joint Worldwide Evasion and Escape Manual (U).
24-1 Tactical Communications Doctrine.
24-16 Signal Orders, Records, and Reports.
AGO 7334A
A—1
FM 30-31

24-18 Field Radio Techniques.


27-10 The Law of Land Warfare.
30- Military Intelligence.
serïes
31- Special Operations.
series
( C ) 32—5 Signal Security (SIGSEC) (U).
33-1 Psychological Operations—U.S. Army Doctrine.
33-5 Psychological Operations—Techniques and Procedures.
41-5 Joint Manual for Civil Affairs.
41-10 Civil Affairs Operations.
(0100-20 Field Service Regulations—Internal Defense and Development (U).
101-5 Staff Officers Field Manual : Staff Organization and Procedure.

A—4. Training Circulars (TC)


3-16 Employment of Riot Control Agents, Flame, Smoke, Antiplant Agents,
and Personnel Detectors in Counterguerrilla Operations.

A—5. Technical Manuals (TM)


30-series Military Intelligence.

A—6. Tables of Organization and Equipment (TOE)


30-series Military Intelligence.

A—7. Other References


Public Law 87-195 Foreign Assistance Act, 4 September 1961, as amended. DOD Military
Assistance Manual (MAM).

m
A—2 AGO 7334A
FM 30-31

APPENDIX B
TYPE COMMUNIST INSURGENT ORGANIZATION

Section I. PARTY CORE


B-l. General members are in daily association with society at
¡
The typical Communist insurgent organization is large.
composed of three major elements: Party Core, d. Regardless of the level of Party organization,
Mass Civil Organization, and a Military Force. the importance of the individual or the functional
These elements are organizationally interlocked to roles performed, all Party members are simulta^
insure that the Party exercises complete control neously cell members. Each must have a cell in
over its activities. Figure B-l depicts an optimum which he is officially enrolled as a member. At the
type Communist insurgent structure. While the lower levels of Party organization this poses no
exact organizational relationship of its elements difficulty since the cell normally functions as a
may vary in detail from one insurgency to an- unit. But, at higher levels in the Party, as organi-
other, all will employ an “interlocking direc- zation and responsibility increase and become
torate,” or an infrastructure arrangement which more complex, the member is concurrently a cell
insures absolute control by the Party over the member and a working member of a Party Com-
entire organization. mittee. In this'situation the Party cellular organi-
zation is designed to maintain internal discipline,
B—2. The Party Cellular Organization exploit the full potential of the individual, and
a. At the base of the Party command structure strengthen Party leadership over the Party mem-
exists the “cell.” The cellular structure of any bership. At the same time the Party Committee, of
Communist Party, legal or illegal, is its most crit- which cell members are an integral part, executes
ical characteristic. the day-to-day functional duties of prosecuting the
insurgency.
b. A Communist Party member normally be- e. Unlike Party cells, which are primarily polit-
longs to two or more cells ; the member’s Party cell ical in character, functional cells serve to protect
and one or more functional cells which exist in his the identity and roles of personnel engaged in in-
place of daily employment. It is the Party cell surgent activities. The degree of cellular compart-
which molds the recruit into a disciplined Party mentalization usually will depend upon the size of
subject, while the functional cell serves as the the organization, the popular support given, the
basic organizational unit for the accomplishment government’s security forces, and the probability
of some task or mission. of detection by security forces. In short, the struc-
c. In an insurgency, Party cells normally will ture of insurgent functional cells usually reflects a
contain from three to seven members, one of compromise between the requirements for organi-
whom is designated “cell captain” or “secretary.” zational efficiency-and the need for security. If the
Initially, a new unit will be expected to maintain security forces have neither instituted population
regular-liaison with its superior body, assume re- control and surveillance nor tried to infiltrate the
sponsibility for the distribution of Party litera- insurgent apparat, the degree of compartmen-
ture, issue its own leaflets and agitational mate- talization is usually small. At the other extreme, if
rials, and to maintain its own fiscal record of dues, the popiulation.supports the government and will-
contributions, and money raised by other means. ingly informs it about subversive activity, com--
These functional responsibilities, however, are of partmentalization will necessarily be complete.
secondary importance to the principal reason for f. Where two or more Party cells exist within a
the cell’s existence—to maintain Party integrity single functional committee of an insurgent or-
and discipline in an environment in which its ganization, Party Groups normally are created to
AGO 7334A
B-l
FM 30-31

MILITARY FORCES COMMUNIST PARTY CORE MASS CIVIL ORGANIZATION

Politburo

m
Central Corwnittae
National Executive
Supreme Headquarters
of
of Military Forces
United (Federated) Front

Fraction
Party Interprov Inter- Moss Civil
Apparatus Party (cellular) Organisations
Committee
Interpro Peopl
Military Party Party Liberation
HQ Youth Revolutionary Committee
Organisation Committee

Fraction
Froi
Party Provincial Inter- Mass Civil
Apparatus Party (cellular) Organizations
Committee
Provincial
Military Party
Youth
Organisation
Party
Rovolutionai
Committee
\=x People s
Liberation
Committee

Fraction
Party District Inter- Mass Civil
Apparatus Party (cellular) Organisations
Committee
District People s
Military Party Party Liberation
HQ Youth Revolutionary Committee
Organisation Committee

Froct
Local (Village/ Mass Civil
Hamlet) Inter* Orgem lotions
Party (cellular)
Cammittaa
People's
I—I Liberation
Committee

Party Chapter

JL
Villege
Party "Control"

Militia Command

Coordination
Cell

Figure B—l. Type Communist insurgent organization showing


channels of command and control.

control and coordinate their activities. Under this at each echelon of the Party hierarchy. This office
arrangement, the Cell Captain is responsible to is known as the Inter-Party Committee and it is
the First Secretary of his respective Party Group, the supreme Communist organ at its particular
which also consists of an Assistant Secretary and level of organization, responsible only to its coun-
an Executive Committee. Party Groups, in turn, terpart office at the next higher echelon. Like the
are responsible to yet another office which exists Party Group, it also is composed of a First Secre-

B—2 AGO 7334A


FM 30-31

NATIONAL LEVEL

Control Commit*«#

Inf r-Porty Commit»»«

First S«cr«tory
Assistant Socrotory
Exocutivo Commit!««
INTERPROVINCIAL LEVEL

^^ortjr_Group Party Group

First Secretary First Secretory


Asst Secretary Asst Secretary
Committee Committee

Cell ¿in. Cell Cell

Captain Captain Captain Captain

Infr-Porty Committ««

PROVINCIAL LEVEL

(Party group structure similior to above)

Inter-Party Committee
DISTRICT LEVEL

(Party group structure similior to above)

Figure D-2. Communist Party cellular organization.

tary, Assistant Secretary, and an Executive Com- the Inter-Party Committees at interprovincial,
mittee. The chain of command within the overall provincial, and district levels. Figure B-2 depicts
Party structure is from the Central Committee of a type Party cellular organization.
the Communist Party at national level to each of
AGO 7334A
B—3
FM 30-31

B—3. The Party Committee System national level, control is exercised by the Secre-
a. Although all authority within a Communist tariat of Central Committee.
insurgency movement stems from the hard core b. The Revolutionary Committee may develop
Party cellular organization, functional commit- into a highly sophisticated structure under the di-
tees, composed of both Party and non-Party mem- rection of a secretary, his assistant, and execu-
bers, are required to carry out the Party’s day-to- tive officer. Under these officials will function a
day activities. The primary organization used for Permanent Standing Committee, composed of per-
this purpose is the Party Executive Committee, haps four to ten persons including the secretary
commonly referred to in times of insurgency as and his two principal officers. Subordinate to this
the Party Revolutionary Committee. Like the body a number of subcommittees or sections will
Party’s cellular organization, these committees function, employing 20 or more individuals some
normally exist at national, interprovincial, provin- of whom may be in positions of limited responsi-
cial, and district levels. Below district level, clus- bility. This committee system, together with its
ters of cells perform their daily functional tasks specialized elements, may be conceived as the “di-
under the direction of local village committees. At recting organ” of the insurgency.

Youth
Inter-Group
Committee

Youth uth
Group Group
Committee Committee

Cell Cell Cell Cell Cell Cell

Sub-cell Sub-eefJ Sub-cell Sub-cell Sub-cell Sub-cell

Figure B~S. A type Communist Party youth organization.

B-4 AGO 7334A


FM 30-31

c. At each hierarchical level of operation, the membership in the Party proper. This age varies
hard core Party cellular organization, and its between 18 and 26 years.
counterpart Revolutionary Committee, exist side b. A Youth Organization exists at each opera-
by side in interlocking fashion. All Party members tional level of Party organization and the junior
in a given branch or section of the Revolutionary body is structured in a manner similar to its
Committee will be concurrently members of a cell parent cellular organization at each echelon. The
in the Party organization. Since the first alle- lowest element is the subcell, composed of from
giance of the Party member is to his cell, Party three to eight youths ; three or more subcells com-
Group, and Inter-Party Committee, this latter pose a cell; three cells are formed into a Youth
body exercises authority over its counterpart Rev- Group Committee; and two or more Youth Group
olutionary Committee. To insure that the hard Committees constitute the highest operational
core Party apparatus retains this authority, the order, the Youth Inter-Group Committee. Figure
First Secretary of the Inter-Party Committee nor- B-3 depicts a type Party Youth Organization.
mally will act in the dual position as First Secre-
tary of the Revolutionary Committee; however, c. Party youth members may engage in most of
below this level, status in the Party organization the activities conducted by actual Party members
does not necessarily equate with that in the com- in an insurgency, since the youth organization is
mittee. considered a school of training and preparation
i,
for the assumption of inner-Party responsibilities
B—4. The Party Youth Organization at a later date. Therefore, Party youth members
a. The Party Youth will beOrganization
employed to isthethemaximum
third extent possible
parallel structure within the Party Core control in a manner similar to their more experienced sen-
apparatus and is an indispensable affiliate of any iors in order for them to acquire that invaluable
Communist Party. The youth - organization is a experience in the multiple phases of Party work
“halfway” house into which likely future Party which will make it possible to draw them into the
members may be drawn in their early youth hard core of the organization by the time they are
before they reach the required age for candidate of eligible age.

Section II. THE MASS CIVIL ORGANIZATION

B-5. General Communist program. The Communist aim, then, is


to recruit in the service of the Party great num-
a. Lenin’s doctrine was that two elements
bers of individuals, most of whom are unconscious
working together were necessary to effect a sub- that they are serving the Communist cause.
versive political revolution—a small elite group of
professional revolutionists and large popular or- c. Mass organizations serve the Party leader-
ganizations. Neither group could be totally effec- ship in at least five distinct ways. First, they pro-
tive alone, Lenin maintained. The professional vide the Party with a seemingly legitimate front
revolutionists would 'be but an “isolated band of which by outward appearances represents the in-
terrorists” without mass organizations. Mass or- terests of the population. Second, they provide a
ganizations, on the other hand, would be incapable cover which diverts attention away from the
of maintaining the secrecy necessary for subver- Party and its operations. Third, they provide a
sive activity. What was required, then, was to means of diverting the allegiance of the popula-
strike a balance in the working relationship be- tion away from the legal government and mobil-
tween these two entities. izing its support in behalf of the insurgency move-
ment. Fourth, they constitute a means of social
b. Communists have never aimed at the conver-
sion of great masses of people to Communist control. Last, they provide the apparatus for es-
tablishing a “shadow” or actual government, com-
Party membership. Their whole concept is that of peting with or replacing that of the legal govern-
a small Party—compact, mobile, disciplined, dedi- ment.
cated, and consisting largely of an intellectual
elite. It is the task of this small group to utilize d. In revolutionary context, Communists con-
scientifically the social forces that move and direct sider three separate organizational elements as
the masses so that the Communist Party may constituting the Mass Civil Organization. These
come to power over them and impose forcibly the are-
AGO 7334A B-5
FM 30-31

(1) Popular Organizations; sion to Communism or Communist control of indi-


(2) Special Interest Groups ; and viduals holding positions in legitimate organiza-
(3) Village Militia (popular guerrilla) Units. tions. Regardless of which insurgent elements per-
PopularOrganizations are the most significant of form the missions of infiltrating or penetrating
the mass organizations in that they are organized popular mass organizations, this activity is always
on a nationwide scale with committees at the na- preceded by investigation.
tional, interprovincial, and district levels with d. Comprehensive investigations are conducted
basic units in the villages and hamlets. These or- on all organizations of potential value to the insur-
ganizations seek to appeal to a broad segment of gency movement in order that a determination can
the population, particularly workers, farmers, be made of the most appropriate action which
women, and youth. Special Interest Groups are should be taken to solicit or coerce support for the
more narrow in scope than Popular Organizations insurgency. These investigations usually involve
and include those groups whose focal concerns and the clandestine spotting, assessment, and cultiva-
activities are oriented on special issues. Examples tion of “target” personalities. Extensive dossiers
of Special Interest Groups are medical associa- are developed on each, which among other things,
tions, sporting clubs, and teachers’ groups. Liter- reflect his interests, motivations, personal weak-
ally any organization created expressly to further ness and vulnerabilities, and his susceptibility for
the special interests of a parochial group falls in being recruited in place. In nearly all cases, the
this category. Surprisingly, the Village Militia is recruitment approach is carefully tailored to each
also considered as an element of the mass civil target personality. Such individuals may be subse-
organization, although it is often construed as a quently recruited into serving the Communists on
part-time and inferior arm of the military. The the basis of ideological appeal, bribery, blackmail,
more correct perspective, however, is to view the or other forms of coercion.
militia elements as elite formations among the
multiple mass organizations. e. The principal Party elements involved in this
type of operation are known as “fractions.” A
B—6. Infiltration fraction consists of part or all of a cell whose
members have been especially selected and trained
a. Communists employ two principal methods to
to work within existing legitimate organizations.
gain control over and direct the masses : infiltra-
These fractions are made up of professional or-
tion or penetration of existing non-Communist or-
ganizers whose responsibility is to learn the inter-
ganizations, and the creation of “fronts.” Each of
ests, language, and attitudes of the organization
these methods involves specialized techniques and
and its personnel. They also identify and investi-
each is designed to achieve similar, although some-
gate individuals who may be sympathetic to the
what distinctive, objectives. A distinction exists
Party and recruit and organize them. In general,
between the meaning of the words “infiltration”
the mission of fractions is to disseminate the
and “penetration.” Infiltration is the word used to
Party line, attract new members to the Party, and
denote the introduction into a group or organiza-
aid in developing a power base for the Party.
tion of an individual or individuals for purposes
of monitoring or controlling its activities. Pene-
tration, on the other hand, may be accomplished B—7. Fronts
by either introducing a person from the outside or a. The term “front” commonly refers to polit-
by recruiting individuals already inside the group ical activities carried out behind the façade of an
or organization. apparently non-Communist organization. Fronts
normally are created when the Party—
b. Principal Communist objectives in infil-
trating and penetrating mass organizations are to (1) Is unable to infiltrate existing organiza-
neutralize existing agencies which support the tions.
government, justify and legitimatize causes which (2) Desires to use people who are sympa-
can be exploited by the subversives, and mobilize thetic with causes which the Party promotes, but
and manipulate mass support. who do not possess the necessary degree of respon-
sibility for membership in, or who cannot be per-
c. In practice infiltration and penetration opera- suaded to join the Party.
tions are carried out partly by direction from (3) Desires to proselyte the membership of
above, partly and spontaneously as the oppor- rival organizations by creating a competitive
tunity arises, and partly by the in-place conver- group with greater popular appeal.

B—6 AGO 73IÍ4A


FM 30-31

(4) Desires to indoctrinate an unsuspecting as well as from the inability of Party members to
segment of the population with views and pro- conciliate or conceal their attitudes toward so-
grams inimical to the established order. cialist groups which Party doctrine has branded
(5) Desires to create organizations where as “evil” and the “mainstays” of capitalism. The
none presently exist ; calculate to appeal to certain second phase in the development of the United
segments of the population. Front involved a short period where coalition with
(6) Desires to avoid proscription in countries democratic or socialist forces was minimized. As-
where the Communist Party has been outlawed as sociation with such groups was conducted solely
subversive. for the stratetic purposes of neutralizing the so-
(7) Desires to raise funds for Party activities cialist leadership, and gaining access to the rank
and file of these organizations. This phase also
through ostensibly non-Communist organizations.
failed the Communist because it resulted in organ-
b. In general, Communists establish fronts as izational and ideological isolation of Communists
devices for establishing access to and control over from the masses. The present United Front policy
unorganized sectors of the population. In creating deception emerged from these experiences. Com-
such organizational weapons, the Communists munists were directed not to worry about Party
seek to create a useful “mass” by transforming an integrity as the basis of operations ; rather Party
unstructured segment of the population, such as members were admonished to go where the masses
youth, unemployed, intelligentsia, into one which were and employ those conspiratorial methods re-
has an established leadership and effective chan- quired to accomplish Communist objectives. In
nels of communication and mobilization. In most short, the party retreated from open participation
instances fronts employ organizational titles and with other groups, relying more and more on the
advocate causes which appeal to the population covert maneuverability of its cadres and the use of
and are not commonly associated with Commu- infiltration and fronts to mobilize and control the
nism. In many instances these fronts may be masses.
headed or endorsed by respected citizens who are
unwittingly aiding and abetting the Communist B—9. The Federated Front
movement.
a. In an active insurgency an organizational
metamorphosis occurs within the Mass Civil Or-
B—8. The United Front ganization as it is transformed into the “Feder-
a. The term “United Front” refers, essentially, ated Front,” commonly referred to by such titles
to the alinement of all popular mass organizations as “National Liberation Front,” “Peoples Front,”
against an enemy. It has a separate and distinct and “Popular Front.” In effect, this organization
meaning from the word “front” which is derived replaces the United Front and becomes a formally
from the architectural idea of a deceptive façade. structured body with “Liberation Committees” at
The United Front may be formally defined as an each echelon where the Communist Party exists.
organizational arrangement whereby Communists These Liberation Committees, composed mainly of
and non-Communists work together to control an non-Communist members, preempt local govern-
organization, agency, or government. In the last ment administration at village, district, and prov-
named case, the United Front has come to be ince level, replacing de jure administration with
known as “collection government.” In essence, de facto insurgent control.
however, the United Front consists of Commu-
nist-dominated organizations, organizations in the b. The Federated Front normally appears when
process of becoming Communist-dominated, and the Party has achieved some degree of military
organizations which are targets for Communist predominance and controls a majority of the pop-
domination or elimination. ulation within a given area. Communist doctrine
prescribes three prerequisites in any given area
b. The United Front, as it evolved from a rela- for activation of a Liberation Committee. First,
tively straight forward instrument of cooperation insurgent forces must be stronger than those of
with other working class parties and organiza- government forces. Second, mass work has en-
tions in the furtherance of mutual objectives, was, joyed success to a degree leading to a “popular
from the start, doomed to failure. This failure disregard of enemy laws.” Third, the Party
stemmed primarily from the very nature of Com- Chapter organization has resolved the problems
munism which causes it to vie and compete for the characteristically inherent in its first major ex-
leadership of any group with which it associates pansion of membership and has been able to es-
AÜO 7334 A
B-7
FM 30-31

tablish a viable cellular committee structure at the cipal controlling element of the Front. Normally,
village level. ' , the main channel- of communication within the
Front apparatus will run from national to village
c. The Liberation Committee at village level is
level through the Current Affairs Section of each
headed up by an Executive Committee of from
intermediate Liberation Committee. A chart de-
three to possibly seven members. Care is exercised
picting a typical Liberation Committee is shown
to insure that the committee composition includes
in figure B-4.
a representative from each of the principal local
mass organizations. In addition to the Executive e.
Committee, a system of staff, sections is estab- lowing conclusions :
ished which serves to implement the decisions of (1) The entire Party organization, with its
the Liberation Committee. On the,surface this or- multiple subelements and parallel channels of con-
ganizational arrangement appears to be at least trol and supervision, resides within the Front hi-
nominally representative.of the desires of the local erarchy obtaining cover and a popular “mass
population ; however, this is not the case. The Ex- voice.”
ecutive Committee, which ostensibly is charged
(2) Party authority within the Front struc-
with conducting the affairs of the entire Libera-
ture is concentrated in two of the elements of any
tion Committee between its plenary sessions, ’is
given Liberation Committee: the Secretariat, and
certain to include several Party members. In addi-
the Current Affairs Section. It is normally the
tion, the staff sections of the . Liberation Com-
non-Communist Chairman of the Board and other
mittee will consist literally of those functional ele-
well-known members of the Central Committee
ments of the local Communist Party Chapter. In
who figure in news releases, public speech-
this manner, through the military, public health,
making, formal ceremonies, and official visits- of
education, economic, and other sections of the Lib-
front personnel to friendly foreign governments.
eration Committee, the Communist Party executes
As long as the Party is assured control over the
its revolutionary activities'under the guise of the
Front it will stay in the background and allow
popular “will of the people.”
others to articulate the propaganda.
d. Liberation Committees at district level and (3) Any plan which seeks the destruction of
higher normally will be highly structured bodies the insurgent machine must concern itself pri-
composed of four elements—Central Committees; marily with the breaking down of an organization,
Board of Chairmen, Secretariat; and Current-Af- not with the infliction of casualties. The military
fairs Section. The Central Committee normally commander in the field charged with the mission
will consist of representatives of various segments of internal security must necessarily give priority
of the population to give the 'front an appearance attention to the destruction of insurgent military
of democratic representation. The members of this units; however, such operations must be con-
Central Committee are predominantly non-Party ducted within a strategic framework, by which
members representing mass organizations and the insurgents would not be forced back into
lower Federated Front Organizations. The.Board progressively less active forms of subversion, but
of Chairmen, appointed by the Central Committee, by destroying the structure which would permit
is composed of the Chairman, Vice-Chairman, and an orderly retreat into a temporary state of dor-
Commissioner(s). This group presents to the mancy. This means that intelligence personnel
public the image of the Front, and its Chairman must determine an insurgent member’s Party, as
(normally a non-Communist) will usually serve as well as Front status, and within the Party, his
the Committee’s key spokesman. The Secretariat, political cellular, as well as his revolutionary com-
appointed by the Board of Chairmen, is composed mittee position. The importance of such informa-
of a Secretary General, Deputy Secretary General, tion stems from the fact that the insurgency ends,
and Commissioner of the Secretariat. This body not with the disappearance of the guerrilla, but
performs functions associated with the overall with the destruction of the apparat which spawns
management of the Front’s activities as well as the guerrilla.
translating into directives the instructions of the
Central Committee or its agents. Finally, the Cur-
rent Affairs Section, appointed by the Central B—10. The Village Militia
Committee, maintains operational control over the a. The Village Militia should not be thought of
specialized staff sections of the Front. The Cur- as inferior military forces which only work part-
rent Affairs Section may be considered the prin- time, but rather as elite formations within the

B-8 AGO 7334A


FM 30-31

CENTRAL COMMUTEE
Board of Chairmen
Contains Party and non>Party mass organiza-
tion leaders, prominent local figures, and
representatives of ethnic, occupational, and
Chairman
Vice-Chairman
n
other segments of society. Commissioner(s) I

(appointing
authority)

CURRENT AFFAIRS SECTION SECRETARIAT

Facade behind . which relevant Secretary General


staffs, branches and agencies of Deputy
the Party (PRP) Committee op- Commissioner(s)
erate * (a Party position)

Civil and
Enemy
Military Organizational Proselyting
Proselyting Branch Branch
Branch

Training and Liaison and


Indoctrination Communications Security
Branch Branch Branch

Figure B-4. Type Liberation Front Committee.

mass civil structure. Three distinct paramilitary- Party in a given area and is composed to a large
elements appear to exist in the Village Militia : the degree of Party members.
Self Defense Forces, Combat Guerrilla Unit (Lib- c. The individual enrolled in a village guerrilla
eration Troops), and the Secret Guerrilla Unit. unit is normally a volunteer, although occasionally
b. The Self Defense Force normally is organized young men are coerced into service. In most small
for, and trained and employed in, the defense of villages where there are few secrets, the identity
villages and other insurgent facilities, whereas of the members of the Village Militia undoubtedly
the guerrilla force constitutes the local instrument is known to most of the inhabitants; however,
for both inflicting damage on the enemy and fear of brutal reprisals keeps them quiet. The vil-
gaining and maintaining population control. The lage guerrilla is, therefore, not readily identifiable
Combat Guerrilla Unit of the Village Militia is to government forces. He operates in or close to
used by the Party in the support of regular insur- his home village, sometimes in conjunction with
^ gent military forces or independently in small op- regional and main force units. By day, he works at
erations. The Secret Guerrilla Unit, on the other his normal job; at night, or in emergencies, he is
hand, is used primarily in enforcing the will of the available for assignment by his Party superiors.
AGO 7334A
B—9
FM 30-31

Plotoon Commond Committee


lnter*village
Ploloon Leader » Guerrilla
Political Officer Unit
2 Asst't Platoon Leaders

Squad Squad Squad

Leade Leade Lead


Ass t Leade Ass t Leader Ass t Leade

Cell Cell Cell Cell Cell Cell Cell Cell

man man man


man

Figure B-5. Type village guerrilla platoon.

The insurgent leadership likes to have at least 5 to insurgent movement within the village community
10 guerrillas in each village. In those villages in which he lives. He provides a labor force for the
under insurgent control, a full squad of 10 to 17 transport and storage of food and equipment,
personnel or a platoon of from three to four such thereby playing a part in the very flexible insur-
squads is usual. A type village guerrilla platoon is gent logistical system. He is responsible for the
shown in figure B-5. protection of Party cadres visiting his village and
d. In the early stages of his development, the the provision of assistance to regional forces or
village guerrilla does not receive much formal mil- special Party groups carrying out sabotage,
itary training and participates in military action terror, propaganda, and murder in and close to his
only in emergencies or when specifically required village. For a variety of reasons many individuals
to play a supporting role to regional or main force will not qualify for membership in the insurgent
military activities. The majority of his training is regular forces, but will continue to serve in the
committed to political indoctrination. He is taught ranks of the local guerrillas indefinitely. Others
to obey unquestioningly. He provides an effective will demonstrate a degree of political under-
intelligence screen by passing on all information standing and reliance and efficiency in their work t
available concerning the movement of government which will insure graduation to the regional
forces and is in fact the “eyes and ears” of the forces.
AGO 7334A
B—10
FM 30-31

Section III. THE MILITARY FORCES

B—11. General mittee at national level, the Inter-Party Com-


mittee in turn passes these orders on to the Inter-
a. According to the Communist doctrine, the
provincial Revolutionary Committee whose Cur-
military forces are but one of several instruments
rent Affairs Committee has the responsibility of
through which the Party seeks to consummate its
planning and coordinating combined military/
power. The Military Forces are considered the
nonmilitary operations. One of the functional staff
lowest in organizational importance of the three
sections of the Revolutionary Committee, the Mili-
principal organizational elements of the Commu-
tary Affairs Committee, is the body which actually
nist insurgent apparat. Communist planning pro-
directs the Main Force Headquarters and super-
vides for military reverses and the posssible need
vises the military units under its command. Conse-
for retrenchment, restructuring, or even the tem-
quently, at Interprovincial level, military com-
porary disbanding of its armed forces, should
mands must pass through some three layers of
enemy strength prove overwhelming. Party
authority before orders reach the Military Head-
strategy pragmatically is based upon the assump-
quarters.
tion that as long as the Party Core and the Mass
Civil Organization remain intact, the military arm c. A similar command and control arrangement
of the insurgent movement can be reactivated or exists at each subordinate operational level where
replenished ; however, without the Party nucleus Provincial and District Party Committees exercise
and mass civil base, the movement cannot succeed. operational control over Regional Forces through
their counterpart Revolutionary Committees. This
b. Communist insurgent military forces usually
overall arrangement does not preclude orders
consist of the following elements : Main Force, Re-
being transmitted directly through military chan-
gional Force and the paramilitary Village Militia.
nels.
The Main Force is normally the best led, best
trained, and best equipped of all insurgent forces. d. The seemingly sharp compartmentalization of
Main Force training may be conducted in the host command and control functions is smoothed over
country or external to its borders. It is considered in practice by the very nature of the interlocking
a highly motivated, elite fighting group with many structure of the entire Communist insurgent or-
of its personnel being full or candidate members ganization where key personnel hold dual or mul-
of the Communist Party. The Main Force usually tiple positions in several of these bodies.
is controlled at Interprovincial level. The Regional
Force, on the other hand, is made up mostly of B—13. The Main Force Structure
indigenous personnel, recruited directly from the a. General. Within the major divisions and sec-
Mass Civil Organization or promoted up from the
tions of a Main Force Headquarters totally dis-
ranks of the Village Militia. Units of this type
tinct but parallel channels of control exist—the
usually operate in regions of no more than Provin-
military chain of command and the Party chan-
cial size.
nels of control. Military command channels stem
from the major divisions, Staff, Political, and Lo-
B—12. Command and Control gistics, and- continue down through sections to
a. Command and control over the insurgent mil- subsections or to operational units. The Party in-
itary structure emanates from the hard core In- sures complete domination over this military
ter-Party (cellular) Committee at each opera- structure by use of its own parallel organization
tional echelon. Authority flows from the Inter- which includes, in addition to those Party ele-
Party Committee to the Party Revolutionary Com- ments already discussed, the “Inter-Party Com-
mittee to the Military Affairs Committee, or the mittee of the Military.”
j '
latter body, and thence to the Headquarters of the
b. Committees. Two such committees normally
pertinent Military Command. This chain of com-
exist for each Interprovincial Maine Force. One
mand flow is shown in figure B-6.
embraces the Staff and Political organizational
b. It is the Inter-Party (cellular) Committee structure ; the second has Party responsibility for
and its counterpart Revolutionary Committee at the Logistics Division. Personnel serving on the
Interprovincial level which normally has opera- Party committee hold dual positions and are an
tional direction over the insurgent Main Forces. integral part of the military organization. In this
Receiving its instructions from the Central Com- capacity, these personnel have two reporting chan-
AGO 7334A
B—11
FM 30-31

INTER-PARTY (CELLULAR)
COMMITTEE

PARTY
REVOLUTIONARY
COMMITTEE

Current Affoirs
Committee

Military
Other
Affoirs
Committees
Committee

Headquarters
Military
Command

Figure B—6. Flow of authority through party bodies to military command.

neis, one for Party affairs and the other for mili- c. The Staff Division.
tary matters. These two channels, Party and mili- (1) In discussing the formal structure of a
tary, merge at the Inter-provincial Inter-Party Communist military organization there does not
(cellular) Committee level. A schematic of this in- appear to exist any standard structure which
terlocking organizational arrangement is shown in might universally serve to identify that particular
figure B-7. staff office or operational unit which usually will
AGO 7834A
B—12
FM 30-31

Interprovinciol
Inter-Porty (cellular)
Corn mitfee

Party
Interprovinciol
Revolutionary Committee

Party
Group

Current Affairs
Committee

cell

Party
Group

Military Other
Affairs Committees
Committee

lnter*Porty Committee of
Inter-Porty Committee of
Military Nr. 1
Military Nr. 2

Headquarters
interprovinciol Military
Force

I
Party
r-
C i
Party
+-
I
T
I

Ú
Group Party
Group B
Group
Staff Political Logistics
Division Division '

cell cell cell


cell

Party
Party Groups established within
Group ■ Party channel of control


subordinate sections which report
directly to Inter-Porty Committee
Military chain of command
I- .a
Party organs

IHI Military HQ & Staff

Figure B-7. Type interlocking party military organization.

AGO 7884A
B-13
FM 30-31

Inorpiovinc ial
Inter-Party (cellular)
CommrlJcc

Pur 1y
Revolutionary Committee

Into' Pa'*/ Commiitee


ol Mi I :*oi y Nr 1

^ Headquarters
Interprovmcial Military
_ Forces

4
G'ci p
rc
i Political
^ i
r^.
J Logistics ■
Division ^ Division ^ '

^
cell
> K >
L. _ -I

Combat T ram mq Support


‘and Section
Guard Section
* “ 1


Party
P—^ PGroup
arty
Group

Military Administrative
Guard Company
T'ominq Scboo Section - H

cell cell cell cell

Er.e~y S'tuotion
Section Section --

cell

1
Party Po’ty Liaison and
Group Group Commun icat ions
Section
Special Mission
Company

cell cell

Paiiy
Group

Signal
Art•I le:y - J
r Section
Campan

cel I

Group
4-
Engineer Engmee
Company ¥ Section

cell

Military chain of Command


Part
Party channel of control
Group

Militia and Military staff offices


Guerrilla Warfare
Guerrilla Section or operational units
Research Center

Party organs

Figure B-8. Interlocking Party/Military structure of a type


Staff Division, headquarters, inter provincial military force.

AGO 7334A
B—14
FM 30-31

perform a specific function. Even within a given counterpart, Guerrilla Warfare Research Center,
insurgency, the composition of major headquar- engage in the conduct of research and experimen-
ters, while similar, do differ. Highly pragmatic, tation in the use of guerrilla tactics by Village
Communist doctrine provides for centralized com- Militia Forces and conduct short training courses
mand and control and decentralized operations. in guerrilla warfare.
This does not mean, however, that the Communist (6)
leadership cannot, when it wishes, intervene in the port section is similar to the G-l or personnel and
conduct of activities of subordinate units at any administration section of a conventional military
level without prior notice. headquarters. The Crypto Section is a small ele-
(2) Two major sections exist within the Staff ment concerned with the decoding of messages to
Division of the Main Force Organization—the be relayed in large part by radio. The Liaison and
Combat Training and Body Guard Section Communications Section exercises staff supervi-
(CTBG), and the Support Section. The CTBG has sion over the Signal Company which is almost ex-
the responsibility for the basic training of recruits clusively involved in the transmission of military
in Main Force units as well as for the administra- orders and information—the Party’s own commu-
tion and assignment of guard personnel. The Sup- nication network being used for Party commu-
port Section performs those roles denoted in the niques.
titles of its subsections. Shown in figure B-8 are d. The Political Division.
the Party channels of control in which Party (1) The Political Division of a Main Force
Groups, assigned to certain sections and opera- Headquarters presents a strikingly simple organi-
tional units, are directly responsible to either the zational picture compared to the complexities
supreme Inter-Party (cellular) Committee or the characterizing the Staff Division. Figure B-9
Inter-Party Committee of the Military No. 1. It shows a type Political Division. No one subsection
will be noted in figure B-8 that three separate contains Party elements higher than the cell, and
channels of Party control exist within the military all Party members are responsible to the same
structure. One leads directly to the supreme In- Party Group First Secretary who will also be the
ter-provincial Inter-Party (cellular) Committee; Division Chief. Thus, the Party and military com-
the second leads directly to the Inter-Party Com- mand channels are fully in accord with one an-
mittee of the military; and the third leads to the other and the reins of authority are vested in one
Party Group of the Staff Division. In other in- individual. The Organization and Cadre Sections
stances, Party Cells exist within other sections perform tasks pertaining primarily to Party ac-
which are responsible to the Party Group situated
tivities within the military structure. The Organi-
within the Staff Division. This rather complex ar- zation Section prepares instructions and orders
rangement insures that the Party leadership can for Party and Party Youth Groups, maintains rec-
maintain absolute control over its Party appa- ords and dossiers on Party military personnel, and
ratus as well as the military bodies in which this officiates at public observances and ceremonies.
apparatus is imbedded. The Cadre Section performs mainly personnel ac-
(3) The Enemy Situation Section in a modi- tions including assignments, promotions, and de-
fied sense approximates the G2 or Intelligence motions of Party members.
Staff Section of a conventional military force; (2) The Propaganda and Training Section is
however, its responsibilities extend into other charged with the ideological education of troops as
areas as well. It is here that the personnel of well as general literacy development. Closely allied
“Armed Propaganda Teams” may be found. The in mission is the Security Section which investi-
Communist Party, fully conscious that its ability gates the loyalty and ideological purity of Party
to dominate the mass civil structure, maintains personnel singled out as suspect by the Propa-
this capability by including terrorist elements in ganda and Training Section.
its military structure. The Enemy Situation Sec- (3) The Enemy Troop and Civilian Propa-
tion, employing as its action units the Reconnais- ganda Section engages in propaganda activities
sance Company and the two or more Special Mis- designed to win over the support of the civil popu-
sion companies, performs this specialized role. lation and to cause defection within enemy mili-
(4) The Artillery and Engineer Staff and op- tary ranks. It also has the responsibility for mili-
erational units perform the conventional roles tary civilian liaison and coordination.
their titles denote. e. The Logistics Division.
(5) The Militia and Guerrilla Section and its (1) The Party apparatus imbedded in the Lo-
AGO 7334A
B—15
FM 30 -31

Inter-Party Committee
of Military Nr. 1

To Party Interprovincial
Revolutionary Committee

Headquarters',
Interprovincial Military
Force

Party
Group

L
Staff Political Logistics
ivision Division Division

cell
L

•“Organization •’
Section
H
cell

Military chair
of command

Cadre
Secti

cell cell
Party channel
of control

• Training and a
Propaganda
Section

cell cell
Military staff
offices

Security
Section H
Party organs

"‘""‘Enemy Troop
Civilian Propaganda
Section
cell cell

Figure B-9. Interlocking Party/Military structure of a type


Political Staff Division, interprovincial military force.

gistics Division is depicted in figure B-10. The Military exists in this Division as in the other two
Logistics Division is responsible to the Inter- staff divisions.
Party Committee of the Military No. 2. The same (2) With few exceptions, the tasks performed
distinctive interrelationship between Party and by the several sections of this division are ap-

B—16 AGO Í334A


FM 30-31

Interprovincial
Inter-Porty (cellular)
Commi ttee

To Party Interprovinciol \ lnter*Party Committee


Revolutionary Committee oí Military Nr 2



Headquarters
Interprovincial Military
Force

Party
Group

"v^i
Staíf ■ i Political Logistics
I Division • ' Division Division

K K 'H

r Party
Quartermaster Group
Dispensary
^ Section

cell cell cell

Nurse Party
Medical Group
Training
Section
School

cel I cell

Party
Clothing Items “ Driver
Group
Section • Platoon

cell cell cell


CJ
Party
Transportation Transportation Group
Section Platoon

cell cell j cel I

Party
Equipment Group
Machine Shop
. Section

cell cell

Finance ' J
Section '
i Mi tmm Military chain oí command

cell ■■■■■Mi Party control channels

Military staii oifices & operational units

I I Party organs

Figure B-lQ. Interlocking Party/Military stricture of a type


Logistics Staff Division, ínter provincial military force.

AGO 7334A B-17


FM 30-31

parent from their, titles. The Clothing Items Sec- Forces are under the control of the Party’s Pro-
tion, in addition to the role which would be clearly vincial or District party apparatus. Normally con-
assigned to such an office, is also the source of sisting of units no larger than battalion in size,
currency issued to military units for the purchase it is these Regional Forces which conduct most
of clothing which it cannot supply. The Finance of the activities normally thought of as “guer-
Section has the additional duty of providing tech- rilla” warfare.
nical guidance on farmwork. Finally, the Equip-
b. The Provincial Revolutionary Committee and
ment Section is charged with controlling a series
of machine shops which manufacture much of the its corresponding Military Headquarters approxi-
equiment needed by military field units. mate in organization their Interprovincial supe-
rior bodies, but will tend to be somewhat more
simple in structure, depening upon the
B—14. The Regional Forces immediate tactical situation and the numbers of
a. Similar to the Main Forces, which normally capable personnel available. Similar to the control
are controlled by either the Interprovincial or a exercised by the Party over its subordinate level
national level Party organization the Regional organizations, the Provincial Military Headquar-

Bottai ion
Commander

Political Executive
Officer Officer

Infantry Battalion Heavy


Company Headquarters Weapons
(3) Company

Administrative Intelligence Message


Sectiion Section Center

Machine Gun Medical


Section Section

Figure B-ll. Type insurgent independent battalion.

B—18 AGO 7334A


FM 30-31

ters will control Regional Forces at the District panies—three infantry and one heavy weapons.
level through channels comparable to those Although not indicated in figure B-ll, the bat-
leading down from the Interprovincial Military talion headquarters may have attached signal, re-
Headquarters. This authority does not, however, connaissance, and engineer platoons. Additional
extend down to the Village Militia which remains platoons may also function from this level to pro-
under the control of the Village Party Chapter. vide liaison with rear service agencies, and con-
duct special mission assignments and other re-
c. The organizational structure of the actual op- quirements as the need arises. The companies, in
erational units of the Regional Forces tends to turn, are divided into platoons, squads, and three-
conform with traditional western military units man military cells or elements. The lowest level of
in that a staff exists to support three or four military organization—the cluster of three sol-
combat elements. The chart shown in figure B-ll diers—should not be confused with the Party cell.
is considered typical or an insurgent independent Its members are not necessarily Party members,
battalion. and, if they are, they will belong to a Party cell in
d. Such a battalion normally contains four com- addition to, not instead of, the military cell.

AGO 7334A B-19


FM 30-31

APPENDIX C
INTELLIGENCE REQUIREMENTS LISTING FOR STABILITY OPERATIONS

C-l. Introduction quate for U.S. Army operational purposes. The


nonmilitary intelligence requirements are gener-
The intelligence requirements to support U.S. ally similar to those of the civil affairs organiza-
Army responsibilities for stability operations tion.
listed in this appendix are not intended to be all-
inclusive, but rather to serve as a guide to assist
C—2. General
in specific operational planning. They will have
preparedness and operational applications for the Section I of this appendix lists the political, eco-
Army in all of the six major missions associated nomic, sociological, geographic, and military intel-
with stability operations : advisory assistance, ligence requirements primarily as they apply to
psychological, civil affairs, intelligence, and tac- basic U.S. Army needs. Section II pertains to in-
tical operations. Coverage in all subject areas telligence requirements on the insurgent move-
must have provincial and local orientation, as well ment as they exist during the growth of the insur-
as national data, if the intelligence is to be ade- gency.

Section I. GEOPOLITICAL INTELLIGENCE REQUIREMENTS

C—3. Political Intelligence b. Agriculture.


( 1 ) Principal crops.
a. The Government.
(2) Animal husbandry.
(1) History. (3) Practices and techniques.
(2) Structure of the government. (4) Land ownership patterns.
(3) Laws and regulations.
h. National Policies—Foreign and Domestic Af- c. Labor.
fairs. ( 1 ) Labor organizations.
( 1 ) Policies and programs. (2) Labor policies and practices.
(2) Political groups. (3) Manpower.
(3) Political stability. d. Economic Organization and Activity.
c. Internal Security. (1) Finance and banking.
(1) Public order and safety. (2) Economic planning and control.
(2) Internal security establishment. (3) Economic development.
(3) Intelligence and counterintelligence es- e. Foreign Economic Relations.
tablishment. (1) Foreign trade.
(4) Political party intelligence apparatus. (2) Economic treaties.
d. Biographies. (3) Foreign exchange.
(4) Foreign investment and foreign aid.
C—4. Economic Intelligence /. Natural Resources.
a. Commerce and Industry. (1) Chemicals.
(1) Business organizations. (2) Metals and minerals.
(2) Manufacturing. (3) Fuels and power.
(3) Developing programs. (4) Agriculture, fisheries, and power.
(4) Size distribution of firms. g. Transportation.
(5) Channels of distribution. (1) Highway transportation.
AGO 7384A
C-l
FM 30-31

(2) Railway transportation. b. Military Geographical Studies, Maps, and


(3) Inland waterway transportation. Charts.
(4) Merchant marine. ( 1 ) Amphibious landing beaches.
(5) Civil aviation. (2)
( 3 ) Transportation obstacles.
h. Communications. Í4) Air installations.
( 1 ) Postal, telephone, and telegraph. (5) Highways and railways.
(2) Radio and television. (6) Ports and harbors.
(3) Other. (7) Inland waterways.
(8) Urban areas.
C—5. Sociological Intelligence
c. Meteorological Data.
a. Social Organization. (1) Climatic studies.
( 1 ) Characteristics of the people. (2) Weather data.
(2) Customs and manners. (3) Light data.
(3) Languages.
(4) Minorities and tribes. d. Imagery.
(-1 ) Basic photocover.
b. Institutions. (2) Photomaps.
(1) Religion. (3) Interpretation keys.
(2) Education. e. Gazetteers.
(3) Arts and letters.
(4) Cultural groups and movements. C-7. Military Intelligence
( 5 ) Public information.
a. Military Establishment Capabilities.
c. Population and Manpower. (1) Governmental subordination of armed
( 1 ) Population data. forces.
(2) Public opinion and attitudes. (2) Political subordination of armed forces.
(3) Displaced persons, refugees, and evac- (3) Military, treaties and alliances.
uees. (4) Internal security forces.
d. Health and Welfare. (5) Manpower resources.
( 1 ) Health, hygiene, and sanitation. (6) Command and staff doctrine.
(2) Public welfare. (7) Regular and nonregular force structure.
(3) Social problems. b. Military Establishment. Attitudes. .
(1) Influence on national policy.
C—6. Geographical Intelligence (2) Importance within government.
(3) Tradition of interference in politics.
a. Physical Geographical Studies, (4) Maps,
Prestigeand
among populace.
Charts. (5) Loyalty to government.
(1) Surface configurations and landforms.
(2) Surface drainage. c. Orgnization of the Armed Forces.
(3) Vegetation. (1) National military establishment.
(4) Soils and trafficability. (2) Territorial organization.
(5) Key terrain features. (3) Ground, naval, air order of battle.
(6) Cultural features. (4) Paramilitary order of battle.
(7) Animal life. (5) Doctrine, strategy and tactics.
(8) Safe area descriptions. d. Biographies.

Section II. INSURGENT MOVEMENT INTELLIGENCE REQUIREMENTS

C—8. General Requirements (2) Local level.


a. Identification of Insurgent Movement. c.
(1) Name(s) of movement. (1) Social.
(2) History of movement. (2) Political.
b. Location of Movement. (3) Intellectual.
(1) National level. (4) Economic.
C—2 AGO 7S34A
FM 30-31

(5) Religious. (2) Regular armed forces.


(6) Historical. ^(a) Regional forces.
(b)
d. Composition of Movement.
(1) National level. (3) Relationships with insurgent political
(2) Local level. movement. ^

e. Support of Movement. b. Support of Local Populace to Insurgency


(1) Communist Parties and organizations. Forces.
(2) Non-Communist Parties and organiza- (1) Direct support.
tions. (2) Indirect support.
(3) Population. c. Government Measures and Attitudes.
(a) Rural.
(b) Urban. (1) Tactical.
(c) Government officials and workers. (2) Nontactical.
(d) General populace. d. Supportfrom External Powers.
(e) Military and paramilitary forces.
(1) Manpower.
(/) Upper class.
(р) Middle class. (2) Weapons and equipment.
{h) Lower class. (3) Other
(i) Professional. e. Order of Battle.
O') Minorities and tribes. (1) Composition.
(4) External support.
(2) Disposition.
(a) Overt.
(b) Covert. (3) Strength.
(4) Tactics.
/. Membership of Movement.
(5) Training.
(1) Actual.
(2) Potential. (6) Logistics.
(3) Biographies. (7) Combat effectiveness.
(8) Personalities.
g. Activities of Movement.
(1) Nonviolent activities. (9) Miscellaneous.
(a) Political. /. Insurgenoy Force Capabilities.
(b) Economic. (1) Tactical. '
(с) Psychological and propaganda. (a) Raids.
(d) Intelligence. (b) Ambushes.
(e) Counterintelligence and security. (c) Interdiction.
(2) Violent activities. (d) Harassment.
(a) Assassinations. (2) Support.
(b) Indiscriminate murder. (a) Logistics.
(c) Torture. (b) Manpower.
(d) Kidnapping. (c) Control of areas.
(e) Extortion. (d) Communications.
(/) Arson. (e) Intelligence.
(p) Sabotage. (/) Counterintelligence and security.
h. Strengths, and Vulnerabilities of Movement. (p) Psychological and propaganda.
( 1 ) Internal. (h) Transportation.
(2) External. (i) Chemical.
U) Engineer.
C—9. Insurgency Force Intelligence (A) Medical.
Requirements p. Strengths and Vidnerabilities.
a. Development of Force (Structure.
1 ) Internal.
(1) Village militia. (2) External.

AGO 7884A C—3


J
FM 30-31

APPENDIX G
COMBAT SURVEILLANCE AND RECONNAISSANCE
REQUIREMENTS FOR STABILITY OPERATIONS

PHASE I
Level of responsibility Minimum requirements
National (NIDCC) 1. LOC studies.
Subnational Area Coordination 2. Terrain studies.
Center
3. Trafficability analyses.
4. Soil analyses and erosion control.
5. Plans for urban and agricultural
growth ; relocation requirements.
6. Study of international boundaries
for border violations.
7. Study of potential LZ and DZ to
disclose possible use by insur-
gents.
8. Observation of demonstrations and
riots for suspected insurgents.
9. Mapping, map stockage, and map
supplements.
10. Detection of insurgent supply
caches from photography and
ground reconnaissance.
11. Planning training of tactical units
in surveillance means and capa-
bilities ; use of surveillance equip-
ment.
12. Coordinating the use of TAOR re-
sources available for in-country
support.
13. Collection of target data on known
or potential insurgent force base
areas, logistical supplies, train-
ing areas, infiltration routes, and
food production areas.
Tactical Unit and/or U.S. 1. Support of the surveillance effort
Advisor to Host Country Unit within area of responsibility by
utilizing the unit’s total surveil-
lance capabilities.
2. Assisting in the training of in-
digenous units in combat surveil-
lance and reconnaissance.
AGO 7884A 0-1
FM 30-31

PHASES II AND III


Level of responsibility Minimum requirements
National (NIDCC) 1. The continuation of all Phase I
requirements still valid.
Subnational Area Coordination 2. Detailed terrain studies and photo-
Center graphic coverage of areas under
consideration for current and
future operations.
3. Development of repetitive aerial
photography coverage for com-
parative analysis purposes.
4. Collection of information usable
for updating operational maps.
5. Reconnaissance to confirm intelli-
gence gathered from other
sources.
6. Continual visual observation of all
areas of suspected or known in-
surgents activity.
Tactical Unit and/or U.S. 1. The continuation of all Phase I
Advisor to Host Country Unit requirements still valid.
2. Development of target data within
areas of known or potential tac-
tical operational value for use in
unit target folders.
3. Ground and aerial surveillance
patrol plans to cover all areas
within unit TAOR.
Photographic coverage of TAOR
with repetitive coverage on a
frequent basis to assure identifi-
cation of all changes.

AGO TS84A
G-a
FM 30-31

APPENDIX H

TYPE INTELLIGENCE TRAINING PROGRAM FOR STABILITY OPERATIONS

H-1. General are assumed to be part of the general training


program for host country military personnel.
a. The program of instruction presented in this
appendix is designed primarily for the training b. The proposed instructional program encom-
of host country military intelligence personnel. passes 185 training hours. This does not include
It is adaptable for use by U.S. Army mobile train- a recommended two-hour period which could be
ing teams, as well as by U.S. Army advisor or used daily for language study, orientation, and
mission personnel operating in foreign countries. review on evenings when no night training is
The program is not inclusive of several common scheduled. Additional hours for practical exercises
subjects, such as scouting and patrolling, which should be added whenever time permits.

H-2. The Instructional Program


Subject area Hours Scope
Map Reading (16)
Introduction to Maps 1 Definition of maps; uses of maps
in intelligence activities ; impor-
tance of marginal data and
meaning of topographic sym-
bols.
Coordinate Systems 4 Explanation and use of Universal
Transverse Mercator (UTM)
and geographic grid systems ;
and/or explanation of grid sys-
tem for quick and accurate loca-
tion of points on any map.
Scale and Distance; Elevation 2 Explain relationship between map
and Relief. distance and ground distance on
any map, illustrate use of
graphic scale to determine
ground distance from map
measurement. Explanation and
use of various methods showing
elevation and relief at specific
may locations.
Land Navigation 3 Illustrate use of azimuths and
of declination diagram in solu-
tion of polar coordinates, inter-
section and resection problems.
Explains use of lensatic com-
pass and/or terrain features for
point to point navigation. Show
techniques for navigation at
night.

AGO 7384A H-1


FM 30-31

Subject area Hour» Scope


Map Reading
Practical Exercises Practical work with available
maps and appropriate tools, in
classroom and/or in field, giv-
ing students practice in solving
typical map reading problems.
Exam and Critique 2 Determine map reading ability of
students through extension of
practical exercises in classroom
and/or in field using available
maps. Critique results to rein-
force teaching objectives.
Communist Subversion (12)
Sino-Soviet Organization of 2 Organizational structure of gov-
Party and State. ernments of USSR and Com-
munist China and of CPSU
and CCP, including intelligence
and security organs.
Indoctrination of Communist 1 The nature of Communist Party
Party Membership. membership. Comparison of re-
cruiting practices. Democratic
centralism as a technique for
securing cadre support of
Party policies. The meaning of
“bureaucratism” and “democ-
racy” within the Party. Criti-
cism and self-criticism as psy-
chological control techniques.
Communist Insurgency Doctrine 1 Evolution of Communist revolu-
tionary theory through Marx,
Lenin, and Mao. Distinctive
characteristics of the revolu-
tionary strategy employed in
Russia and China. Ethics of
communism as reflected in sub-
versive insurgency. Objectives
of revolutionary communism in
theory and practice.
Strategy of Subversive Insur- 1 Minimum requirements for an in-
gency. surgency. The three basic in-
surgent strategies: early power
seizure, coalition government,
and parallel government. Com-
mon characteristics of the three
strategies. Selection of a strat-
egy based upon local conditions.
Communist Tactics Within the 2 The mass organization and the
Population. infiltration cell. Objectives of
Communist Party control of
mass organizations. Forms of
the urban demonstration of
strength. Forms of support for
rural insurgent operations.
H—2 AGO 7884A
FM 30-31

Subject area Hours Scope


Communiât Subversion
Communist Tactics in Promo- 1 The five steps in the promotion
tion of Insurgency. of an insurgency: intelligence,
propaganda, organization, train-
ing, and struggle. Methods of
protraction and escalation of an
insurgency. Formulation and
manipulation of People’s Liber-
ation Committees.
Insurgent Psychological Oper- 2 The Communist concept of prop-
ations. aganda and agitation. Content
of insurgent propaganda. Typi-
cal propaganda themes. Face to
face persuasion and action prop-
aganda. Techniques of agita-
tion. The insurgent “agitprop”
network.
Communist Penetration and 2 Practical exercise and seminar in
Subversive Techniques. which the student applies the
Communist doctrine, tactics and
techniques presented in pre-
vious instruction in preparing
an assessment of the suscepti-
bility of his own organization
to Communist penetration.
Assessment prepared outside of
class and brought in for dis-
cussion of appropriate counter-
measures.
Fundamentals of Insurgent (27)
Organization and Operations
Evolution of the Insurgent 1 Discussion of the three phases of
Movement. insurgent development and the
five-step promotional method.
History of Bowmore 4 Seminar on the development of an
insurgency in the hypothetical
country of Bowmore. Identifi-
cation of factors that contrib-
uted to political instability.
Evidence of insurgent organiza-
tions and exploitation of griev-
ance. Comparison of events in
the student’s country with those
in Bowmore.
Organizational Principals 2 Organizational principles of the
insurgent movement and com-
mon characteristics of the in-
surgent organization.
Insurgent Use of Political 1 The exploitation of local political,
Pressure to Weaken the economic, and psychological fac-
Established Government. tors by the insurgent organiza-
tion.
AGO 7884A H-3
Subject area Hourê Scope
Fundamentals of Insurgent
Organization and Operations.
Internal and External Devel- 5 Development of the insurgent
opment of the Insurgent effort through exploitation of
Movement. outside assistance, civil popula-
tion, terrain, propkganda, and
intelligence. Discussion of fac-
tors which enhance the internal
strength of the insurgent move-
ment such as aggressive leader-
ship, internal discipline, unity
of the movement, and the will
to resist.
Causes of Insurgency 2 Analysis of the grievances which
exist within the civil popula-
tion arid are exploited by the
insurgent movement to weaken
the established government.
Introduction to Insurgent Order 2 Introduction to order of battle;
of Battle. necessity for compiling order
of battle in peace and war ;
importance of order of battle
factors; and order of battle as
it pertains to insurgent opera-
tions during the three phases of
insurgent development to in-
clude personalities, doctrine, etc.
Type Insurgent Order of Battle 6 Typical insurgent organization in
each phase of insurgent develop-
ment to include combat, combat
support, and combat service
support organizations. Tactics
and training during the three
phases of insurgent develop-
ment (sabotage, terrorist activi-
ties). Detailed discussion of sur-
prise and mobility to include
ambush, raid, and harassirig
operation.
Other Order of Battle Con- 2 Other order of battle considera-
siderations. tions concerning internal de-
fense operations to include inter-
relationship with other sources/
agencies to enhance the overall
effort and to assess the overall
combat effectiveness of the in-
surgent force.
Insurgent Activity Indicators 2 Type insurgent activity indicators.
Determination and evaluation of
indicators. Use of insurgent
activity to determine the rela-
tive advancement of insurgency
within the first phase.
FM 30-31

Subject area Hour a Scope


Production of Internal Defense (39)
Intelligence.
Intelligence Cycle 1 Introduction to planning, collec-
tion and processing of informa-
tion and the dissemination of
intelligence for purposes of in-
ternal defense in first phase of
insurgency.
Area Coordination Center 2 Necessity for civil-military coor-
dination in the local intelligence
effort. Type area coordination
center including agencies to be
represented. Operation of the
Area Coordination Center with
emphasis upon participating
agencies as collectors of infor-
mation and users of intelligence.
Function of the Area Coordina-
tion Center in integrating in-
telligence and operations.
Area Studies in Intelligence 4 Requirements for information on
Planning. the local area of operations.
Area studies and their use as a
basic aid in planning the collec-
tion of information. Scope, for-
mat, and techniques of prepar-
ing an area study, including a
practical exercise in the prepa-
ration of a local area study.
Intelligence Planning 4 Planning of the collection effort
to include determination, for-
mat, and content of intelligence
requirement; priorities among
intelligence requirements; for-
mat and function of the collec-
tion plan as an aid in intelli-
gence planning during the first
phase of insurgency.
Collection of Information 3 Definition of, and distinction be-
tween, sources of information
and collection agencies. Identifi-
cation of sources which can be
exploited at the local level dur-
ing the first phase of insur-
gency ; their capabilities and
limitations. Identification of
collection agencies, their capa-
bilities, limitations, and employ-
ment at the local level. Counter-
measures the insurgent can
employ to hinder the collection
effort.

AGO 7884A H-5


FM 30-31

Subject atea Hours Scope


Production of Internal Defense
Intelligence
Recording of Information _ 3 The development, maintenance,
and utilization of recording de-
vices and systems for use at the
Area Coordination Center dur-
•s

ing the first phase of insurgency.


The importance of working files
in developing knowledge of the
insurgent enemy with emphasis
on personality and incident files.
Influence of local- conditions
upon the applicability of vari-
ous recording devices. Discus-
sion of type recording devices
with emphasis upon the intelli-
gence workbook.
Evaluation and Interpretation 4 The production of intelligence
of Information. through evaluation and inter-
pretation. Evaluation to deter-
mine pertinence and credibility
of information. Evaluation to
determine reliability of source
and agency. The'process of in-
terpreting information through
analysis, integration, and de-
duction. Use of the pattern
analysis techniques.
Determination of Insurgent 2 Methods of determining insurgent
Capabilities. capabilities. Importance of in-
telligence in the determination
of probable courses of action
during the first phase of insur-
gency. Format and content of
statements regarding insurgent
capabilities.. -
Intelligence Estimate of the 3 Format, content, and function of
Insurgent Situation. the estimate. Preparation of an
estimate of the insurgent situa-
tion at a local level during the
first phase of insurgency.
Dissemination of Intelligence The importance of proper and ob-
jective (dissemination. Methods
and means of dissemination.
The effect of timeliness and
security upon the dissemination
means. The development and
utilization of intelligence re-
ports applicable to the first
phase of insurgency. The in-
fluence of local conditions upon
the applicability of various
reports. Discussion of type in-
H-6 AGO 7884A
r

FM 30-31

Subject area Houre Scope


Production of Internal Defense
Intelligence
telligence reports with empha-
sis upon the intelligence esti-
mate.
Role of Intelligence in Internal 3 The use of intelligence to detect,
Defense. identify, expose, penetrate and
neutralize revolutionary activi-
ties and organizations. Consid-
erations of intelligence support
to major internal defense pro-
grams.
Intelligence Review 1 Review of intelligence cycle ; plan-
ning collection, processing of
information ; dissemination of
information.
Intelligence Production PE 8 A practical exercise emphasizing
the use of intelligence produc-
tion devices and techniques in
an Area Coordination Center.
Intelligence Personnel Management, (22)
Stability Operations
Introduction 1 Importance of the continuous in-
formation coverage of the entire
region by area, population, and
specific targets. Necessity for
broad coverage to provide over-
all knowledge within geographi-
cal boundaries to detect poten-
tial subversive activities or dis-
sident elements.' Methods of ob-
taining information regarding
a specific target, known or sus-
pected, through informants.
Insurgent Vulnerabilities 1 The vulnerabilities of the insur-
gent movement to intelligence
penetration. Placement of in-
formants within the insurgent
political and military organiza-
tion, cadre, and local support.
Locating the Informant 2 The continuous search for quali-
fied persons who may have or
who can obtain placement or
access to the desired informa-
tion. Determination of motiva-
tional factors, i.e., progovern-
ment, special interests, griev-
ances against the insurgent.
Suspectibility tb operational
control and discipline.
Initial Checking 2 Security procedures to be followed
prior to contact with the pros-
pective informant. File checks,
discreet neighborhood inquiry,
AGO 7884A
H-7
Subject area Hour* Scope
Intelligence Personnel Management,
Stability Operations
other existing investigative
techniques.
Contact 2 How to approach the prospective
informant, identity, the offer,
answer to objections, reassur-
ances, rewards, and punish-
ments, concluding the bargain.
How to plan and arrange for
the initial meeting. Degree of
exposure, physical security, and
operational security during ini-
tial contact.
Tasks 2 The need of assigning a clear,
meaningful task to the inform-
ant who has the capability to
accomplish it. What is required
and guidelines for collecting,
i.e., observation, conversation
documents.
Individual and Cell Security — 2 The techniques of achieving indi-
vidual and cell security with an
explanation of: individual pre-
cautions and defensive meas-
ures, both active and passive,
to prevent exposure; cell prac-
tices and control ; cell discipline,
and methods to prevent ex-
posure of the cell.
Identity 2 The necessity for a different iden-
tity for individuals and the cell ;
explanation for individual and
cell activities; and the use of
identities and explanations to
prevent exposure. How these
identities and explanations are
developed to fit the character
of the informant, the task which
must be accomplished, the area,
and other factors. The need to
continue normal actions and ap-
pearances to prevent notice and
detection.
Communications With Inform- 3 The requirements in establishing
ants — communications with inform-
ants. How to meet with inform-
ants in a secure manner. The
use of signals, couriers, hiding
places, and other techniques to
communicate with informants.
Testing 2 The testing of the informant’s
honesty, capabilities, identity,
FM 30-31

Subject area Hours Scope


Intelligence Personnel Manage-
ment, Stability Operations.
and security. How to conduct
field tests; techniques employed
and evaluation of the informant.
Separation From Service 2 Compensation and rewards the
informant might receive. How
compensation may be deter-
mined. Security problems in
informant payments. Actions
after the informant is no longer
required. How the informant is
separated from service. Cate-
gories of separation and post
action report.
Records on Informants 1 The need for details in writing of
the physical description, per-
sonal data, actions as an inform-
ant, and any other data which
would be necessary if control
were to be transferred to
another intelligence collector.
Security practices to safeguard
informant records and the need
to develop an informant registry
at national or regional level.
Techniques of Gathering 17
Information.
Observation and Surveillance _ . 3 Principles of observation. Type
of surveillance. Reconnaissance,
both ground and air, as a part
of the surveillance effort. Tech-
niques of conducting overt and
clandestine surveillance during
the first phase of insurgency ac-
tivity; The employment of police
patrols in urban areas and mili-
tary patrols in rural areas as à
means of collecting information.
Police Type Support to Inter- 4 Installation security, traffic con-
nal Defense Operations trol measures, law enforcement
in riot control, and population
registry and control measures.
Basic Techniques 6 Employment of the basic tech-
niques of observation and
description of personalities,
equipment, weapons, movement,
construction and incidents to in-
clude systematic approach to
motivating, training, and direct-
ing of individuals to collecting
such information, identification
and recognition of basic geo-
metric shapes and figures com-

AGO 78S4A H-9


FM 30-31
Subject area Hours Scope
Techniques of Gathering
Information.
mon to manmade products and
structures, selection of perti-
nent detail, sketching and draw-
ing from both planimetric
and horizontal views, methods
of estimating and measuring
dimensions, identification, ap-
proximation and relation of new
or unusual impressions to known
objects of previous experiences,
estimation of specific time of
occurrences and time spans,
identification of personalities as
to specific individuals, tribal
association, area of origin and
status within group, identify
and denote significance of pat-
terns of activity and changes in
mode or status of existence, ex-
amples and practical exercises
to aid in the instructional
process.
Review of Basic Photography — Review of the photographic cycle.
Sensitized photomaterial, cam-
era lens and shutter relation-
ship.
Determining Exposure Various methods of determining
exposure in photography. Use
of an exposure meter.
Operation of a 35mm Camera _ Theory and operation of a simple
35mm camera. Practical exer-
cise in the use of the camera as
an aid in the collecting and re-
cording of information.
Interrogation and Handling of (18)
Insurgent Suspects.
Apprehension and Disposition Identification of suspects. Arrest
of Insurgent Suspects. of suspects and search of appro-
priate area. Objective, prepara-
tion and techniques of suspect
interrogation. Knowledge of in-
surgent organization in suspect
interrogation. Disposition of in-
terrogated suspect.
Interrogation Techniques Introduction to interrogation tech-
niques. Principles, procedures,
and approaches used in interro-
gation.
Handling of Interrogées The proper handling of inter-
rogées, their personal effects,
and documents in order to in-
sure a successful interrogation.
Insurgents as Sources of In- The value of an insurgent inter-
formation. rogée as a source of information
and the types of information
which may be elicited.
AOO 78S4A
H—10
Subject area Hours Scope
Interrogation and Handling of
Insurgent Suspects.
Interrogation of Illiterates 2 Techniques in interrogating illiter-
ates with limited ability to read,
write, or count. Procedures for
establishing mutually accept-
able frames of reference with
interpreter and subject.
Preparation of Reports 2 The techniques of placing infor-
mation elicited from an inter-
rogée into a usable format.
Communist Interrogation Tech- 4 Historical examples of Communist
niques. techniques of interrogation and
indoctrination.
Passive Opposition to Insurgent (11)
Penetration and Activity.
Insurgent Strategy 2 Analysis of the operational advan-
tages and disadvantages of an
insurgent movement compared
with those of the established
government.
Unit Security Against Pene- 2 Insurgent methods of operation in
tration. penetration. Passive counter-
measures including orientation
of personnel and establishment
of reporting requirements. Prob-
lems of unit members and the
commander in implementing re-
porting requirements.
Civil Administration Person- 1 The civil administration as a prime
nel Security Program. target of infiltration by sub-
versive insurgent elements. The
components of an effective per-
sonnel security program within
the civil administration.
Counterintelligence Support 2 The use of passive security meas-
ures, investigation, surveillance,
informants, and the population
to thwart or detect subversive
penetration activities.
Categories of Counterintelli- 3 Military security; civil security;
gence Operations. port, frontier .and travel secu-
rity, censorship and special
operations necessary to achieve
objective of national security.
Camouflage, Concealment, and 1 Employment of camouflage, con-
Deception. cealment, and deception ; passive
artifices and countermeasures.
General Orientation (15)
Intelligence Orientation 1 Introduction to principles of in-
telligence. Definitions of intelli-
gence and counterintelligence.
FM 30-31

Subject area Hour* Scope


General Orientation
Types of intelligence. Require-
ment for intelligence to support
operations of local police, para-
military, and military forces
and to support programs of civil
aifairs and psychological opera-
tions conducted by the govern-
mPTit fnr internal defense.

Counterintelligence and Secu- 3


rity Orientation.
1. Operational Security (1) Internal security measures, se-
Principles. crecy discipline, compartmenta-
tion of security operations and
liaison with other agencies.
2. Counterintelligence (1) Organization, function, mission,
Organization. capabilities and limitations of
personnel.
3. Positive Counterintelli- (1) Aggressive information collection
gence. program to include special pene-
tration operations.
Public Administration Orien- 1 Orientation on the concepts of
tation. village, regional, and provincial
administration duties in support
of the government’s intelligence
collection effort. The concept in-
cludes the utilization of cadres
involved extensively in pacifica-
tion tasks.
Psychological Operations 2 Orientation on psychological oper-
Orientation. ations to include: tactical and
consolidation psychological op-
erations ; definition of prop-
aganda ; propaganda means and
themes ; intelligence require-
ments ; and civil affairs require-
ments in support of internal
defense operations.
U.S. Objectives and Organiza- 4
tion in Internal Defense and
Development Assistance
Operations.
1. U.S. Objectives (2) The purpose of this unit of in-
struction is to give the student
a general knowledge of the
United States response to devel-
oping nations in internal de-
fense and development assist-
ance operations. The objectives
of the United States Govern-
ment in developing nations re-
garding their internal defense
AGO 7S84A
H-12
r
FM 30-31

Subject area Hours Scope


General Orientation
effort with emphasis on the
organization and mission of the
in-country team.
2. U.S. Army and Its In- (2) Orientation on the U.S. Army with
telligence Support. emphasis upon the organization
of a division and upon the MI
support of a division. Duties
and functions of various mili-
tary intelligence specialists.
Development of an Organiza- 4
tion and Tactics for Stability
Operations.
1. Intelligence Organiza- (2) Organization and functional con-
tion for Small Units. siderations in the development
of a military intelligence orga-
nization to support battalion
and smaller sized military and
paramilitary units. Discussion
of organization and functions
of a type small unit intelligence
support organization for em-
ployment in an internal defense
mission.
Fundamentals of Orga- (2) To give the students a general
nization for Stability knowledge of the concept of sta-
Operations. bility operations as part of a
comprehensive internal defense
program. Military tactics are
explained under the general con-
cept of isolation and elimina-
tion. Concepts of area organiza-
tion, combat security, protec-
tion of civilian communities and
vital installation and immediate
action drills.
Final Course Practical (8) Practical exercise and seminar in
Exercises which the student applies the
techniques presented in the in-
struction on hypothetical inter-
nal defense/development situa-
tions.

AGO 7884A
H-13
!

F
t

f
I
l

I
î,

li
I'

f,

I
FM 30-31

INDEX

Paragraph Page
Advisory functions 5-7, 5-8, 6-12c, 5-
8-6d(2) 6-
Advisory intelligence training 9-3 9-1
Aerial reconnaissance and surveillance:
Airphotos 4-86, 7-14»(6), 4-2, 7-9, 7-12,
7-18»(3),8-9 8-5
Functions 8—8» 8-5
General 6-8c 5-
Agencies (collection) (see Sources)
Agent operations 8-6c(2) 8-4
Agricultural factors:
Intelligence indicators E—2d(l), E-3, 7-11
7-15d(l)
Intelligence requirements C-46 C-l
Air weather service 2-7c 2-4
Area coordination center:
Communication facilities 7-256 7-20
Dissemination function 7-25, e-76 7-20, 6-2
Missions 7-25, App G 7-20, G-l
Surveillance requirements 8-4» 8-2
Area study :
General 7-246(1) 7-19
Intelligence requirements App C C-l
Updating 7-186(4) 7-13
Army intelligence operations:
Advisory functions 5-7, 5-8 5-
Combat support 5-8, 6-6, 6-13 6-3, 6-2, 6-5
Missions 6-2, 6-12» 6-
Training 6-12c 6-
Unilateral requirements 6-3 6-1
Base camps 2-5 2-3
Capabilities (insurgent) :
Analysis ? 2 3-1
Basic 8-4—3-8 3-
Counterintelligence 7-16 7-11
Guerrilla warfare 3-7 3-2
Infiltration 7-16» 7-11
Intelligence 4-3, 2-13 4-
Intelligence requirements App C-9/ C-3
Reinforcement 3-13, 3-14 3-4
Supporting 3-9—3-12 3-3
Tactical 3-8,4-8 3-3, 4-2
Civil affairs:
Civic liaison 7-96 7-6
Intelligence liaison 7-9» 7-6
Personnel 7-96 7-6
Clandestine intelligence 7-136 7-8
Collection of information:
Agencies (see Sources)
Collection plan 7-7d, App F 7-6, F-l
Combat surveillance and reconnaissance 4—7c, 4-8, 4-9c, 8 4-2
Counterintelligence 8-6c(n 8-3
General 7-11 7-6

AGO 7881A lndex-1


FM 30-31

Paragraph Page
Collection of information—Continued
Interrogation 5-8c 5-3
Sources 4-96, 7-7, 8-6 4-3, 7-4, 8-3
Collection plan:
Contents 1- 7-
Format App F F-l
Combat reconnaissance and surveillance:
Capabilities 8-3o, App C 8-2, C-l
Development 8-3 8-
Effects of terrain 8-2d 8-2
General 4-7c, 4-8, 4-9c, 4-3, 4-3
7-166(1) 7-11
Limitations of weather 8-2(2 8-2
Requirements 8-4, App G 8-2, G-l
Responsibility 8—4c 8-2
Roles (missions) 8-46 8-2
Supervision 8—4e 8-2
Combined intelligence :
Agreements 6-9,6-2, 6-4 5-
6-1, 6-2
Centralization 6-5 6-
Coordination 6-4, 6-5, 6-120. 6-2, 6-5
Planning 6-4, 6-5 6-2
Priorities 6-4 6-2
Command and control (insurgent) :
Communist App B-12 B-ll
Native leadership 2- 2-2
Organizational structure 4-5 4-1
Commodity intelligence indicators App E-2c2 E-2
App E-3(2 E-6
Communications (friendly) :
General 7-256 7-20
Use in ACC 7-256 7-20
Use in intelligence dissemination 7-256 7-20
Communications (insurgent) :
Couriers and messengers 4-4 4-1
Equipment 2-46(2) 2-3
Requirements 4-6 4-
Communications (general) :
Effects of terrain 2-9 e 2-5
Effects of weather 8-2d 8-2
Communist insurgent organization :
Cellular compartmentalization App B-2e B-l
Cellular structure App B-2 B-l
Command and control App B-12 B-ll
Front organization App B-7-9 B-7
Infiltration techniques App B-6 B-6
Main force structure App B-13 B-ll
Mass civil organization App B-5 B-5
Military forces App B-ll B-ll
Party committee system App B-3 B-4
Party youth organization App B—4 B-5
Village militia App B-10 B-8
Coordination centers (intelligence) 6-7 6-2
Counterintelligence :
Activities 8-6c(l) 8-3
Countersubversive measures 7-136 7-
Files 8-6c(l) 8-
Insurgent 7-16 7-11
Intelligence support 5- 5-
Sources 8-6c(l) 8-3
Countersubversion 7-136 7-8
Country team 6- 6-
Couriers (insurgent) 4-4 4-1

AGO 7884A
Index—2
FM 30-31
Paragraph Page
Defectors (insurgent) 7-12 h 7-7
Dissemination of information
Area coordination center 6-76, 7-25, App G 6-2, 7-20, G-l
Area studies 7-246(1), App C 7-19, C-l
Estimate of insurgent situation 7-246(2), App D 7-19, D-l
General 7-23—7-25 7-19—7-20
Documentary data base 5-3 5-1
Documents :
Area study 7-246(1) 7-19
Biographical data 7-246(2) 7-19
Estimate of insurgent situation 7-246(2) 7-19
General 7-24 7-19
Intelligence 6-3d, 7-146, 5-1, 7-9, 7-19
7-246
Lists of suspect targets 7-246(3) 7-19
Police reports 7-246(1) 7-19
Enemy situation :
Estimate of insurgent situation 7-246(2) 7-19
Indicators App E-2, App E-l, E-3
E-36
Intelliger"« requirements App C-2 C-l
Economy :
Intelligence indicators App E-2d, App E-2, E-6
E-3d
Intelligence requirements App C—4 C-l
Environmental indicators App E-2e, App E-3, E-7
E-3e
Essential elements of information (EEI) _ 7-5 7-3
Estimate of insurgent situation 7-246(2), App D 7-19, D-l
Evaluation of information 7-19 7-13
Files and records:
Area study control copy 7-186(4) 7-13
Current propaganda and PSYOP file 7-186(2) 7-13
General 7-18 7-11
Hot file 7-186(1) 7-12
Incident file 7-18a(l) 7-12
Organizational file 7-20a(3) 7-14
Personality and organization file 7-186(3) 7-13
Police reports 7-246(1) 7-19
Reference material 7-186(6) 7-13
Resource file 7-186(5) 7-13
Suspect personality file 7-20a(2) 7-14
Foreign aid (insurgency) 1-Pd 1-4
Front organizations (communist) App B-7—B-9 B-6, B-7
Ground surveillance and reconnaissance:
Agencies 8-6 8-8
Equipment 8-7c 8-4
General 8-5 8-3
Planning considerations 8-7 8-4
Security missions 8-6a 8-3
Guerrillas (see Insurgents)
Guerrilla operations l-6c, d, 3-7, 1-3,1-4,3-2,
8-26 8-1

Health factors:
General 2-9g 2-5
Intelligence requirements App C-5d C-2
Host country :
Economy 3-56 3-2
Ethnic factors 2-llc, d 2-6
Governmental 2-116 2-7
Intelligence coordination centers 6-7—6-9 6-2—6-3
Intelligence requirements 6-3, 6-4 6-1—6-2

AGO 7334A lndex-3


FM 30-31

Paragraph Page
Host country—Continued
Intelligence sources 8-6d(3) 8-
Intelligence training 9-4 9-
Internal defense organization 6-1, 6-7—6-9 6-1
6-2
Local area coordination center 6—9a 6-3
National intelligence structure 6-8 6-3
Police forces 6-96 6-3
Popular support 2-10d, 2-11, 2-6, 2-8
2-13d
Traditions 2-12c 2-7
Vulnerabilities l-6c, 2-12c, 6-9c 1-1, 2-7, 6-4
Hot file 7-186(1) 7-12
Imagery interpretation 5-8c 5-3
Incident file 7-20a(l) 7-14
Incident map ^— 7-18a(l) 7-12
Indicators (intelligence) :
Commodity indications App E-2d, App E-2, E-6
E-3d
Environmental App E-2e, App E-3, E-7
E—3e
General 7-6, 17 7-4, 7-11
Insurgent activities App E-26, d E-l, E-2
Population App E-36 E-3
Propaganda App E-2c E-2
Infiltration :
General 7-16a 7-11
Insurgent techniques (communist)' App B-12 B-ll
Informants 7-156(2) 7-11
Infrared (see Aerial reconnaissance and surveillance)
Insurgency :
Armed forces l-6c, d 1-
App B-ll
Base camps 2-5, 4-2a, 2-3, 4-1
Capabilities 3 3-
Characteristics l-4a,6 1-
Clandestine operations 2-3a(2), 2-4c, 2-2, 2-3, 7-8
7-136
Command and staff 2-3, 4-5, App B- 2-
12
Communications -, 2-46(2), 2-9e, 2-3, 2-5, 4-1,
4-4, 4-5, 4-6, 4-2, 7-8
7-13c(2)
7-16 7-11
Counterintelligence
Development . 1-6 1-2
Finances 2-3a(6), 7-13/(l) 2-
l-6c, d, 3-7, 8-26 1- 3, 1-4, 3-2, 8-1
Guerrilla operations
7-16a 7-11
Infiltration techniques —
4-3,7-136 4-1, 7-8
Intelligence agencies
Intelligence operations 2-3a(2), 2-4c 2-
4-3 4-
Intelligence requirements
Intelligence sources 4-3,7-136 4-1, 7-8
Leadership 1-76, 2-36, 4-56 1-
Logistics 2-3a, 2-46(3), 2-
4-7, 7-13/, 7-22 7-9, 7-17
6(6)
Objectives 1—4c 1-2
Organization 2-2, 2-3a, 4-5, 2-
App B B-l
Political activities 3-5a, 4-7—4-9, 3-
Popular support 7-4c, 7-13d, /, 7-3, 7-8, 7-9,
App E-26 E-2
Propaganda 1-66(2), 2-126, 1-2, 2-7, 2-8,
2-13d, 3-5, 7- 3-
13c(2)

AGO 7884A
lndex-4
FM 30-31

Paragraph Page
Insurgency—Continued
Propaganda indicators App E-2c E-2
PSYOP activities 7-13c 7-8
Recruitment 2-3o(l), (4), 7— 2-2, 7-8, B-9
13e, App B-lOc
Rival insurgencies 1- 1-
Subversion indicators . E-26(3), 1-66, c, E-2, 1-3, 2-6,
Subversive activities 2-106, c, 2-13c, d, 2-8, 3-2, 7-8
3-5, 7-13c
Tactics 2-3a(3), 4-8c, 7- 2-2, 9-3, 7-8,
13e, 7-226(5 j, 7-17, H-l
App H
Training 2- 2-2, 4-3
226(5), 7-13e, 7-16, 7-8, H-l
App H
U.S. Army Role 1-56, 5-16, 5-6, 1-2, 5-1, 5-2,
5-8, 5-9a, 6-10 5-3, 5-8, 6-4
U.S. Policy 1-56, 6-26 1-2, 6-1
Vulnerabilities l-7c, 4-1—4-9 1-
Insurgents :
Captured 7-12Í 7-7
Characteristics 2-la, d 2-
Defectors 7-116. 7-6
Morale 2- 2-1
Training 2-lc, 2-3a(3),4- 2-
8c, App B-lOd B-10
Insurgent situation map 7-18a(2) 7-12
Intelligence :
Advisory elements 5-7, 5-8, 6-12c 5-2, 5-3, 6-5
Agencies 7-7, 8-6c 7-4, 8-4
Basic 5-3 5-1
Civil affairs 7-9 7-6
Clandestine operations 7-136 7-8
Collection 7- 7-2—7-11
Command responsibility — 5—4c, 5-5c, 7-3 e 5-2, 7-2
Coordination 9-46(3) 9-2
Current 5-5 5-2
Cycle 7-16 7-1
Dissemination 5-5c, 7-22—7-24 7-14—7-19
Documentary data base 5-3 5-1
Documents 5-3d 5-1
Estimates 7-3, App D 7-2, D-l
Files and records : 7-186 7-12
Indicators 7-6, 7-13, App 7-4, 7-8, E-l
E-2
Management 7-4d 7-3
Order of battle 7-22 7-14
Overt 7-136, 7-226(7) 7-8, 7-18
:
Pattern analysis techniques 7-2 7-1
. Personnel 9-2a 9-1
Planning 3- 3-
7-4—7-9, 6-11 7-2—7-6, 6-4
Priorities 7-5 7-3
Processing information 7-17—17-22 7-11—7-14
Psychological operations 7-8 7-5
Reports 5-4a, 5-56, 7-3, 5-2, 7-2, 7-19
7-246
Requirements 5-1—5-9, 6-11, 5-1—5-3, 6-4,
7-4, App C-7, 7-2, C-2
C-8
Security 4- 4-
Sources 4-96, 4-7c, 4-8, 7-1, 7-4, 7-7,
7-7, 7-12, 7-14, 7-9, 8-3
8-

AGO 7334A lndex-5


FM 30-31

Paragraph Page
Intelligence—Continued
Strategic 5-3, 6-11 5-1, 6-4
Tactical 5-8c 5-3
Intelligence estimate 7-3, App D 7-2, D-l
Internal defense l-5c, 1-2 1-2
Interpretation of information 7-21 7-14
Interrogation 5-8c 5-3

Leadership (insurgent) l-7d, 2-36, 4-56, 1-4, 2-2, 4-2,


App B-12 B-ll
Liaison with civil affairs 7-9 7-
Linguists 8-66(2) 8-
Local area coordination centers 6-9a, d 6-3, 6-4
Logistics (insurgent) :
Base camps 2-6 2-3
General 1-66(2),l-6c(3) 1-2,1-3, 2-2
(d), 2—3a(4)
Popular support 4-9 4-3
Procurement 7-13/ 7-9
Requirements 4-7 4-2
Vulnerabilities 4-7c 4-2
Long range reconnaissance patrols (LRRP) 4-86, 5-8e 4-

MAAG 6-11 6-
Maps 7-18 7-11
Messengers 4-4 4-1
Military intelligence detachments 5-8c, 6-136 5-
Military police operations 7-10 7-
Militia (insurgent) 8-26, App B-10 8-1, B-8
Morale (insurgent) 2-lc 2-1

National Internal Defense Coordination Center 6-76,6-8,6-116, 6-2, 6-3, 6-5,


6-12a, c, 8-4a, 8-2, G-l
App G
Order of battle:
Composition 7-226(1), App B 7-15, B-l
Disposition 7-226(2) 7-15
Effectiveness 7-226(7) 7-18
General 5-8e, 7-22a 5-3, 7-14
Intelligence requirements App C-9e C-3
Logistics 7-226(6) 7-17
Personalities 7-226(8) 7-18
Strength 7-226(3) 7-16
Tactics 7-226(4) 7-16
Training 7-226(5) 7-17
Organization (insurgent) 2-2, 2-3a, 4-5 2-1, 2-2, 4-1
Organizational file 7-20a(3) 7-14
Other intelligence requirements (OIR) 7-5 7-3
Overt operations 7-136, 7-226(7) 7-8, 7-18
(6)
Patrols :
General 7-146(1), 8-2e 7-9, 8-2
LRRP 8-66(3) 8-3
Objectives 8-66(1) 8-3
Training 8-66 8-3
Use of linguists 8-66(2) 8-3
Pattern analysis techniques 7-2 7-1
Personalities and contact map 7-20a(5) 7-14
Personality and organizational files 7-186(3) 7-13
Phases of insurgency l-7a, 3-5, 3-8, 1-4, 3-2, 3-3
4-3, 4-76, 4-8, 4-1, 4-2, 7-14
7-22a
Photographs (aerial) 7-14a(6), 7-18 7-9, 7-12,
a(3), 4-86, 8-9 4-2, 8-5

Index-6 AGO 7884A


r
i
FM 30-31

Paragraph Page
Police forces (indigenous) 6-96(4, 5), 7-15 6-3, 7-10
a, b
Political indoctrination App B-10d B-10
Populace :
Discontent 2-1 la, 3-5c, 7- 2-6, 3-2, 7-8
13c, e
Ethnic groups 2-llc, d, 2-10, 2-6, 2-7, 2-8
General 2-11, 2-12c, 2-136
Intelligence indicators App E-36 E-3
Intelligence requirements App C-8 C-3
Intelligence source 7-12 7-7
Literacy 2-1 Ij 2-7
Logistical support to insurgents 4-9 4-3
Population status map 7-18a(4) 7-12
Processing information:
Evaluation 7-19 7-13
Files and records 7-186 7-12
General 7-17—17-22 7-11—7-14
Integration 7-20 7-13
Interpretation 7-21 7-14
Recording 7-18 7-11
Propaganda activities (insurgent) :
General 1-66(2), 2-126, 1-2, 2-7, 2-8,
2-13d, 3-5, 7-12c, 3-2, 7-7, 7-9,
7-14a(5), App B- B-10
10e
Psychological operations 7-8, 7-13c, App 7-5, 7-8, D-l
D-2e
Publications 7-146(2) 7-9
Recording information 7-18 7-11
Recruitment (insurgent) 2-3a(14), 7-13e, 2-2, 7-8
App B-lOc B-9
Reports :
Intelligence 5-4a, 5-5b 5-2
Intelligence estimate 7-3, App D 7-2, D-l
Resource file 7-186(5) 7-13
Sociology :
General 3_5c 8-2
Intelligence requirements App C-5 C-2
Sources (collection) :
Advisory mission 8-6d(2) 8-4
Agent operations 8-6c(2) 8-4
Availability 7_7 7-4
Collection plan 7-7d 7-
Combat units 8-6¿ 8-
Counterintelligence 8-6c(l) 8-3
Defectors 7-126- 7-
Host country government 8-6d(3) 8-
Informants 4-96, c 4-3
Insurgent 4-3, 7-136 4-1, 7-8
Liaison 7-76 7-
Patrols 8-66 8-
Requests for information 7-7c 7-5
Selection 7-7 7-
Special forces 8-6d(l) 8—
Technical intelligence 8-6c(5) 8-4
U.S.' Army returnees 8-6c(6) 8-1
Special Forces 8-6d(l) 8-1
Stability operations :
Combat surveillance and reconnaissance 8-2a 8-1
Ground surveillance and reconnaissance 8-6 8-3
Intelligence priorities 7-56 7-
Intelligence requirements 5-ld, 5-4c, 7-4c 5-1, 5-2, 7-3
Patrolling 8-66(2) 8-

AGO 7884A
lndex-7
FM 30-31
Paragraph Pase
State Department 6-10 6—
Statement of intelligence interest 6—46 5-2
Subversion (insurgent) :
Economie 3-66 3-2
General 1- 1-
2-13c 2-8
Indicators App E-26(3) E-2
Political 3-5 a 3-2
Sociological 3- 3-2
Terroristic activities 3-6, 7-166 3-2, 7-11
Subversive insurgency 1- 1-2
Suspect personality file 7-20a(2) 7-14
TAOR (Tactical area of responsibility) 8—7a 8-4
Tactics :
Conventional , 3-8 3-
Countersubversive 8-7d 8-6
Guerrilla 2- 2-
4a, 2, 3-7,4-8, 3-
7-226(4)
Intelligence requirements 5-8 c 5-3
Technical intelligence 6-8c, 8-6c(5) 5-3, 8-4
Terrain :
Factors 2-9 2-5
Intelligence App C-6 C-2
Objectives 2- 2-5
Terroristic activities 2-106, c, 2-13c, 2-6, 2-8, 3-2,
3-6, 7-166 7-11
Training (insurgent) :
Indoctrination 2-7—2-13e, 7-22 2-4—2-8, 7-17
6(5)(6)
Recruitment 7-13e 7-
Rehearsals 4- 4-
Tactical 2-3a(3), 7-226 2-2, 7-17
<5)(a)
Training (intelligence) 9-1—9-4 9-1, 9-2
Training (requirements) 9_2—9-4 9-1, 9-2
Transportation intelligence requirements . App C-4f7 C-l
U.S. Information operations (in-country) :
Advisory assistance missions 5-7, 5-8, 6-12c 6-2, 5-3, 6-5
Country team 6-10 6-4
Intelligence training assistance 6-6 6-2
Logistical support 5-8a 5-
Military intelligence detachments 5-8c, 6-136 5-
Policies 6-2, 6-12a 6-
Tactical support 5-8a, c, 6-13 5-3, 6-5
Training activities 6-12c 6-
Unilateral requirements 6-3 6-1

Vulnerabilities :
Host country 1—6c, 2—12c, 6—9c 1-3, 2-7, 6-4
Insurgent l-7c, 4-1—4-9 1-4, 4-1—4-3
Weather:
Effects on communications 8-2d 8-1
Effects on ground reconnaissance 8-2 d 8-1
General 2-6 2-4
Intelligence requirements App C-6c C-2

lndex-8 AGO 7834A


T-

FM 30-31

By Order of the Secretary of the Army :

W. C. WESTMORELAND,
General, United States Army,
Official : Chief of Staff.
KENNETH G. WICKHAM,
Major General, United States Army,
The Adjutant General.

Distribution :
To be distributed in accordance with DA Form 12-11 requirements for Combat Intelligence.

#
AGO 7834A *U. S. GOVERNMENT PRINTING OFFICE : 1970 '390-807/7334
I
\

)
r

r¡*

ÍSÜi

*
>1

• • •
§
09

>

UNIT DtLAWAKt MOVINCt Alffc COO10iMAllOH_CIN1!l

PfRIOD COVERED; FROM TO


COLLECTION PLAN
PBMABT
COlliCTtON teiciAiizie oovt
AOINCIIt
EXAMPLE OF A PARTIALLY COMPLETED COLLECTION PLAN

(IIMTIAl IliaiHTS Of MOUB AMO

MfOCSATION AMO OTHIB VfCTMC BlOUItfi S3 OltlMAtlOM


MWIHMMCI BtOMBIMUm
or BiroiTi

Figure F—l.
Will the .insurgents en* Recent (lest 6 months)
goge in nonviolent te- Insurgent political ac-
(1) Identify provincial leaders of Radical Reform Party 9
ll ana’ If so. «bel. «ben. tivities
wbere end bow’ (2) Report all recent activities of the party
&
(3) Report current plans and ultimate objectives of the
party
Recent (last 6 months) (1) Identify leaders of the Peoples' Democratic Labor 9

Example of partially completed collection plan.


insurgent economic ac- Party and the taall Farmers’ Progressive Grange
tivities. Association
(2) Report their recent activities
(3) What are the programs and objectives of these organ-
izations (stated and actual)1*
c. Recent (last 6 months)
Insurgent sociological
(1) Identify groups (ethnic, religious, social, minorities,
etc ) which have been the targets of recent insurgent
9 9 999 9 9 9
activities activities
(2) Report their activities and identify the individuals 9 9 9 9
who conducted them.
(3) Enumerate effects of insurgent activities on the 9 9 ) ® ; 9
target groups
d Recent (last 6 months) i\) Identify targets of Insurgent psychological activi-
Insurgent psychological ties and explain why they are targets.
activities (2) What do the insurgents hope to achieve through their 9 ©
psychological activities’
(3) Describe individual insurgent psychological activi- 9
ties.
Will the Insurgent en* a Recent assassination, (1) Report all assassinations, including the identity of
gage in terrorist ac- those assassmed, their positions, the reasons for the
tions’ if so. what, when, assassination, and the identity of the assassin
where and how’
b Recent cases of torture. (1) Report the identity of those tortured, their positions,
the reasons they weie tortured, and the Identity of
9 & ® .

the torturers
c Recent cases of extor- (1) Report the identity of Individuals who have been the
object of extortion, their positions, the purpose of
9
tion
the extortion, means used, and the identity of the
extortioners
d Recent kidnappings (1) Report the identity of individuals who have been
kidnapped, their positions, why and how they were
9 9 i ®
kidnapped, and the identity of the kidnappers
e Recent sabotage (1) Report objects which have been sabotaged, reasons
for and results of the sabotage, how sabotage was
9 9 0® ® a. 0 &&
accomplished, and identity of saboteurs
Will the insurgent. en-
gage In terrorist ac-
Recent harassment di-
rected at the govern-
(1) Report individuals or government forces that have
been harassed, purpose and results of the harass-
& 9
tions’ If so. what, when, ment or the population ment. and Identity of and methods used by individ-
where and how’ uals who conducted the harassment

Z
E
FM 30-31

EXAMPLE OF PARTIALLY COMPLETED COLLECTION PLAN (coni)


Recent destruction of (1) Report personnel or objei Is that ha\e been destrm ed
personnel, equipment, b) ambush or raid, the manner in t'hsch thei were
installations by am* desiroted, and the identitv of individuals involved
bush or raid. ¡n t),r ambushes or raids.
20 8 X XX XXX XXX
c Recent interdiction of (1) Report systems which have been destroved or dis-
transportation ande rupted, methods employed, reasons for destruction,
monication system. and identify individuals who carried out the destruc-
tion. 2& 2 x&2 X
d. Recent actions in (1) Report location, date and nature of actions, forces
which insurgent forces involved (government and insurgent), and insurgent
dispersed before gov-
ernment forces could
tactics employed to avoid contact. &0 X
close.

Will the insurgents en- Formation of insurgent (1) Report location and activities of insurgent regimen
gage in conventional
tactical operations? If
military forces of regi-
mental size.
tal headquarters and subordinate units. X
so, what, when, where,
and how?

will the insurgents en- Recent insurgent intel (1) Report insurgent intelligence collection activities-
gage in activities to sup- ligenre and security targets of the activities, methods rmploved, person
port nonviolent action,
terrorist action, guerrilla
activities. nel involved (friendly and insurgent). 8$0X X X X XX

Figure F-l—Continued.
operations, or conven-
(2) Report methods used by the insurgents to deny m
tional tactical opera-
formation to the government concerning their loca
tions? If so, what, when
tion, personnel, organization, installations, activi
where and how’
ties, and plana. 888
b. Recent recruitment and Report all attempts (successful and unsuccessful)
retention of elements of by insurgents to recruit members of the local popu-
the provincial populace lace—identify individuals and groups contacted bv
by the insurgents. the insurgents, insurgent methods of recruitment,
and personnel employ ea. 88X 8 8 X X8
(2) Report how the insurgents retain individuals after
they have been recruited. 888
. Recent organization and (1) Report insurgent attempts to organize the people and
training of elements of the leadership, activities, plans and objectives of
the provincial populace
bv the insurgents.
insurgent controlled organizations. 888X X
(2) Report locations of insurgent training sites, describe
facilities, type training conducted and identitv of
students and instructors.
8 88
d. Recent insurgent (1) Report all items procured by the insurgents bv tvpe
vurement
and
(Both
of
logistical
within
fu
f mancial
si
support,
pr
provint e
and quantitv—how procured, from and bv
disposition of items .ifter procurement.
whom, and

88 8 x xx8
and from e)
external
souri es.)


o
o

• • •
FM 30-31

(c) Discovery of arms, ammunition, and tors in the physical and manmade environment in
explosives being clandestinely manufactured, an urban center. The following listing, while not
transported or cached. all-inclusive is intended,to create an atmosphere
. (d) Increased purchase and theft from sal- conducive to recognition of such indicators that
vage yards of metal products such as pipe, cas- may appear in an area.
ings, wire, spikes, and nails. (1) Apartments and housing being rented but
(e) Increased purchase of surplus military not lived in as homes.
goods and nonserviceable items. (2) Slogans written on walls, bridges, and
(/) Increase in demand for small arms and streets.
ammunition on the open market. (3) Defacement of government and police in-
(g) Reports of large scale purchasing of formation signs.
weapons, ammunition, and material used in their (4) Disappearance of electrical lines.
manufacture from gunsmiths, traders and regular (5) Pollution of the urban area’s water
businessmen. supply.
(h) Increase in pilfering of arms and am- (6) Isolated terroristic acts directed at the
munition from the government. destruction of government buildings and installa-
(i) An increase in the number of armed tions and the homes and businesses of community
robberies which indicates a tendency toward the leaders.
use of arms in addition to indicating a source of (7) Changes in residence of suspected subver-
financing for the insurgent movement. sives.
O') Reports of theft or sudden shortages of (8) Discovery of message drops.
certain basic chemicals which could be utilized in (9) Apartments and houses apparently being
the clandestine manufacture of explosives. used for purposes other than residences.
(fc) Appearance of arms manufactured in (10) Increased smuggling of currency,’ gold,
pro-insurgency oriented countries. gems, narcotics, medical supplies, and arms into
(3) Clothing. urban centers.
(а) Unusual systematic purchase of (11) Reports that local currency is being
clothing materials, possibly indicating the crea- bought up in world markets by pro-insurgency or-
tion of factories for the manufacture of insurgent iented countries.
uniforms or footwear. (12) Appearance of abnormal amounts of
(б) Unusual scarcity of clothing or mate- counterfeit currency in country of concern.
rial used in the manufacture of clothing and foot- (13) Increase in bank robberies.
wear. (14) Work stoppages or slowdowns in essen-
(c) Large scale distribution of clothing to tial industries.
underprivileged classes by organizations of recent • (15) Marked decline in product quality in es-
or suspect origin. sential industries.
(d) Discovery of caches of uniform (16) Marked increases in equipment failures
clothing. in essential industries.
(4) Drugs. ' ' (17) Mass strikes and sympathy strikes in
(a) Scarcity of drugs and medical supplies essential industries.
on the market or black market. (Í8) Appearance of known agitators or sus-
(b) Large scale purchase or theft of drugs pected subversives in picket lines.
and other medical supplies from warehouses and (19) Escalation of peaceful strikes to violence
distributors. against property and nonstriking personnel.
(20) Explosions in or bombing of essential
(c) Diversion of shipments of drugs into utilities and industries.
the cities. (21) Roadblocks and mines on main lines of
e. Environment Indicators. Environment indica- communication, powerlines, and aqueducts lead-
tors in an urban area may not be as apparent as in ing to urban centers.
the rural areas of a province or country. It is pos- (22) Malicious damage to industrial products
sible, nevertheless, to recognize insurgency indica- or factory machinery.

AGO 7334A
E-7
FM 30-31

(g) Leakage of classified information to ganda goals will be those of attempting to bring
newspapers. the normal pattern of background dissension to a
(h) Sudden changes in working and living predetermined level and maintaining it at that
patterns and financial status of government and level until an opportune moment. The secondary
law enforcement employees. goal will be to broaden the base of popular support
(z) Failure of government raids on sus- elsewhere in the urban community with a specially
pected subversive meetings or headquarters ap- designed campaign.
parently because of forewarning. (1) Against the general situation.
(j) Increased student activity against the (a) Worldwide dissemination of propa-
government and its police, or against minority ganda by proinsurgency oriented countries de-
groups, foreigners and the like. nouncing conditions in, and the government of,
(k) Demonstrations against government the country of concern.
forces, scapegoat minority groups, or foreigners (b) In-country dissemination of antigov-
who are designed to goad government forces into ernment slogans and pronouncements by word of
acting against crowds and thereby creating gen- mouth, wall scribblings, and crude posters and
eral hostility toward the government. leaflets.
(l) An increased number of articles or ad- (c) Initiation of letterwriting campaigns to
vertisements in newspapers criticizing the govern- newspapers and government officials deploring
ment. undesirable conditions and blaming individuals in
(m) The growth of general hostility power.
toward the government and law enforcement (d) Proliferation of slogans pinpointing
agencies. specific grievances.
(n) The occurrence of strikes in critical (e) Increase in petitions demanding gov-
areas casting doubt upon the ability of the govern- ernment redress of grievances.
ment to maintain order and provide for the needs (/) Circulation of petitions and tracts
of the people. whose origins cannot be immediately determined,
(o) Unusual and unsatisfactorily explained which appear to follow the beliefs and policies of a
absences of government employees from their of- foreign power.
fices for periods of short duration. (g) An increase in rumors, publications, or
(p) Sporadic, unexplained destruction of leaders emerging from the areas occupied by re-
and/or forgery of government identification cards cently arrived migrants, which seem to focus upon
and passports. the idea that no one cares about the new arrivals
(q) Unexplained disruptions of public utili- or their social conditions.
ties. (h) A general increase in the underlying
(r) Reports of extortion attempts on local
feeling of agitation and unrest among the critical
leaders and businessmen. urban population for which there is no logical ex-
(s) Anonymous threats addressed to or ter- planation.
roristic acts committed against government and (i) Appearance of committees and organi-
business leaders. zations whose leaders do not seem to be from the
(t) Murder or kidnapping of government population of that urban area, yet who purport to
officials. speak for all of the citizens of that area.
c. Psychological, Propaganda, and Agitation In- (j) Increased appeals directed at intensi-
dicators. The state of advancement of the insur- fying general religious unrest in countries where
gent movement may be gauged by certain consid- religious competition exists and the religious com-
erations. First, since the beginnings of the urban position of the urban population is heterogeneous.
insurgency are characterized by a high degree of (k) Mass demonstrations whose partici-
secrecy and clandestine operation combined with pants advocate standard Communst demands.
selective recruitment, there is little requirement (l) Announcements by foreign countries
for a propaganda campaign beyond that necessary that the concerned country is ripe for a “war of
for face-to-face or person-to-person recruitment. national liberation,” or words to that effect.
When the first concrete urban propaganda indica- (m) Propaganda identifying local ethnic
tors appear, therefore, it can be taken as a sign groups with those in neighboring countries in con-
that the minimum underground insurgent organi- nection with selected themes.
zation has been established. The initial propa- (n) Clandestine in-country radio broad-
AGO 7334A E—5
FM 30,31

casts worded to appeal to those with special griev- (d) Pleas to the people to stop cooperating
ances or to underprivileged ethnic groups. with the military and police.
(0) Use of bullhpms, truck-mounted loud- (e) Deliberate acts during demonstrations
speakers, and other sophisticated equipment in or strikes to provoke police reprisals.
spontaneous demonstrations. (/) Accusations of police brutality or inef-
(p) Presence of photographers other than fectiveness or claims that government forces ini-
newsmen among demonstrators. tiated violence when demonstrations end in riots.
(q) Widespread advertising of planned (g) Publication of altered or misleading
demonstrations or strikes to appeal for sympa- photographs purporting show repressive police
thetic reception or participation. practices.
(r) Rallies to honor “martyred” insur- (4)
gents. (a) Student unrest manifested by new or-
(s) Mass demonstrations honoring revolu- ganizations, proclamations, demonstrations, and
tionary heroes or dates significant to insurgency strikes against authority.
movements in other countries. (b) Charges by students and others that
(t) Nationwide strikes called to demon- the educational system is not adequate and is only
strate the strength of the insurgent movement. training youth to do the government’s bidding.
(w) Sympathy strikes called outside the (c) Appearance of questionable doctrine in
country concerned. the educational system.
(2) Against the established government.
(a) Radio propaganda from foreign coun- (d) Clamor for key personnel changes in
ties beamed at the country of concern denouncing the educational system.
its government for failure to meet the needs and d. Commodity Indicators. In an insurgency that
desires of its people. is both rural and urban, the primary function of
(b) Propaganda from foreign countries the urban sèction is the financing and supplying of
aimed at the country of concern denouncing its the movement. Not only will an effective intelli-
allies for imperialistic and expansionistic designs gence operation that becomes conscious of com-
on that country. modity indicators be aware of the existence of the
(c) Demonstrations and violence in foreign insurgency, but (of even greater importance) ef-
countries against embassies, offices, and consulates fective intelligence operations will enable the gov-
of the country of concern and its allies. ernment forces to deny critical supplies to the in-
(d) The spread of ideas that the govern- surgent movement.
ment is corrupt and completely out of touch with • (1) Foods.
the people. (a) A scarcity of food supplies in the city
(e) Agitation against existing or proposed when there is no report of natural impediments to
government projects and plans. agriculture, indicating that food is being diverted.
(/) Rumors that the government is a pawn (b) In a country or province where there is
of a foreign government. a tolerated black market, a decline of foodstuffs at
(g) Advocation of a popular front govern- this source indicating that the food is being di-
ment including new parties unfamiliar to the verted.
people.
{h) Character assassinations of chief ex- (c) Sudden shortages of preserved foods or
ecutives and their advisors. items of food requiring minimal storage facilities.
(1) Movement to remove strong anti-insur- (d) The failure of farmers to transport
gency leaders. their crops and meats to the city indicating a fear
O') Strikes or work stoppages called to pro- of travel on the highways.
test government actions. (e) Large scale purchasing of foodstuffs on
(3) Against the military and police. the market by sources not previously identified as
(a) The spread of ideas that the military wholesale buyers, possibly indicating purchasing
and police are corrupt and completely out of touch agents for an insurgent movement.
with the people. (2)
(b) Character assassinations of military (a) Increase in assaults on police and mili-
and police officials. tary personnel accompanied by theft of weapons.
(c) Movement to remove strong anti-insur- (ö) Increase in thefts and purchases of
gency military and police leaders. arms, ammunition, and explosives.

E—6 AGO 7334A


FM 30-31

and distribution of goods, which may denote that (6)


a subversive insurgency is operating in the area or (a) Increases in purchase and use of
is making preparation for future operations are— radios.
(1) Crops. ib) Discovery of caches of communications
(а) Diversion of crops from the market. equipment.
(c) Unusual increase in communications
(б) Unexplained decrease in the production
traffic in amateur radio operations.
of a given crop.
(c) Increased reports of pilfering of food- e. An environment indicator could result from
stuffs. any manmade change, purposeful or accidental, in
(d) Strangers attempting to purchase the natural environment. The first environment
crops or produce. indicators should be apparent in the rural areas.
The intelligence gathering network can be facili-
(e) Farmers marketing a crop that is
tated by the assignment of personnel to these
smaller than usual, yet showing no signs of subse-
areas who are thoroughly familiar with the ter-
quent financial difficulty.
rain and who will be able to spot any physical
(/) Discovery of caches of staple food- dislocations resulting from any changes that have
stuffs. taken place. The following indicators may be ap-
(g) Fluctuation in crop prices indicating parent :
the existence of an insurgent taxing authority in
(1) Evidence of increased foot traffic in the
the area.
area.
(2) Animals.
(2) Increased travel within and into remote
(а) Diversion of meat from the market.
or isolated areas.
(б) Reports of loss of hides or diversion of
(3) Unexplained trails and cold campsites.
hides from the market.
(4) Establishment of new, unexplained agri-
(c) Disappearance of wild game from an
cultural areas, or recently cleared fields.
area in which it was previously plentiful.
(5) Unusual smoke, possibly indicating the
(d) Disappearance of pack animals or the
presence of a campsite or a rudimentary form of
appearance of unusual numbers of pack animals in
communication.
certain areas.
(6) Concentration of dead foliage in an area;
(3) Arms and ammunition.
possible indication of camouflage.
(а) Increased loss of weapons by military
and police forces. (7) Presence of foot traps, spikes, and the
like, in an area not noted for hunting.
(б) Increased pilferage of weapons.
(8) Presence of obstacles such as roadblocks
(c) Discovery of arms caches.
and canal blocks.
id) Unexplained attacks on patrols re-
sulting in loss of weapons and ammunition.
E—3. Type Indicators of Urban
(e) The above factors would not only be
Insurgent Activity
applied to actual weapons, but also to any simi-
larly essential goods such as surplus army goods, a. General. Urbanization entails the develop-
vital machine parts, vehicles, and the like. ment of institutions and political processes pecu-
(4) Clothing. liar to the city-state. These institutions and pro-
(а) Unusual scarcity of any type of mate- cesses have always been a prime target for subver-
rial that could be used for footwear. This would sive insurgency. Indicators of urban insurgent ac-
include such items as hides of animals and old tivity will be placed in the four categories of popu-
tires in addition to manufactured footwear. lation, propaganda, commodity, and environment
(б) Discovery of caches of clothing or of indicators.
materials which may be used in the manufacture b. Population Indicators. Urban insurgent lead-
of clothing or uniforms. ership is especially selected because of its ability
(5) Drugs. and talent to persuade and manipulate people.
(a) Scarcity of herbs and plants used as This leadership operates initially in an absolute
drugs. vaccum apart from the other sectors of society
(5) Large scale purchasing
and in an atmosphere of intenseor theft of
security. Leader-
drugs and of the herbs used in their manufacture. ship training is conducted in absolute secrecy be-
AGO 7834A
E-3
FM 30-31

cause at this point the insurgency is extremely ances, or interests of underprivileged or minority
vulnerable. It is rare that this urban insurgent groups.
elite reveals its activities intentionally or by mis- (s) Reports of large donations to new or
take. But the insurgents must reach beyond them- revamped organizations.
selves for growth. It is as a product of the re- (t) Reports of payments to locals for en-
sulting involvement with the public and the neces- gaging in subversive activities.
sary popular recruiting to achieve this growth (u) Reports of the formation of subversive
that the insurgency indicators appear. paramilitary organizations.
( 1 ) General activity. (v) Gernade throwing and bombing.
(a) Increase in size of pro-insurgent or- (w) Reports of insurgent lists of targets
iented embassy or consulate staffs in country of for planned terroristic acts.
concern. (cc) Appearance of professional agitators
(&) Increase in staff and activities in pro- in demonstrations that result in violence.
insurgency oriented embassies or consulates in (y) Evidence of the participation of paid
neighboring countries ; including unusual patterns and armed demonstrators in riots.
in nature of volume of external communications (2) Activity to gain the support of the people.
(both in-country and out-of-country). (а) Reported incidents of attempted re-
(c) Increased travel by suspected subver- cruitment of people to join new movements or un-
sives or other elements of the population to pro- derground organizations.
insurgency oriented countries or to countries
notably under insurgent influence. (б) Unexplained unavailability of doctors,
(d) Influx of insurgent leaders, both for- printers, and other specialists who may be
eign and domestic, into the urban area. working with and for the insurgents.
(e) Reports of locals being trained in pro- (c) Habitual criminals and formerly
insurgency oriented countries. unruly youth who seem to be acting with new pur-
(/) Increase in visitors from pro-insur- pose.
gency oriented countries (tourists, technicians, (d) Increased unrest among laborers.
businessmen, officials). (e) Inability and/or refusal of people, who
{g) Close connections between the diplo- formerly paid taxes, to pay them now to the gov-
matic representatives of pro-insurgency oriented ernment.
countries and the insurgents. (/) Reports of extortion and other coercion
(h) Disappearance of known or suspected utilized by the insurgents to obtain financial “do-
insurgents and dissident elements. nations” from the people.
(i) Increase in insurgent youth gatherings. (g) Disappearance of young men from the
O') Hosting of trade fairs or increased at- city.
tendance by locals. (3) Activity against the government.
(k) Return of nationals from travel or (a) Failure of police and informant nets to
study in pro-insurgency oriented countries. report properly which would indicate sources of
(l) Increase in visits to urban centers by information are affiliating with the insurgents or
rural officials and leaders from areas of unrest. are sufficiently afraid of them to preclude the
(m) Establishment of organizations (even passing of information.
very small) of unexplained origin and of unclear (&) Decreasing success of government
or nebulous aims. agents in infiltrating subversive organizations.
(n) Establishment of a new organization to (c) Assassination or disappearance of gov-
replace an existing organizational structure with ernment agents.
identical aims. (d) Reports of increased attempts by in-
(o) Appearance of many new members in surgent representatives dr suspected subversives
established organizations such as labor unions. to make contacts with local leaders or government
(p) Attempts by new groups to obtain con- officials.
trol of established organizations. (e) Reports of attempts to bribe or black-
(q) Infiltration of student organizations mail government and law enforcement employees.
and unions by known agitators. (/) Reports of attempts to extract classi-
(r) Appearance of new organizations with fied information from government officials or do-
titles stressing patriotism, rectification of griev- cuments from government offices.
E—4 AGO 7334A
FM 30-31

APPENDIX E
INSURGENT ACTIVITY INDICATORS

E—1. General tion appear to be much less critical than it really


is.
a. Anything that insurgents can do to influence
and direct a society toward revolution will be re- c.
flected by some overt occurrence or indication, no together with the collection effort instituted to
matter how subtle the action. These occurrences gather needed information, will not only indicate
and actions are referred to as insurgent activity the existence of an insurgency or potential insur-
indicators, and it is through recognition of them gent situation, but also the existence and magni-
that the first clues to insurgent existence and evi- tude of the problems and dissatisfaction of the
dence of the growth of the insurgent movement people. The elimination or effective control of in-
are obtained. There is a requirement to discover surgency is predicated on the coordinated efforts
which of the various sociological, economic, polit- of internal defense operational forces working
ical, and other activities are representative of in- with meaningful programs in their respective
surgent activity. fields. Before these programs can be developed, the
threat must be defined. The first step in the pro-
b. No attempt is made in this appendix to de- cess of definition is the establishment of insurgent
velop an all-inclusive listing of insurgency indica- activity indicators.
tors. Any attempt to do so would be unsuccessful
simply because no one could list in sufficient E—2. Type Indicators of Rural
detail the many possibilities, and combina- Insurgent Activity
tions thereof, existing in the different nations of
the world. Any such compilation must be specific a. A rural area, for purposes of this appendix,
and requires a detailed analysis of the particular includes all farming areas, any town or village up
country in question. The greater the perception of to 5,000 people, and any town or village up to
an insurgency situation within a particular 20,000 people with an agrarian based economy
country and the greater the knowledge of the type where the townspeople, if not engaged in farming,
of insurgent involved, the easier it will be to iden- earn their livelihood in agricultural service indus-
tify the insurgent activity indicators which are tries. In areas such as these, where the interests
applicable. This appendix will serve as a guide for are so interdependent, insurgency indicators
the determination of insurgent indicators and would be similar in both the town and countryside.
assist the intelligence officer in developing similar This is not to say that rural insurgency may not
clues to insurgent activity in a particular area. It be directed by, and coordinated with, urban insur-
is important to recognize that isolated actions of gency, but current Communist theoreticians em-
seemingly little significance in one frame of refer- phasize that the key to success is the countryside
ence may show a pattern of an emerging insur- and the rural population. In such cases the first
gency when coordinated with reports of indicators insurgency indicators will be found in the rural
from other areas. In developing new indicators or areas where the subversive insurgents are concen-
utilizing the suggested ones it must be remem- trating their initial efforts.
bered that the insurgent tactical approach is not
fixed and is capable of sudden change. The insur- b. During the development of a subversive in-
gent threat can unfold along altogether different surgency, some of the first indicators of latent or
lines simultaneously or switch with suddenness incipient insurgency will appear in the rural
from use of military force, for example, to a polit- areas. They will be recognized only by personnel
ical offensive. Such a development is particularly sensitive to change who are intimately familiar
dangerous in that it may make the general situa- with the area and the local conditions.
AGO 7384A E-l
FM 30-31

( 1 ) General activity. (d) Increased agitation on issues for which


(a) Identification thereofis insurgents,
no known reform movement or organiza-
their sup-
porters and sympathizers who suddenly appear in, tion.
or move out, of an area. (e) Increased activity by insurgent orga-
(&) New faces in the community. nizations thought to be dormant.
(c) Unusual gatherings among the popula- (/) Circulation of petitions advocating
tion. standard insurgent demands.
(d) Disruption of normal social patterns. (g) Reports from other countries that the
(2) Action taken to gain the support of the country is ripe for revolution.
people. (2) Directed against the established govern-
(а) Refusal of peasants to pay rent, taxes, ment.
or loan payments or unusual difficulty in their col- (a) Discrediting attacks causing embar-
lection. rassment and ridicule of national or public
(б) Trend of hostility on the part of the officials.
local population toward government forces. (&) Discrediting the judicial system and
(c) Occurrence of actions considered taboo police organizations.
by the populace. (c) Characterization of government leaders
(d) Disappearance of the population from as puppets and tools of a foreign government.
or avoidance by the people of certain areas. (d) Movement to remove strong anti-insur-
gency leaders.
(e) Unexplained disappearance or disloca- (e) Agitation against long-term govern-
tion of young people. ment projects and plans.
(3) Activity against the government. (/) Rumors resulting in public acceptance
(a) Strangers attempting to join local se- of untruths about the government or governmen-
curity forces. tal leaders.
(&) Reports of the people being approached (flf) Advocacy of a popular front govern-
for purposes of intelligence recruitment. ment.
(c) Unusual short absences of government (3) Directed against the national military
employees. forces.
(d) Failure of police and informant nets to (a) Attacks to embarrass or ridicular mili-
report properly. tary officials.
(e) Growth of general hostility toward the (5) Characterization of military leaders as
government. puppets and tools of a foreign government.
(/) Unexplained destruction or loss of gov- (c) Movement to remove strong anti-insur-
ernment identification papers or passports and in- gency leaders from the military.
creased forgeries thereof. {d) Exhortations to youths to refrain from
(р) Closing of rural schools. joining the military service or similar exhorta-
(h) Murder and kidnapping of local gov- tions to soldiers to desert with the resultant rise in
ernment officials. the number of AWOL or a decline in the enlist-
ment rate.
c. Propaganda indicators of an existing insur- (e)
gency should be apparent in every society. The the enemy of the people.
extent of the propaganda usually provides an indi-
cation of the phase of insurgency a country is ex- (/) Civilian avoidance of and failure to
periencing. The following indicators are not in- cooperate with the military.
tended to serve as a complete listing of possibili- (4) Directed against the educational system.
ties, but should serve as a guide and an aid in (a) Appearance of questionable doctrine in
recognizing the existence of similar indicators. the educational system.
(1) General propaganda indicators. (6) Charges by students and others that
(a) Dissident propaganda from unidenti- the educational system is not adequate and is only
fied sources. training the youth of the nation to do the govern-
(b) Increase in the number of entertainers ment’s bidding.
with a political message. d. Commodity indicators deviating from the
(с) Intensification of religious unrest. normal pattern in the manufacture, processing
AGO 7884A
E-2
FM 30-31

(Classification)
c. Insurgent vulnerabilities. (Lists exploitable insurgent vulner-
abilities.)

/s/
G2/S2
(Commander if distributed
outside headquarters)
ANNEXES:
Distribution: (If distributed only.)
Authentication: (G2/S2 authenticates if commander signs estimate.)

(Classification)
AGO 7334A D-3
FM 30-31

APPENDIX D
FORMAT OF AN INTELLIGENCE ESTIMATE FOR STABILITY OPERATIONS

(Classification)
INTELLIGENCE ESTIMATE
Preparing Staff Element
Organization
Location
Date/Time Group
References: Maps, Charts, or other Documents.
1. MISSION. (States the current or proposed mission of the force
designated for stability operations.)
2. THE AREA OF OPERATIONS. (This paragraph discusses char-
acteristics of the host country, the area, and their probable effect upon both
insurgent and government courses of action.)
a. Geography. (Includes climate and topography.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
b. Politics. (Includes governmental organization, political parties,
and interest groups.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
c. Economy. (Includes private enterprise and public facilities.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
d. Sociology. (Includes minority groups and social programs.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
e. Psychology. (Includes behavior patterns and motivating factors.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
3. THE INSURGENT SITUATION. (This paragraph discusses the
insurgent organization and its activities.)
a. Organization and Leadership. (Includes composition.)
(1) Nonmilitary. (Includes the underground.)

(Classification)
-AGO 7884A D-l
FM 30-31

(Classification)
(2)
b. Strength and Disposition.
(1) Nonmilitary.
Military. (Includes all insurg
#
(2) Military.
c. Recent and Present Significant Activities.
(1) Nonviolent action. (Includes political, economic, sociological,
and psychological action.)
(2) Terrorist action. (Includes murder, torture, extortion, kid-
napping, and sabotage.)
(3) Guerrilla operations. (Includes harassment, destruction,
interdiction, and dispersion.)
(4) Conventional tactical operations. (Includes attack, defense,
delay, and withdrawal.)
d. Strengths and Weaknesses.
(1) Recruitment and retention.
(2) Intelligence and security.
(3) Organization and training.
(4) Finance and logistics.
(5) Communications.
4. INSURGENT CAPABILITIES. (This paragraph lists current
insurgent capabilities and discusses them in regard to probability of
adoption. )
a. Enumeration. (Includes what, where, when, and how for each
capability.)
(1) Basic capabilities.
(a) Nonviolen
(&) Terrorist
(c) Guerrilla operations.
(d) Conventional tactical operations.
(e) Employment of chemical, biological, or nuclear weapons.
(2) Supporting Capabilities.
(a) Intelligence and security.
(b) Recruitment and retention.
(c) Organization and training.
(d) Finance and logistics.
(e) Reinforcement capabilities.
b. Analysis and Discussion. (Includes all evidence supporting or
rejecting the adoption of each capability.)
5. CONCLUSIONS. (This paragraph draws conclusions from the
content of the preceding paragraphs and furnishes a basis for selection
of courses of action to accomplish the assigned mission.)
a. Effects of the operational environment. (States the total effect
of the area of operations upon courses of action.)

»
b. Probable insurgent courses of action. (Lists probable insurgent
courses of action in order of relative probability of adoption.)

(Classification)
D-2 AGO 7834A
FM 30-31

CHAPTER 10
INTELLIGENCE COLLECTION OPERATIONS

The contents of this chapter, which deals with doctrine in the field of Human Intelligence (HUMINT)
and Signal Intelligence (SIGINT), appears in FM 30-31 A, a supplement to this manual.

AGO 7334A
10-1
#

(
ß>»
FM 30-31

CHAPTER 1
INTRODUCTION

Section I. GENERAL

1-1.
\
Purpose and Scope vironment. FM 30-5 contains the established
a. This manual, together with its SECRET
conventional intelligence doctrine for—
N0F0RN classified supplement FM 30-31A, pro- (1) Nuclear and nonnuclear environments.
(2) Chemical, biological, and radiological en-
vides guidance on doctrine tactics, and techniques
for intelligence support to U.S. Army stability op- vironments.
erations in the internal defense environment. Its d. Guidance on doctrine, tactics, and techniques
intended use is for commanders, staff officers, and for intelligence interrogation, counterintelligence
intelligence specialists. It is applicable to major operations, and aerial surveillance and reconnais-
commands and subordinate units and will serve as sance operations in support of stability operations
guidance for intelligence planning\training, and in the internal defense environment is contained
operations (unilateral and combined). in FM 30-15, FM 30-17, FM 30-20, and FM
\ 32-10.
b. This manual is concerned primarily with in-
telligence requirements in support of ÜiS. Army
stability operations; however, it also has Applica- 1—2. Changes
tion to U.S. internal defense and development as- Users of this manual are encouraged to submit
sistance operations where U.S. personnel advise, recommended changes and comments to improve
assist, and train host country (HC) military intel- the manual. Comments should be keyed to the spe-
ligence personnel. For this reason, the scope is riot cific page, paragraph, and line of the text in which
limited entirely to stability operations but includes., the change is recommended. Reasons will be pro-
a description of the overall internal defense intel- vided for each comment to insure understanding
ligence system, its management, and its unique as- \ and complete evaluation. Comments should be pre-
pects of operations in the internal defense envi- Apared using DA Form 2028 (Recommended
ronment, including those involving collection and Changes to Publications) and forwarded direct to
production agencies. A discussion of intelligence the Commanding Officer, U.S. Army Combat De-
training requirements for stability operations and velopments Command Intelligence Agency, Fort
a proposed intelligence training program also Holábird, Maryland 21219.
have been incorporated in this manual. \
\
c. The contents of this manual are based on the 1-3. Definitions
\
broad guidance and doctrine found in FM 100-20, The terminology used in this manual to discuss the
FM 31-22, and FM 31-23. The manual applies pri- internal defense environment and its intelligence
marily to Army force employment in the internal aspects is consistent with internal defense termi-
defense and internal development operational en- nology contained in AR 310-25 and FM 31-23.

Section II. BACKGROUND

1-4. General Frequently, such insurgencies have been Commu-


a. Recent history has been characterized by the nist inspired or have become subversive in nature
occurrence of a hundred or more insurgencies. as Communist elements manage to gain control
These insurgencies usually have taken place in de- of the movement and its leadership and exploit
veloping nations as a result of World War II or in the movement for their owrKpurposes. Any fore-
nations newly formed from colonial possessions. cast of the future must consider the probable fur-
AGO 7334A
1-1
FM 30-31

ther spread of insurgencies among other newly- b. In response to requests for internal defense
emerging and developing nations of the world and development assistance, the United States
which are seeking to achieve the status of self- provides a wide range of help through its various
respecting and viable members of the interna- governmental, civilian, and military agencies. The
tional community. U.S. Army contributes men and resources for sta-
bility operations in support of U.S. national in-
b. Insurgencies usually develop when discontent ternal defense assistance objectives. These U.S.
among the population of a country is not alle- Army resources may vary from provision of a few
viated by appropriate government action. Govern- selected advisors to provision of major combat
ments, perhaps unwittingly, may not respond to forces.
such discontent in time to prevent their develop-
ment into real or imagined grievances. Skillful c. Internabdefense involves all measures taken
agitators may capitalize on existing conditions by a government and its allies to free its society
and develop grievances when none originally ex- from subversion, lawlessness, and insurgency.
isted. With organization and leadership, growing While these measures will most probably involve
discontent with existing conditions within a some form of military participation, internal de-
country develops into insurgency. fense is not purely a military operation. Political,
economic, and sociological factors influence mili-
c. Communist movements use insurgency as a tary operations at all levels. Consequently, all U.S.
tool to achieve power by the use of military, polit- military intelligence personnel and agencies and
ical, economic, sociological, and psychological their host country counterparts are confronted
means in an integrated attack on weak govern- with many intelligence tasks which must be ac-
ments in less-developed countries. Subversive in- complished if stability operations are to make a
surgency (so-called “wars of liberation”) must be valuable contribution to the success of the overall
properly recognized as a major form of politico/ internal defense and development effort.
military conflict requiring at least the same atten-
tion and effort as limited and general warfare. The 1—6. The Nature of Insurgency
main objectives of insurgencies are the control of a. General. In order to contribute to the destruc-
the people and the destruction and replacement of tion of insurgency, the military intelligence staff
the existing government. A combination of per- officer and specialist must have a thorough under-
suasion and terror is used to gain control of the standing of the evolutionary development of in-
people while the government is destroyed by sub- surgent movements. While the nature of insurgen-
version, sabotage, and, if necessary, armed con- cies varies in some respects from country to
flict. country, certain patterns and similarities have
been discerned. Three frequently overlapping
T—5. United States Policy phases have been utilized as an aid in analyzing
insurgencies. They are discussed in b through d
a. United States foreign policy has long viewed
below.
an international community of independent,
stable, peaceful, progressive, and free nations as b. Phase I: Subversion.
the best guarantee of its own security. For this ( 1 ) Phase I insurgency varies from situations
reason the United States Government has under- in which subversive activity is only a potential
taken to assist, upon request, certain newly- threat to situations in which subversive incidents
emerging nations in their development toward pol- and activities occur with rising frequency in an
itical stability and economic and social progress. organized pattern. No major outbreak of violence
or uncontrolled insurgent activity occurs during
Many Of these nations, however, are confronted
this phase. The beginnings of an insurgency are
with latent, incipient, or active insurgencies which difficult to recognize. Insurgent activities may
inhibit their national growth and often threaten appear as one of many legitimate party activities
their very existence. Such nations seek and receive or movements such as loyal opposition or social or
internal defense and development assistance from religious reform. However, during this develop-
the United States and other allies to protect their ment period, when forces of the movement are
societies from subversion, lawlessness, and in- few, resources limited, and organization and lead-
surgency as well as to free them from conditions ership uncertain, the insurgency is most suscep-
which foster this unrest and instability. tible to counteraction. Although each particular

1-2 AGO 7334A


CHAPTER 2
THE ENVIRONMENT

Section I. THE INSURGENT ARMED ELEMENTS

2—1. General will remain at a relatively high level, particularly


in the early phases of an insurgency. The insur-
a. The insurgent enemy is likely to be poorly gent may or may not be a Communist. The nature
educated and a part of the underprivileged group or directions of the insurgent cause may or may
of a nation. The low standard of living to which he not reflect a connection with a Communist cause.
is accustomed has adapted him to privations. Al- i \
In some cases the individual insurgent may not
though he can be well trained and disciplined, he even know that the Communists are supporting
will normally require strong leadership and super- his flight for their own purposes.
vision. He is intimately familiar with the terrain
on which he fights and has learned to use it to his d.
best advantage. His knowledge of the area and its chiefly by his skill at his own sort of fighting, his
people, together with his skill at melding into his superb knowledge of the environment in which he
surroundings generally keeps him from having to lives and fights, and his devotion to the insurgent
fight pitched battles. He is almost always a native ideal or cause. It must be remembered, however,
of the country, and he generally relies on the po- that any generalities made concerning the insur-
pulace for supplies, information, and other sup- gents will vary with the state or degree of educa-
port. Outwardjy, he is usually indistinguishable tion, training, organization, equipment, and lead-
from the populace ; he has the potential of hiding ership which exists in the country concerned. In-
his weapon and melding into his environment. surgent regular force units may be introduced into
the conflict in the late Phase II or early Phase III
b. The insurgent’s tactics emphasize a “hit-and- stages of the insurgency. The organization and
run” technique; he masses sufficiently to insure mission of these forces may closely approximate
success, hits his target where least expected, and the characteristic of conventional forces.
disperses immediately thereafter. The insurgent
relies on flexibility and the uae of surprise to com-
pensate for his lack of numbers, training, and 2—2. Organization
equipment. His tactical doctrine demands that the a. At the heart of some insurgency movements,
initiative be maintained. The insurgent doctrine a tightly disciplined party organization may be
further requires that his intelligence be compre- found (see app B), structured to parallel the ex-
hensive and accurate, for intelligence is consid- isting governmental organizations. In most in-
ered the key to success over any adversary. If un- stances this structure will consist of committee
expected resistance is encountered during an oper- organizations at levels paralleling the existing le-
ation, the mission is aborted and foreseeable gitimate political structure. Intermediate echelons
defeat precluded. Movement normally is accom- may be deleted from the party structure of the
plished during the hours of darkness or during party leadership believes that it can adequately
other conditions of poor visibility. The insurgent supervise and coordinate the activities of subordi-
keeps his operations simple, thus reducing consid- nate committees from a national level.
erably the burdens of administration and logistics.
b. During a latent insurgency, the demands
c. The insurgent often is highly motivated be- placed upon a typical party, so far as administra-
cause of the intensive and continual political in- tion and tactical adaptability are concerned, war-
doctrination he receives which promises relief rant a relatively simple internal political organiza-
from real or imagined grievances and injustices. If tion. The party organization could consist of little
the insurgent's tactics are successful, his morale more than the committee system itself, plus such
AGO 7334A 2-1
FAA 30-31

agencies or specialized personnel as might be re- (4) Insurgent military forces have a much
quired for intelligence collection, agitation, prop- less complex supply and logistical system than
aganda, and occasional strong-arm activities. As conventional forces. When the insurgents are sup-
the insurgency develops, however, the need to es- plied through clandestine channels, the supply
tablish a mass civil organization and a military problem may be complicated by the need for secu-
force dictates the creation of new echelons of au- rity; however, supply operations are made as
thority and new organizations to accommodate simple as possible. Insurgent military forces rely
them. Details concerning a type insurgent organi- on the people for logistical support and also obtain
zation can be found in appendix B. supplies or equipment by successful attacks on
governmest forces or from external support pro-
2—3. Commemd and SflafiF vided by a sponsoring power.
a. The insurgent military organization is aus- (5) Insurgents may have an immediate and
tere and its structure simple. An actual physical near total dependence on close and continuous con-
installation for a headquarters may be nonexistent tact with the population. Winning population sup-
or of the most primitive type. The headquarters port is the key to success or failure of an insur-
personnel often fight alongside the rank and file of gency. Civilian proselyting sections or equivalent
the military force. The staff structure is often in- organizational elements are continually engaged
formal, but individuals within the force are as- in extensive political activities.
signed to perform roughly the same functions re- (6) Special staff activities of the insurgent
quired of any military staff. Differences between armed elements can range from the austere to the
staff functions necessary in insurgent force organ- complex. While medical care is often scarce and
izations and conventional force organizations gen- primitive, extensive field hospital facilities may
erally are as follows : still be found. Construction is kept simple and
(1) Insurgents carry on few personnel func- avoided when possible. It is possible, however,
tions—the only two which receive any significant that the insurgents will establish vast tunnel net-
emphasis are recruitment and replacement. Per- works and underground facilities. Other insurgent
sonnel records, if kept at all, are sketchy, and re- activities may be highly sophisticated. Financing,
quired administration is conducted informally. for example, can attain a degree of complexity
The insurgent personnel functions dealing with that includes formal taxation, issuance of war
discipline, law and order, and morale are politi- bonds, and the printing of money.
cally oriented. (7) Insurgent communication will vary from
(2) The intelligence function, on the other the use of couriers to modern radios. The commu-
hand, receives even more attention in insurgent nication nets will be relatively simple in opera-
units than in many conventional military units. tions and procedures in the initial stages of insur-
This is due to the clandestine, conspiratorial way gency. Subsequent stages normally will evidence
in which insurgents must live and operate. more sophistication.
(3) Insurgent planning encompasses far b. Leadership in an insurgency movement stems
more than tactical planning. Even at local levels from the degree of loyalty to the movement. One
the party chapter maintains formalized sections of the greatest advantages possessed by the insur-
dealing with long-range interests, such as youth gents is their well-qualified key leadership which
affairs, agriculture, civilian proselyting, and mate- is often provided by foreign powers for operations
riel procurement. General, long-range strategic in the specific insurgency being developed. When a
planning usually is performed by the secret di- recognized major insurgent force leader lacks a
recting apparatus. The results of this long-range military background, a sponsoring power may in-
planning usually come down to the individual in- filtrate qualified personnel to serve as his military
surgent force in the form of written orders. Oper- and technical advisors. By so doing, the military
ations are characterized by surprise, swift attack, capabilities of the insurgent force are exploited
and rapid dispersal, and usually occur under con- effectively without destroying the command struc-
ditions of reduced visibility. Much of the tactical ture of the established organization. Replacement
training takes place during actual operations, but of local leadership with personnel from outside the
considerable attention is given at small unit level area, however, may create exploitable morale and
to pre-attack rehearsals. Ideological indoctrination disciplinary problems. Often, promising native
receives a high degree of emphasis whenever the leadership candidates are recruited, trained over
insurgents reach a relatively safe position. extended periods of time, and then returned to
2-2 AGO 7334A
FM 30-31

means. Since climatic conditions vary from nation the details of weather and climate extremes which
to nation, area handbooks and USAF Air Weather will affect the employment of U.S. forces and plan-
Service reports should be consulted to determine ning assistance programs to the host country.

Section III. TERRAIN

2—8. General overgrowth reduces ground vehicular mobility, ad-


versely affects aircraft operations, and provides
. a. Insurgent forces exploit the geographical, as
well as political, sociological, economic, and psy- concealment for insurgent forces from ground and
aerial observation and cover from superior fire-
chological conditions of the environment. Often
power. In order to attack the insurgent effectively,
the terrain is rugged and difficult to negotiate. In-
friendly forces have a heavier burden of finding
accessible mountains, swamp areas, rain forests,
or uncharted wastelands affect internal develop- and fixing the insurgent than in conventional war-
fare. The navigation of observation or reconnais-
ment as well as military operations. Communica- sance aircraft to target areas will be difficult. The
tions and transport systems in most developing
nations rarely are equal to the requirements of determination of the geographical location of de-
internal defense and development operations. tected targets also will be difficult.
b. Swampland, river deltas, and valleys which
b. A host country may contain a wide variety of are flooded during the rainy season, and dense net-
terrain features. Operations must be conducted in works of rice paddies in river valleys and lowland
areas which vary from .high mountain ranges to areas may be difficult to traverse. Canals and
inundated areas, from desert to thick jungles and rivers are the “roads” and “highways” of this
rain forests, and from relatively open plains to type of area.
rugged mountain ranges. The terrain in each area
presents significantly different problems in c. Hot and extremely humid weather may
supply, transportation, maintenance, medical sup- weaken personnel and have an adverse effect on
port, and other logistical services. materiel.
d. Poor trafficability for vehicles and heavy
c. Increased efforts to obtain complete intelli-
gence, to habitually employ forces in the same weapons which limits cross-country movement
area, and to integrate assistance activities into the may prohibit or severely reduce the use of sophis-
activities of the population are required to gain ticated equipment. Limited roads and terrain ap-
and maintain familiarity with the area. proaches may also channelize trucks and tracked
equipment.
d. Particularly in the early phases of an insur- e. Terrain and atmospheric conditions may limit
gency terrain objectives are rarely selected to radio communications.
seize and hold as in conventional operations. The
same terrain may be the site of battle over and /. Mountainous terrain with rain forest type
over again. The population, not terrain, is the ob- vegetation may prevent ready accessibility to an
jective of most internal defense and development area.
operations. When population centers are seized, g. Health hazards, such as malaria, dysentery,
every effort must be made to secure them so that parasitic infections, and others may weaken per-
the insurgents cannot resume or continue insur- sonnel.
gent activities.
h. Hot, dry climates in desert areas may also
have weakened effects on personnel and present
2—9. Considerations
serious problems in equipment maintenance.
Terrain characteristics which must be considered
i. The vegetation of an area may not only pro-
during stability operations planning include the
following : vide concealment and cover to the insurgent, but,
together with the animal life, increase the ability
a. Dense jungleofwith
the undergrowth
insurgent to live
and off the land.
canopy

AGO 7334A 2-5


2—T 0. ©emeraD the population who are benefited. The upper strata
a. Control of the populace is a primary aim of of society who anticipate loss of status may resent
insurgent organizations, for once this is accom- the new developments. Segments of society which
plished, the government usually will fall. Con- favor change in a different manner, or by different
versely, government internal defense effort have processes than those proposed or accomplished,
the purpose of separating and protecting people may press for their own programs. For these rea-
from the insurgent. The success or failure of an sons, while the national government process
insurgency depends substantially upon the atti- brings the promise of eventual internal peace and
tude of the population. The possible effect on the a common national identity, its short-term im-
people of any action must be carefully assessed pacts usually involve the further increase of in-
and “immediate” gain versus “long-term” loss ternal pressures. The potential for insurgency lies
evaluated. in these dissatisfactions and grievances.

b. Subversive insurgent organizations exploit 6. People residing in sparsely settled areas are
the discontent of the population. Thus, it may be strongly influenced by their immediate environ-
said that insurgency arises from the people. Be- ments—such factors as family relationships and
cause of this identity factor, even the organized factors related to obtaining food, clothing, and
cadres of full-time military and paramilitary in- shelter.
surgent units are able to blend into the population c. The racial stock and physical characteristics
when necessary. of the population of an area are important consid-
c. Insurgent activities—including terrorism, sab- erations. A tendency exists among the populations
otage, subversion, espionage, raids, and ambushes of developing nations to fear and distrust persons
—are conducted by the insurgent from within the who are not of their own race.
structure of society. For this reason, detailed d. Ethnic groups, especially those constituting
knowledge of the population in an insurgency area minority factions, are of prime consideration.
is a definite requirement in order to analyze and Ethnic groups may be either a source of discon-
evaluate insurgent activity. tent or of major assistance depending upon the
d. Because some governments in areas afflicted amount of discrimination or persecution which
with insurgency are new and undergoing rapid exists. Where the antagonism between the govern-
change, there is often little sense in a mutual na- ment and minority faction is not immediately rec-
tional identity between the government and the oncilable, the U.S. or allied forces may provide
population. There is.seldom a national tradition or advisory elements to neutralize or assist in
heritage to act as a unifying force. It is necessary, gaining the support of these groups. However, the
therefore, that a strong and proud national iden- ultimate solution to this complex problem must be
tity be quickly developed to provide a cohesive a lasting reconciliation between the government
force for unifying the government and the popula- and minority groups.
tion. Governments seek to accomplish this by im- e. The introduction of large numbers of military
plementing measures that will develop political
and civilian assistance personnel from the United
and social cohesion and demonstrate economic prog- States and allied nations may create additional
ress. Civil affairs operations and psychological social and economic problems and antagonisms.
operations in support of this objective are impor-
tant aspects of stability operations. f. Some developing nations are reaching, or
have gone beyond, the population saturation point.
2—11 H. G@iniSDdleraîô®iras Many of these nations cannot feed, clothe, employ,
or otherwise satisfy even the basic subsistence
a. The developing nations are undergoing the needs of their populations. Compounding this
rapid changes associated with modernization. The problem is the fact that the economic growth rate
process is often a source of tension. The people normally does not keep pace with the rate of popu-
who resent the loss of traditional ways and values lation increase.
may become alientated from the government.
Those portions of the population, not benefited by g. The population saturation point may occur in
the change, envy those of the same element within certain geographical areas within a developing

AGO 7884A
FM 30-31

for civil affairs operations, intelligence operations, ations in an insurgent war differ little from those
and psychological operations. These advisors will of other types of warfare. However, it is the re-
have some requirements in common in the six in- quirement for the other Army missions directly
telligence subject areas; however, each will have associated with stabilty operations which are dis-
his own special interest which must be met by tinct in counterinsurgency operations. As part of
operational intelligence. Intelligence advisors the stability operations effort during Phase II, in-
must continually bear in mind that their status telligence units, psychological operation units, and
may shift at any time from primarily an advisory troops engaged wholly or in part in civil affairs to
to a basic operational role, and that their basic include populace and resources control operations
intelligence requirements will increase accord- may be committed. This requires detailed, compre-
ingly. Thus, even though there may be no current hensive, and current data concerning the six sub-
indications of such a shift in their status and its ject intelligence areas (qara 5-3b). With the in-
accompanying requirements, their efforts con- volvement of U.S. combat units, the entire Army
cerning buildup of the documentary data base intelligence support capability—to include inter-
should be shaped around that eventuality. rogation, order of battle, counterintelligence, im-
agery interpretation, technical intelligence, aerial
5-8. Phase II and ground battlefield surveillance, signal intelli-
gence, and long-range patrols—becomes active.
a. Intelligence requirements generated at the in-
itiation of the military assistance program for the
use of advisors will continue to be applicable as 5-9. Phase III
U.S. military efforts are expanded during Phase a. U.S. Army participation in Phase III may
II. The U.S. military assistance program may be involve only support personnel and units, or it
greatly enlarged with more effort at the provincial may involve combat forces in tactical operations.
and lower level of the host country. U.S. Army With such involvement it can be expected that the
support units may be committed in Phase II to entire spectrum of stability operations missions
provide direct technical and specialized assistance will be encountered. Where U.S. buildup is
to host country military forces. Army aircraft, gradual from the initial phase into Phase III of an
communication, transportation, ordnance, and insurgency, the intelligence requirements for
medical units are examples of such support. U.S. Phase I and Phase II will have been formulated
Army combat units may also be committed in the based on advisory and support needs. In such a
later stages of Phase II. situation the involvement of Army units in sup-
b. In the determination of operational intelli- port of host country military forces will have little
gence requirements for the Army forces during effect on requirements, except for an obvious in-
this period, a significant factor is that the U.S. crease in the collection-production resources.
Army may become involved in some capacity in all Where Army involvement begins with little or no
five of the major missions associated with stability advance warning or buildup, an intelligence pro-
operations. Requirements may include combat in- gram to support all missions, tactical and nation
telligence for tactical operations against the insur- building, will be required immediately. Tactical in-
gent forces and intelligence to support all opera- telligence requirements in Phase II should be ex-
tions in the other four missions—civil (to include panded to meet the expected larger insurgent
populace and resources control), intelligence, advi- force structure.
sory assistance, and psychological operations b. During Phase III, U.S. Army intelligence
which are conducted concurrently with tactical op- staffs, specialists, and units will be helping to pro-
erations.
vide all tactical and nontactical stability opera-
c. Tactical requirements are concerned with tions intelligence needs. Working in coordination
finding, fixing, and destroying the insurgent with host country and other U.S. and allied intelli-
armed forces. FM 31-16 considers the specific re- gence agencies, U.S. Army intelligence will collect,
quirements for these operations in great detail. process, and disseminate current and detailed in-
Intelligence requirements for combat support and telligence necessary to support tactical, civil af-
combat service support units participating in the fairs, intelligence, and psychological operations on
tactical counterguerrilla effort are adequately es- a continual basis.
tablished in appropriate field manuals. The
combat intelligence requirements for tactical oper- c. As discussed in paragraph 6-2, combined mil-

AGO 7S34A 5-3


FM 30-31

itary intelligence operations with the host country will assist in a fully coordinated effort to exploit
are by far the most eifective in stability opera- all available intelligence assets :
tions. (Details on combined collection and counter- (1) Interrogation Center (for details, see FM
intelligence operations are contained in the classi- 30-15).
fied supplement, FM 30-31 A.) Early development (2) Document Exploitation Center (for de-
of such combined operations should lead to the tails, see FM 30-15).
establishment of combined intelligence production (3) Materiel Exploitation Center (for details,
centers during Phase III at both national and sub- see FM 30-16).
national levels. Additionally, establishment of the (4) Imagery Interpretation Center (for de-
following types of combined intelligence facilities tails, see FM 30-20).

5-4 AGO 7334A


FM 30-31

intelligence collection plan. Further, he closely nator personnel, host country civilian, paramili-
coordinates with sources of information other tary and military personnel, and other U.S. mili-
than intelligence collection agencies. This coordi- tary and civilian organizations and agencies in-
nation includes operations and fire support coordi- country.

Section II. GROUND SURVEILLANCE AND RECONNAISSANCE

8—5. General (2) Patrolling in stability operations involves


o. Ground surveillance integrates all available much more than just looking for the enemy. It
means of surveillance (both human and mechan- also involves making contact with the people who
ical) to cover the area of interest. Mechanical sur- inhabit the area of interest. Patrols will be re-
veillance devices are employed to take advantage quired also to contact local police, village chiefs,
of their all-weather, day-and-night capability. and friendly paramilitary units as part of their
missions. They must be able to observe and report
b. Ground reconnaissance utilizes most of the on those items of intelligence interest enumerated
same human and mechanical means as ground sur- in paragraph 8-2. Contact with civilians may re-
veillance. However, in reconnaissance these means quire that patrols include linguists. When avail-
are directed specifically where to look and for able, qualified U.S. military linguists can be used ;
what to look. Reconnaissance missions collect in however, often this type of personnel will not be
response to specific EEI or OIR; surveillance mis- available for everyday operations. In that case
sions have a much broader scope. maximum utilization should be made of host
country soldiers who are proficient in the English
8-6. Agencies language and have been fully cross-trained in all
a. Combat Units. Ground surveillance and re- aspects of insurgency patrolling procedures.
connaissance is part of the mission of all units to (3) Long-Range Reconnaissance Patrols
be accomplished as part of the normal unit SOP or (LRRP), operating under the staff supervision of
as a result of the commander’s specific intelligence the G2, make important contributions to the
needs. Effective ground surveillance and recon- ground surveillance and reconnaissance plan by
naissance in stability operations is more difficult reporting information concerning remote portions
to provide because units frequently fight in rela- of the area of interest. Insurgency terrain inacces-
tive isolation without flank support. (For details sible to other target acquisition means can be ex-
on the role of armor and infantry units in recon- ploited to some degree by LRRP. Indigenous
naissance and security operations, see FM 31-16, LRRP, clothed and armed like the insurgents, are
FM 17-1 and FM 7-20.) dispatched to work close to or among insurgent
b. Patrols. troops. Indigenous LRRP are requested on a sup-
port or attachment basis and should be under the
(1) Patrolling is of paramount importance in
operational control of the commander requesting
stability operations. Regardless of the type of
them. In stability operations this is at a tactical
patrol or mission assigned, the collection and re-
porting of intelligence information is a continuing level lower than those of other types of war.
responsibility for all patrols. Combat patrols as LRRP units should be formed and commence oper-
well as reconnaissance patrols should be trained to ation in Phase I. The number of LRRP should be
observe and report negative as well as positive increased as necessary in Phases II and III to sat-
evidence of past or present enemy activity ; newly isfy requirements of U.S. major tactical units.
developed trails ; vacated assembly areas ; locations c. Other Sources. Other intelligence sources fur-
of fortified and boobytrapped areas; cache sites, nish excellent ground surveillance and reconnais-
whether active or not ; current effects of weather
sance support. They assist in gathering informa-
on terrain ; trafficability and the location of poten-
tion for future requirements as well as. make
tial landing zones and drop zones. Patrol training
should place emphasis on the detection and attack available information already in their possession
of enemy ambushes, the detection and disarming which may be of value. Among other intelligence
of boobytraps, knowledge of insurgent delaying sources are—
devices, the use of deception and knowledge of (1) Counterintelligence units that provide a
enemy deception practices, tracking techniques, good source of contact with local civilians and
and procedures for calling for fire support. investigate suspicious activity that occurs both
AGO 7334A 8-3
IPíVl SO—3 U
3000017391

inside military areas and within civilian communi- with the land, its people, and the various insur-
ties. They also maintain files on people and organi- gent forces makes these units a lucrative source of
zations that may serve as further contacts for current intelligence information.
ground reconnaissance elements. (2) U.S. aid-type missions that provide as-
(2) Agent operations which provide a source sistance to the indigenous personnel of an area.
of information from within the enemy area. Often These organizations have contact with all types of
agents penetrate an area and gather information civilians at each level down to the local village and
not otherwise available to any form of overt hamlet. Their own personnel are actively engaged
action or which could only be procured by indig- in travel around the country. Their reference
enous personnel. material, contacts, and personnel all provide a
(3) Interrogation efforts by interrogation vast amount of useful information.
sections on prisoners, suspects, defectors, and ref- (3) The host country government has many
ugees that can produce much new information or of its own sources of information. The most im-
can assist in confirming or refuting information portant of these sources are those which extend
gathered from other sources. through all echelons of the governmental struc-
(4) Stay-behind units that can pick up con- ture. The major organizations in this category in-
tact with insurgent forces, maintain that contact, clude host country military and paramilitary
and furnish scheduled reports of their sightings. forces, civilian police, local governmental organi-
Stay-behind units are capable of remaining in con- zations; and religious groups.
tact for long periods of time, and the information
they furnish has a very high degree of reliability. S—7. Pllfflnniinig Ê©n$5deraîD®iras
(5) Technical intelligence specialists and doc- o. Frontlines and secure rear areas usually are
ument translators both of which offer valuable in- not established during stability operations. Tac-
formation gathered from enemy documents and tical areas of responsibility (TAOR) are assigned
materiel. Many items brought back from recon- to units within which a base camp is established
naissance patrols will furnish additional informa- and permanent responsibility for military control
tion once it has been identified and analyzed by and security is assigned. All terrain within the
one of these specialists. TAOR cannot be physically occupied due to the
(6) Recovered U.S. personnel can provide vasUsize of the area involved. As an alternative to
very valid information when properly debriefed physical occupation of the ground, aggressive
by intelligence personnel. The fact that he speaks ground surveillance and reconnaissance must be
English, has been trained to observe and retain utilized to effect security. - •
information of intelligence value, and has physi- b. For military operations outside of a unit’s
cally passed through insurgent territory, makes
TAOR an area of operation (AO) is assigned,
the U.S. returnee an excellent source.
usually at some distance from the TAOR. A unit
(7) Communications intelligence resources moves into an AO on a temporary basis to conduct
can provide an all-weather, day and night surveil- tactical operations. Once these operations are ac-
lance of enemy communications. complished, participating units return to their
d. Specialized Organizations. There are other TAOR or depart directly to a new AO for further
operations; however, even when physically sepa-
specialized organizations that can furnish as- rated from their TAOR, units remain responsible
sistance in gathering information. While their pri- for their security.
mary mission is not intelligence, their operations
do put them in a position where they have a lot of c. Security for a TAOR or AO requires all-
information available. Some of these organiza- around coverage, mostly by visual observation and
tions are— patrolling especially during periods of reduced
(1) Special Forcesvisibility. Special sensors
units in-country and mechanical devices,
which are
strategically located astride LOG, adjacent to such as ground surveillance radars, anti-intrusion
border crossing points, and near identified or sus- devices, night vision scopes, and searchlights can
pect insurgent areas of operations. They usually complement this effort, but all such equipment has
are placed within or adjacent to civilian occupied certain limitations, the most common of which is
areas. One of their major missions is to advise the requirement for ground line-of-sight. Ground
indigenous troops on patrols and combat opera- surveillance plans will require the coordination
tions within their local area. Constant contact and employment of all available surveillance
AGO 7334A
F

o
PENTAGON LIBRARY
«
fr
#

You might also like