Professional Documents
Culture Documents
■ i ■
; • v
/ / • v/
'O'
#
Í . I '
FM 30-31
y-
FIELD MANUAL
STABILITY OPERATIONS-INTELLIGENCE
I \
RETURN TO ARMY LIBRARY
ROOM 1 A 518 PENTAGON
\
\
\
HEADQUARTERS, DEPARTMENT OF T\H E ARMY
m TAGO 7334A
JANUARY 1970
\
*
m
FM 30-31
Cl
CHANGE HEADQUARTERS
DEPARTMENT OF THE ARMY
No. 1 WASHINGTON, D.C., 28 August 1972
STABILITY OPERATIONS-INTELLIGENCE
4. File this change sheet in front of the publication for reference purposes.
Distribution :
To be distributed in accordance with DA Form 12-11 requirements for Combat Intelligence.
RETURN TO A®’
518 ENTftG0N
ROOM 1 A P
&U.S. GOVERNMENT PRINTING OFFICE: 1972—510-853/3105A
r 1
/
i.
i
i
*
Cl, FM 30-31
CHAPTER 1
INTRODUCTION
Section I. GENERAL
to the Commanding Officer, US Army Combat Virginia 22060. This action will facilitate review
Developments Command Intelligence Agency, Fort and followup.
Huachuca, Arizona 85613. Originators of pro-
posed changes constituting significant modifica- 'Arl-3. Definitions
tion of approved Army doctrine may send an The terminology used in this manual is consist-
information copy, through command channels, to ent with terminology contained in AR 310-25, FM
the Commanding General, USACDC, Fort Belvoir, 31-23, and FM 100-20.
STABILITY OPERATIONS-INTELLIGENCE
Paragraph Page
CHAPTER 1. INTRODUCTION
Section I. General 1-1—1-3 1-1
II. Background 1-4—1-7 1-1—1-4
CHAPTER 2. THE ENVIRONMENT
Section I. The insurgent armed elements 2-1—2-5 2-1—2-4
II. .Weather 2-6, 2-7 2-4
III. Terrain 2-8, 2-9 2-5
IV. People 2-10—2-13 2-6, 2-7
CHAPTER 3. INSURGENT CAPABILITIES
Section I. General 3-1—3-3 3-1
II. Basic capabilities 3-4—3-8 3-1—3-3
III. Supporting capability 3-9—3-13 3-
IV. Reinforcement capability 3- 3-4
CHAPTER 4. POTENTIAL INSURGENT VULNERABILITIES 4- 4-
CHAPTER 5. INTELLIGENCE REQUIREMENTS
Section I. General 5-1, 5-2 5-1
II. Requirements for preparedness 5-3—5-5 5-1, 5-2
III. Operational intelligence requirements 5-6—5-9 5-2, 5-3
CHAPTER 6. THE INTERNAL DEFENSE INTELLIGENCE SYSTEM
Section I. General 6-1—6-6 6-1, 6-2
II. Host country organization for internal defense operations 6-7—6-9 6-2, 6-3
III. U.S in-country intelligence structure 6-10—6-13 6-4, 6-5
CHAPTER 7. PRODUCTIONS OF INTELLIGENCE FOR STABILITY
OPERATIONS
SECTION I. General 7-1—7-3 7-1, 7-2
II. Planning the collection effort 7-4—7-10 7-2—7-6
III. Collection of information 7-17—7-22 7-11—7-14
IV. Processing of information 7-11—7-16 7-6—7-11
V. Dissemination of intelligence 7-23—7-25 7-19, 7-20
CHAPTER 8. COMBAT SURVEILLANCE AND RECONNAISSANCE
SECTION I. General 8-1—8—4 8-1, 8-2
II. Ground surveillance and reconnaissance 8- 8-3, 8-4
III. Aerial surveillance and reconnaissance 8-8—8-10 8-
(g> \
*This manual supersedes FM 30-31, 12 September 1967.
AGO 7334A
I
FM 30-31
Paragraph Page
M AGO 7334A
Cl, FM 30-31
insurgency will develop in its own way, a general (2) The insurgents embark upon a long range
pattern providing clues to its progress will exist. effort to alienate the people from the government
(2) Grievances, whether real or imagined, and to prevent the government from maintaining
will exist together with a lack of faith in the law and order and continuing nation-building pro-
ability or desire of the government to improve grams. The basic strategy is to force the govern-
conditions. A leadership appears which is capable ment to do everything everywhere at once so that
of crystallizing this discontent into an impulse for its means will be more quickly dissipated. The in-
action. An organization is established that is ca- surgents will concentrate their efforts to gain
pable of planning, coordinating, and executing ac- startling local successes at times and places of
tions. If the organization is outlawed, it goes un- their own choosing by enticing the government to
derground and continues to function. Equipment spread itself thinly across the land. They will seek
and supplies are stockpiled and hidden. Produc- to exploit every government weakness and to un-
tion or fabrication facilities are established for dermine or circumvent every government
future use. Such diverse items as food, firearms, strength. If the insurgency continues, the insur-
communications-electronics equipment, drugs, gents will seek to interrupt and frustrate the na-
leaflets, clothing, and fuel may be stockpiled, tion-building process while pointing to the govern-
locally or in adjacent countries. Literature is dis-ment’s lack of progress in this area as proof of
tributed and speeches are presented to arouse the government incompetence or insincerity. Like-
population and incite unlawful actions. Strikes, wise, the insurgents attack public safety and at-
work stoppages, demonstrations, parades, and tempt to break down effective law and order. This
other actions occur in the hope of intimidating the breakdown of law and order is very important to
government and further alienating the people the rate of spread of the insurgency. It creates
from the government. Riots and mass actions doubts concerning the government’s ability to per-
(which include violence) are planned to increase form its functions, injects fear into the minds of
the vehemences of feeling, to further intimidate people who want to support the government, and
the government, or to goad the government into encourages the active or passive support of the
responses which will alienate the people. Martyrs insurgency on the part of persons who fear for
may be created in the process. their own safety or who wish to be on the side of
(3) An attempt often will be made to over- the eventual winner of the struggle. The break-
throw the government through mass demonstra- down of effective law and order, provides the
tions and riots. Overthrow of the government is proper climate for successful insurgency.
easier if the insurgents gain adherents among the (3) Expansion into more violent and criminal
government elements, the military, the police, or acts against the government and the people re-
among other powerful government officials. The quires the formation of local militia-type military
insurgents may temporarily settle for achievement elements to engage in open guerrilla warfare. The
of some amount of representation within the gov- leadership element of the movement and the mass
ernment in the belief that the remainder of gov- of the insurgent organization will continue to
ernment leadership could be purged at a later remain hidden. This part of the movement has
date. Insurgent effort at this stage usually is or- been compared to the submerged portion of an ice-
iented against the existing government rather berg while the militia forces constitute the portion
than toward the population. If the insurgency is visible above the surface of the water. Military
not successful and develops into Phase II—addi- elements are used to accelerate the spread of the
tional organizational effort is required in prepara- underground organization, while the underground
tion for the ensuing long hard struggle. in turn accelerates the building of the militia
forces. The underground portion of the movement
c. Phase II: Guerrilla Warfare. directs political activities, consolidates control of
(1) Phase II occurs and
the populace, when the insurgent
reestablishes move-forces when
militia
ment, having developed sufficient organization, they are destroyed. The general pattern of the in-
leadership, and local or external support, initiates surgency during this stage is apparent in the fol-
organized guerrilla warfare and related forms of lowing activities :
violence against the established authority. The in- (a) Acts of sabotage will occur against
surgents concentrate their efforts toward the selected public and private facilities and will in-
people whom they must win over to gain more crease in magnitude and frequency.
support in the struggle. (b) Terrorism will spread and become se-
AGO 7334A 1-3
FM 30—31
lective in order to demonstrate to the people the (4) Insurgent, control of land areas will
merits of cooperation with the insurgent move- spread and the numbers and sizes of base areas
ment. will increase.
(c) Small bands of guerrillas appear in the (5) Foreign support of the insurgents may
countryside, particularly where the forces for law increase in volume and may become overt.
and order are weak and where the basic griev- (6) The insurgent political organization map
ances against the government are most pro- surface and appeal- for international-recognition.
nounced. Quick support of this movement by foreign coun-
(d) Guerrilla bases, (e.g., safe havens, tries who have been sponsoring the insurgency
storage points, training centers) begin to appear. can be expected.
(e) The pattern of gerrilla activity will in-
dicate that insurgent infiltration of the govern- 1-7. The Dynamics of Insurgency
ment has occurred and that the underground is
• a. The insurgency may not pass through each of
spreading its influence.
the three mentioned stages (para l-6b-d). When
(/) Guerrillas will attempt to infiltrate large elements of trained military and paramili-
radio stations for the purpose of broadcasting tary forces of the government are converted to the
propaganda.
insurgent cause, the insurgent leadership may
d. Phase III: War of Movement. The situation have the necessary strength to challenge the re-
moves from Phase II to Phase III when the insur- mainder of the government forces in open battle.
gency becomes primarily a war of movement be- The insurgents may train a well-equipped combat
tween organized forces of the • insurgents and force in foreign sanctuary and, thus, move quickly
those of the established authority. By this time into Phase III with little or no Phase II effort.
regular type military forces have been organized Furthermore, different phases may occur simulta-
on a regional and sometimes nationwide basis. The peously in different parts of the host country.
forces are larger and better equipped than the mil-
b. The insurgent leadership can reduce the level
itia although they often continue to use unconven-
of intensity'quickly and temporarily for tactical
tional guerrilla tactics in their military opera-
advantage. Such action may be taken to confuse
tions. The insurgents continue, to expand and per-
the government, to. make government efforts
fect their military organization and tactical capa-
appear ridiculous in the eyes of the people or to
bilities in order to eventually - achieve the capa-
reduce government pressure. Such action, how-
bility of standing up to the government in open
ever, may undermine the confidence of the sup-
combat. When strong enough, the insurgent forces
porters of the insurgency and be interpreted as a
may not always flee and hide from government
military forces, but may deláy in position for con- favorable government accomplishment by the
siderable periods of time and even deny' entry to people. Insurgent leadership, in retaining flexi-
particular areas to all but the' very strongest of bility and in view of the situation, may find it
government forces. Eventually, the insurgent may necessary to regress from Phase III to II, or from
engage the government fqrces in a decisive cam- II to I.
paign, or the insurgents may establish complete j c. The insurgency can be defeated at any stage
control in some portion of the country, and seek of its development. However, the earlier resolute
international recognition and the status of bellig-
internal defense and development programs are
erency for their government. The general pat-
established, the easier the insurgency can be pre-
tern of, activities and achievements during this
vented or destroyed. All insurgent movements have
phase includes the following : ■ '
exploitable weaknesses and vulnerabilities. Ener-
(1) Insurgent military forces, armed with
more sophisticated weapons and possessing im- getic nation-building programs combined with
proved means of communication and transporta- sound internal security measures can produce an
tion, will operate in larger units than previously. environment in which it will be impossible for in-
(2) Insurgent activities involving both small surgent activities to continue. (Nation building in-
and large unit operations will become bolder and volves a complex of interdependent economic, psy-
of longer duration. chological, political, and social changes. It includes
(3) Insurgent ability to coordinate many dis- thé development of the economic substructure nec-
persed activities and' to react quickly to dangers essary to meet the material needs of the people. It
or to exploit opportunities will increase. consists of the development of a social organiza-
tion wherein people work in unity to achieve quently, any one insurgent effort may be less apt
common goals. This means, in many cases, a to take .antigovernment actions that could benefit
change in habits, loyalties, and thought processes other movements. A situation of this type offers
of people.) many possibilities for government exploitation.
When the insurgents lack the means to force a
d. It should be noted that several insurgencies final decision and the government is equally inca-
may exist simultaneously in the same country and pable or disinclined to defeat the insurgents, the
may operate at cross purposes to each other be- movement may continue over a number of years.
cause each maj^ desire to control a single national Such a situation is particularly characteristic of
movement. Each movement seeks to demonstrate movements by minority groups which are seeking
its own particular superiority over others. Conse- to separate from the established state.
AGO 7334A
1-5
I
il
!
Si
Á\
«I
t
\
II
i
Cl, FM 30-31
CHAPTER 2
THE ENVIRONMENT
levels paralleling the existing legitimate political terests, such as youth affairs, agriculture, civilian
structure. Intermediate echelons may be deleted proselyting, and materiel procurement. General,
from the party structure if the party leadership long-range strategic planning usually is performed
believes that it can adequately supervise and co- by the secret directing apparatus. The results of
ordinate the activities of subordinate committees this long-range planning are usually transmit-
from a national level. (See appendix B for an ted to the individual insurgent force in the form
example of a Communist insurgent organization.) of written orders. Operations are characterized
■feb. During a latent insurgency, the demands by surprise, swift attack, and rapid dispersal,
placed upon a typical political party, so far as and usually occur under conditions of reduced
administration and tactical adaptability are con- visibility. Much of the tactical training takes
cerned, warrant a relatively simple internal poli- place during actual operations, but considerable
tical organization. The party organization could attention is given at small unit level to pre-attack
consist of little more than the committee system rehearsals. Ideological indoctrination receives a
itself, plus such agencies or specialized personnel high degree of emphasis whenever the insurgents
as might be required for intelligence collection, reach a relatively safe position.
agitation, propaganda, and occasional strong-arm -&(4) Insurgent military forces often have a
activities. As the insurgency develops, however, much less sophisticated logistics system than con-
the need to establish a mass civil organization and ventional forces. When the insurgents are supplied
a military force dictates the creation of new through clandestine channels, the supply problem
echelons of authority and new organizations to may be complicated by the need for security;
accommodate them. Details concerning a type in- however, supply operations are made as simple
surgent organization can be found in appendix B. as possible. Insurgent military forces rely on
the people for logistical support and also obtain
supplies or equipment by successful attacks on
■^râ—3. Ê@mmeiifiidl smdl Staff
government forces or from external support pro-
a. The insurgent military organization is aus- vided by a sponsoring power.
tere and its structure simple. An actual physical (5) Insurgents may have an immediate and
installation for a headquarters may be nonexist- near total dependence on close and continuous
ent or of the most primitive type. The headquar- contact with the population. Winning popula-
ters personnel often fight alongside the rank and tion support is the key to success or failure of
file of the military force. The staff structure is an insurgency. Civilian proselyting sections or
often informal, but individuals within the force equivalent organizational elements are continu-
are assigned to perform roughly the same func- ally engaged in extensive political activities.
tions required of any military staff. Differences
between staff functions necessary in insurgent (6) Special staff activities of the insurgent
force organizations and conventional force or- armed elements can range from the austere to
ganizations generally are as follows : the complex. While medical care is often scarce
and primitive, extensive field hospital facilities
-&(!) The insurgents generally place little may still be found. Construction is kept simple
emphasis on the broad spectrum of personnel or avoided when possible. It is possible, however,
functions, however, recruitment and replacement that the insurgents will establish vast tunnel net-
do receive significant attention. The personnel works and underground facilities. Other insurgent
records maintained are limited, and the required
administration is conducted informally. The in- activities may be highly sophisticated. Financing,
surgent personnel functions dealing with disci- for example, can attain a degree of complexity
pline and morale are politically oriented. that includes formal taxation, issuance of war
bonds, and the printing of money.
(2) The intelligence function, on the other
hand, receives even more attention in insurgent (7) Insurgent communication will vary from
units than in many conventional military units. the use of couriers to modern radios. The com-
This is due to the clandestine, conspiratorial way munication nets will be relatively simple in op-
in which insurgents must live and operate. erations and procedures in the initial stages of
-5Îr(3) Insurgent planning often emphasizes insurgency. Subsequent stages normally will evi-
areas outside normal tactical planning. Even at dence more sophistication.
local levels the party chapter often maintains 'fab. One of the major characteristics of leader-
formalized sections dealing with long-range in- ship in an insurgency is its high quality and ex-
2-2
Cl, FM 30-31
treme degree of loyalty to the movement. This surgent force are exploited effectively without de-
key leadership is often provided by foreign pow- stroying the command structure of the estab-
ers for operations in the specific insurgency be- lished organization. Replacement of local leader-
ing developed. When a recognized major insurge ship with personnel from outside the area, how-
ent force leader lacks a military background, a ever, may create exploitable morale and disciplin-
sponsoring power may infiltrate qualified person- ary problems. Often, promising native leadership
nel to serve as his military and technical advisors. candidates are recruited, trained over extended
By so doing, the military capabilities of the in- periods of time, and then returned to
2-2.1
FM 30-31
such as a basement or small cache site. On the mary operating system functions within and near
other hand, the secretive movement of bodies of the populated areas where support and assistance
troops, the need for assembly areas, the span of is provided as a result of the insurgents’ carefully
time required to mass foot-mobile elements, and prepared plan to avoid prolonged conflict. The con-
the need for communications systems to relay figuration of the terrain is used to advantage, par-
orders and intelligence require a labyrinth of re- ticularly those features which handicap govern-
sources, areas, and control. The routes are an or- ment forces. While the insurgent fighting unit
ganic part of the overall system. They do not nec- may have both time and manpower, when it fights,
essarily connect by the shortest route, but rather, it does so in or near a base area, wherein any
by a secure one. given tactical engagement, it is generally bound
c. In order to maintain sustained operations, a by time and space limitations. It is therefore im-
base area is obviously necessary. Further, because perative to the insurgents’ survival to avoid deci-
the population is the object of the insurgency, the sive engagement with superior government forces
base area system must allow access to the popula- unless his battlefield has been thoroughly pre-
tion and must, sooner or later, incorporate popu- pared. Tedious hours are spent on plans and re-
lated areas, the so-called “liberated areas.” Once hearsals for attack, withdrawal and counterat-
the insurgency is underway, the government and
the insurgent are competing for the same re- tacks. Positions are prepared well in advance and
sources. The effect of this competition on the gov- thoroughly camouflaged. These elaborate prepara-
ernment is powerful. If resources accrue to the tions require a scale of manpower available only
insurgent, the relative strength ratio between the in the local population. When he has support of
government and the insurgent changes signifi- the population, he enjoys decided advantages over
cantly. The base area system is far more elaborate the government forces, particularly in the field of
and complex than is normally realized. While intelligence. To a large extent, therefore, the rela-
myths grow about secret bases in remote moun- tively high degree of mobility of the insurgent is
tainous areas and impenerable jungles, the pri- dependent on the base area systems.
•^■means. Since climatic conditions vary from na- upon request through the command Weather Of-
tion to nation, National Intelligence Summaries, ficer from the USAF Air Weather Service.
area handbooks, and USAF Air Weather Service i^d. Hot and extremely humid weather may
climatic summaries should be consulted to deter- weaken personnel and have an adverse affect on
mine the details of weather and climatic extremes materiel. Hot, dry climates in desert areas may
which will affect the employment of US forces also have weakening effects on personnel and
present serious problems in equipment mainten-
and planning assistance programs to the host ance. Health hazards, such as malaria, dysentery,
country. Also, special climatic studies for specific parasitic infections, and others, present addi-
countries, areas, or operations can be obtained tional difficulties.
■&/. The vegetation of an area may not only problem to movement over glaciers and ice cap
provide concealment to the insurgent, but, to- areas is crevasses, special crevasse detection
gether with the animal life, increase the ability equipment, should be used.
of the insurgent to live off the land.
The following field manuals should be con-
Forested areas often present an obstacle to sulted for detailed information on the respective
movement, particularly in deep snow cover. terrain :
FM 31-25 Desert Operations
■fch. In arctic or subarctic areas, tundra, FM 31-35 Jungle Operations
ice, muskeg, grassland, semi-desert or mountains FM 31-71 Northern Operations
provide challenges that affect military operations FM 31-72 Mountain Operations
in a variety of ways. Since the most serious FM 31-75 Riverine Operations
2^^
Cl, FM 30-31
Ethnie groups may be either a source of discon- United States and allied nations may create addi-
tent or of major assistance depending upon the tional social and economic problems and antagon-
amount of discrimination or persecution which isms.
exists. Where the antagonism between the govern- /. Some developing nations are reaching, or
ment and minority faction is not immediately have gone beyond, the population saturation point.
reconcilable, the US or allied forces may provide Many of these nations cannot feed, clothe, employ,
advisory elements to assist in gaining the support or otherwise satisfy even the basic subsistence
of these groups. However, the ultimate solution needs of their populations. Compounding this
to this complex problem must be a lasting re- problem is the fact that the econmic growth rate
conciliation between the government and minority normally does not keep pace with the rate of pop-
groups. ulation increase.
e. The introduction of large numbers of mili- g. The population saturation point may occur
tary and civilian assistance personnel from the in certain geographical areas within a developing
/■
FM 30-31
nation. For example, local, primarily urban areas The government leaders in many developing na-
frequently are overpopulated because of the mi- tions may not take positive actions to increase the
gration of rural populations or refugees to urban confidence of their people in the government’s
areas seeking employment or refuge. ability to correct poor social/economic conditions
and to provide security from insurgent attack and
h. Government structure is frequently poorly
intimidation.
organized at the local (village, hamlet) levels.
Community organizations usually are incapable of 6. Poor sociological and economic conditions in
coping with the process of modernization. Civic the nation foment dissatisfaction among the poor-
leaders adequate to handle the operations of gov- class population. Insurgents promise change in
ernment in the traditional society, usually are prevailing conditions and a batter way of life in
unable to function in a developing society. These general. These promises may include the supply of
leaders often lack the education and motivation basic needs, food, and land reform.
required to effectively govern their transitional so-
cieties. Subversive insurgency movements pose c. Traditionalism often will adversely affect eco-
particularly acute threats at the local levels be- nomic progress and social reform in developing
cause of the lack of native expertise and resources nations. Governmental departments may formu-
to counter such threats. late adequate general plans for economic progress,
but take little effective action to achieve goals. In-
i. Varying problems concerning religion may dividuals may undertake the management of
also afflict a developing nation. In some developing public enterprises only because they see them as
nations, one religious organization predominates; means of benefiting their relatives and friends.
in others, religious fragmentation prevails. In What may seem like graft is, to them, the fulfill-
most of these nations, religion and religious or- ment of traditional family loyalties and moral ob-
ganizations exert an extremely strong influence on ligations. Other individuals are earnest, but lack
their adherents and through them can have a con- initiative because they have traditional, unques-
siderable effect on national affairs. Religious or- tioning respect for the opinions and ways of their
ganizations may substitute for, supplement, or elders. Additional factors affecting attitudes may
compete with, the established national political, include—
economic, military, and social organizations. If re- (1) A widespread sense of injustice; lack of
ligious friction already exists between different means of redressing individual injustices.
religions or between religions and government,
(2) Lack of a dynamic ideology.
the insurgents may attempt to expand and nurture
this discontent. (3) Low national morale.
(4) Poorly motivated civil and military es-
j. Most developing nations contain numerous tablishments.
minority groups, who may speak a language or (5) Dislike and distrust of government au-
dialect different from one another and from the thority as alien and remote to their vital interests.
language of the majority. Although the urban elite
may be multilingual (as a result of having been
educated outside the country), the more remote 2-13. Insurgent Exploitation
rural segments of the population probably will not a. In conventional warfare the intelligence
be multilingual. effort is directed primarily against the enemy mil-
itary forces. The enemy is easily recognized by his
k. A majority of the population is likely to be uniform, is called a prisoner of war, and is
illiterate. National education programs may direct granted protection under the articles of the
children to attend school (partly to instill national Geneva Convention. He is of value to intelligence
consciousness), but other considerations such as personnel because of his ability to provide, among
lack of teachers, facilities, and transportation, and other things, order of battle information. Nor-
the need for youth to help in the production of mally, the nature of conventional warfare re-
food usually will reduce the effectiveness of these stricts the civilian population’s ability to gain in-
programs. formation on the enemy’s forces, capabilities, and
objectives. Victory is dependent upon seizing and
2-12. Psychological Consideration holding terrain, superiority in firepower, destruc-
a. In some developing nations, the people may tion of the enemy’s military organization, and his
not be motivated to fight subversive insurgency. capability to wage war. The civilian population in
/]
FM 30-31
such a conflict is considered of secondary impor- taxation, kidnapping, terror ; various forms of aid,
tance for intelligence exploitation, although it is rewards, and promises; and the stated belief of
of value to the counterintelligence effort. sonie that he, the insurgent, offers a “better life.”
b. In an insurgency, however, the civilian popula- To foster unrest and mistrüst, he plays ethnic, re-
tion is the primary objective, and in the final anal- ligious, linguistic, and socioeconomic differences
ysis, victory or defeat is totally dependent upon of people against each other. The insurgent first
the degree of support of the people to one side or attempts to organize in those areas where the gov-
the other. The political struggle is born within the ernment has failed to associate or identify itself
population and is fed by the population’s griev- with its people. He initiates actions to force a com-
ances against the defactd government. This polit- plete breakdown of the governmental apparatus,
ical struggle is organized and directed by those and then proceeds to fill the vacuum thus created
seeking power through the destruction of the gov- with his own political organization. The insurgent
erning political organization. Basically, the face of will constantly attempt to impress the population
insurgency is national rather than international, with his superiority over the established govern-
although external support may be provided. The ment. He directs his efforts to changing the social
inhabitants participate in, as well as suffer from, structure initially at the grass roots level and then
the hardships of the struggle. attempts to assume the role of the government
c. Insurgent organizations in their “wars of lib- through control of the primary groups within the
eration” have defined as the highest priority the social structure since they have the strongest in-
gaining of support of the rural population. fluence on attitudes within the total society. The
insurgent attempts to control existing primary
d. The people represent the insurgents’ logis- groups (such as teachers, political, religious, trade
tical base, intelligence system, and military and union organizations, etc.), destroy those that
political organization. He motivates them and ob- cannot be controlled or used, or create primary
tains their support through propaganda, illegal groups as control mechanisms.
k
FM 30-31
CHAPTER 3
INSURGENT CAPABILITIES
Section I. GENERAL
3-1. Introduction mount large offensive operations will still exist al-
though insurgent operations may continue for
a. Intelligence planning must permit assessment
weeks or months at a lesser degree of tactical ac-
of insurgent capabilities as well as a determina- tivity. Intelligence planning in de-escalation situa-
tion of insurgent vulnerabilities. This chapter will tions must be thorough and accurate and fully
discuss insurgent capabilities. Chapter 4 discusses support government efforts leading to the ultimate
insurgent vulnerabilities or weaknesses. All insur- destruction of the insurgency.
gent courses of action will have the ultimate goal
of destroying the existing government. However, 3—2. Analysis of Insurgent Capabilities
during Phase I the insurgent movement may at-
tempt to establish a united front government and Any analysis of insurgent capabilities must meet
progress to an overt or conventional military pos- the following criteria :
ture in Phase III if the attempted “peaceful” over- a. The capabilities must be presented in relation
throw of the government fails. It is essential that to the mission of the host government and allied
internal defense intelligence agencies gain infor- forces.
mation on the political party or parties that the
insurgent movement supports, the amount of in- b. The capabilities must encompass all possible
fluence which the insurgent exerts, and the sub- insurgent courses of action, whether directed at
stance of the insurgent movement in overt nonvi- the people or the forces of the government.
olent attacks against the government. While intel- c. The capabilities must be described completely
ligence efforts are directed primarily toward the and in sufficient detail to permit planning for in-
obvious area of direct insurgent activity, efforts ternal defense and development operations.
should also include other areas in which insurgent
influence may appear indirectly. 3—3. Capabilities
b. Intelligence planning must also consider situ- For the purpose of analysis by intelligence per-
ations in which resolute friendly actions have re- sonnel the capabilities of the insurgent can be
duced insurgent capabilities and a de-escalation of classified into three broad areas : basic, supporting,
insurgent warfare takes place, i.e., from a Phase and reinforcing. Activity aimed directly and
III to Phase II, or a Phase I situation. Such a immediately toward the destruction of the govern-
de-escalation must be carefully distinguished from ment is termed a basic capability. Supporting ca-
one in which the insurgent movement deliberately pabilities are those which pertain directly to
reduces its actitivy for a temporary period to suit maintenance of insurgent’s activities and only in-
its own purposes. In the first situation, the insur- directly to the downfall of the government. The
gents may no longer have the capability, for ex- insurgent’s ability to protect his organization
ample, to mount regimental sized tactical opera- from government penetration is an example of a
tions because of combat losses sustained in earlier supporting capability. Reinforcing capability is
engagements with friendly forces. In the latter the ability of the insurgent to concentrate on or
situation, the capability of the insurgents to reinforce his efforts in one area of activity.
erations. If one course of action becomes ineffec- the improved economy. The national and local tax
tive, the insurgent will attempt another. These ac- structure, mqnetary policies and import-export
tions will tend to be cumulative, however, rather tariffs may be subverted in order to provide
than a substitution of one for another. In the later sources of revenue for insurgent operations or to
stages of an insurgency the enemy will be capable provide a basis for characterizing the existing
of conducting all four types of activity simulta- government as inefficient and corrupt. Insurgent
neously, with variations, in different parts of the psychological operations may be used, to reduce
country depending on the comparative strengths popular confidence in the existing currency. Actual
of both sides and other environmental influences. counterfeiting of the currency may also occur.
c.
3—5. Nonviolent Action to exploit those traditional social and behavioral
Nonviolent actions will be directed toward patterns of the people which further their inter-
bringing about changes in the political, economic, ests. When such measures fail, the breakdown of
and social framework of the society—frequently these patterns normally will be attempted in order
through psychological means. In t-Jiis manner the to create instability. A rising crime pattern or in-
insurgent will attempt to influence the opinions, surgent agitation to create religious unrest is to be
attitudes, feelings, and drives of friendly, hostile, expected. Social organizations may be infiltrated
and neutral individuals to bring about behavior to gain close contact with the people and to exploit
favorable to his objectives. During Phase I (sub- both the resources and influence of those organiza-
version) mental and emotional persuasion is the tions which can further insurgent objectives. Ex-
primary weapon of tlie insurgent. Nonviolent isting grievances are identified and new ones
action, however, can be expected to continue created in the minds of the people. Unrest is pro-
throughout the life of the insurgent movement, moted through agitation and propaganda. The in-
i.e., throughout Phases II and III. surgents may engage in actions in direct opposi-
tion to the rules of society for the specific purpose
a. Political. The insurgents will attempt to. in- of breaking down cultural values, thus bringing
fluence the direction, control, and authority exer- about instability.
cised over the nation as a whole and the adminis-
tration of the political system. Insurgents will be 3-6. Terroristic Activities
active in areas of political appointments, politifcal If nonviolent methods do not accomplish the de-
organizations, political education, and judicial en- sired goals, the insurgents may resort to harsher
actment. They may resort to subverting the gov- measures to bring about submission and coopera-
ernment through elections in which the insurgents tion with their demands. Terroristic activities are
cause the replacement of an unfriendly'govern- particularly useful for gaining control over the
ment official with one favorable to their cause. In- populace. Terror may be applied selectively or in-
surgent activity will include provision of cam- discriminately. Selective terror is directed toward
paign funds, provision of publicity, assistance in an individual or a small segment of the society.
membership drives, and organization of political Indiscriminate terror, on the other hand, involves
rallies for their candidates. Bribery may be' at- the whole population and serves to further dis-
tempted, and informants máy be placéd in key credit the government while at the same time
areas to counter government action. Propaganda giving a magnified aura of power to the insurgents.
attacks may be launched to.discredit and ridicule Confidence in the government is undermined when
political leaders or government officials. In addi- no protection is provided. The capability of the
tion, insurgent leaders may enter political contests insurgent to engage in terroristic activities may
as candidates for government office. ’ be one of the direct determinants of the govern-
b. Economics. The insurgents will attempt to ment’s internal défense policy. Aside from the ob-
affect the production, distribution, and consump- vious use of torture, murder, extortion, and kid-
tion of resources within a country in an effort to napping, the use of sabotage is one of the most
further impair the effectiveness of the govern- effective methods of creating havoc. Terroristic
ment. Economic influence may emerge in the form activity is extremely difficult to prevent.
of boycotts, strikes, riots, or it may be in the form
of civic action designed - to improve a local 3-7. Guerrilla Operations
economy with the purpose of winning the alle- a. The insurgents normally will use terror as
giance of the people or to share in the products of one of their main weapons during any phase of
3-2 AGO 7334A
FM 30-31
the insurgency, but insurgents do not engage in government’s ability to close with and destroy the
guerrilla operations until they have developed a insurgents. The ability to temporarily withdraw
military'capability of at least squad or platoon from contact, regroup, and redirect effort to an
size. This growth in strength usually indicates the area where government forces are weak is one of
beginning of Phase II of insurgency development. the inherent advantages of guerrilla warfare and
Often activities will be initiated against transpor- must be considered along with each of the previous
tation arteries. Their primary effect is to inter- capabilities discussed.
rupt supply and communications lines to prevent
adequate supply of government forces. By cutting 3—8. Conventional Tactical Operations
telephone lines, stealing wire, and destroying tele-
phone poles in places to which1 access is difficult, The insurgent’s capabilities in the field of conven-
the insurgent may deny communication through tional tactical operations can be considered from
an area as effectively as if he were occupying and the viewpoint of his ability to attack, defend, or
defending that terrain with a large body of sol- withdraw when opposed by conventional host gov-
diers. Roads may be blocked or damaged, bridges ernment or allied forces. Each of these capabilities
destroyed, and railroads and airfields damaged.. can be further divided into more specific courses
cf action as stated in FM 30-5. The insurgent’s
b. While harassment, destruction, and interdic- capability of conventional tactical operations is
tion operations are of an aggressive nature, the determined in the light of the current intelligence
insurgent’s capability of dispersion enables him to on the insurgent, the capabilities of the govern-
avoid contact with superior government forces. ment forces, and the effect of the characteristics
This in itself is an operation in that it is as care- of the environment upon both of these. In general,
fully planned as the aggressive tactics that pre- the employment of large insurgent forces in con-
cede it. If correctly implemented, this insurgent ventional tactical operations would indicate that
capability directly and significantly defeats the the insurgency has progressed to Phase III.
b. Recruitment and Retention. The insurgent alists, and saboteurs. Basic subversive, terroristic,
possesses a capability of recruiting and retaining and guerrilla techniques are taught to all elements
personnel. As the scope of insurgent, operations with emphasis on the techniques of most current
widens, the conflicting needs of security and ex- importance.
pansion cf the organization become more acute.
Aggressive recruitment is essential for the attain- 3—12. "Finance and Logistics
ment of expanded objectives, while security is es- Through finance and logistics activities the insur-
sential to survival. As a result, the insurgent must gent develops a capability of supplying and
AGO 7334A
3-3
FM 30-31
moving his forces. Supply items to include food, taxation of the population and sale of food crops
paper for written propaganda, communication in areas under insurgent control, to extortion of
equipment, weapons and ammunition, clothing, business and shop owners.
and medical supplies must be obtained. The insur-
gent has many techniques to obtain financial as- 3-13. Communications
sistance both from within and outside the country.
His capability to effectively employ these tech- The ability of the insurgent to communicate is es-
niques provides the foundation of his logistical sential to the success of his mission. At least a
ability which in turn provides the necessary mate- small nucleus of insurgents must be well trained
riel to enable the insurgent to engage in specific in communications. The communications equip-
courses of action. The insurgent’s financial sources ment employed by the insurgents varies in quality
from within the country may range from special and use.
AGO 7834A
3-4
FM 30-31
CHAPTER 4
POTENTIAL INSURGENT VULNERABILITIES
several organizational elements of the movement, populace may tend to alienate the insurgents from
tends to defeat insurgent practices of compart- the people. Internal defense intelligence can ex-
mentation for security purposes. Intelligence on ploit such a situation. Information on supply re-
one cell in the party can often lead to intelligence sources, identity of supporters, supply shortages,
on parallel cells. caches, and supply bases and routes can be ob-
b. Frequently the leaders of each echelon of an tained more readily.
insurgent organization are better trained and b. During Phase III the insurgent forces may
better qualified than those of the government. require considerable logistical support from ex-
Their removal will have a detrimental effect on ternal sources to meet the demands caused by
the functioning of the units. The identification of large scale combat operations. Many items must
the commander, then, is a prime goal for internal be transported illegally into a target country.
defense intelligence operations. Intelligence anal- Points of entry for such materiel are often limited
ysis of the leadership of insurgent organizations in number. The illegal goods arriving through
may develop information which could be used to these entry points are vulnerable to counterin-
discredit and lessen popular support of the telligence checks and inspections. Illegal ground
leaders. Detection and disruption of logistical sup- routes or paths for bringing in supplies are sus-
port operations may be complicated by the fact ceptible to detection by aerial reconnaissance and
that many of these facilities will be located in photography and other intelligence means.
areas adjacent to the recognized borders of the c. Insurgent logistical support facilities such as
insurgency affected country. Access to these areas bases of supplies, way stations, caches, factories,
may be limited by separate international agree- and farm plots will increase in size and number
ments. concurrently with force expansion. The resultant
increase in trail patterns, diggings, thermal emis-
4—6. Communications Requirements sions, disturbances of natural terrain features or
As the insurgency progresses, a rapid means of vegetation and other signs of increased human ac-
communications and a large, complex communica- tivity will make the insurgent support facilities
tions system may become necessary for the insur- more vulnerable to detection.
gent leadership to exercise command and control.
The insurgent may also maintain contact with an 4-8. Tactical Operations
outside sponsoring country in order to receive di- a. During Phase I and the early part of Phase
rection and assistance. Insurgent intelligence, II, insurgent tactical operations against the gov-
counterintelligence, security, and propaganda ernment, its military and police forces, and its pop-
functions also increase and demand a greater var- ulation normally are limited to isolated acts car-
iety of communications means. As the need for a ried out primarily to entrench their positions in-
rapid means of communications progresses, the in- country. In the latter stage of Phase II and during
surgents may be forced to resort to less secure Phase III insurgent operations increase in scope
systems such as telephone, telegraph, radio, and and ferocity. Attempts are made to defeat internal
postal service. This will enhance insurgent com- defense military forces by conventional combat
mand and control, but at the same time, make the operations which results in occupancy of larger
communications system more vulnerable. ground areas, requires supplies and equipment,
and requires more storage facilities. Insurgents
4—7. Logistical Requirements will rely heavily on communications for command
a. The insurgents usually obtain a large portion and control. Communications equipment will begin
of their logistical needs from the immediate areas to appear in greater numbers, and communica-
of operation. Procurement of supplies, equipment, tions nets will become more sophisticated.
and services is by local purchase, volunteer contri- b. As the insurgent forces expand in size, a dis-
butions from supporters, theft, levies on the popu- tinction between the local population and the in-
lace, raids, and combat operations against govern- surgent force becomes evident. Base areas are
ment forces. Expansion of the insurgent armed created which must be closed to civilian movement
forces results in a step-up of tactical operations and defended with field fortifications. These base
and in a corresponding increase in requirements areas are vulnerable to discovery and exploitation
for logistics support. Some of the increased sup- by combat surveillance and reconnaissance
port is obtained by intensification of procurement sources. Long-range patrols can penetrate the in-
from the people. This increased demand on the surgents' territory and observe trails and insur-
4-2 AGO 7334A
FM 30-31
gent activity and base camps. The use of aerial tion of armed elements from external sources. The
photographs and other aerial sensors will help to requirement to rapidly increase the size of armed
identify new camps, cache sites, field fortifica- elements is in conflict with the leadership’s con-
tions, and training areas. Intelligence personnel cern for extreme caution in the assesssment of the
can secure information on the location of insur- loyalty of recruits. It is extremely difficult to
gent base areas from local people who have seen achieve a rapid expansion of forces while at the
activity or have been denied áccess to the area. same time maintain high recruitment security
c. Detailed planning is vital for all of the insur- standards. During such an expansion phase, the
gent’s combat operations. Insurgents normally insurgents are especially vulnerable to govern-
follow up their detailed, precise, planning with ment intelligence penetration efforts.
“dress” rehearsals. This preparation often entails b. Labor requirements for insurgent base area
marking of routes in and but of the battle area as buildups usually exceed the capability of the in-
well as stockpiling of supplies and equipments. surgent force itself. The insurgents must depend
These patterns of preparation for military opera- upon voluntary or involuntary local civilian labor
tions constitute yet another vulnerability to intel- to meet the requirements. Thus, specific knowl-
ligence reconnaissance and surveillance activity. edge concerning base locations may be possessed
by large numbers of local people. This knowledge
4-9. Dependence Upon the Population con be exploited by internal defense intelligence
forces. Information concerning insurgent activity
To succeed in his phased development the insur- may be willingly given by some individuals. Other
gent relies on the population as the major source individuals will require inducement of some sort.
for expansion and replacement of his military No matter what their motivation for providing
forces; the framework for establishment and op- the information all will require that their in-
eration of his warning and collection nets; the former roles not be compromised and if compro-
labor resources necessary to build up his base mised that they and their families will be pro-
areas and training camps; the main source for tected from insurgent reprisal. The requirement
consumable supplies; medicines, and construction for secrecy must be respected in all collection ac-
materials; and the cover he requires to meld into tivities.
the local environment. Insurgent dependence Upon
the population is critical during all phases of in- c. The insurgent’s supply needs will require that
surgency. The importance of this factor is height- he contact certain local people such as commodity
ened as the insurgent extends the scope and mag- brokers and merchants. When persuaded to act as
nitude of his organization and operations. informers, such people can be used to identify in-
surgent contact men. Surveillance of identified
a. In order to achieve the men
contact ultimate
may aim.
lead of
to over-
the uncovering of identi-
throwing the government forces, the insurgents ties of other key insurgent personnel as well as
usually organize regional and regular armed insurgent base locations. Information relating to
forces which possess the actual or potential char- insurgent purchases can also be used by intelli-
acteristics of conventionally organized military gence analysts when assessing insurgent force
forces. These forces can be achieved by expansion strengths, critical supply needs, and probable op-
of the civil base of the insurgency or by infiltra- erational plans.
AGO 7334A
4-3
FM 30-31
CHAPTER 5
INTELLIGENCE REQUIREMENTS
Section I. GENERAL
propriate Army intelligence element to immedi- coverage should be filled through priority collec-
ately request such data and convert them to mean- tion tools such as those discussed in chapter 7.
ingful documents which the user can apply to his e.
operational environment.
contingency responsibilities to acquire the perti-
nent segments of the national data base for their
5—4. Sources for the Data Base respective geographic areas of interest.
a. Estimates, surveys, studies, area handbooks,
analyses, and reports published by various agen- 5—5. Current Intelligence
cies serve as the basis for the initial development a. In addition to the documentary data base a
of the documentary data base. All possible con- requirement exists for timely and accurate cur-
tributory agencies are queried for available in-
formation to contribute to the data base. rent intelligence for day-to-day monitoring of the
extent of subversive activities and the develop-
b. One method of obtaining this data is the use ment of insurgencies. Such warning data is essen-
of the Statement of Intelligence Interest (SII) tial for the refinement of contingency plans, the
which may be forwarded from subordinate to reorientation of training, and the initiation of pre-
higher levels. The SII is a standing request for the liminary operational requirements. Current intel-
dissemination of the full range of intelligence pro- ligence must cover the most recent, significant de-
duced by the entire national intelligence commu- velopments in areas of interest in each of the six
nity within suitable classification and need-to- categories of intelligence (para 5-3b) in as much
know restrictions. detail as possible.
c. Because of the broad scope of stability opera- b. Current intelligence, when combined with the
tions, the data base requirements differ greatly documentary data base, will provide an opera-
from those needed for convëntional military oper- tional data base. Spot reports ; routine, daily, and
ations. Stability operations require elaborately de- weekly summaries ; and other special reports from
tailed intelligence concerning sociological, polit- national agencies and from unified and component
ical, geographic, and economic information and commands, normally in abbreviated telegraphic
usually a minimal amount of scientific and techno- format, comprise the bulk of the current intelli-
logical intelligence. This difference often is dicated gence support available to commands with in-
by the depth of involvement with the civil popula- ternal defense missions.
tion during stability operations.
c. Current intelligence and information must be
d. A suggested coverage of the data base is provided to the users in an expeditious manner.
listed in appendix C. The list should be viewed as Commanders and intelligence staffs must insure
minimum subject coverage intended for use as a that current intelligence is disseminated to the
guide for specific operational planning. Gaps in lowest practical level.
for civil affairs operations, intelligence operations, if-c. Tactical requirements are concerned with
and psychological operations. These advisors will finding, fixing, and destroying the insurgent
have some requirements in common in the six armed forces. FM 31-6 considers the specific re-
intelligence subject areas; however, each will quirements for these operations in great detail.
have his own special interest which must be met Intelligence requiremnts for combat support and
by operational intelligence. Intelligence advisors combat service support units participating in the
must continually bear in mind that their status tactical counterguerrilla effort are adequately es-
may shift at any time from primarily an advis- tablished in appropriate field manuals. The com-
ory to a basic operational role, and that their bat intelligence requirements for tactical opera-
basic intelligence requirements will increase ac- tions in an insurgency differ little from those of
cordingly. Thus, even though there may be no other types of warfare. However, what is distinct
current indications of such a shift in their sta- in counterinsurgency operations is the require-
tus and its accompanying requirements, their ef- ment for the other Army missions directly associ-
forts concerning buildup of the documentary data ated with stability operations in counterinsurg-
base should be shaped around that eventuality. ency operations. As part of the stability opera-
ifd. Consideration should also be given to the tions effort during Phase II, intelligence units,
utilization of tactical cover and deception mea- psychological operation units, and troops en-
sures during Phase I. Because of the insurgent’s gaged wholly or in part in civil affairs and popu-
heavy dependence upon accurate intelligence dur- lation and resources control operations may be
ing this phase, many insurgent activities can be utilized. This requires detailed, comprehensive,
compromised and frustrated by the deliberate in- and current data concerning the six categories of
troduction of false or misleading information. intelligence (para 5-3b). With the involvement
This in turn can significantly degrade the of US combat units, the entire Army intelligence
growth and effectiveness of the insurgency. For support capability becomes active.
additional guidance on tactical cover and de-
ception, refer to FM 31-40. 5-9. Phase III
ita. US Army participation in Phase III may
5-8. Phase I! involve only support personnel and units, or it
ifa. Intelligence requirements generated at the may involve combat forces in tactical opera-
initiation of the military assistance program for tions. With such involvement it can be expected
the use of advisors will continue to be applicable that the entire spectrum of the stability opera-
as US military efforts are expanded during Phase tions mission will be encountered. Where US
II. The US military assistance program may be buildup is gradual from the initial phase into
greatly enlarged with more effort at the provin- Phase III of an insurgency, the intelligence
cial and lower level of the host country. US Army requirements for Phase I and Phase II will have
support units may be committed in Phase II to been formulated based on advisory and support
provide direct technical and specialized assistance needs. In such a situation the involvement of
to host country military forces. Army aircraft, Army units in support of host country military
communication, transportation, ordnance, mili- forces will have little effect on requirements, ex-
tary police, and medical units are examples of cept for an obvious increase in the collection-
such support. US Army combat units may also production resources. Where Army involvement
be committed in the later stages of Phase II. begins with little or no advance warning or
buildup, an intelligence' program to support all
In the determination of operational intelli- missions, tactical and internal development, will
gence requirements for the Army forces during be required immediately. Tactical intelligence re-
this period, a significant factor is that the US quirements in Phase II should be expanded to
Army may become involved, in some capacity, in meet the expected larger insurgent force struc-
all of the major missions associated with stability ture.
operations. Requirements may include combat in-
telligence forces and intelligence to support op- ifb. During Phase IIII, US Army intelligence
erations in the other missions: civil affairs, in- staffs, specialists, and units will be helping to
telligence, advisory assistance, psychological, and provide all tactical and nontactical stability op-
population and resources control operations, erations intelligence needs. Working in coordina-
which are conducted concurrently with tactical tion with host country and other US and allied
operations. intelligence agencies, the US Army will collect
5-3
Cl, FM 30-31
and process information, and diseeminate the re- Additionally, establishment of the following types
sulting intelligence necessary to support tactical, of combined intelligence facilities will assist in a
civil affairs, intelligence, psychological, popula- fully coordinated effort to exploit all available in-
tion and resources control operations on a con- telligence assets :
tinuing basis. (1) Interrogation Center (for details, see
FM 30-15).
+0. As discussed in paragraph 6-2, combined
military intelligence operations with the host (2) Document Exploitation Center (for de-
country are the most effective in stability op- tails, see FM 30-15).
erations. Early development of such combined (3) Materiel Exploitation Center (for de-
operations should lead to the establishment of tails, see FM 30-16).
combined intelligence production centers during (4) Imagery Interpretation Center (for de-
Phase III at both national and subnational levels. tails, see FM 30-20).
5-4
FM 30-31
CHAPTER 6
THE INTERNAL DEFENSE INTELLIGENCE SYSTEM
Section I. INTRODUCTION
spective national authorities. In such cases inde- that the intelligence and security resources of both
pendent U.S. or host country action will be re- the U.S. and the.host country are employed effec-
quired. tively and efficiently. There should be no unneces-
sary competition or duplication of effort between
6—4. Determination of Objectives the various echelons and agencies involved. There
The U.S. and host country intelligence authorities must be sufficient organization of effort to insure
should coordinate, in detail, to determine mutual that each essential function is handled in a thor-
long-range obj ectives and basic organizational and ough manner. Staffing must come primarily from
operational procedures and policies required. within the total in-country capability. However,
Long-term plans developed by U.S. and host thorough planning and management action to
country intelligence authorities must provide' for define basic responsibilities, specific tasks, and al-
intelligence efforts related to the possible further location of resources between the various agencies
growth of the insurgency, possible external inva- and echelons comprising the intelligence system
sion, and possible third country active or passive should insure the most effective and efficient use of
support of the insurgents. In an internal defense all available intelligence assets.
environment it is at times difficult to determine
relative priorities for various intelligence require- b. Centralization, pooling, and control of critical
ments. U.S. and host country intelligence per- intelligence resources by higher echelons are fre-
sonnel must reach an agreement as to the major quently required. This may necessitate control of
personnel, funds, and other resources at national
programs and activities to be undertaken and
level to insure that efforts at lower levels remain
their relative priority for accomplishment within
subject to the desired degree of centralized super-
available resources. Actual organization and
vision and control.
procedures adopted are tailored to the operational
situation and environment. Combined U.S./host
country planning is the key to progress in the de- 6—6. Intelligence Support Available
velopment of in-country intelligence capabilities. from U.S. Theater Army
The theater army intelligence structure has the
6—5. Employment of Resources principal mission of developing intelligence re-
a. Planning, centralization of control, and flexi- quired for theater missions which is not satisfied
bility are all related factors which contribute to from U.S. national intelligence agency sources.
the ability of the internal defense intelligence Particularly during Phase I of an insurgency, in-
system to make the best possible use of available telligence advisory elements are normally aug-
personnel and materiel. Care must be taken to see mented from theater army intelligence resources.
dination centers may vary from one country to sible that the commander of the major supporting
another: However, for clarity of reference in U.S. operational intelligence unit and the intelligence
Army doctrine, the national level center is identi- head of the area coordination center may be the
fied as the National Internal Defense Coordination same individual.
Center (NIDCC) with subnational centers being
termed as Area Coordination Centers. (For de- 6—9. Local Area Coordination Centers
tails, see FM 31-23.) a. The organizational and operational features
of the area coordination center at local levels will
6-8. The National Intelligence Structure vary according to the local geographical, political,
a. The national intelligence structure of the host sociological, psychological and military factors
country should be established to direct informa- present in the area. The local area coordination
tion from all sources into a single channel. This center has three missions :
channel, leads to a central body whose responsi- (1) To provide integrated planning, coordina-
bility it is to produce a composite intelligence pic- tion, and direction to all of the governmental
ture for the country as a whole. This body is the effort imtheir area of responsibility.
intelligence branch of the NIDCC, organized spe- (2) To insure an immediate, coordinated re-
cifically to direct and coordinate the collection, sponse to operational requirements.
production, and dissemination of intelligence in- (3) To communicate with the people and
formation. Intelligence operations of the area invite their participation in programs designed to
coordination centers at major subnational level improvè the economic, social, and political well-
are performed by intelligence branches with being and security of the area.
format and function similar to that of the NIDCC.
b. Prior to, or during, the initial stages of insur-
The composition of each of these intelligence ele-
gency it is likely that the intelligence chief of a
ments will vary according to the level and circum-
local area coordination center will come from the
stances, but to be effective they should be estab-
civilian police organization in the area. Some ad-
lished on the following guidelines :
vantages and disadvantages in selecting a police
(1) Single directorship. official for this position are as follows :
(2) Incorporation and integration of all civil (1) Advantages.
and military intelligence agencies at all levels.
(a) They have intimate contact with the
(3) Staffing by trained professional intelli- population which permits them to gain valuable
gence personnel. intelligence concerning the existence and extent of
(4) Access to a secure, rapid system of com- insurgency in their area.
munication. (b) They usually are accepted by the people
(5) Functioning to— as the government organization at local level with
(а) Review all local activities and external enforcement prerogatives.
influences that may affect the security of the area (c) They are best suited to exploit the in-
or country and the campaign against the insur- surgents’ dependence on the local populace.
gent. (2) Disadvantages.
(б) Provide intelligence assessments of in-
(a) In times of stress, younger, healthier,
surgent programs and ádvise on the security poli-
more energetic policemen normally are called to
cies and actions necessary to combat these threats.
military service. Civilian police forces are under-
(c) Review the effectiveness of the intelli- manned or replacements are less able and less
gence effort and originate methods of improving trained auxilaries. “Usual” police duties (traffic
it. and curfew controls; licensing; civilian crimes
b. Close integration must be maintained be- against property and person; complaints of mis-
tween the intelligence elements of the coordination conduct by civilians and military persons against
centers and the intelligence, units which provide the other) increase progressively. Thus, the chief
them operational support. This integration should of a police force of reduced capability already
be extensive enough to permit the interchange of faced with increased work, cannot undertake a
personnel between the two elements and should major additional reponsibility.
serve as an excellent source-of trained intelligence ■ (b) The police chief, or key members of his
manpower for staffing of -the area coordination force, may be allied with or intimidated by insur-
centers. Depending’on the local situation, it is pos- gents, organized criminals, or legitimate enter-
AGO 7334A
6-3
FM 30-31
prises (business, religious, cultural, etc.) whose coordination center area of responsibility which
interests are adverse to the intelligence program. has some type of activity devoted to the collection
(c) The police and/or processing
chief may beofclosely
intelligence
asso- information. The
ciated with a local faction and as a result of dis- area coordination center provides a pooling of all
trust by the opposition may not be effective in his available intelligence for use in operations against
role as chief of police. the insurgent.
c. If insurgent strength grows, several causes (2) Basic functions of the intelligence ele-
may contribute to the government’s relative ina- ment of the local area coordination center parallel
those of the higher level coordination centers of
bility to maintain itself. One possible element of
the national system. Some of the more important
government weakness is the intelligence effort. All
of these functions are to :
facets of the military intelligence/counterin-
(a) Determine intelligence objectives.
telligence program, including economic, political,
(&) Integrate local intelligence programs
and sociological intelligence, must be scrutinized
with those of the national intelligence system.
for areas of possible improvement. Indigenous at-
(c) Evaluate intelligence resources.
titudes, host government and United States poli-
(d) Organize and train new intelligence ac-
cies, and other factors may indicate changes in
staffing organization, mission, or procedures of tivities and forces.
(e) Formulate intelligence operational
area coordination centers.
plans.
d. The local area coordination center is com- (/) Establish priorities and allocate re-
posed of the same elements as the coordination sources for intelligence attack of selected insur-
centers of the national system—i.e., intelligence, gent targets.
operations, administration, political, and logistics. (g) Establish and conduct an active liaison
For details on a type area coordination center at program with intelligence elements of other area
province level, see FM 31-23. coordination centers.
(1) The intelligence element is composed of e.
two sections—collection and production. It is posed of both governmental and influential private
staffed by representatives from each intelligence citizens should be formed to assist the area coordi-
organization and each agency within the area nation center.
a. Evaluate the intelligence documentary data selected Combat, combat support, and combat
base and develop a program for data base expan- service support units of the host country—both
sion. military and paramilitary. Intelligence programs
b. Determine overall intelligence collection re- of instruction are established. Buildup of the U.S.
quirements ; prepare U.S. collection plans, orders, in-country military intelligence effect also includes
and requests; recommend allocation of collection U.S. Army intelligence participation on intelli-
tasks to NIDCC and area coordination center ele- gence staffs of the NIDCC and area coordination
ments ; and asisst in the development of the HC centers at major subnational level, as well as pro-
collection plan. vision of advisors to the host country military in-
telligence organizations which directly support the
c. Determine overall intelligence production re- NIDCC and area codrdination centers. These facil-
quirements, establish production standards and ities serve as a focus for issuing requests for in-
formats, assign production tasks to U.S. func- formation, receipt and evaluation of collected
tional staffs, assign intelligence input require- data, and rapid dissemination to all agencies, par-
ments to U.S. agencies in-country, propose com- ticularly those which can readily exploit the infor-
bined intelligence production programs to the host mation. Overall planning and supervision on an
country, and determine dissemination policies. integrated U.S./host country basis of intelligence
d. Resurvey periodically projected U.S. intelli- collection, processing, and production programs is
gence personnel requirements. necessary to insure an effective and efficient effort
e. Task out-of-country resources, such as com- that meets the U.S. and. host country intelligence
munication intelligence. requirements. This is accomplished by the intelli-
gence director and integrated staff at each level.
6—12. Expansion of internal Defense Special benefits of an integrated U.S./host
Intelligence Support country staff are to :
(1) Reduce misunderstanding and confusion
a. An increase in U.S. participation in the in- between U.S. and host country intelligence author-
ternal defense programs of any insurgency-af- ities.
fected country usually will be accompanied by a
(2) Eliminate gaps and undue duplication of
significant expansion or reorganization of U.S.
in-country forces. Existing U.S./host country in- intelligence effort.
tegrated organizations, such as may exist as the (3) Make available specialist personnel and
NIDCC and area coordination center levels, will expertise necessary for the production of required
similarly expand or reorganize. This growth will intelligence estimates or for rapid, accurate evalu-
be required due to the expanded missions which ation of estimates prepared by others.
U.S. organizations must undertake. When reor- (4) Improve supervision over intelligence
ganizing, care is taken not to unduly disturb ex- personnel management through better evaluation
isting relationships between U.S. elements or indi- of tasks to be accomplished and resource availa-
viduals and their host country counterparts. bility.
Every effort is made to maintain the rapport and (5) Establish and supervise activities to sup-
mutual trust and respect which already exist. port in-country intelligence requirements for cen-
tralized intelligence data processing, storage, and
b. U.S. civilian and military intelligence support retrieval. r
to the internal defense intelligence system may
consist of advice, financial and material aid, provi- 6-13. Relation of U.S. Tactical Forces
sions for professional education, and development to the Area Intelligence System
of an intelligence documentary data base. Most of a. U.S. Army tactical units, introduced into a
this effort is directed at the host country national country where the combined U.S./host country
level, but mobile training teams and advisors may area intelligence system is already developed,
be sent throughout the country to subnational work with thé area intelligence elements on a
levels. Some military intelligence advisors may mutual support basis. This relationship is shown
also be required to assist nonmilitary elements. schematically in figure 6-1.
c. U.S. Army involvement in the internal de- b. U.S. tactical forces arrive in-oountry with at-
fense intelligence system gradually may branch tached military intelligence support detachments.
out into subnational areas. Intelligence advisors The makeup of these detachments is similar to the
may be sent to assist commanders and staffs of structure of standard MID ; however, strengths of
AGO 7334A
6-5
FM 30-31
ACC
(REGION)
COMBINED INTELLIGENCE
ACTIVITIES AND FACILITIES
US INTEL HC INTEL
OFFICER OFFICER
HC 1 ACTICAL
US TACTICAL
FORCES INTEL UNITS AND M FORCES
IN AREA
si OTHER AGENCIE Ul IN AREA
zz
ORGANIC ORGANIC
INTEL CAPABILITY INTEL CAPABILITY
1
LEGEND Direct excnonge of info intel
Figure 6—1. Relationship of tactical units to area intelligence system at subnational level.
their functional intelligence elements are based their respective tactical forces, but the wide-
upon predetermined intelligence needs of the tac- ranging nature of tactical operations results in
tical forces. These attached MID provide most of some dependence upon the area coordination cen-
the intelligence specialist support required by ters for current intelligence and additional spe-
6-6
FM 30-31
cialist support required for each specific mission tribute significantly to short-term collection and
within their current areas of operation. production efforts in support of area coordination
c. When tactical forces are deployed in such a center intelligence programs.
manner whereby they are subj ect to frequent and
sudden change of locations, they should not be d. Details regarding functional intelligence sup-
given responsibility for long-term, area-oriented port arrangements with tactical forces are found
intelligence programs. However, they may con- in subsequent chapters of this manual.
CHAPTER 7
PRODUCTION OF INTELLIGENCE FOR STABILITY OPERATIONS
Section I. GENERAL
ation and the operational environment. The latter stability operations. Developed requirements must
consists of both the geography and the people of give purpose and direction to the collection system
an area. Once the mission is understood, valid in- to obtain needed information. Planning must
telligence requirements are determined by consid- result in efficient utilization of the available intel-
ering these two variables. ligence resources. No intelligence system can be
effective without this management; nor can any
b. Stability operations which are directed satisfactory system be developed without consid-
against the insurgents generate intelligence re- ering how the available means and resources can
quirements based primarily on insurgent capabili- work toward a clearly definable end requirement.
ties. The operational environment is considered It is essential that intelligence requirements be
primarily only to the extent that it influences in- clear and concise and that they continuously be
surgent capabilities. In an incipient insurgency revised and updated to meet the commander’s need
where minimal violence is occurring, requirements as the situation changes.
will be obtained primarily from a consideration of
the nonviolent insurgent capabilities in the politi- 7—5. Intelligence Priorities
cal, economic, social, and psychological fields, and a. The terms “essential elements of information
from the insurgent’s support capabilities (intelli- (EEI)” and “other intelligence requirements
gence and security, recruitment and retention, or- (OIR)” represent a priority system for arranging
ganization and training, and finance and logistics). critical elements of information required by a
Intelligence gaps in each of these areas are deter- commander, with the EEI having the highest
mined and become intelligence requirements, i.e., priority. (For a discussion of these terms, see FM
the information needed to produce the intelligence 30-5.) These requirements are arranged in a de-
necessary for operations against the insurgents. scending order of priority in the collection plan.
The purpose of the priority system is to insure the
c. In addition to considering the capabilities of most effective use of the collection means avail-
the enemy, whether they be basic or supporting, able ; because, in most instances, the requirements
cognizance must also be taken of the operational exceed the capabilities of the means available.
environment. Nonviolent insurgent activity at- b. EEI and OIR are formulated for stability
tacking the economic structure of the country operations by the same careful considerations as
would, for instance, be strongly affected by the are present for conventional intelligence require-
climate of the region and the terrain. Terrain con- ments. However, the collection planning process in
siderations may materially affect the insurgent’s stability operations must make provision for polit-
capability in the sociological field. For example, ical, economic, and sociological data collection, and
terrain often determines the location of people and the intelligence officer must be concerned with a
their degree of isolation from the rest of society. wide variety of nontactical data to support the
The people themselves will have a strong influence mission of the command.
on insurgent capabilities. If they refuse to give
c. The following listing shows examples of EEI
logistical support to the insurgents, for instance, which may have application in an insurgency situ-
the entire insurgent effort will be significantly ation :
hindered. Stability operations aimed at internal
(1) Are there any legal political organiza-
development programs are based primarily on the tions which may be a front for insurgent activi-
operational environment as it is influenced by in- ties?
surgents. For example, internal development plans
(2) What are the salient geographic, demo-
for improving agricultural production in a certain graphic, social, political, and economic character-
area will generate requirements concerning ter- istics of the urban and rural areas ?
rain, climate, and existing agricultural conditions.
Also, there is a requirement for determination of (3) Are the political boundaries established
ways in which the insurgents may influence the by the insurgent the same as those established by
people and affect any government effort in the the government?
area. (4) What psychological operations activities
are being conducted by the insurgent? What are
d. Positive management is essential to the effec- the indications of its effectiveness?
tiveness of the intelligence system in support of (5) What is the nature of national and local
AGO 73S4A
7-3
FM 30-31
communication media (radio, TV, newspaper, timidation, kidnapping, propaganda, taxation, bri-
etc.) ? Does it support national objectives? bery, sabotage, rallies) ?
(6) What social problems (juvenile delin- (22) Has the insurgent force established pat-
quency, narcotic addiction, unemployment, pov- terns of deployment?
erty, etc.) are, or may become, significant? (23) Are insurgent redoubts, safe houses,
(7) What public assistance programs are of- factories, hospitals, caches, liaison sites, mission
fered, upon what basis is assistance granted, and support sites, control points, and the like being
to whom ? Are there significant weaknesses in the pinpointed geographically ?
programs ? (24) Are routes within operational areas con-
(8) Is the public education system vulnerable stantly used by the insurgents ?
to infiltration by insurgent agents (with a long (25) Are these routes and alternates de-
term aim of gaining control of the population fended ?
through the youth of the country? (26) Are movements conducted in mass or
(9) What is the influence of politics on sporadically in small groups?
teachers, textbooks, and students, conversely, (27) Are certain units characterized by their
what influence does the education system exercise method of movement?
on politics? (28) What type of transport is used ?
(10) What is the nature of labor organiza- (29) Where is this transport procured?
tions; what relationships exist between these or-
ganizations, the government, and the insurgents?
7—6. Determination of Indicators
(11) What general economic conditions and
problems of the nation (limited human or naturàl a. An indicator is any positive or negative evi-
resources, low per capita income, savings, con- dence of enemy activity or any characteristic of
sumption, national goals, etc.) are vulnerable to the area of operations which points toward enemy
insurgent attack ? vulnerabilities or the adoption or rejection by the
(12) What general conditions and problems insurgent of a particular capability which may in-
exist in the national transportation system (rail, fluence the selection of a course of action.
vehicular, water, air) ? b. FM 30-102 discusses indicators pertaining to
(13) What relationships exist among orga- various courses of action. These will have general
nized and unorganized religious and religious application primarily in the later stages of an in-
leaders (indigenous and missionary), the estab- surgency. In the earlier phases, indicators will be
lished government, and the insurgents? developed based on an analysis of insurgent opera-
(14) What are the principal nonindigenous tions and activities such as raids, ambushes, out-
sources of support for the insurgents? What form post attacks, assassinations, and sabotage. The in-
does this support take and what are the channels telligence officer’s experience and background
through which it is transmitted ? knowledge of insurgent operations and order of
(15) What urban and rural social stratum or battle will play an important role in developing
strata provide the greatest support to the insur- these important indicators. Appendix E is a
gency? What form does support take (food, listing of indicators for application in stability op-
clothing, shelter, etc.) ? erations. The determination of indicators is fur-
ther discussed in FM 30-5.
(16) In what areas are insurgent forces lo-
cated ?
7—7. Sources of Information and
(17) In what areas are government controls
Selection of Collection Agencies
most effective ? Why ?
(18) In what areas are the people in sym- a. The appropriate selection of agencies and of
pathy with the insurgent forces? Why? sources is discussed in FM 30-5, and that doctrine
is generally applicable to stability operations. The
(19) In what areas are insurgent forces in one significant difference arises from the much
full or partial control ? wider variety of sources and agencies available to
(20) In what areas are insurgent forces the intelligence officer in stability operations. His
active? collection effort should reflect the flexibility that
(21) What activities are most evident in spe- additional sources and agencies give him. The
cific areas (subversion, attacks, assassinations, in- sources and agencies used will depend on require-
AGO 7334A
7-4
FM 30-31
ment priorities, and these in turn are dependent subversion operations have the best capabilities to
on the insurgency phase. Another factor to be con- satisfy a wide range of high-priority intelligence
sidered is the capabilities of the sources and agen- collection requirements. In conjunction with their
cies. While the principles are valid and the selec- mission to penetrate the insurgent infrastructure
tion process is the same as in conventional war- and the maintenance of area coverage-type in-
fare, the possibilities for collection will be in- formant networks, these agencies are also in a po-
creased. sition to develop considerable information of po-
tential intelligence value in the political, economic,
6. During an insurgency, almost all government
and sociological fields.
agencies, whether or not their primary function
pertains to intelligence, are called upon to collect
information. Therefore, a close liaison must exist 7—8. PSYOP/Intelligence Relationships
between all nonmilitary collection agencies. In- a. The impact of the internal defense environ-
surgents use widely divergent methods in their at- ment on psychological operations (PSYOP) has
tempts to exploit government weaknesses and pop- far reaching implications to intelligence planners.
ular discontent. Government agencies involved in The role of PSYOP is of particular importance to
activities ranging from public health to communi- internal defense programs and requires extensive
cations should be called upon to assist in the col- intelligence support beyond that normally de-
lection of information relating to their fields of manded of PSYOP conventional missions (FM
interest. The finished intelligence will be useful to 33-1 and FM 33-5).
these same agencies for further planning as well
as to military planners. &. Military psychological operations are com-
pletely dependent upon timely, accurate, and
c. Orders and requests for specific information useful intelligence at all levels of command where
are based on indicators. Collection agencies are PSYOP are employed. The success of such opera-
directed or requested to supply the information tions depends in great measure on their timing,
which will confirm or deny the indicators. FM which in turn depends on the relevance and scope
30-5 contains a discussion of the formulation and of available intelligence. No two groups of insur-
dissemination of these orders and requests. In sta-
gents have identical environments, attitudes, be-
bility operations, emphasis should be placed on havior, or motivations. It is also quite likely that
value of negative reports since a lack of enemy factors present in the everyday life of different
activity may be a significant indication of the in- groups within an insurgent movement would
surgent’s course of action in a particular area or a change the psychological approach to individual
shifting of emphasis to another area.
elements within the same insurgent force. Intelli-
d. FM 30-5 contains a discussion and an ex- gence to support PSYOP against the insurgents
ample of a collection plan. Appendix F is an ex- will not necessarily be adequate for psychological
ample of a collection plan for stability operations. operations directed towards the population as a
The EEI and OIR shown are based upon insurgent whole. Psychological operations can have little
capabilities. The portion of the plan listing the hope of success in trying to influence the minds of
collection agencies has been expanded to show the audiences without the benefit of all intelligence
additional sources and agencies which are avail- available to give the psychological operators the
able for the collection of information. The collec- needed insight into what makes these audiences
tion agency shown simply as “military” is actually think and act the way they do. These extensive
a composite of all the collection agencies available intelligence requirements in support of PSYOP
within the military organization. It can be ex-
place a heavy burden on host country and U.S.
panded as appropriate by the intelligence officer in
intelligence organizations.
much the same manner as is shown in FM 30-5.
e. One of the significant variations to the overall c. Intelligence staffs and personnel responsible
collection program and the selection of collection for planning and directing the collection effort in
agencies in stability operations is the heavy reli- the internal defense environment must establish
ance on police, security, and counterintelligence and maintain close and continuous contact with
units and agencies, particularly in the early the civil-military operations officer or staff and op-
phases of an insurgency. As a result of the subver- erational PSYOP elements to insure that the nec-
sive nature of an insurgency, these agencies which essary intelligence is obtained to support psycho-
are normally charged with the conduct of counter- logical operations. Coordination and liaison be-
AGO 7334A
7-5
PM 30—311
may indicate that insurgents have recently en- faction throughout the local government and mili-
tered an area and are beginning their attempts to tary, its activities, plans and personnel. Other en-
win the support of the people. ervating activities include instigating riots,
(3) In rural areas the discovery of unex- strikes, and demonstrations to cause government
plained trails, recently used campsites, small farm or military forces to react violently resulting in
plots, caches of food, clothing, and weapons may mistreatment or death of some of the individuals
indicate that insurgents have recently moved into involved. In countries where there are several reli-
an area but do not yet want to make their pres- gious groupings, insurgent propaganda may cause
ence known. religious unrest by making one religous sect feel
that another is receiving preferential treatment
b. Insurgent intelligence collection activities from the government.
will be of two types—overt and clandestine. Overt (2)
activities involve open collection of information by ances typifies activity carried on to win support of
insurgents who circulate among the people and the populace. Strangers who spend most of their
those who attempt to procure local maps, publica- time mingling with the people and who become
tions containing information about the area, and popular by showing the people practical ways to
official government and military publications improve their living conditions often are an indi-
available to the general public. Clandestine activi- cation of activity to win popular support. Terror-
ties involve secret collection of information by in- istic acts (assassination, kidnapping, mutilation)
surgent agents who may join mass organizations, against unpopular government agencies signify
government agencies, the police, and military in- that the insurgents are attempting to win the sup-
telligence units. Unusual activity by government port of the people by eliminating individuals and
employees, such as unexplained absences, overtime agencies they consider to be oppressive. The for-
or weekend work when the workload does not j us- mation or resurgence of organizations whose aims
tify it, and taking official documents home over- are to alleviate local grievances is still another
night may mean that they are providing informa- indication of activity to win the support of the
tion to the insurgents. Government workers who people.
are living beyond their normal means may be able
to do so because they are receiving money or other d. Newly formed organizations or reappearance
material rewards fom the insurgents in exchange of formerly inactive organizations, attacking local
for information concerning their agencies. When government or stressing immediate social,'polit-
information received from established sources is ical, or economic reform may be an indication that
consistently false, misleading, or of no value, these the insurgents have gained a significant degree of
sources are likely to be under insurgent control. control.
When all government efforts fail to identify and e. Insurgent recruitment and training of new
apprehend insurgents known to be in the area, personnel is a continuous process. Insurgent
this is an indication that insurgent informants are movements make it a practice to give continuous
likely to be present in the government forces and political indoctrination, leadership training, and
are able to anticipate government actions. training in the methods of revolution to selected
key members of the movements. Some typical in-
c. Insurgent psychological operations have two surgent recruitment and training activities and
general aims—to weaken the established govern- their effects are as follows :
ment and to win the support of the people. Often (1) The unexplained disappearance of young
both these aims are achieved by a single act. The men may indicate insurgent recruitment and de-
following indicates types of insurgent psycholog- parture to receive training at another location.
ical operations, their effects on the local popula- (2) Reports from people concerning contacts
tion, and the information that can be derived from by strangers to join new movements or under-
them : ground organizations may indicate that insur-
(1) Activities togents weaken
are the established
actively engagedgov-
in recruitment. These
ernment are antigovernment propaganda ; assassi- reports may also indicate patterns and targets of
nation and kidnapping of local government insurgent recruitment.
leaders ; breakdowns in government provided (3) Radical and hostile changes in the atti-
public services; use of influential organizations, tude of the people toward the government may
groups and individuals, knowingly or unknow- indicate that the people have been subverted by
ingly, to create or spread statements of dissatis- the insurgents.
(4) Unexpected shortages of doctors, print- (4) Captured insurgent documents regarding
ers, and other specialists may indicate that they s u ch su bj ects as—
have been recruited or forced by the insurgents to (a)
work for the movement. supporters (both foreign and local).
(5) Travel by individuals to foreign areas or (ft) The insurgent organization.
local areas under insurgent control may indicate (c) The insurgent routes of communica-
that these individuals are receiving training and tion, camps, caches, and “safe houses.”
indoctrination or are somehow engaged in insur- (d) Local insurgent targets.
gent activities. (e) Insurgent plans.
(/) Insurgent doctrine and methods of op-
(6) The apprehension of individuals engaged eration.
in subversive activities, clandestine information (g) Adjacent insurgent units.
collection, or sabotage, is usually a clear indication
that they are part of the insurgent movement. (5) Propaganda reveals targets (government
agencies, official programs, unpopular local condi-
/. Insurgents depend in varying degrees upon tions) which the insurgent intends to attack.
local sources for financial and logistical support. Analysis of the propaganda message may reveal
Their procurement needs during any particular segments of the local populace to which the propa-
period may indicate a financial and material weak- ganda is addressed and may help to determine the
nesses or it may indicate their future intentions origin.
(large scale procurement of arms, ammunition, (6) Photographs are excellent sources of in-
and medical supplies indicate that the insurgents formation, alone or as supplements to oral or
are preparing for guerrilla warfare). The prin- written reports. Typical photographs which pro-
cipal items which the insurgents may procure vide valuable information are—
locally are— (a) Photos of insurgents which provide
(1) Money. positive identification.
»
(2) Food. (b) Photos of known insurgent bases,
(3) Clothing and field equipment. caches, and meeting sites.
(4) Weapons, ammunition, and explosives. (c) Chance or intentional photos of insur-
(5) Medical supplies. gents engaged in illegal activity.
(6) Printing material and equipment for (d) 'Photos of demonstrations, riots, and
propaganda purposes. strikes which may provide positive identification
of insurgent agitators present at these events.
7-14. Objects as Sources of Information (e) Photos of the results of insurgent ter-
roristic acts which provide vivid pictorial evidence
The final category of sources of information con-
that can be used psychologically against the insur-
sists of objects. This category is broad, ranging
from objects which provide specific information gents.
on the identity and plans of the insurgents, (e.g., b. Documents Concerning the Local Situation.
captured documents) to objects which provide ( 1 ) Maps. Detailed topographic maps will in-
general information on local, social, political, and dicate the local areas best suited for insurgent
economic conditions (e.g., area studies). Some spe- bases and routes of communication. If the loca-
cific objects used as sources of information are— tions of the insurgents’ activities are known, they
a. Physical Evidence. Before the insurgent be- may be plotted on maps to enable the intelligence
officer to deduce patterns and thus anticipate
comes firmly established in an area, he craves an-
future insurgent moves.
onymity. Indicators which betray his presence,
however, are— (2) Official publications. Official publications
prepared by government agencies or private or-
(1) New trails and campsites in remote ganizations under government contract, provide a
areas. wealth of information to stability operations plan-
(2) Apartments or homes which are occupied ners. Examples of publications which may exist
at irregular intervals by strangers who keep odd are—
hours or act in a suspicious manner. (a) Statistical studies concerning the crime
(3) Caches of food, weapons, ammunition, rate and types of crimes committed.
transceivers, clothing, and medicine. (ft) Studies of the local economic situation.
AGO 7334A
7-9
FM 30-31
(c) Reports on local public health and sani- edgeable of insurgents as well, and interrogation
tation. of known or suspected insurgents may yield de-
(3) Books. Books written about the local area tailed information on aspects of the insurgent
should not be overlooked as possible sources of movement. Searchers of suspected buildings and
information, particularly if they are factual texts. locations, and seizure of their contents, may pro-
These books may be useful as background material duce individuals and/or items of intelligence
for more detailed area studies or may explain the value. Finally, police checkpoints, both stationary
causes of racial, religious or other tensions. and mobile, may detect the movement of insurgent
(4) Newspapers. Newspapers may contain personnel and supplies and lead to the discovery of
valuable information which has not yet come to insurgent routes of communication, bases, and
the attention of the government. Newspaper re- caches.
porters frequently have an excellent informant (3)
network which enables them to obtain new infor- lecting a great deal of information, certain factors
mation as early as possible. often limit their information collection capability.
Good relations with the people are often lacking
and local police forces frequently do not have suf-
7—15. Indigenous Government Collection ficiently trained manpower to operate effectively.
Agencies Adequate funds usually are not available to sup-
a. Most indigenous government agencies collect port operations effectively. Also, police forces
information in the performance of their govern- usually lack sufficient equipment to provide mo-
mental functions. All national and subordinate bility and rapid communication ; police records
level governmental agencies, therefore, with a ca- and files usually are rudimentary.
pability to collect information should be consid-
ered by internal defense intelligence planners in c. When a national intelligence service exists
planning the collection effort. apart from police and military intelligence, it may
have the best human, finanial, and material re-
b. At the local level the police are often the best sources to enable it to engage in overt and covert
information collection agency. In performing their information collection.
law enforcement role they develop a thorough d. Other specialized government agencies will
knowledge of the local environment. The type and often possess a useful collection capability. Exam-
quantity of information the police can collect is ples of such agencies are—
almost limitless. This collection capability is more ( 1 ) The Ministry of Agriculture.
easily understood when one recognizes that police (a) Agricultural agents can obtain such in-
units usually are recruited from the local popula- formation as—local agricultural conditions and
tion and remain assigned to the same area. By problems ; irregularities such as theft or diversion
operating in the same area for years, police accu- of crops and livestock from the open market to the
mulate detailed data on such useful information as insurgents; and the attitudes and grievances of
the local social, economic, political, and religious local farmers. This information may be collected
conditions, the attitude of the people concerning in the following ways: personal observation of
the government and the insurgents, and insurgent local conditions by field representatives, inter-
organization and activities. They also are usually views with local farmers and agricultural speci-
completely familiar with terrain features of the alists, and casual conversation with local farmers
areas in which they are stationed. while providing them assistance.
(1) Routine patrols afford the police an excel- b) The limitations based on the above ca-
lent opportunity to collect information by asso- pabilities and employment are that sufficient agri-
ciating with the people, observing events along the cultural specialists usually are not available to
patrol route, and investigating suspicious activity. cover all rural areas, and these specialists, when
Surveillance of suspected persons, places, and they exist, must be trained to collect the type in-
things discloses the existence of insurgent activi- formation needed by internal defense forces.
ties and reveals the identities of those engaged in (2) The Ministry of Public Health.
such activities. Investigation of crimes may also (a) Representatives of this organization
reveal a relationship between the crimes and the can collect data on local health and sanitary condi-
insurgents. tions, theft of drugs and other medical supplies
(2) Informants, routinely employed by the from government facilities by insurgents, the atti-
police to detect criminal activity, are often knowl- tude of the people toward government health and
sanitation programs, and the effectiveness of these time often pose as legitimate workers, refugees,
programs. Information of this type can be col- and settlers. They will be extremely security con-
lected by field representatives of the Ministry of scious and organized into small cells which often
Public Health in the f ollowing ways : personal ob- will not openly associate with one another. Insur-
servation of local conditions, interviews of local gent communications will be covert, and almost all
medical personnel and patients, and casual conver- insurgent information collection activities will be
sations with medical personnel and patients. conducted clandestinely. Insurgent propaganda
(5) The limitations of the Ministry of will be so worded as to disguise the relationship
Public Health are the same as those of the Min- between the propaganda and the insurgent move-
istry of Agriculture. ment; front organizations established by the in-
(3) The Ministry of Communications. This surgents may appear as legal organizations whose
ministry can be a source of information on estab- stated aims openly support—but covertly subvert
—the government.
lishment of new commercial and amateur radio
stations ; evidence of use of unauthorized frequen- b. Insurgent activities such as assassination and
cies, and unusual traffic patterns on commercial robberies may be executed in such a way as to
communication systems. appear to be the work of common criminals. In-
surgent installations in urban areas will be dis-
7-16. Insurgent Countermeasures guised or hidden. In rural areas insurgent bases,
To Deny Information caches, and supply routes will be located where
they are not likely to be discovered by patrols or
a. Insurgent cadre entering an area for the first aerial reconnaissance.
either by drawing portions of the map to a larger (4) Population status map. This may consist
scale, with the addition of significant detail, or by simply of an overlay in the situation map. Essen-
making a mosaic from aerial photos. The impor- tially, this map will portray the attitudes of the
tant factor is that past, present, and potential in- population whether disaffected, loyalist, or
surgent activity must be visible in terms of a de- doubtful. Colors can be used effectively to desig-
tailed and thorough understanding of the environ- nate these conditions.
ment. Comparison of the several annotated maps (5) Personalities and contacts map. What is
maintained will often assist the intelligence officer known initially about the insurgent situation may
in estimating the enemy’s intentions and capabili-
consist primarily of information concerning loca-
ties or to establish trends. tions and activities of individual agents of es-
(1) Incident map. The incident map provides pionage, agitation, organization, and liaison. The
historical cumulative information to trends and appearances, movements, meetings, and disap-
patterns of insurgent activity. Properly main- pearances of these personalities should be re-
tained, the distribution of entries will enable the corded on a ^personalities and contacts map. A
intelligence officer to make judgments as to the large-scale map will be required for this purpose
nature and location of insurgent targets in the (a city street map or town plan if an urban area is
area, the relative intensity of insurgent interest in involved). Deviations from regular patterns of
specific areas, insurgent control over or support movement can be detected in this manner. De-
from the population, and potential areas of insur- pending upon the number of personalities under
gent operations. Judgments concerning the latter surveillance, the regularity of their habits, and the
also require knowledge of terrain factors and in- variety or reports received on them, it may be
surgent limitations. necessary to maintain a separate overlay for each
(2) Insurgent situation map. The situation subject. Old overlays should be filed for compar-
map represents finished intelligence, much of it ison. Each subject’s route should be portrayed in a
built around the information recorded on the inci- different color, and regularly traveled routes dis-
dent map. It will be difficult to pinpoint insurgent tinguished from new routes. Observations should
installations and dispositions with the same be dated and incidents noted by symbol, if pos-
degree of confidence as in a conventional tactical sible. Depending upon the amount of insurgent ac-
situation. The insurgents can displace on short tivity in the area of responsibility, this map may
notice, making a report outdated before it can be be combined with the incident map.
confirmed. While the situation map presents an un- b. Working Files. The intelligence worksheet
certain and hypothetical picture, composed less of
and the annotated maps serve to isolate problem
firm information than of reports or fleeting tar-
areas and formulate relationships among the in-
gets, estimates, and abstractions, it may sub-
formation and intelligence collected. Extensive re-
stantiate in graphic terms the trends or patterns search material is required, however, to analyze
derived from the incident map resulting in im-
these problem areas. In the early phase of an in-
proved economy and effectiveness of the surveil-
surgency, the enemy is building his own organiza-
lance and reconnaissance effort.
tion. His organizational procedures and tactics
(3) Trap map. This map is used if the insur- will, therefore, be unique, and familiarization of
gent has a capability for sabotage or terrorist the part of the intelligence officer will require
action. It can be constructed by direct annotation study of personalities and painstaking analysis of
of the map on which the situation overlay is
incidents. This necessitates the keeping of exten-
placed, or it can be kept separately. This map will
sive working files, types of which include :
portray locations in the area of responsibility
which present particularly attractive targets for (1) Hot file. The most important working file
insurgent sabotage or terrorism, such as road and will be the hot file. This will include all available
railroad bridges, communications centers, theaters material pertaining to an incident or groups of
and assembly halls, and places where the terrain possibly related incidents which are of current in-
favors ambushes and raids. Such areas should be terest. Also included will be material relating to
identified and analyzed as part of the area study, persons or places likely to be involved in insurgent
but they should also be plainly marked on this activity, together with material on agents or sus-
map with attention directed to possible insurgent pects who may be involved. A reported sabotage
access and escape routes. Photographs which are plot, for example, could initiate a hot file on the
keyed to the map can also supplement this effort. subject. The hot file remains active until the
report is refuted, the incident occurs, or the atten- cident files, inactive personality and organization
tion of the insurgent is diverted elsewhere. files, and photography. The latter material may be
(2) Current propaganda and PSYOP file. If particularly useful. Air or ground photographs of
propaganda constitutes a major part of the insur- places of interest should be arranged chronologi-
gent effort in the area, a file maintained by the cally by location and should be readily available
analyst should contain all pertinent literature, for use in conjunction with hot files, incident
background material and analyses available, to in- maps, trap maps, and the like.
clude copies of propaganda literature, transcripts (6)
of propaganda speeches, and analyses of local maintained of reference publications such as man-
grievances being exploited or subject to exploita- uals on doctrine and method, books on the area
tion by the insurgents. and on the insurgent threat, files of newspaper
(3) Personality and organization files. At- and magazine clippings, and any other material
tempts should be made to develop and maintain as which may be of use. This material may be kept at
detailed a local file on each insurgent personality a central library serving the entire staff and lo-
as is possible. If surveillance is carried out by the cated at the area coordination center.
local police, basic identifying and biographical in-
formation can be transferred from police dossiers 7—19. Evaluation
to a card file. This file will support training of Evaluation involves the examination of informa-
friendly surveillants in their ability to recognize tion to determine its intelligence value. In evalu-
key personalities on sight. The organization sec- ating information the knowledge and j udgment of
tion of this file should include information on the the intelligence analyst play a major role. In con-
history and activities of the insurgent organiza- sidering whether a fact or event is at all 'possible,
tions in the area and on fronts or other subversive it must be realized that certain events are possible
or suspected groups. Officers and memberships, despite the fact that they have not previously oc-
overlapping directorates and memberships, and curred and have been deemed unlikely to occur.
liaison among these organizations should all be re- While confirmation of information by other
corded and kept up to date. sources and agencies is always desirable, it is not
(4) Area study files. Area study files should always possible to obtain. Initially, intelligence
be established to maintain up-to-date and perti- production commences with unconfirmed informa-
nent data in the geographic, political, sociological, tion which is subsequently supported, confirmed,
economic, and cultural fields. In stability opera- or denied by the collection of additional and re-
tions, even the lower echelon tactical commander, lated information. As more information is ob-
particularly when operating in the same general tained, the insurgent situation, capabilities, and
operational area over extended periods of time, probable courses of action become increasingly
has a definite requirement for such information. clear. As the body of intelligence expands, infor-
The intelligence staff officer should, therefore, mation that is not compatible with the current in-
have ready access to such data. The topical break- surgent situation and is not consistent with the
down of such files should be oriented toward recent pattern of insurgent activity is suspect.
events and activities of continuing significance. The process of evaluating information is discussed
Thus, for example, if rice is the basic staple in an in detail in FM 30-5. Procedures governing the
economy, the topical breakdown in the economic assignment of evaluation ratings to sources and
portion should include files on rice production, dis- agencies have equal application in the internal de-
tribution and marketing, price levels, black fense environment.
market and pilferage, etc. Since this key economic
indicator will have continuing influence on 7—20. Integration
friendly military operations as well as on the in- a. Evaluated information becomes intelligence
surgent forces who depend on this staple for sur- only after it has been integrated with other infor-
vival, careful analysis of this data over a period of mation and interpreted to determine its signifi-
time may provide patterns based on which insur- cance. Integration involves the combining of se-
gent actions could be anticipated and their capa- lected data in order to form a pattern which will
bilities predicted. have meaning and establish a basis for interpreta-
(5) Resource file. A resource file should in- tion (see para 7-2). It is important that the intel-
clude all material which may be of importance but ligence analyst be sufficiently perceptive to recog-
not of immediate value. It can include inactive in- nize all the possible patterns that may be formed.
AGO 7334A
7-13
FM 30-31
An example will serve to illustrate the mental pro- the insurgents and, finally, there is a fourth possi-
cess of integration. The intelligence section of the bility that both the labor leader and his murder
area coordination center receives information that are unconnected with the insurgency.
a prominent labor leader has been murdered. In a
search for related information the intelligence an- 7-21. Interpretation
alyst checks the incident file, the friendly and sus-
a. Interpretation is the result of making deduc-
pect personality files, and the organization file.
tions as to the probable meaning of new informa-
(1) The incident file reveals a series of mur- tion and determining its implications with respect
ders that have been linked with the insurgent, to future insurgent activity. The meaning of the
with the primary victims being government information is determined in relation to the insur-
officials, prosperous merchants, and large land- gent situation and the insurgents’ probable
holders who opposed insurgent objectives. courses of action.
(2) The suspect personality file reveals the b. For example, in the case mentioned above, if
labor leader’s controlling position within a union the labor leader was loyal to the government and
that has recently intensified its criticism of the was murdered for opposing insurgent control of
government. The personality file also reveals the the union, it may reasonably be expected that fur-
labor leaders’ close association with several gov- ther consolidation of insurgent control over the
ernment officials and his recent extensive travel union, increased antigovernment agitation by the
throughout the nation. union, and possibly an extension of insurgent ter-
(3) The organization file indicates that the rorist activities will take place.
union has recently begun to disseminate antigov-
c. If however, the labor leader was a member of
ernment leaflets and has threatened to call a strike
the insurgent organization and was murdered by
if demands for representation in a popular front
the insurgents, it may be conjectured that he was
government are not met. The organization file also
eliminated because he was considered unreliable
indicates that a struggle for power has been
or was progressing too slowly toward the achieve-
taking place within the union. The other primary
ment of insurgent objectives. In this case, the
contender for union leadership is a relatively un-
prompt emergence of another insurgent union
known newcomer.
leader who will insure more rapid progress
b. Once the intelligence toward
analyst hasinsurgent objectives may be expected. It
obtained all
related items of information from the intelligence may also be inferred, however, that the labor
files, he begins to assemble the available informa- leader was murdered as a result of a struggle for
tion to form as many logical pictures or hy- power within the insurgent organization. In this
potheses as possible. Alternative methods of as- case, weaker insurgent control of the union may
sembly are an essential prerequisite to any valid be expected due to the dissension among the insur-
interpretation. Assembly of information to de- gents.
velop logical hypotheses requires good judgment d. Finally, if the labor leader had no connection
and considerable background knowledge. In for- with the insurgent organization and was mur-
mulating hypotheses the intelligence analyst must dered for reasons unconnected with the insur-
avoid the limitations which result from precon- gency, this event has no significance from an intel-
ceived opinions. In the example of the murdered ligent standpoint.
union leader, the new information can be inte-
grated with existing intelligence in several dif- e. Additional discussion of the interpretation
ferent ways. By combining the murder with one function to include analysis, deduction, and
set of facts, the labor leader might be pictured as bearing on the current intelligence estimate of the
a loyal supporter of the government who became situation can be found in FM 30-5.
the victim of a campaign of selective terror under-
taken by the insurgents. On the other hand, by 7—22. Order of Battle
combining the murder with another set of facts, a. The production of order of battle intelligence
the labor leader might be portrayed as a membe- is discussed in FM 30-5. There are certain order
of the insurgent organization who was murdered of battle considerations, however, which are
for reasons unconneced with the insurgency. As a unique to the insurgent enemy. Order of battle
third possibility, he may have been a member of intelligence is equally as important in an insur-
the insurgent organization who was eliminated by gency as in conventional combat operations. How-
ever, some differences in nomenclature and ap- to include their organization and chain of com-
proach must be recognized. The applicability of mand. The degree of sophistication encountered
the various order of battle factors will differ will be indicative of other factors, such as training
somewhat in an insurgency from conventional op- logistics, strength, etc. Armed platoons or small
erations and there will also be differences in appli- terrorist cells would indicate that the overtly mili-
cability between Phase I and Phase II insurgency tary portion of the insurgents’ plan is just begin-
situations. The elements of order of battle intelli- ning; armed battalions and large urban terrorist
gence (order of battle factors) are not inde- groups indicate that there is a serious menace to
pendent of each other ; they are closely related and the government in power.
must be considered as a whole. Information on one (c) Political structure. At the center of
of the elements will often lead to a re-evaluation some insurgent movements may be found a tightly
or alteration of information previously received disciplined party organization formally structured
on another element. Furthermore, the general to parallel the existing government hierarchy in
rule, whereby order of battle intelligence is devel- the country. In most instances this organizational
oped and maintained down to and including two structure will consist of committed organizations
echelons below the analyst’s own level of com- at the village, district, province, interprovincial,
mand, does not apply to stability operations. Due and national levels. Within major divisions and
to the nature of the insurgency and the phased sections of an insurgent military headquarters to-
development of the insurgent forces, order of tally distinct, but parallel, command channels
battle intelligence must be produced in much exist. These are the military chain of command
greater detail and pertain to much lower echelons and the political channels of control. Whether it is
(even down to squad) than in conventional combat through a political division of an insurgent mili-
operations. tary headquarters, a party cell or group in an in-
b. A listing of the order of battle factors fol- surgent military unit, or a unit political officer, the
lows, together with a brief explanation of their party insures complete domination over the mili-
applicability and means in the context of insur- tary structure by use of its own parallel organiza-
gency situations. tion.
(d) Combat forces. The organization of in-
(1) Composition. In some insurgent move-
surgent combat forces is dependent upon the need,
ments, military force is only one of several instru-
the tactics to be employed, and the availability of
ments through which the insurgent movement
personnel and equipment. Frequently, subordinate
seeks power. Development of a military force has
the lowest priority during the early stages of an elements of insurgent units are employed inde-
pendently. The intelligence analyst who receives a
insurgency. As long as the party core and civil
organizations are established and move effectively confirmed report of a subordinate element of an
insurgent unit operating in his area cannot, there-
toward the goal of the insurgency, the military
for, assume that the parent unit is also present.
arm may either lie dormant or simply exist in
Identification of insurgent units may be by
cadre form until needed as a supporting force. See
number, commander’s names, nickname, code des-
appendix B for further details on the composition
ignation, and/or the name of the area in which it
of a type insurgent armed force organization.
operates. Further, designations are frequently
(a) Phase I considerations. Rather than in- changed and multiple designations are used to
formation on the identification and organization confuse friendly intelligence. It follows that the
of specific enemy units, we are concerned with the intelligence analyst may not be able to make a
types and internal workings of insurgent activity determination of the size and strength of an insur-
groups. Knowledge of the composition of insur- gent unit merely by obtaining a unit identification.
gent groups can be a key to the entire planned
course of the insurgency. Details of composition (2) Disposition.
may include the appearance of new organizations, (a) Insurgent forces. Determination of the
the relative amount of enemy effort expended in disposition of the insurgent involves the location
rural and urban operations, the internal chain of of his operational bases, training bases, supply
command and control, and the manner in which bases, lines of communication, and areas of polit-
insurgent groups are organized for operations. ical control. The intelligence analyst can arrive at
(b) Phase II considerations. The intelli- potential dispositions of the insurgent combat
gence analyst will be concerned here with deter- forces by developing patterns of activity based
mining the composition of insurgent combat units, upon map study and knowledge of insurgent tac-
AGO 7334A
7-15
FM 30—31
tics. Insurgent base areas, for instance, normally multiple designations for a single element. Re-
are located near areas politically controlled by the ports from the populace concerning the strength
insurgents, thereby providing an early warning of the insurgent forces should be viewed with cau-
system. By plotting insurgent sightings and com- tion and the importance of actual counts of enemy
bining this information with weather conditions, personnel stressed. Certain insurgent initiated in-
time factors, detailed investigation of insurgent cidents can provide useful indicators of the
incidents, and after action reports', the analyst can strength of the insurgents in a particular area.
best select possible enemy dispositions as well as Examples of these are an increase in kidnapping
possible areas of tactical deployment. Considera- or an increase in raids with subsequent loss of
tion should also be given to areas where no insur- weapons. The determination of popular support
gent activity has been reported. These areas, while for the insurgents is a more difficult task and can
appearing to be under the control of internal de- be stated best in terms of the percentage of an
fense forces, may be under the political control of area under government control as opposed to the
the insurgents. percentage under insurgent control, with both
(b) Phase I considerations. The location, viewed together in terms of population density. A
deployment within this location, and any move- useful indicator of the extent of insurgent polit-
ments of insurgent organizations or personnel are ical control is the willingness of the populace to
of concern here. The enemy’s strength and tactics report information concerning the insurgents.
may be revealed to some extent by discovering (by Phase I considerations. The cadre who
whether this effort is concentrated in a few places are used to organize and activate the movement
or dispersed throughout the target nation. If his usually are highly trained, aggressive profes-
effort is initially concentrated in one city or in one sionals who exercise an influence out of proportion
rural area, then the extent and rapid spread of the to their actual numbers. The analyst is also con-
insurgent organizations are a key to how long he cerned with the number of enemy units in exist-
has been operational, how successful he has been, ence, which in Phase I means identifying and eval-
and, in part it is an indication of his appraisal of uating new groups and organizations »which have
friendly strength. In a nation which he considers a appeared in the nation and any changes in the size
relatively easy conquest he may begin with many of existent groups. While weapons are not a
operations rather than a few. By studying the matter of paramount interest, other equipment is.
other available elements of order of battle intelli- A printing press in Phase I may be a deadlier
gence the intelligence analyst may determine such weapon than a battalion.of artillery.in Phase III.
things as whether the movement of an enemy . • (c) Phase II considerations. The actual
cadre or group is an advance toward new goals or number of men available to the insurgent now as-
a retreat from an unprofitable operation. sumes the importance it lacked to some degree in
(c) Phase II considerations. The manner in Phase I. By knowing also the amount of weapons
which the insurgent forces are deployed can indi- and equipment he possesses, estimates of capabili-
cate whether the enemy is making a widespread ties against friendly forces can be formulated. The
show of strength with units scattered about the degree of popular support for the insurgent will
country or is concentrating them around a few manifest itself in such areas as recruiting for his
key targets. It can also show whether he is going forces.
to concentrate on such activities as interdicting (4) Tactics.
transportation or actively seeking battle with gov- • (a) Insurgent forces. Tactics include both
ernment forces. enemy doctrine and his conduct of operations in
(3) Strength. accordance with that doctrine. Insurgents may be
(a) Insurgent forces. The strength of the more flexible in their application of doctrine than
insurgents must be thought of in terms of the regular military organizations. The doctrine
combat forces, political cadres, and popular sup- which guides the insurgent must be known and
port. Conventional methods of strength computa- understood by friendly forces if they are to effec-
tion can be applied in the determination of insur- tively counter enemy efforts. The careful examina-
gent strength. The analyst should be aware, how- tion of his tactics, or actual operational tech-
ever, that the insurgent will attempt to have his niques, may reveal changes in doctrine as well as
strength overestimated by stability operations indications of the personality and competence of
forces. In order to give this false impression, he the insurgent leader. Again, his choice and appli-
will employ rapid movement of his units and use cation of tactics is a reflection of insurgent ap-
7-16 AGO 7334A
FM 30-31
praisal of friendly strength as well as of his own. mined to some degree by any observed increase in
A continuing .estimate of relative strengths is a the effectiveness or size of the insurgent move-
very basic part of Communist operational plan- ment. Some training normally will be conducted in
ning and has an immediate effect on tactics. Tac- another country and may be indicated by a change
tics of the insurgent will involve political, mili- in number and type of personnel traveling to that
tary, psychological, and economic considerations, country.
all closely integrated. They will vary with the (c) Phase II considerations. Much atten-
phase of the insurgency. The political' goal of the tion must now be devoted to locating training
insurgents will be to undermine and discredit the camps and areas, identifying training cadres, and
established government. Military tactics are char- interdicting the movement of insurgents to' and
acterized by speed, surprise, and heavy application from out-of-country training areas. Some insur-
of firepower and mobility.. The capabilities and gent units may be identifiable as having been
vulnerabilities of the insurgents are discussed in trained for special missions such as reconnais-
detail in chapters 3 and 4. , , r sarice or demolition.
(b) Phase I considerations. Phase I insur- (&) Logistics. .
gency is characterized by an absence of strictly (a) Insurgent forces..\r\ an insurgency, as
military operations and an emphasis on subver- in a- conventional warfare situation, the effective-
sion and organizational development. Although in- ness of the insurgent is very much dependent on
stances of terrorism may begin to occur in the his logistical support. In the early stages of an
later stages of Phase I, military activity usually is insurgency the requirements for military equip-
limited to recruiting and establishment of military ment and supplies are less than in the later stages.
cadres. Accurate intelligence on the insurgent’s sources
(c) Phase II considerations. An increased and availability, of supplies and equipment is es-
emphasis on the study and evaluation of the insur- sential to determine his capability to maintain and
gent military tactics is required during this phase. expand the.insurgency.
Tactics during Phase II'generally are limited to
(ö) Phase I considerations. Two particular
ambushes, raids, sabotage, and terrorism. These
items, have always been essential to the Phase I
activities provide the insurgent with supplies, ex-
insurgent—money and a printing press. If the in-
perience, and self-confidence, while at the same
surgent is highly successful in the establishment
time they erode friendly morale .and reduce and motivation of his power base, he may never
friendly economic and military capabilities. really hajve a requirement for the usual items of
(5) Training. - . < military “supply. Money is often supplied from
(а) Iñstirgent forces. Insurgent training abroad, but such occurrences as bank robberies,
will be closely related to the tactics being em- unusual or .excessive fund drives, payroll deduc-
ployed and will include vigorous indoctrination in tion requests, or sudden affluence among suspect
political affairs. Both the combat forces and the government officials are cause for suspicion.
people within an area under the political domina- Equipment for the production and dissemination
tion of the insurgents receive training. Individual of propaganda, such as printing presses and radio
operations and phases of movement are carefully sets, is of a special nature, and its purchase and
planned and trained for by the insurgents. A use can be controlled by the friendly government
careful analysis of an area with respect to the to a large degree.
type of training taking place can provide a useful
(c) Phase II considerations. Logistics is
indicator of the probable courses of action that
now a larger and more elaborate requirement for
will be employed against stability operations
the insurgent. He must now procure, store, trans-
forces.
port, and maintain such items as weapons, ammu-
(б) Phase I considerations. During Phase I nition, explosives, signal equipment, and medical
the insurgent will train and indoctrinate his own supplies. A much larger number of people are re-
cadre as well as newly accepted or recruited indig- quired to operate the logistical system. Insurgent
enous personnel. Training will consist of a great supply caches and supply lines become items of
deal of political indoctrination along with tech- critical .concern to friendly forces. Borders and
niques of propaganda, communications, and intelli- coastlines must be controlled and aerial surveil-
gence collection. Training and effectiveness go lance of remote areas or areas known to be used
hand in hand ; the type, amount, and validity of by the insurgents' must be instituted in order to
training received by the insurgents may be deter- detect or deter his movement of supplies.
AGO 7334A
7-17
FM 30-31
their subversive activities despite severe losses reports not covered in the SOP would be directed
and defeat by government forces. to the chief of the intelligence element of the
center for a determination as to recipients and
7—25. Dissemination by the Area priority of dissemination, since he will be most
Coordination Center familiar with the intelligence needs of the various
a. The area coordination center should contain a organizations. Reports handled by a minimum
number of personnel will help promote rapid dis-
communications section which has secure commu-
nication facilities for the dissemination of infor- semination with a minimum of errors. Higher of-
mation and intelligence reports to higher, adja- ficials within the area coordination center are re-
lieved of the burden of personally reviewing all
cent, and lower organizations and a message
center which distributes information and intelli- reports in order to determine proper dissemina-
tion.
gence to sections within the area coordination
center. c.
Small organizations such as a village level area
b. When the area coordination center is staffed
by a large number of people it will be necessary to coordination center might have a much less formal
have simplified procedures in order to achieve procedure for dissemination, while large organiza-
timely and proper dissemination of information tions such as a regional level center or the NIDCC
and intelligence produced by the center. A possible would require detailed regulations and procedures
governing dissemination due to the wide variety
method would be to have all information and intel- of information and intelligence reports which they
ligence reports coming from the production sec- must disseminate to many subordinate organiza-
tion given directly to the communications section tions. In order to achieve timely and proper'dis-
for dissemination both internally and externally. semination, individuals at all levels who are placed
The communications section would then dissemi- in charge of dissemination must be thoroughly fa-
nate according to an SOP listing the recipients miliar with all internal defense and development
and priorities of all reporte normally produced by organizations as well as operations requiring in-
the area coordination center. Special or unusual formation and intelligence. *
CHAPTER 8
COMBAT SURVEILLANCE AND RECONNAISSANCE
Section I. GENERAL
(12) Abnormal traffic on established roads or (1) Tactical targeting throughout the area of
waterways. interest.
(13) Unidentified or suspicious activity de- (2) Continuous improvement of host country
tected by infrared (IR), radar, or other sensory comm .nications facilities.
devices. (3) Combat surveillance and reconnaissance
training of both host country and U.S. personnel,
d. Bad weather limits all surveillance and recon-
naissance means. When the weather permits aerial with emphasis on—
observation, the insurgent usually will act in a (а) Calling for and adjusting friendly fires.
way that makes his presence unknown. When the (б) Map reading and land navigation.
weather precludes normal aircraft operations, the (c) Employment of long-range and stay-be-
insurgent force will move and strike more openly. hind patrols in gathering intelligence information.
Because weather conditions change rapidly, air- (d) Visual aerial surveillance; photo-
borne and ground surveillance measures are pre- graphic interpretation.
planned so they can be implemented as scon as the (e) Communications equipment and proce-
weather breaks. In this way insurgent forces are dures.
exposed or caught in activities they reserve for (/) Use and maintenance of surveillance
periods when they think they cannot be observed. equipment available to the host country.
Because visibility and air and ground vehicular
(fif) Proper reporting procedures.
movement are adversely affected by bad weather,
(4) Tasking out-of-country resources such as
alternate foot-mobile reconnaisance is planned.
COMINT.
Good communications are required for an effective
surveillance plan. Communications problems
caused by bad weather should be anticipated and 8-4. Requirements for Effective Combat
alternate plans developed to cope with them. Surveillance and Reconnaissance
a. Combat surveillance and reconnaissance is re-
e. Terrain frequently limits line-of-sight obser-
quired throughout all phases of an internal de-
vation. In addition, insurgents use natural cover
fense program. Requirements differ at each level
and concealment to hinder friendly observation.
—national (NIDCC), subnational (Area Coordi-
To overcome these obstacles, aerial and ground ob-
nation Center), and tactical unit—according to
servation are extended in variety, depth, and fre-
the particular phase of insurgency involved. When
quency of coverage. Often it will be necessary to
put personnel on the ground who can travel be- more than one phase is in effect simultaneously,
neath jungle canopy and across areas that cannot surveillance requirements are more numerous and
be watched from observation points. Reconnais- varied than in single-phase situations. The min-
sance missions will include the requirement for imum requirements for combat surveillance and
patrols to stay in an area for extended periods of reconnaissance, by phase at each level, are shown
time and to react positively to any insurgent ac- in appendix G.
tivity encountered. Increased emphasis must be
b. The role of combat surveillance and recon-
placed on remotely monitored sensors.
naissance in stability operations is much broader
than in other types of warfare. Since the enemy
8—3. Development of Combat Surveillance does not occupy fixed positions or fixed terrain,
and Reconnaissance Capabilities locating him will depend in large part on the full
a. Basic intelligence data must be gathered to utilization of the capabilities of the collection
support combat surveillance and reconnaissance means that are sent out to locate him. During sta-
operations. The minimum intelligence require- bility operations, mission requirements are
ments to support stability operations are listed in broadly stated to allow units engaged in siirveil-
appendix C. These requirements must be satisified lance and reconnaissance maximum initiative and
in as much detail and accuracy as possible to responsiveness to changing situations.
insure an effective surveillance and reconnais-
sance effort. c. Combat surveillance and reconnaissance func-
tions are under the staff supervision of the intelli-
b. The following actions and special training are gence officer. By close coordination and coopera-
begun in Phase I, to be continued, as required, so tion he makes certain that combat surveillance
long as the insurgency lasts. and reconnaissance is integrated into the overall
intelligence collection plan. Further, he closely ordination personnel, host country civilian,
coordinates with sources of information other paramilitary and military personnel, and other
than intelligence collection agencies. This coor- US military and civilian organizations and agen-
dination includes operations and fire support co- cies in-country.
8-3
Cl, m 30-31
erations in Phase I. The number of LRRP should excellent source of information. Police intelligence
be increased as necessary in Phases II and III relies heavily on information supplied by inform-
to satisfy requirements of US major tactical ants. Many of these informants represent the
units. lowest order in the society, particularly in the
more densely populated areas. The police, by their
c. Other Sources. Other intelligence sources very nature, must maintain contact with this
furnish excellent ground surveillance and recon- element of society to collect information. Planned
naissance support. They assist in gathering in- surveillance, observation reports, and infiltration
formation for future requirements as well as of subversive organizations are other techniques
make available information already in their which contribute to police intelligence. As a mini-
possession which may be of value. Available in- mum, these files should include the city or village
telligence sources are indicative in (1) through building and street plan ; subterranean sewer and
(8) below. transportation systems; location of suspected in-
(1) Counterintelligence units can
surgents, provide a and criminals by build-
sympathizers,
good source of contact with local civilians and in- ing or house ; known establishments used for crim-
vestigate suspicious activity that occurs both in- inal or insurgent activities; shops, businesses,
side military areas and within civilian communi- and plants that handle commodities of critical
ties. They also maintain files on people and or- value for criminal or insurgent activities ; and an
ganizations that may serve as further contacts up-to-date census of the area to include names
for ground reconnaissance elements. and number, by sex and age of personnel in
■JV (2) Agent operations can provide a source each building or house. (See FM 19-50 for de-
of information from within the enemy area. Of- tailed information.)
ten agents can penetrate an area and gather in- d. Specialized Organizations. There are other
formation not otherwise obtainable or which specialized organizations that can furnish assist-
could only be procured by indigenous personnel. ance in gathering information. While their
(3) Interrogation efforts by interrogation primary mission is not intelligence, their opera-
sections on prisoners, suspects, defectors, and tions do place them in strategic positions. Some
refugees can produce much new information or of these organizations are—
can assist in confirming or refuting information (1) Special Forces units in-country which
gathered from other sources. may be strategically located astride LOG, adja-
-5^(4) Stay-behind units can observe in- cent to border crossing points, and near identified
surgent forces and furnish scheduled reports of or suspect insurgent areas of operations. They
their sightings. In addition, stay-behind units usually are placed within or adjacent to civilian
may be able to maintain observation for extended occupied areas. One of their major missions
periods and provide highly reliable information. is to advise indigenous troops on patrols and
-£(5) Technical intelligence specialists and combat operations within their local area. Con-
document translators can provide valuable infor- stant contact with the land, its people, and the
mation gathered from enemy documents and ma- various insurgent forces makes these units a
teriel. Items brought back from reconnaissance lucrative source of current intelligence informa-
patrols may furnish additional information once tion.
it has been identified and analyzed by one of (2) US aid-type missions that provide assist-
these specialists. ance to the indigenous personnel of an area.
■5Îr(6) Recovered US personnel can provide These organizations have contact with all types
valid information when properly debriefed by in- of civilians at each level down to the local village
telligence personnel. The fact that he has been and hamlet. Their own personnel are actively en-
trained to observe and retain information of in- gaged in travel around the country. Their refer-
telligence value, and has physically passed ence material, contacts, and personnel all provide
through insurgent territory, makes the US re- a vast amount of useful information.
turnee an excellent source.
(3) The host country government has many
(7) Communications intelligence resources of its own sources of information. The most im-
can provide an all-weather, day and night surveil- portant of these sources are those which extend
lance of enemy communications. through all echelons of the governmental struc-
-fciS) Police intelligence files can provide an ture. The major organizations in this category
Cl, FM 30-31
include host country military and paramilitary AO on a temporary basis to conduct tactical op-
forces, civilian police, local governmental organi- erations. Once these operations are accomplished,
zations, and religious groups. participating units return to their TAOR or de-
part directly to a new AO outside the TAOR for
'À'8-7. Security Considerations further operations. However, even when the bulk
■fra. Frontlines and secure rear areas usually are of a unit is physically separated from its TAOR,
not established during stability operations. Tac- the unit remains responsible for its security. Rear
tical areas of responsibility (TAOR) are as- elements of the unit continue operations within
signed to units within which a base camp is their capabilities, or they may be augmented by
established and permanent responsibility for mili- other forces, to prevent deterioration of the se-
tary control and security is assigned. Subelements curity situation in the TAOR.
are assigned an area of operation (AO) within
the TAOR. All terrain within the TAOR cannot c. Security for a TAOR or AO requires all-
be physically occupied due to the vast size of the around coverage, mostly by visual observation
area involved. Nor is occupation of terrain an and patrolling especially during periods of re-
objective of stability operations. As an alterna- duced visibility. Special sensors and mechani-
tive to physical occupation of the ground, aggres- cal devices, such as ground surveillance radars,
sive ground surveillance and reconnaissance must anti-intrusion devices, night vision scopes, and
be utilized to effect security. searchlights can complement this effort, but all
such equipment has certain limitations, the most
★6. For military operations outside of a unit’s common of which is the requirement for ground
TAOR, another area of operation may be assigned, line-of-sight. Ground surveillance plans will re-
which may or may not be at some distance quire the coordination and employment of all
from the TAOR. A unit moves into this type of available surveillance
8-5
fl
FM 30-31
means, with the preponderance of emphasis on entire area of interest. Tactical operations con-
human resources. ducted to locate insurgent forces, such as search
and seize operations, clearing operations, and se-
d. Tactical stability operations are oriented on curing operations are either ground reconnais-
the enemy rather than on the terrain. Their main sance type operations or depend largely on aggres-
purpose is that of defeating the enemy and al- sive ground reconnaissance to achieve success.
lowing for the extension of friendly control into Their effectiveness will be greatly enhanced if all
the area. A large insurgency area precludes a con- means of ground reconnaissance are employed by
tinuous and complete surveillance coverage of the the troops engaged or in a direct support role.
AGO 7334A
8-5
í
FM 30-31
CHAPTER 9
INTELLIGENCE TRAINING
propriate, with subjects outlined in paragraph of the government in much the same manner that
9-2 military police operations, military tactical opera-
tions, military civic action, and military psycho-
b. During the training program an under-
standing must be developed of what intelligence is, logical operations must be integrated within the
and what it can and must do to assist in the pre- overall government program. The intelligence ca-
vention or defeat of subversive insurgency. It pabilities of the military and paramilitary forces
should be used to augment and supplement the
should focus particular attention upon the nature
and scope of intelligence needed to support the intelligence capabilities of the police and other ci-
vilian agencies during the first phase of insur-
various operational programs of the host country
which are designed to maintain or restore internal gency. Maximum integration of the intelligence
security. In order to build this common under- effort is necessary in order to prevent gaps in cov-
standing of intelligence, training programs should erage, avoid duplication of effort, and produce in-
include consideration of the basic axioms de- telligence that will meet the needs for all opera-
scribed below. tional elements.
(1) Intelligence is essential to internal secu- (4)
rity. Intelligence can provide advance warning of superior to that of the insurgent.
insurgent activity. It can provide the requisite de- (a) The struggle between a subversive in-
tailed knowledge of the insurgent organization, its surgent organization and the constituted govern-
personnel, its plans, and its tactics. It can pinpoint ment of a nation is in every sense an intelligence
the roots and mechanisms of subversion while at war. Throughout the entire development of insur-
the same time identify the causes of popular dis- gency, the insurgent relies heavily upon intelli-
content which the insurgent traditionally exploits. gence to plan and execute measures designed to
It can ascertain popular reaction to both insurgent disrupt, paralyze, and overthrow the constituted
activity and governmental programs. In short, in- govérnment. In fact, effective use of intelligence
telligence provides the critical information which by the insurgent is the key to his survival. The
the government needs to prevent or detect insur- government must not only deny the insurgent the
gency. intelligence he needs to succeed, but it must also
(2) Intelligence is essential to all operations. obtain positive intelligence concerning the insur-
The government of a nation faced with subversive gent organization and all factions within the popu-
insurgency must initiate a carefully planned, fully lation in order to identify and locate subversive
coordinated, and intensively executed program to elements.
maintain or restore internal security. ( b ) From the standpoint of government in-
(3) Intelligence is a responsibility of all gov- telligence and counterintelligence activities, it is
ernmental agencies. most important to detect the first phase of insur-
(a) The clandestine nature of subversive gency. The earlier the government intelligence
insurgency requires a thoroughly coordinated and effort is mobilized and directed toward defeating
controlled intelligence effort on the part of the insurgent activity, the greater will be the proba-
government. All government agencies must con- bility of success. Superior intelligence during the
tribute to the intelligence effort to collect the de- first phase of insurgency can enable the govern-
tailed information and produce the comprehensive ment to eliminate the insurgent movement before
intelligence that is required for internal defense, it erupts into open violence and to initiate reforms
internal development and psychological opera- designed to alleviate popular discontent.
tions. Much of the information requiréd for intel- ( c ) It must be noted that the results of any
ligence purposes can best be provided by civilian intelligence effort are cumulative. If the govern-
governmental agencies which are primarily con- ment intelligence effort is organized and coordi-
cerned with public administrative activities such nated during the first phase of insurgency, the
as law enforcement, public health, public educa- proper groundwork for further expansion of intel-
tion, and revenue collection. ligence activities during the second phase of insur-
(b) Military intelligence activities must be gency will have been provided in the event this
integrated within the overall intelligence program becomes necessary.
APPENDIX A
REFERENCES
m
A—2 AGO 7334A
FM 30-31
APPENDIX B
TYPE COMMUNIST INSURGENT ORGANIZATION
Politburo
m
Central Corwnittae
National Executive
Supreme Headquarters
of
of Military Forces
United (Federated) Front
Fraction
Party Interprov Inter- Moss Civil
Apparatus Party (cellular) Organisations
Committee
Interpro Peopl
Military Party Party Liberation
HQ Youth Revolutionary Committee
Organisation Committee
Fraction
Froi
Party Provincial Inter- Mass Civil
Apparatus Party (cellular) Organizations
Committee
Provincial
Military Party
Youth
Organisation
Party
Rovolutionai
Committee
\=x People s
Liberation
Committee
Fraction
Party District Inter- Mass Civil
Apparatus Party (cellular) Organisations
Committee
District People s
Military Party Party Liberation
HQ Youth Revolutionary Committee
Organisation Committee
Froct
Local (Village/ Mass Civil
Hamlet) Inter* Orgem lotions
Party (cellular)
Cammittaa
People's
I—I Liberation
Committee
Party Chapter
JL
Villege
Party "Control"
Militia Command
Coordination
Cell
control and coordinate their activities. Under this at each echelon of the Party hierarchy. This office
arrangement, the Cell Captain is responsible to is known as the Inter-Party Committee and it is
the First Secretary of his respective Party Group, the supreme Communist organ at its particular
which also consists of an Assistant Secretary and level of organization, responsible only to its coun-
an Executive Committee. Party Groups, in turn, terpart office at the next higher echelon. Like the
are responsible to yet another office which exists Party Group, it also is composed of a First Secre-
NATIONAL LEVEL
Control Commit*«#
First S«cr«tory
Assistant Socrotory
Exocutivo Commit!««
INTERPROVINCIAL LEVEL
Infr-Porty Committ««
PROVINCIAL LEVEL
Inter-Party Committee
DISTRICT LEVEL
tary, Assistant Secretary, and an Executive Com- the Inter-Party Committees at interprovincial,
mittee. The chain of command within the overall provincial, and district levels. Figure B-2 depicts
Party structure is from the Central Committee of a type Party cellular organization.
the Communist Party at national level to each of
AGO 7334A
B—3
FM 30-31
B—3. The Party Committee System national level, control is exercised by the Secre-
a. Although all authority within a Communist tariat of Central Committee.
insurgency movement stems from the hard core b. The Revolutionary Committee may develop
Party cellular organization, functional commit- into a highly sophisticated structure under the di-
tees, composed of both Party and non-Party mem- rection of a secretary, his assistant, and execu-
bers, are required to carry out the Party’s day-to- tive officer. Under these officials will function a
day activities. The primary organization used for Permanent Standing Committee, composed of per-
this purpose is the Party Executive Committee, haps four to ten persons including the secretary
commonly referred to in times of insurgency as and his two principal officers. Subordinate to this
the Party Revolutionary Committee. Like the body a number of subcommittees or sections will
Party’s cellular organization, these committees function, employing 20 or more individuals some
normally exist at national, interprovincial, provin- of whom may be in positions of limited responsi-
cial, and district levels. Below district level, clus- bility. This committee system, together with its
ters of cells perform their daily functional tasks specialized elements, may be conceived as the “di-
under the direction of local village committees. At recting organ” of the insurgency.
Youth
Inter-Group
Committee
Youth uth
Group Group
Committee Committee
c. At each hierarchical level of operation, the membership in the Party proper. This age varies
hard core Party cellular organization, and its between 18 and 26 years.
counterpart Revolutionary Committee, exist side b. A Youth Organization exists at each opera-
by side in interlocking fashion. All Party members tional level of Party organization and the junior
in a given branch or section of the Revolutionary body is structured in a manner similar to its
Committee will be concurrently members of a cell parent cellular organization at each echelon. The
in the Party organization. Since the first alle- lowest element is the subcell, composed of from
giance of the Party member is to his cell, Party three to eight youths ; three or more subcells com-
Group, and Inter-Party Committee, this latter pose a cell; three cells are formed into a Youth
body exercises authority over its counterpart Rev- Group Committee; and two or more Youth Group
olutionary Committee. To insure that the hard Committees constitute the highest operational
core Party apparatus retains this authority, the order, the Youth Inter-Group Committee. Figure
First Secretary of the Inter-Party Committee nor- B-3 depicts a type Party Youth Organization.
mally will act in the dual position as First Secre-
tary of the Revolutionary Committee; however, c. Party youth members may engage in most of
below this level, status in the Party organization the activities conducted by actual Party members
does not necessarily equate with that in the com- in an insurgency, since the youth organization is
mittee. considered a school of training and preparation
i,
for the assumption of inner-Party responsibilities
B—4. The Party Youth Organization at a later date. Therefore, Party youth members
a. The Party Youth will beOrganization
employed to isthethemaximum
third extent possible
parallel structure within the Party Core control in a manner similar to their more experienced sen-
apparatus and is an indispensable affiliate of any iors in order for them to acquire that invaluable
Communist Party. The youth - organization is a experience in the multiple phases of Party work
“halfway” house into which likely future Party which will make it possible to draw them into the
members may be drawn in their early youth hard core of the organization by the time they are
before they reach the required age for candidate of eligible age.
(4) Desires to indoctrinate an unsuspecting as well as from the inability of Party members to
segment of the population with views and pro- conciliate or conceal their attitudes toward so-
grams inimical to the established order. cialist groups which Party doctrine has branded
(5) Desires to create organizations where as “evil” and the “mainstays” of capitalism. The
none presently exist ; calculate to appeal to certain second phase in the development of the United
segments of the population. Front involved a short period where coalition with
(6) Desires to avoid proscription in countries democratic or socialist forces was minimized. As-
where the Communist Party has been outlawed as sociation with such groups was conducted solely
subversive. for the stratetic purposes of neutralizing the so-
(7) Desires to raise funds for Party activities cialist leadership, and gaining access to the rank
and file of these organizations. This phase also
through ostensibly non-Communist organizations.
failed the Communist because it resulted in organ-
b. In general, Communists establish fronts as izational and ideological isolation of Communists
devices for establishing access to and control over from the masses. The present United Front policy
unorganized sectors of the population. In creating deception emerged from these experiences. Com-
such organizational weapons, the Communists munists were directed not to worry about Party
seek to create a useful “mass” by transforming an integrity as the basis of operations ; rather Party
unstructured segment of the population, such as members were admonished to go where the masses
youth, unemployed, intelligentsia, into one which were and employ those conspiratorial methods re-
has an established leadership and effective chan- quired to accomplish Communist objectives. In
nels of communication and mobilization. In most short, the party retreated from open participation
instances fronts employ organizational titles and with other groups, relying more and more on the
advocate causes which appeal to the population covert maneuverability of its cadres and the use of
and are not commonly associated with Commu- infiltration and fronts to mobilize and control the
nism. In many instances these fronts may be masses.
headed or endorsed by respected citizens who are
unwittingly aiding and abetting the Communist B—9. The Federated Front
movement.
a. In an active insurgency an organizational
metamorphosis occurs within the Mass Civil Or-
B—8. The United Front ganization as it is transformed into the “Feder-
a. The term “United Front” refers, essentially, ated Front,” commonly referred to by such titles
to the alinement of all popular mass organizations as “National Liberation Front,” “Peoples Front,”
against an enemy. It has a separate and distinct and “Popular Front.” In effect, this organization
meaning from the word “front” which is derived replaces the United Front and becomes a formally
from the architectural idea of a deceptive façade. structured body with “Liberation Committees” at
The United Front may be formally defined as an each echelon where the Communist Party exists.
organizational arrangement whereby Communists These Liberation Committees, composed mainly of
and non-Communists work together to control an non-Communist members, preempt local govern-
organization, agency, or government. In the last ment administration at village, district, and prov-
named case, the United Front has come to be ince level, replacing de jure administration with
known as “collection government.” In essence, de facto insurgent control.
however, the United Front consists of Commu-
nist-dominated organizations, organizations in the b. The Federated Front normally appears when
process of becoming Communist-dominated, and the Party has achieved some degree of military
organizations which are targets for Communist predominance and controls a majority of the pop-
domination or elimination. ulation within a given area. Communist doctrine
prescribes three prerequisites in any given area
b. The United Front, as it evolved from a rela- for activation of a Liberation Committee. First,
tively straight forward instrument of cooperation insurgent forces must be stronger than those of
with other working class parties and organiza- government forces. Second, mass work has en-
tions in the furtherance of mutual objectives, was, joyed success to a degree leading to a “popular
from the start, doomed to failure. This failure disregard of enemy laws.” Third, the Party
stemmed primarily from the very nature of Com- Chapter organization has resolved the problems
munism which causes it to vie and compete for the characteristically inherent in its first major ex-
leadership of any group with which it associates pansion of membership and has been able to es-
AÜO 7334 A
B-7
FM 30-31
tablish a viable cellular committee structure at the cipal controlling element of the Front. Normally,
village level. ' , the main channel- of communication within the
Front apparatus will run from national to village
c. The Liberation Committee at village level is
level through the Current Affairs Section of each
headed up by an Executive Committee of from
intermediate Liberation Committee. A chart de-
three to possibly seven members. Care is exercised
picting a typical Liberation Committee is shown
to insure that the committee composition includes
in figure B-4.
a representative from each of the principal local
mass organizations. In addition to the Executive e.
Committee, a system of staff, sections is estab- lowing conclusions :
ished which serves to implement the decisions of (1) The entire Party organization, with its
the Liberation Committee. On the,surface this or- multiple subelements and parallel channels of con-
ganizational arrangement appears to be at least trol and supervision, resides within the Front hi-
nominally representative.of the desires of the local erarchy obtaining cover and a popular “mass
population ; however, this is not the case. The Ex- voice.”
ecutive Committee, which ostensibly is charged
(2) Party authority within the Front struc-
with conducting the affairs of the entire Libera-
ture is concentrated in two of the elements of any
tion Committee between its plenary sessions, ’is
given Liberation Committee: the Secretariat, and
certain to include several Party members. In addi-
the Current Affairs Section. It is normally the
tion, the staff sections of the . Liberation Com-
non-Communist Chairman of the Board and other
mittee will consist literally of those functional ele-
well-known members of the Central Committee
ments of the local Communist Party Chapter. In
who figure in news releases, public speech-
this manner, through the military, public health,
making, formal ceremonies, and official visits- of
education, economic, and other sections of the Lib-
front personnel to friendly foreign governments.
eration Committee, the Communist Party executes
As long as the Party is assured control over the
its revolutionary activities'under the guise of the
Front it will stay in the background and allow
popular “will of the people.”
others to articulate the propaganda.
d. Liberation Committees at district level and (3) Any plan which seeks the destruction of
higher normally will be highly structured bodies the insurgent machine must concern itself pri-
composed of four elements—Central Committees; marily with the breaking down of an organization,
Board of Chairmen, Secretariat; and Current-Af- not with the infliction of casualties. The military
fairs Section. The Central Committee normally commander in the field charged with the mission
will consist of representatives of various segments of internal security must necessarily give priority
of the population to give the 'front an appearance attention to the destruction of insurgent military
of democratic representation. The members of this units; however, such operations must be con-
Central Committee are predominantly non-Party ducted within a strategic framework, by which
members representing mass organizations and the insurgents would not be forced back into
lower Federated Front Organizations. The.Board progressively less active forms of subversion, but
of Chairmen, appointed by the Central Committee, by destroying the structure which would permit
is composed of the Chairman, Vice-Chairman, and an orderly retreat into a temporary state of dor-
Commissioner(s). This group presents to the mancy. This means that intelligence personnel
public the image of the Front, and its Chairman must determine an insurgent member’s Party, as
(normally a non-Communist) will usually serve as well as Front status, and within the Party, his
the Committee’s key spokesman. The Secretariat, political cellular, as well as his revolutionary com-
appointed by the Board of Chairmen, is composed mittee position. The importance of such informa-
of a Secretary General, Deputy Secretary General, tion stems from the fact that the insurgency ends,
and Commissioner of the Secretariat. This body not with the disappearance of the guerrilla, but
performs functions associated with the overall with the destruction of the apparat which spawns
management of the Front’s activities as well as the guerrilla.
translating into directives the instructions of the
Central Committee or its agents. Finally, the Cur-
rent Affairs Section, appointed by the Central B—10. The Village Militia
Committee, maintains operational control over the a. The Village Militia should not be thought of
specialized staff sections of the Front. The Cur- as inferior military forces which only work part-
rent Affairs Section may be considered the prin- time, but rather as elite formations within the
CENTRAL COMMUTEE
Board of Chairmen
Contains Party and non>Party mass organiza-
tion leaders, prominent local figures, and
representatives of ethnic, occupational, and
Chairman
Vice-Chairman
n
other segments of society. Commissioner(s) I
(appointing
authority)
Civil and
Enemy
Military Organizational Proselyting
Proselyting Branch Branch
Branch
mass civil structure. Three distinct paramilitary- Party in a given area and is composed to a large
elements appear to exist in the Village Militia : the degree of Party members.
Self Defense Forces, Combat Guerrilla Unit (Lib- c. The individual enrolled in a village guerrilla
eration Troops), and the Secret Guerrilla Unit. unit is normally a volunteer, although occasionally
b. The Self Defense Force normally is organized young men are coerced into service. In most small
for, and trained and employed in, the defense of villages where there are few secrets, the identity
villages and other insurgent facilities, whereas of the members of the Village Militia undoubtedly
the guerrilla force constitutes the local instrument is known to most of the inhabitants; however,
for both inflicting damage on the enemy and fear of brutal reprisals keeps them quiet. The vil-
gaining and maintaining population control. The lage guerrilla is, therefore, not readily identifiable
Combat Guerrilla Unit of the Village Militia is to government forces. He operates in or close to
used by the Party in the support of regular insur- his home village, sometimes in conjunction with
^ gent military forces or independently in small op- regional and main force units. By day, he works at
erations. The Secret Guerrilla Unit, on the other his normal job; at night, or in emergencies, he is
hand, is used primarily in enforcing the will of the available for assignment by his Party superiors.
AGO 7334A
B—9
FM 30-31
The insurgent leadership likes to have at least 5 to insurgent movement within the village community
10 guerrillas in each village. In those villages in which he lives. He provides a labor force for the
under insurgent control, a full squad of 10 to 17 transport and storage of food and equipment,
personnel or a platoon of from three to four such thereby playing a part in the very flexible insur-
squads is usual. A type village guerrilla platoon is gent logistical system. He is responsible for the
shown in figure B-5. protection of Party cadres visiting his village and
d. In the early stages of his development, the the provision of assistance to regional forces or
village guerrilla does not receive much formal mil- special Party groups carrying out sabotage,
itary training and participates in military action terror, propaganda, and murder in and close to his
only in emergencies or when specifically required village. For a variety of reasons many individuals
to play a supporting role to regional or main force will not qualify for membership in the insurgent
military activities. The majority of his training is regular forces, but will continue to serve in the
committed to political indoctrination. He is taught ranks of the local guerrillas indefinitely. Others
to obey unquestioningly. He provides an effective will demonstrate a degree of political under-
intelligence screen by passing on all information standing and reliance and efficiency in their work t
available concerning the movement of government which will insure graduation to the regional
forces and is in fact the “eyes and ears” of the forces.
AGO 7334A
B—10
FM 30-31
INTER-PARTY (CELLULAR)
COMMITTEE
PARTY
REVOLUTIONARY
COMMITTEE
Current Affoirs
Committee
Military
Other
Affoirs
Committees
Committee
Headquarters
Military
Command
neis, one for Party affairs and the other for mili- c. The Staff Division.
tary matters. These two channels, Party and mili- (1) In discussing the formal structure of a
tary, merge at the Inter-provincial Inter-Party Communist military organization there does not
(cellular) Committee level. A schematic of this in- appear to exist any standard structure which
terlocking organizational arrangement is shown in might universally serve to identify that particular
figure B-7. staff office or operational unit which usually will
AGO 7834A
B—12
FM 30-31
Interprovinciol
Inter-Porty (cellular)
Corn mitfee
Party
Interprovinciol
Revolutionary Committee
Party
Group
Current Affairs
Committee
cell
Party
Group
Military Other
Affairs Committees
Committee
lnter*Porty Committee of
Inter-Porty Committee of
Military Nr. 1
Military Nr. 2
Headquarters
interprovinciol Military
Force
I
Party
r-
C i
Party
+-
I
T
I
Ú
Group Party
Group B
Group
Staff Political Logistics
Division Division '
Party
Party Groups established within
Group ■ Party channel of control
□
subordinate sections which report
directly to Inter-Porty Committee
Military chain of command
I- .a
Party organs
AGO 7884A
B-13
FM 30-31
Inorpiovinc ial
Inter-Party (cellular)
CommrlJcc
Pur 1y
Revolutionary Committee
^ Headquarters
Interprovmcial Military
_ Forces
4
G'ci p
rc
i Political
^ i
r^.
J Logistics ■
Division ^ Division ^ '
^
cell
> K >
L. _ -I
□
Party
P—^ PGroup
arty
Group
Military Administrative
Guard Company
T'ominq Scboo Section - H
Er.e~y S'tuotion
Section Section --
cell
1
Party Po’ty Liaison and
Group Group Commun icat ions
Section
Special Mission
Company
cell cell
Paiiy
Group
Signal
Art•I le:y - J
r Section
Campan
cel I
Group
4-
Engineer Engmee
Company ¥ Section
cell
Party organs
AGO 7334A
B—14
FM 30-31
perform a specific function. Even within a given counterpart, Guerrilla Warfare Research Center,
insurgency, the composition of major headquar- engage in the conduct of research and experimen-
ters, while similar, do differ. Highly pragmatic, tation in the use of guerrilla tactics by Village
Communist doctrine provides for centralized com- Militia Forces and conduct short training courses
mand and control and decentralized operations. in guerrilla warfare.
This does not mean, however, that the Communist (6)
leadership cannot, when it wishes, intervene in the port section is similar to the G-l or personnel and
conduct of activities of subordinate units at any administration section of a conventional military
level without prior notice. headquarters. The Crypto Section is a small ele-
(2) Two major sections exist within the Staff ment concerned with the decoding of messages to
Division of the Main Force Organization—the be relayed in large part by radio. The Liaison and
Combat Training and Body Guard Section Communications Section exercises staff supervi-
(CTBG), and the Support Section. The CTBG has sion over the Signal Company which is almost ex-
the responsibility for the basic training of recruits clusively involved in the transmission of military
in Main Force units as well as for the administra- orders and information—the Party’s own commu-
tion and assignment of guard personnel. The Sup- nication network being used for Party commu-
port Section performs those roles denoted in the niques.
titles of its subsections. Shown in figure B-8 are d. The Political Division.
the Party channels of control in which Party (1) The Political Division of a Main Force
Groups, assigned to certain sections and opera- Headquarters presents a strikingly simple organi-
tional units, are directly responsible to either the zational picture compared to the complexities
supreme Inter-Party (cellular) Committee or the characterizing the Staff Division. Figure B-9
Inter-Party Committee of the Military No. 1. It shows a type Political Division. No one subsection
will be noted in figure B-8 that three separate contains Party elements higher than the cell, and
channels of Party control exist within the military all Party members are responsible to the same
structure. One leads directly to the supreme In- Party Group First Secretary who will also be the
ter-provincial Inter-Party (cellular) Committee; Division Chief. Thus, the Party and military com-
the second leads directly to the Inter-Party Com- mand channels are fully in accord with one an-
mittee of the military; and the third leads to the other and the reins of authority are vested in one
Party Group of the Staff Division. In other in- individual. The Organization and Cadre Sections
stances, Party Cells exist within other sections perform tasks pertaining primarily to Party ac-
which are responsible to the Party Group situated
tivities within the military structure. The Organi-
within the Staff Division. This rather complex ar- zation Section prepares instructions and orders
rangement insures that the Party leadership can for Party and Party Youth Groups, maintains rec-
maintain absolute control over its Party appa- ords and dossiers on Party military personnel, and
ratus as well as the military bodies in which this officiates at public observances and ceremonies.
apparatus is imbedded. The Cadre Section performs mainly personnel ac-
(3) The Enemy Situation Section in a modi- tions including assignments, promotions, and de-
fied sense approximates the G2 or Intelligence motions of Party members.
Staff Section of a conventional military force; (2) The Propaganda and Training Section is
however, its responsibilities extend into other charged with the ideological education of troops as
areas as well. It is here that the personnel of well as general literacy development. Closely allied
“Armed Propaganda Teams” may be found. The in mission is the Security Section which investi-
Communist Party, fully conscious that its ability gates the loyalty and ideological purity of Party
to dominate the mass civil structure, maintains personnel singled out as suspect by the Propa-
this capability by including terrorist elements in ganda and Training Section.
its military structure. The Enemy Situation Sec- (3) The Enemy Troop and Civilian Propa-
tion, employing as its action units the Reconnais- ganda Section engages in propaganda activities
sance Company and the two or more Special Mis- designed to win over the support of the civil popu-
sion companies, performs this specialized role. lation and to cause defection within enemy mili-
(4) The Artillery and Engineer Staff and op- tary ranks. It also has the responsibility for mili-
erational units perform the conventional roles tary civilian liaison and coordination.
their titles denote. e. The Logistics Division.
(5) The Militia and Guerrilla Section and its (1) The Party apparatus imbedded in the Lo-
AGO 7334A
B—15
FM 30 -31
Inter-Party Committee
of Military Nr. 1
To Party Interprovincial
Revolutionary Committee
Headquarters',
Interprovincial Military
Force
Party
Group
L
Staff Political Logistics
ivision Division Division
cell
L
•“Organization •’
Section
H
cell
Military chair
of command
Cadre
Secti
cell cell
Party channel
of control
• Training and a
Propaganda
Section
cell cell
Military staff
offices
Security
Section H
Party organs
"‘""‘Enemy Troop
Civilian Propaganda
Section
cell cell
gistics Division is depicted in figure B-10. The Military exists in this Division as in the other two
Logistics Division is responsible to the Inter- staff divisions.
Party Committee of the Military No. 2. The same (2) With few exceptions, the tasks performed
distinctive interrelationship between Party and by the several sections of this division are ap-
Interprovincial
Inter-Porty (cellular)
Commi ttee
♦
■
Headquarters
Interprovincial Military
Force
Party
Group
"v^i
Staíf ■ i Political Logistics
I Division • ' Division Division
K K 'H
r Party
Quartermaster Group
Dispensary
^ Section
Nurse Party
Medical Group
Training
Section
School
cel I cell
Party
Clothing Items “ Driver
Group
Section • Platoon
Party
Equipment Group
Machine Shop
. Section
cell cell
Finance ' J
Section '
i Mi tmm Military chain oí command
I I Party organs
parent from their, titles. The Clothing Items Sec- Forces are under the control of the Party’s Pro-
tion, in addition to the role which would be clearly vincial or District party apparatus. Normally con-
assigned to such an office, is also the source of sisting of units no larger than battalion in size,
currency issued to military units for the purchase it is these Regional Forces which conduct most
of clothing which it cannot supply. The Finance of the activities normally thought of as “guer-
Section has the additional duty of providing tech- rilla” warfare.
nical guidance on farmwork. Finally, the Equip-
b. The Provincial Revolutionary Committee and
ment Section is charged with controlling a series
of machine shops which manufacture much of the its corresponding Military Headquarters approxi-
equiment needed by military field units. mate in organization their Interprovincial supe-
rior bodies, but will tend to be somewhat more
simple in structure, depening upon the
B—14. The Regional Forces immediate tactical situation and the numbers of
a. Similar to the Main Forces, which normally capable personnel available. Similar to the control
are controlled by either the Interprovincial or a exercised by the Party over its subordinate level
national level Party organization the Regional organizations, the Provincial Military Headquar-
Bottai ion
Commander
Political Executive
Officer Officer
ters will control Regional Forces at the District panies—three infantry and one heavy weapons.
level through channels comparable to those Although not indicated in figure B-ll, the bat-
leading down from the Interprovincial Military talion headquarters may have attached signal, re-
Headquarters. This authority does not, however, connaissance, and engineer platoons. Additional
extend down to the Village Militia which remains platoons may also function from this level to pro-
under the control of the Village Party Chapter. vide liaison with rear service agencies, and con-
duct special mission assignments and other re-
c. The organizational structure of the actual op- quirements as the need arises. The companies, in
erational units of the Regional Forces tends to turn, are divided into platoons, squads, and three-
conform with traditional western military units man military cells or elements. The lowest level of
in that a staff exists to support three or four military organization—the cluster of three sol-
combat elements. The chart shown in figure B-ll diers—should not be confused with the Party cell.
is considered typical or an insurgent independent Its members are not necessarily Party members,
battalion. and, if they are, they will belong to a Party cell in
d. Such a battalion normally contains four com- addition to, not instead of, the military cell.
APPENDIX C
INTELLIGENCE REQUIREMENTS LISTING FOR STABILITY OPERATIONS
APPENDIX G
COMBAT SURVEILLANCE AND RECONNAISSANCE
REQUIREMENTS FOR STABILITY OPERATIONS
PHASE I
Level of responsibility Minimum requirements
National (NIDCC) 1. LOC studies.
Subnational Area Coordination 2. Terrain studies.
Center
3. Trafficability analyses.
4. Soil analyses and erosion control.
5. Plans for urban and agricultural
growth ; relocation requirements.
6. Study of international boundaries
for border violations.
7. Study of potential LZ and DZ to
disclose possible use by insur-
gents.
8. Observation of demonstrations and
riots for suspected insurgents.
9. Mapping, map stockage, and map
supplements.
10. Detection of insurgent supply
caches from photography and
ground reconnaissance.
11. Planning training of tactical units
in surveillance means and capa-
bilities ; use of surveillance equip-
ment.
12. Coordinating the use of TAOR re-
sources available for in-country
support.
13. Collection of target data on known
or potential insurgent force base
areas, logistical supplies, train-
ing areas, infiltration routes, and
food production areas.
Tactical Unit and/or U.S. 1. Support of the surveillance effort
Advisor to Host Country Unit within area of responsibility by
utilizing the unit’s total surveil-
lance capabilities.
2. Assisting in the training of in-
digenous units in combat surveil-
lance and reconnaissance.
AGO 7884A 0-1
FM 30-31
AGO TS84A
G-a
FM 30-31
APPENDIX H
FM 30-31
AGO 7884A
H-13
!
F
t
f
I
l
I
î,
li
I'
f,
I
FM 30-31
INDEX
Paragraph Page
Advisory functions 5-7, 5-8, 6-12c, 5-
8-6d(2) 6-
Advisory intelligence training 9-3 9-1
Aerial reconnaissance and surveillance:
Airphotos 4-86, 7-14»(6), 4-2, 7-9, 7-12,
7-18»(3),8-9 8-5
Functions 8—8» 8-5
General 6-8c 5-
Agencies (collection) (see Sources)
Agent operations 8-6c(2) 8-4
Agricultural factors:
Intelligence indicators E—2d(l), E-3, 7-11
7-15d(l)
Intelligence requirements C-46 C-l
Air weather service 2-7c 2-4
Area coordination center:
Communication facilities 7-256 7-20
Dissemination function 7-25, e-76 7-20, 6-2
Missions 7-25, App G 7-20, G-l
Surveillance requirements 8-4» 8-2
Area study :
General 7-246(1) 7-19
Intelligence requirements App C C-l
Updating 7-186(4) 7-13
Army intelligence operations:
Advisory functions 5-7, 5-8 5-
Combat support 5-8, 6-6, 6-13 6-3, 6-2, 6-5
Missions 6-2, 6-12» 6-
Training 6-12c 6-
Unilateral requirements 6-3 6-1
Base camps 2-5 2-3
Capabilities (insurgent) :
Analysis ? 2 3-1
Basic 8-4—3-8 3-
Counterintelligence 7-16 7-11
Guerrilla warfare 3-7 3-2
Infiltration 7-16» 7-11
Intelligence 4-3, 2-13 4-
Intelligence requirements App C-9/ C-3
Reinforcement 3-13, 3-14 3-4
Supporting 3-9—3-12 3-3
Tactical 3-8,4-8 3-3, 4-2
Civil affairs:
Civic liaison 7-96 7-6
Intelligence liaison 7-9» 7-6
Personnel 7-96 7-6
Clandestine intelligence 7-136 7-8
Collection of information:
Agencies (see Sources)
Collection plan 7-7d, App F 7-6, F-l
Combat surveillance and reconnaissance 4—7c, 4-8, 4-9c, 8 4-2
Counterintelligence 8-6c(n 8-3
General 7-11 7-6
Paragraph Page
Collection of information—Continued
Interrogation 5-8c 5-3
Sources 4-96, 7-7, 8-6 4-3, 7-4, 8-3
Collection plan:
Contents 1- 7-
Format App F F-l
Combat reconnaissance and surveillance:
Capabilities 8-3o, App C 8-2, C-l
Development 8-3 8-
Effects of terrain 8-2d 8-2
General 4-7c, 4-8, 4-9c, 4-3, 4-3
7-166(1) 7-11
Limitations of weather 8-2(2 8-2
Requirements 8-4, App G 8-2, G-l
Responsibility 8—4c 8-2
Roles (missions) 8-46 8-2
Supervision 8—4e 8-2
Combined intelligence :
Agreements 6-9,6-2, 6-4 5-
6-1, 6-2
Centralization 6-5 6-
Coordination 6-4, 6-5, 6-120. 6-2, 6-5
Planning 6-4, 6-5 6-2
Priorities 6-4 6-2
Command and control (insurgent) :
Communist App B-12 B-ll
Native leadership 2- 2-2
Organizational structure 4-5 4-1
Commodity intelligence indicators App E-2c2 E-2
App E-3(2 E-6
Communications (friendly) :
General 7-256 7-20
Use in ACC 7-256 7-20
Use in intelligence dissemination 7-256 7-20
Communications (insurgent) :
Couriers and messengers 4-4 4-1
Equipment 2-46(2) 2-3
Requirements 4-6 4-
Communications (general) :
Effects of terrain 2-9 e 2-5
Effects of weather 8-2d 8-2
Communist insurgent organization :
Cellular compartmentalization App B-2e B-l
Cellular structure App B-2 B-l
Command and control App B-12 B-ll
Front organization App B-7-9 B-7
Infiltration techniques App B-6 B-6
Main force structure App B-13 B-ll
Mass civil organization App B-5 B-5
Military forces App B-ll B-ll
Party committee system App B-3 B-4
Party youth organization App B—4 B-5
Village militia App B-10 B-8
Coordination centers (intelligence) 6-7 6-2
Counterintelligence :
Activities 8-6c(l) 8-3
Countersubversive measures 7-136 7-
Files 8-6c(l) 8-
Insurgent 7-16 7-11
Intelligence support 5- 5-
Sources 8-6c(l) 8-3
Countersubversion 7-136 7-8
Country team 6- 6-
Couriers (insurgent) 4-4 4-1
AGO 7884A
Index—2
FM 30-31
Paragraph Page
Defectors (insurgent) 7-12 h 7-7
Dissemination of information
Area coordination center 6-76, 7-25, App G 6-2, 7-20, G-l
Area studies 7-246(1), App C 7-19, C-l
Estimate of insurgent situation 7-246(2), App D 7-19, D-l
General 7-23—7-25 7-19—7-20
Documentary data base 5-3 5-1
Documents :
Area study 7-246(1) 7-19
Biographical data 7-246(2) 7-19
Estimate of insurgent situation 7-246(2) 7-19
General 7-24 7-19
Intelligence 6-3d, 7-146, 5-1, 7-9, 7-19
7-246
Lists of suspect targets 7-246(3) 7-19
Police reports 7-246(1) 7-19
Enemy situation :
Estimate of insurgent situation 7-246(2) 7-19
Indicators App E-2, App E-l, E-3
E-36
Intelliger"« requirements App C-2 C-l
Economy :
Intelligence indicators App E-2d, App E-2, E-6
E-3d
Intelligence requirements App C—4 C-l
Environmental indicators App E-2e, App E-3, E-7
E-3e
Essential elements of information (EEI) _ 7-5 7-3
Estimate of insurgent situation 7-246(2), App D 7-19, D-l
Evaluation of information 7-19 7-13
Files and records:
Area study control copy 7-186(4) 7-13
Current propaganda and PSYOP file 7-186(2) 7-13
General 7-18 7-11
Hot file 7-186(1) 7-12
Incident file 7-18a(l) 7-12
Organizational file 7-20a(3) 7-14
Personality and organization file 7-186(3) 7-13
Police reports 7-246(1) 7-19
Reference material 7-186(6) 7-13
Resource file 7-186(5) 7-13
Suspect personality file 7-20a(2) 7-14
Foreign aid (insurgency) 1-Pd 1-4
Front organizations (communist) App B-7—B-9 B-6, B-7
Ground surveillance and reconnaissance:
Agencies 8-6 8-8
Equipment 8-7c 8-4
General 8-5 8-3
Planning considerations 8-7 8-4
Security missions 8-6a 8-3
Guerrillas (see Insurgents)
Guerrilla operations l-6c, d, 3-7, 1-3,1-4,3-2,
8-26 8-1
Health factors:
General 2-9g 2-5
Intelligence requirements App C-5d C-2
Host country :
Economy 3-56 3-2
Ethnic factors 2-llc, d 2-6
Governmental 2-116 2-7
Intelligence coordination centers 6-7—6-9 6-2—6-3
Intelligence requirements 6-3, 6-4 6-1—6-2
Paragraph Page
Host country—Continued
Intelligence sources 8-6d(3) 8-
Intelligence training 9-4 9-
Internal defense organization 6-1, 6-7—6-9 6-1
6-2
Local area coordination center 6—9a 6-3
National intelligence structure 6-8 6-3
Police forces 6-96 6-3
Popular support 2-10d, 2-11, 2-6, 2-8
2-13d
Traditions 2-12c 2-7
Vulnerabilities l-6c, 2-12c, 6-9c 1-1, 2-7, 6-4
Hot file 7-186(1) 7-12
Imagery interpretation 5-8c 5-3
Incident file 7-20a(l) 7-14
Incident map ^— 7-18a(l) 7-12
Indicators (intelligence) :
Commodity indications App E-2d, App E-2, E-6
E-3d
Environmental App E-2e, App E-3, E-7
E—3e
General 7-6, 17 7-4, 7-11
Insurgent activities App E-26, d E-l, E-2
Population App E-36 E-3
Propaganda App E-2c E-2
Infiltration :
General 7-16a 7-11
Insurgent techniques (communist)' App B-12 B-ll
Informants 7-156(2) 7-11
Infrared (see Aerial reconnaissance and surveillance)
Insurgency :
Armed forces l-6c, d 1-
App B-ll
Base camps 2-5, 4-2a, 2-3, 4-1
Capabilities 3 3-
Characteristics l-4a,6 1-
Clandestine operations 2-3a(2), 2-4c, 2-2, 2-3, 7-8
7-136
Command and staff 2-3, 4-5, App B- 2-
12
Communications -, 2-46(2), 2-9e, 2-3, 2-5, 4-1,
4-4, 4-5, 4-6, 4-2, 7-8
7-13c(2)
7-16 7-11
Counterintelligence
Development . 1-6 1-2
Finances 2-3a(6), 7-13/(l) 2-
l-6c, d, 3-7, 8-26 1- 3, 1-4, 3-2, 8-1
Guerrilla operations
7-16a 7-11
Infiltration techniques —
4-3,7-136 4-1, 7-8
Intelligence agencies
Intelligence operations 2-3a(2), 2-4c 2-
4-3 4-
Intelligence requirements
Intelligence sources 4-3,7-136 4-1, 7-8
Leadership 1-76, 2-36, 4-56 1-
Logistics 2-3a, 2-46(3), 2-
4-7, 7-13/, 7-22 7-9, 7-17
6(6)
Objectives 1—4c 1-2
Organization 2-2, 2-3a, 4-5, 2-
App B B-l
Political activities 3-5a, 4-7—4-9, 3-
Popular support 7-4c, 7-13d, /, 7-3, 7-8, 7-9,
App E-26 E-2
Propaganda 1-66(2), 2-126, 1-2, 2-7, 2-8,
2-13d, 3-5, 7- 3-
13c(2)
AGO 7884A
lndex-4
FM 30-31
Paragraph Page
Insurgency—Continued
Propaganda indicators App E-2c E-2
PSYOP activities 7-13c 7-8
Recruitment 2-3o(l), (4), 7— 2-2, 7-8, B-9
13e, App B-lOc
Rival insurgencies 1- 1-
Subversion indicators . E-26(3), 1-66, c, E-2, 1-3, 2-6,
Subversive activities 2-106, c, 2-13c, d, 2-8, 3-2, 7-8
3-5, 7-13c
Tactics 2-3a(3), 4-8c, 7- 2-2, 9-3, 7-8,
13e, 7-226(5 j, 7-17, H-l
App H
Training 2- 2-2, 4-3
226(5), 7-13e, 7-16, 7-8, H-l
App H
U.S. Army Role 1-56, 5-16, 5-6, 1-2, 5-1, 5-2,
5-8, 5-9a, 6-10 5-3, 5-8, 6-4
U.S. Policy 1-56, 6-26 1-2, 6-1
Vulnerabilities l-7c, 4-1—4-9 1-
Insurgents :
Captured 7-12Í 7-7
Characteristics 2-la, d 2-
Defectors 7-116. 7-6
Morale 2- 2-1
Training 2-lc, 2-3a(3),4- 2-
8c, App B-lOd B-10
Insurgent situation map 7-18a(2) 7-12
Intelligence :
Advisory elements 5-7, 5-8, 6-12c 5-2, 5-3, 6-5
Agencies 7-7, 8-6c 7-4, 8-4
Basic 5-3 5-1
Civil affairs 7-9 7-6
Clandestine operations 7-136 7-8
Collection 7- 7-2—7-11
Command responsibility — 5—4c, 5-5c, 7-3 e 5-2, 7-2
Coordination 9-46(3) 9-2
Current 5-5 5-2
Cycle 7-16 7-1
Dissemination 5-5c, 7-22—7-24 7-14—7-19
Documentary data base 5-3 5-1
Documents 5-3d 5-1
Estimates 7-3, App D 7-2, D-l
Files and records : 7-186 7-12
Indicators 7-6, 7-13, App 7-4, 7-8, E-l
E-2
Management 7-4d 7-3
Order of battle 7-22 7-14
Overt 7-136, 7-226(7) 7-8, 7-18
:
Pattern analysis techniques 7-2 7-1
. Personnel 9-2a 9-1
Planning 3- 3-
7-4—7-9, 6-11 7-2—7-6, 6-4
Priorities 7-5 7-3
Processing information 7-17—17-22 7-11—7-14
Psychological operations 7-8 7-5
Reports 5-4a, 5-56, 7-3, 5-2, 7-2, 7-19
7-246
Requirements 5-1—5-9, 6-11, 5-1—5-3, 6-4,
7-4, App C-7, 7-2, C-2
C-8
Security 4- 4-
Sources 4-96, 4-7c, 4-8, 7-1, 7-4, 7-7,
7-7, 7-12, 7-14, 7-9, 8-3
8-
Paragraph Page
Intelligence—Continued
Strategic 5-3, 6-11 5-1, 6-4
Tactical 5-8c 5-3
Intelligence estimate 7-3, App D 7-2, D-l
Internal defense l-5c, 1-2 1-2
Interpretation of information 7-21 7-14
Interrogation 5-8c 5-3
MAAG 6-11 6-
Maps 7-18 7-11
Messengers 4-4 4-1
Military intelligence detachments 5-8c, 6-136 5-
Military police operations 7-10 7-
Militia (insurgent) 8-26, App B-10 8-1, B-8
Morale (insurgent) 2-lc 2-1
Paragraph Page
Police forces (indigenous) 6-96(4, 5), 7-15 6-3, 7-10
a, b
Political indoctrination App B-10d B-10
Populace :
Discontent 2-1 la, 3-5c, 7- 2-6, 3-2, 7-8
13c, e
Ethnic groups 2-llc, d, 2-10, 2-6, 2-7, 2-8
General 2-11, 2-12c, 2-136
Intelligence indicators App E-36 E-3
Intelligence requirements App C-8 C-3
Intelligence source 7-12 7-7
Literacy 2-1 Ij 2-7
Logistical support to insurgents 4-9 4-3
Population status map 7-18a(4) 7-12
Processing information:
Evaluation 7-19 7-13
Files and records 7-186 7-12
General 7-17—17-22 7-11—7-14
Integration 7-20 7-13
Interpretation 7-21 7-14
Recording 7-18 7-11
Propaganda activities (insurgent) :
General 1-66(2), 2-126, 1-2, 2-7, 2-8,
2-13d, 3-5, 7-12c, 3-2, 7-7, 7-9,
7-14a(5), App B- B-10
10e
Psychological operations 7-8, 7-13c, App 7-5, 7-8, D-l
D-2e
Publications 7-146(2) 7-9
Recording information 7-18 7-11
Recruitment (insurgent) 2-3a(14), 7-13e, 2-2, 7-8
App B-lOc B-9
Reports :
Intelligence 5-4a, 5-5b 5-2
Intelligence estimate 7-3, App D 7-2, D-l
Resource file 7-186(5) 7-13
Sociology :
General 3_5c 8-2
Intelligence requirements App C-5 C-2
Sources (collection) :
Advisory mission 8-6d(2) 8-4
Agent operations 8-6c(2) 8-4
Availability 7_7 7-4
Collection plan 7-7d 7-
Combat units 8-6¿ 8-
Counterintelligence 8-6c(l) 8-3
Defectors 7-126- 7-
Host country government 8-6d(3) 8-
Informants 4-96, c 4-3
Insurgent 4-3, 7-136 4-1, 7-8
Liaison 7-76 7-
Patrols 8-66 8-
Requests for information 7-7c 7-5
Selection 7-7 7-
Special forces 8-6d(l) 8—
Technical intelligence 8-6c(5) 8-4
U.S.' Army returnees 8-6c(6) 8-1
Special Forces 8-6d(l) 8-1
Stability operations :
Combat surveillance and reconnaissance 8-2a 8-1
Ground surveillance and reconnaissance 8-6 8-3
Intelligence priorities 7-56 7-
Intelligence requirements 5-ld, 5-4c, 7-4c 5-1, 5-2, 7-3
Patrolling 8-66(2) 8-
AGO 7884A
lndex-7
FM 30-31
Paragraph Pase
State Department 6-10 6—
Statement of intelligence interest 6—46 5-2
Subversion (insurgent) :
Economie 3-66 3-2
General 1- 1-
2-13c 2-8
Indicators App E-26(3) E-2
Political 3-5 a 3-2
Sociological 3- 3-2
Terroristic activities 3-6, 7-166 3-2, 7-11
Subversive insurgency 1- 1-2
Suspect personality file 7-20a(2) 7-14
TAOR (Tactical area of responsibility) 8—7a 8-4
Tactics :
Conventional , 3-8 3-
Countersubversive 8-7d 8-6
Guerrilla 2- 2-
4a, 2, 3-7,4-8, 3-
7-226(4)
Intelligence requirements 5-8 c 5-3
Technical intelligence 6-8c, 8-6c(5) 5-3, 8-4
Terrain :
Factors 2-9 2-5
Intelligence App C-6 C-2
Objectives 2- 2-5
Terroristic activities 2-106, c, 2-13c, 2-6, 2-8, 3-2,
3-6, 7-166 7-11
Training (insurgent) :
Indoctrination 2-7—2-13e, 7-22 2-4—2-8, 7-17
6(5)(6)
Recruitment 7-13e 7-
Rehearsals 4- 4-
Tactical 2-3a(3), 7-226 2-2, 7-17
<5)(a)
Training (intelligence) 9-1—9-4 9-1, 9-2
Training (requirements) 9_2—9-4 9-1, 9-2
Transportation intelligence requirements . App C-4f7 C-l
U.S. Information operations (in-country) :
Advisory assistance missions 5-7, 5-8, 6-12c 6-2, 5-3, 6-5
Country team 6-10 6-4
Intelligence training assistance 6-6 6-2
Logistical support 5-8a 5-
Military intelligence detachments 5-8c, 6-136 5-
Policies 6-2, 6-12a 6-
Tactical support 5-8a, c, 6-13 5-3, 6-5
Training activities 6-12c 6-
Unilateral requirements 6-3 6-1
Vulnerabilities :
Host country 1—6c, 2—12c, 6—9c 1-3, 2-7, 6-4
Insurgent l-7c, 4-1—4-9 1-4, 4-1—4-3
Weather:
Effects on communications 8-2d 8-1
Effects on ground reconnaissance 8-2 d 8-1
General 2-6 2-4
Intelligence requirements App C-6c C-2
FM 30-31
W. C. WESTMORELAND,
General, United States Army,
Official : Chief of Staff.
KENNETH G. WICKHAM,
Major General, United States Army,
The Adjutant General.
Distribution :
To be distributed in accordance with DA Form 12-11 requirements for Combat Intelligence.
#
AGO 7834A *U. S. GOVERNMENT PRINTING OFFICE : 1970 '390-807/7334
I
\
)
r
r¡*
ÍSÜi
*
>1
►
• • •
§
09
0»
>
Figure F—l.
Will the .insurgents en* Recent (lest 6 months)
goge in nonviolent te- Insurgent political ac-
(1) Identify provincial leaders of Radical Reform Party 9
ll ana’ If so. «bel. «ben. tivities
wbere end bow’ (2) Report all recent activities of the party
&
(3) Report current plans and ultimate objectives of the
party
Recent (last 6 months) (1) Identify leaders of the Peoples' Democratic Labor 9
the torturers
c Recent cases of extor- (1) Report the identity of Individuals who have been the
object of extortion, their positions, the purpose of
9
tion
the extortion, means used, and the identity of the
extortioners
d Recent kidnappings (1) Report the identity of individuals who have been
kidnapped, their positions, why and how they were
9 9 i ®
kidnapped, and the identity of the kidnappers
e Recent sabotage (1) Report objects which have been sabotaged, reasons
for and results of the sabotage, how sabotage was
9 9 0® ® a. 0 &&
accomplished, and identity of saboteurs
Will the insurgent. en-
gage In terrorist ac-
Recent harassment di-
rected at the govern-
(1) Report individuals or government forces that have
been harassed, purpose and results of the harass-
& 9
tions’ If so. what, when, ment or the population ment. and Identity of and methods used by individ-
where and how’ uals who conducted the harassment
Z
E
FM 30-31
Will the insurgents en- Formation of insurgent (1) Report location and activities of insurgent regimen
gage in conventional
tactical operations? If
military forces of regi-
mental size.
tal headquarters and subordinate units. X
so, what, when, where,
and how?
will the insurgents en- Recent insurgent intel (1) Report insurgent intelligence collection activities-
gage in activities to sup- ligenre and security targets of the activities, methods rmploved, person
port nonviolent action,
terrorist action, guerrilla
activities. nel involved (friendly and insurgent). 8$0X X X X XX
Figure F-l—Continued.
operations, or conven-
(2) Report methods used by the insurgents to deny m
tional tactical opera-
formation to the government concerning their loca
tions? If so, what, when
tion, personnel, organization, installations, activi
where and how’
ties, and plana. 888
b. Recent recruitment and Report all attempts (successful and unsuccessful)
retention of elements of by insurgents to recruit members of the local popu-
the provincial populace lace—identify individuals and groups contacted bv
by the insurgents. the insurgents, insurgent methods of recruitment,
and personnel employ ea. 88X 8 8 X X8
(2) Report how the insurgents retain individuals after
they have been recruited. 888
. Recent organization and (1) Report insurgent attempts to organize the people and
training of elements of the leadership, activities, plans and objectives of
the provincial populace
bv the insurgents.
insurgent controlled organizations. 888X X
(2) Report locations of insurgent training sites, describe
facilities, type training conducted and identitv of
students and instructors.
8 88
d. Recent insurgent (1) Report all items procured by the insurgents bv tvpe
vurement
and
(Both
of
logistical
within
fu
f mancial
si
support,
pr
provint e
and quantitv—how procured, from and bv
disposition of items .ifter procurement.
whom, and
88 8 x xx8
and from e)
external
souri es.)
►
o
o
• • •
FM 30-31
(c) Discovery of arms, ammunition, and tors in the physical and manmade environment in
explosives being clandestinely manufactured, an urban center. The following listing, while not
transported or cached. all-inclusive is intended,to create an atmosphere
. (d) Increased purchase and theft from sal- conducive to recognition of such indicators that
vage yards of metal products such as pipe, cas- may appear in an area.
ings, wire, spikes, and nails. (1) Apartments and housing being rented but
(e) Increased purchase of surplus military not lived in as homes.
goods and nonserviceable items. (2) Slogans written on walls, bridges, and
(/) Increase in demand for small arms and streets.
ammunition on the open market. (3) Defacement of government and police in-
(g) Reports of large scale purchasing of formation signs.
weapons, ammunition, and material used in their (4) Disappearance of electrical lines.
manufacture from gunsmiths, traders and regular (5) Pollution of the urban area’s water
businessmen. supply.
(h) Increase in pilfering of arms and am- (6) Isolated terroristic acts directed at the
munition from the government. destruction of government buildings and installa-
(i) An increase in the number of armed tions and the homes and businesses of community
robberies which indicates a tendency toward the leaders.
use of arms in addition to indicating a source of (7) Changes in residence of suspected subver-
financing for the insurgent movement. sives.
O') Reports of theft or sudden shortages of (8) Discovery of message drops.
certain basic chemicals which could be utilized in (9) Apartments and houses apparently being
the clandestine manufacture of explosives. used for purposes other than residences.
(fc) Appearance of arms manufactured in (10) Increased smuggling of currency,’ gold,
pro-insurgency oriented countries. gems, narcotics, medical supplies, and arms into
(3) Clothing. urban centers.
(а) Unusual systematic purchase of (11) Reports that local currency is being
clothing materials, possibly indicating the crea- bought up in world markets by pro-insurgency or-
tion of factories for the manufacture of insurgent iented countries.
uniforms or footwear. (12) Appearance of abnormal amounts of
(б) Unusual scarcity of clothing or mate- counterfeit currency in country of concern.
rial used in the manufacture of clothing and foot- (13) Increase in bank robberies.
wear. (14) Work stoppages or slowdowns in essen-
(c) Large scale distribution of clothing to tial industries.
underprivileged classes by organizations of recent • (15) Marked decline in product quality in es-
or suspect origin. sential industries.
(d) Discovery of caches of uniform (16) Marked increases in equipment failures
clothing. in essential industries.
(4) Drugs. ' ' (17) Mass strikes and sympathy strikes in
(a) Scarcity of drugs and medical supplies essential industries.
on the market or black market. (Í8) Appearance of known agitators or sus-
(b) Large scale purchase or theft of drugs pected subversives in picket lines.
and other medical supplies from warehouses and (19) Escalation of peaceful strikes to violence
distributors. against property and nonstriking personnel.
(20) Explosions in or bombing of essential
(c) Diversion of shipments of drugs into utilities and industries.
the cities. (21) Roadblocks and mines on main lines of
e. Environment Indicators. Environment indica- communication, powerlines, and aqueducts lead-
tors in an urban area may not be as apparent as in ing to urban centers.
the rural areas of a province or country. It is pos- (22) Malicious damage to industrial products
sible, nevertheless, to recognize insurgency indica- or factory machinery.
AGO 7334A
E-7
FM 30-31
(g) Leakage of classified information to ganda goals will be those of attempting to bring
newspapers. the normal pattern of background dissension to a
(h) Sudden changes in working and living predetermined level and maintaining it at that
patterns and financial status of government and level until an opportune moment. The secondary
law enforcement employees. goal will be to broaden the base of popular support
(z) Failure of government raids on sus- elsewhere in the urban community with a specially
pected subversive meetings or headquarters ap- designed campaign.
parently because of forewarning. (1) Against the general situation.
(j) Increased student activity against the (a) Worldwide dissemination of propa-
government and its police, or against minority ganda by proinsurgency oriented countries de-
groups, foreigners and the like. nouncing conditions in, and the government of,
(k) Demonstrations against government the country of concern.
forces, scapegoat minority groups, or foreigners (b) In-country dissemination of antigov-
who are designed to goad government forces into ernment slogans and pronouncements by word of
acting against crowds and thereby creating gen- mouth, wall scribblings, and crude posters and
eral hostility toward the government. leaflets.
(l) An increased number of articles or ad- (c) Initiation of letterwriting campaigns to
vertisements in newspapers criticizing the govern- newspapers and government officials deploring
ment. undesirable conditions and blaming individuals in
(m) The growth of general hostility power.
toward the government and law enforcement (d) Proliferation of slogans pinpointing
agencies. specific grievances.
(n) The occurrence of strikes in critical (e) Increase in petitions demanding gov-
areas casting doubt upon the ability of the govern- ernment redress of grievances.
ment to maintain order and provide for the needs (/) Circulation of petitions and tracts
of the people. whose origins cannot be immediately determined,
(o) Unusual and unsatisfactorily explained which appear to follow the beliefs and policies of a
absences of government employees from their of- foreign power.
fices for periods of short duration. (g) An increase in rumors, publications, or
(p) Sporadic, unexplained destruction of leaders emerging from the areas occupied by re-
and/or forgery of government identification cards cently arrived migrants, which seem to focus upon
and passports. the idea that no one cares about the new arrivals
(q) Unexplained disruptions of public utili- or their social conditions.
ties. (h) A general increase in the underlying
(r) Reports of extortion attempts on local
feeling of agitation and unrest among the critical
leaders and businessmen. urban population for which there is no logical ex-
(s) Anonymous threats addressed to or ter- planation.
roristic acts committed against government and (i) Appearance of committees and organi-
business leaders. zations whose leaders do not seem to be from the
(t) Murder or kidnapping of government population of that urban area, yet who purport to
officials. speak for all of the citizens of that area.
c. Psychological, Propaganda, and Agitation In- (j) Increased appeals directed at intensi-
dicators. The state of advancement of the insur- fying general religious unrest in countries where
gent movement may be gauged by certain consid- religious competition exists and the religious com-
erations. First, since the beginnings of the urban position of the urban population is heterogeneous.
insurgency are characterized by a high degree of (k) Mass demonstrations whose partici-
secrecy and clandestine operation combined with pants advocate standard Communst demands.
selective recruitment, there is little requirement (l) Announcements by foreign countries
for a propaganda campaign beyond that necessary that the concerned country is ripe for a “war of
for face-to-face or person-to-person recruitment. national liberation,” or words to that effect.
When the first concrete urban propaganda indica- (m) Propaganda identifying local ethnic
tors appear, therefore, it can be taken as a sign groups with those in neighboring countries in con-
that the minimum underground insurgent organi- nection with selected themes.
zation has been established. The initial propa- (n) Clandestine in-country radio broad-
AGO 7334A E—5
FM 30,31
casts worded to appeal to those with special griev- (d) Pleas to the people to stop cooperating
ances or to underprivileged ethnic groups. with the military and police.
(0) Use of bullhpms, truck-mounted loud- (e) Deliberate acts during demonstrations
speakers, and other sophisticated equipment in or strikes to provoke police reprisals.
spontaneous demonstrations. (/) Accusations of police brutality or inef-
(p) Presence of photographers other than fectiveness or claims that government forces ini-
newsmen among demonstrators. tiated violence when demonstrations end in riots.
(q) Widespread advertising of planned (g) Publication of altered or misleading
demonstrations or strikes to appeal for sympa- photographs purporting show repressive police
thetic reception or participation. practices.
(r) Rallies to honor “martyred” insur- (4)
gents. (a) Student unrest manifested by new or-
(s) Mass demonstrations honoring revolu- ganizations, proclamations, demonstrations, and
tionary heroes or dates significant to insurgency strikes against authority.
movements in other countries. (b) Charges by students and others that
(t) Nationwide strikes called to demon- the educational system is not adequate and is only
strate the strength of the insurgent movement. training youth to do the government’s bidding.
(w) Sympathy strikes called outside the (c) Appearance of questionable doctrine in
country concerned. the educational system.
(2) Against the established government.
(a) Radio propaganda from foreign coun- (d) Clamor for key personnel changes in
ties beamed at the country of concern denouncing the educational system.
its government for failure to meet the needs and d. Commodity Indicators. In an insurgency that
desires of its people. is both rural and urban, the primary function of
(b) Propaganda from foreign countries the urban sèction is the financing and supplying of
aimed at the country of concern denouncing its the movement. Not only will an effective intelli-
allies for imperialistic and expansionistic designs gence operation that becomes conscious of com-
on that country. modity indicators be aware of the existence of the
(c) Demonstrations and violence in foreign insurgency, but (of even greater importance) ef-
countries against embassies, offices, and consulates fective intelligence operations will enable the gov-
of the country of concern and its allies. ernment forces to deny critical supplies to the in-
(d) The spread of ideas that the govern- surgent movement.
ment is corrupt and completely out of touch with • (1) Foods.
the people. (a) A scarcity of food supplies in the city
(e) Agitation against existing or proposed when there is no report of natural impediments to
government projects and plans. agriculture, indicating that food is being diverted.
(/) Rumors that the government is a pawn (b) In a country or province where there is
of a foreign government. a tolerated black market, a decline of foodstuffs at
(g) Advocation of a popular front govern- this source indicating that the food is being di-
ment including new parties unfamiliar to the verted.
people.
{h) Character assassinations of chief ex- (c) Sudden shortages of preserved foods or
ecutives and their advisors. items of food requiring minimal storage facilities.
(1) Movement to remove strong anti-insur- (d) The failure of farmers to transport
gency leaders. their crops and meats to the city indicating a fear
O') Strikes or work stoppages called to pro- of travel on the highways.
test government actions. (e) Large scale purchasing of foodstuffs on
(3) Against the military and police. the market by sources not previously identified as
(a) The spread of ideas that the military wholesale buyers, possibly indicating purchasing
and police are corrupt and completely out of touch agents for an insurgent movement.
with the people. (2)
(b) Character assassinations of military (a) Increase in assaults on police and mili-
and police officials. tary personnel accompanied by theft of weapons.
(c) Movement to remove strong anti-insur- (ö) Increase in thefts and purchases of
gency military and police leaders. arms, ammunition, and explosives.
cause at this point the insurgency is extremely ances, or interests of underprivileged or minority
vulnerable. It is rare that this urban insurgent groups.
elite reveals its activities intentionally or by mis- (s) Reports of large donations to new or
take. But the insurgents must reach beyond them- revamped organizations.
selves for growth. It is as a product of the re- (t) Reports of payments to locals for en-
sulting involvement with the public and the neces- gaging in subversive activities.
sary popular recruiting to achieve this growth (u) Reports of the formation of subversive
that the insurgency indicators appear. paramilitary organizations.
( 1 ) General activity. (v) Gernade throwing and bombing.
(a) Increase in size of pro-insurgent or- (w) Reports of insurgent lists of targets
iented embassy or consulate staffs in country of for planned terroristic acts.
concern. (cc) Appearance of professional agitators
(&) Increase in staff and activities in pro- in demonstrations that result in violence.
insurgency oriented embassies or consulates in (y) Evidence of the participation of paid
neighboring countries ; including unusual patterns and armed demonstrators in riots.
in nature of volume of external communications (2) Activity to gain the support of the people.
(both in-country and out-of-country). (а) Reported incidents of attempted re-
(c) Increased travel by suspected subver- cruitment of people to join new movements or un-
sives or other elements of the population to pro- derground organizations.
insurgency oriented countries or to countries
notably under insurgent influence. (б) Unexplained unavailability of doctors,
(d) Influx of insurgent leaders, both for- printers, and other specialists who may be
eign and domestic, into the urban area. working with and for the insurgents.
(e) Reports of locals being trained in pro- (c) Habitual criminals and formerly
insurgency oriented countries. unruly youth who seem to be acting with new pur-
(/) Increase in visitors from pro-insur- pose.
gency oriented countries (tourists, technicians, (d) Increased unrest among laborers.
businessmen, officials). (e) Inability and/or refusal of people, who
{g) Close connections between the diplo- formerly paid taxes, to pay them now to the gov-
matic representatives of pro-insurgency oriented ernment.
countries and the insurgents. (/) Reports of extortion and other coercion
(h) Disappearance of known or suspected utilized by the insurgents to obtain financial “do-
insurgents and dissident elements. nations” from the people.
(i) Increase in insurgent youth gatherings. (g) Disappearance of young men from the
O') Hosting of trade fairs or increased at- city.
tendance by locals. (3) Activity against the government.
(k) Return of nationals from travel or (a) Failure of police and informant nets to
study in pro-insurgency oriented countries. report properly which would indicate sources of
(l) Increase in visits to urban centers by information are affiliating with the insurgents or
rural officials and leaders from areas of unrest. are sufficiently afraid of them to preclude the
(m) Establishment of organizations (even passing of information.
very small) of unexplained origin and of unclear (&) Decreasing success of government
or nebulous aims. agents in infiltrating subversive organizations.
(n) Establishment of a new organization to (c) Assassination or disappearance of gov-
replace an existing organizational structure with ernment agents.
identical aims. (d) Reports of increased attempts by in-
(o) Appearance of many new members in surgent representatives dr suspected subversives
established organizations such as labor unions. to make contacts with local leaders or government
(p) Attempts by new groups to obtain con- officials.
trol of established organizations. (e) Reports of attempts to bribe or black-
(q) Infiltration of student organizations mail government and law enforcement employees.
and unions by known agitators. (/) Reports of attempts to extract classi-
(r) Appearance of new organizations with fied information from government officials or do-
titles stressing patriotism, rectification of griev- cuments from government offices.
E—4 AGO 7334A
FM 30-31
APPENDIX E
INSURGENT ACTIVITY INDICATORS
(Classification)
c. Insurgent vulnerabilities. (Lists exploitable insurgent vulner-
abilities.)
/s/
G2/S2
(Commander if distributed
outside headquarters)
ANNEXES:
Distribution: (If distributed only.)
Authentication: (G2/S2 authenticates if commander signs estimate.)
(Classification)
AGO 7334A D-3
FM 30-31
APPENDIX D
FORMAT OF AN INTELLIGENCE ESTIMATE FOR STABILITY OPERATIONS
(Classification)
INTELLIGENCE ESTIMATE
Preparing Staff Element
Organization
Location
Date/Time Group
References: Maps, Charts, or other Documents.
1. MISSION. (States the current or proposed mission of the force
designated for stability operations.)
2. THE AREA OF OPERATIONS. (This paragraph discusses char-
acteristics of the host country, the area, and their probable effect upon both
insurgent and government courses of action.)
a. Geography. (Includes climate and topography.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
b. Politics. (Includes governmental organization, political parties,
and interest groups.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
c. Economy. (Includes private enterprise and public facilities.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
d. Sociology. (Includes minority groups and social programs.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
e. Psychology. (Includes behavior patterns and motivating factors.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
3. THE INSURGENT SITUATION. (This paragraph discusses the
insurgent organization and its activities.)
a. Organization and Leadership. (Includes composition.)
(1) Nonmilitary. (Includes the underground.)
(Classification)
-AGO 7884A D-l
FM 30-31
(Classification)
(2)
b. Strength and Disposition.
(1) Nonmilitary.
Military. (Includes all insurg
#
(2) Military.
c. Recent and Present Significant Activities.
(1) Nonviolent action. (Includes political, economic, sociological,
and psychological action.)
(2) Terrorist action. (Includes murder, torture, extortion, kid-
napping, and sabotage.)
(3) Guerrilla operations. (Includes harassment, destruction,
interdiction, and dispersion.)
(4) Conventional tactical operations. (Includes attack, defense,
delay, and withdrawal.)
d. Strengths and Weaknesses.
(1) Recruitment and retention.
(2) Intelligence and security.
(3) Organization and training.
(4) Finance and logistics.
(5) Communications.
4. INSURGENT CAPABILITIES. (This paragraph lists current
insurgent capabilities and discusses them in regard to probability of
adoption. )
a. Enumeration. (Includes what, where, when, and how for each
capability.)
(1) Basic capabilities.
(a) Nonviolen
(&) Terrorist
(c) Guerrilla operations.
(d) Conventional tactical operations.
(e) Employment of chemical, biological, or nuclear weapons.
(2) Supporting Capabilities.
(a) Intelligence and security.
(b) Recruitment and retention.
(c) Organization and training.
(d) Finance and logistics.
(e) Reinforcement capabilities.
b. Analysis and Discussion. (Includes all evidence supporting or
rejecting the adoption of each capability.)
5. CONCLUSIONS. (This paragraph draws conclusions from the
content of the preceding paragraphs and furnishes a basis for selection
of courses of action to accomplish the assigned mission.)
a. Effects of the operational environment. (States the total effect
of the area of operations upon courses of action.)
»
b. Probable insurgent courses of action. (Lists probable insurgent
courses of action in order of relative probability of adoption.)
(Classification)
D-2 AGO 7834A
FM 30-31
CHAPTER 10
INTELLIGENCE COLLECTION OPERATIONS
The contents of this chapter, which deals with doctrine in the field of Human Intelligence (HUMINT)
and Signal Intelligence (SIGINT), appears in FM 30-31 A, a supplement to this manual.
AGO 7334A
10-1
#
(
ß>»
FM 30-31
CHAPTER 1
INTRODUCTION
Section I. GENERAL
1-1.
\
Purpose and Scope vironment. FM 30-5 contains the established
a. This manual, together with its SECRET
conventional intelligence doctrine for—
N0F0RN classified supplement FM 30-31A, pro- (1) Nuclear and nonnuclear environments.
(2) Chemical, biological, and radiological en-
vides guidance on doctrine tactics, and techniques
for intelligence support to U.S. Army stability op- vironments.
erations in the internal defense environment. Its d. Guidance on doctrine, tactics, and techniques
intended use is for commanders, staff officers, and for intelligence interrogation, counterintelligence
intelligence specialists. It is applicable to major operations, and aerial surveillance and reconnais-
commands and subordinate units and will serve as sance operations in support of stability operations
guidance for intelligence planning\training, and in the internal defense environment is contained
operations (unilateral and combined). in FM 30-15, FM 30-17, FM 30-20, and FM
\ 32-10.
b. This manual is concerned primarily with in-
telligence requirements in support of ÜiS. Army
stability operations; however, it also has Applica- 1—2. Changes
tion to U.S. internal defense and development as- Users of this manual are encouraged to submit
sistance operations where U.S. personnel advise, recommended changes and comments to improve
assist, and train host country (HC) military intel- the manual. Comments should be keyed to the spe-
ligence personnel. For this reason, the scope is riot cific page, paragraph, and line of the text in which
limited entirely to stability operations but includes., the change is recommended. Reasons will be pro-
a description of the overall internal defense intel- vided for each comment to insure understanding
ligence system, its management, and its unique as- \ and complete evaluation. Comments should be pre-
pects of operations in the internal defense envi- Apared using DA Form 2028 (Recommended
ronment, including those involving collection and Changes to Publications) and forwarded direct to
production agencies. A discussion of intelligence the Commanding Officer, U.S. Army Combat De-
training requirements for stability operations and velopments Command Intelligence Agency, Fort
a proposed intelligence training program also Holábird, Maryland 21219.
have been incorporated in this manual. \
\
c. The contents of this manual are based on the 1-3. Definitions
\
broad guidance and doctrine found in FM 100-20, The terminology used in this manual to discuss the
FM 31-22, and FM 31-23. The manual applies pri- internal defense environment and its intelligence
marily to Army force employment in the internal aspects is consistent with internal defense termi-
defense and internal development operational en- nology contained in AR 310-25 and FM 31-23.
ther spread of insurgencies among other newly- b. In response to requests for internal defense
emerging and developing nations of the world and development assistance, the United States
which are seeking to achieve the status of self- provides a wide range of help through its various
respecting and viable members of the interna- governmental, civilian, and military agencies. The
tional community. U.S. Army contributes men and resources for sta-
bility operations in support of U.S. national in-
b. Insurgencies usually develop when discontent ternal defense assistance objectives. These U.S.
among the population of a country is not alle- Army resources may vary from provision of a few
viated by appropriate government action. Govern- selected advisors to provision of major combat
ments, perhaps unwittingly, may not respond to forces.
such discontent in time to prevent their develop-
ment into real or imagined grievances. Skillful c. Internabdefense involves all measures taken
agitators may capitalize on existing conditions by a government and its allies to free its society
and develop grievances when none originally ex- from subversion, lawlessness, and insurgency.
isted. With organization and leadership, growing While these measures will most probably involve
discontent with existing conditions within a some form of military participation, internal de-
country develops into insurgency. fense is not purely a military operation. Political,
economic, and sociological factors influence mili-
c. Communist movements use insurgency as a tary operations at all levels. Consequently, all U.S.
tool to achieve power by the use of military, polit- military intelligence personnel and agencies and
ical, economic, sociological, and psychological their host country counterparts are confronted
means in an integrated attack on weak govern- with many intelligence tasks which must be ac-
ments in less-developed countries. Subversive in- complished if stability operations are to make a
surgency (so-called “wars of liberation”) must be valuable contribution to the success of the overall
properly recognized as a major form of politico/ internal defense and development effort.
military conflict requiring at least the same atten-
tion and effort as limited and general warfare. The 1—6. The Nature of Insurgency
main objectives of insurgencies are the control of a. General. In order to contribute to the destruc-
the people and the destruction and replacement of tion of insurgency, the military intelligence staff
the existing government. A combination of per- officer and specialist must have a thorough under-
suasion and terror is used to gain control of the standing of the evolutionary development of in-
people while the government is destroyed by sub- surgent movements. While the nature of insurgen-
version, sabotage, and, if necessary, armed con- cies varies in some respects from country to
flict. country, certain patterns and similarities have
been discerned. Three frequently overlapping
T—5. United States Policy phases have been utilized as an aid in analyzing
insurgencies. They are discussed in b through d
a. United States foreign policy has long viewed
below.
an international community of independent,
stable, peaceful, progressive, and free nations as b. Phase I: Subversion.
the best guarantee of its own security. For this ( 1 ) Phase I insurgency varies from situations
reason the United States Government has under- in which subversive activity is only a potential
taken to assist, upon request, certain newly- threat to situations in which subversive incidents
emerging nations in their development toward pol- and activities occur with rising frequency in an
itical stability and economic and social progress. organized pattern. No major outbreak of violence
or uncontrolled insurgent activity occurs during
Many Of these nations, however, are confronted
this phase. The beginnings of an insurgency are
with latent, incipient, or active insurgencies which difficult to recognize. Insurgent activities may
inhibit their national growth and often threaten appear as one of many legitimate party activities
their very existence. Such nations seek and receive or movements such as loyal opposition or social or
internal defense and development assistance from religious reform. However, during this develop-
the United States and other allies to protect their ment period, when forces of the movement are
societies from subversion, lawlessness, and in- few, resources limited, and organization and lead-
surgency as well as to free them from conditions ership uncertain, the insurgency is most suscep-
which foster this unrest and instability. tible to counteraction. Although each particular
agencies or specialized personnel as might be re- (4) Insurgent military forces have a much
quired for intelligence collection, agitation, prop- less complex supply and logistical system than
aganda, and occasional strong-arm activities. As conventional forces. When the insurgents are sup-
the insurgency develops, however, the need to es- plied through clandestine channels, the supply
tablish a mass civil organization and a military problem may be complicated by the need for secu-
force dictates the creation of new echelons of au- rity; however, supply operations are made as
thority and new organizations to accommodate simple as possible. Insurgent military forces rely
them. Details concerning a type insurgent organi- on the people for logistical support and also obtain
zation can be found in appendix B. supplies or equipment by successful attacks on
governmest forces or from external support pro-
2—3. Commemd and SflafiF vided by a sponsoring power.
a. The insurgent military organization is aus- (5) Insurgents may have an immediate and
tere and its structure simple. An actual physical near total dependence on close and continuous con-
installation for a headquarters may be nonexistent tact with the population. Winning population sup-
or of the most primitive type. The headquarters port is the key to success or failure of an insur-
personnel often fight alongside the rank and file of gency. Civilian proselyting sections or equivalent
the military force. The staff structure is often in- organizational elements are continually engaged
formal, but individuals within the force are as- in extensive political activities.
signed to perform roughly the same functions re- (6) Special staff activities of the insurgent
quired of any military staff. Differences between armed elements can range from the austere to the
staff functions necessary in insurgent force organ- complex. While medical care is often scarce and
izations and conventional force organizations gen- primitive, extensive field hospital facilities may
erally are as follows : still be found. Construction is kept simple and
(1) Insurgents carry on few personnel func- avoided when possible. It is possible, however,
tions—the only two which receive any significant that the insurgents will establish vast tunnel net-
emphasis are recruitment and replacement. Per- works and underground facilities. Other insurgent
sonnel records, if kept at all, are sketchy, and re- activities may be highly sophisticated. Financing,
quired administration is conducted informally. for example, can attain a degree of complexity
The insurgent personnel functions dealing with that includes formal taxation, issuance of war
discipline, law and order, and morale are politi- bonds, and the printing of money.
cally oriented. (7) Insurgent communication will vary from
(2) The intelligence function, on the other the use of couriers to modern radios. The commu-
hand, receives even more attention in insurgent nication nets will be relatively simple in opera-
units than in many conventional military units. tions and procedures in the initial stages of insur-
This is due to the clandestine, conspiratorial way gency. Subsequent stages normally will evidence
in which insurgents must live and operate. more sophistication.
(3) Insurgent planning encompasses far b. Leadership in an insurgency movement stems
more than tactical planning. Even at local levels from the degree of loyalty to the movement. One
the party chapter maintains formalized sections of the greatest advantages possessed by the insur-
dealing with long-range interests, such as youth gents is their well-qualified key leadership which
affairs, agriculture, civilian proselyting, and mate- is often provided by foreign powers for operations
riel procurement. General, long-range strategic in the specific insurgency being developed. When a
planning usually is performed by the secret di- recognized major insurgent force leader lacks a
recting apparatus. The results of this long-range military background, a sponsoring power may in-
planning usually come down to the individual in- filtrate qualified personnel to serve as his military
surgent force in the form of written orders. Oper- and technical advisors. By so doing, the military
ations are characterized by surprise, swift attack, capabilities of the insurgent force are exploited
and rapid dispersal, and usually occur under con- effectively without destroying the command struc-
ditions of reduced visibility. Much of the tactical ture of the established organization. Replacement
training takes place during actual operations, but of local leadership with personnel from outside the
considerable attention is given at small unit level area, however, may create exploitable morale and
to pre-attack rehearsals. Ideological indoctrination disciplinary problems. Often, promising native
receives a high degree of emphasis whenever the leadership candidates are recruited, trained over
insurgents reach a relatively safe position. extended periods of time, and then returned to
2-2 AGO 7334A
FM 30-31
means. Since climatic conditions vary from nation the details of weather and climate extremes which
to nation, area handbooks and USAF Air Weather will affect the employment of U.S. forces and plan-
Service reports should be consulted to determine ning assistance programs to the host country.
b. Subversive insurgent organizations exploit 6. People residing in sparsely settled areas are
the discontent of the population. Thus, it may be strongly influenced by their immediate environ-
said that insurgency arises from the people. Be- ments—such factors as family relationships and
cause of this identity factor, even the organized factors related to obtaining food, clothing, and
cadres of full-time military and paramilitary in- shelter.
surgent units are able to blend into the population c. The racial stock and physical characteristics
when necessary. of the population of an area are important consid-
c. Insurgent activities—including terrorism, sab- erations. A tendency exists among the populations
otage, subversion, espionage, raids, and ambushes of developing nations to fear and distrust persons
—are conducted by the insurgent from within the who are not of their own race.
structure of society. For this reason, detailed d. Ethnic groups, especially those constituting
knowledge of the population in an insurgency area minority factions, are of prime consideration.
is a definite requirement in order to analyze and Ethnic groups may be either a source of discon-
evaluate insurgent activity. tent or of major assistance depending upon the
d. Because some governments in areas afflicted amount of discrimination or persecution which
with insurgency are new and undergoing rapid exists. Where the antagonism between the govern-
change, there is often little sense in a mutual na- ment and minority faction is not immediately rec-
tional identity between the government and the oncilable, the U.S. or allied forces may provide
population. There is.seldom a national tradition or advisory elements to neutralize or assist in
heritage to act as a unifying force. It is necessary, gaining the support of these groups. However, the
therefore, that a strong and proud national iden- ultimate solution to this complex problem must be
tity be quickly developed to provide a cohesive a lasting reconciliation between the government
force for unifying the government and the popula- and minority groups.
tion. Governments seek to accomplish this by im- e. The introduction of large numbers of military
plementing measures that will develop political
and civilian assistance personnel from the United
and social cohesion and demonstrate economic prog- States and allied nations may create additional
ress. Civil affairs operations and psychological social and economic problems and antagonisms.
operations in support of this objective are impor-
tant aspects of stability operations. f. Some developing nations are reaching, or
have gone beyond, the population saturation point.
2—11 H. G@iniSDdleraîô®iras Many of these nations cannot feed, clothe, employ,
or otherwise satisfy even the basic subsistence
a. The developing nations are undergoing the needs of their populations. Compounding this
rapid changes associated with modernization. The problem is the fact that the economic growth rate
process is often a source of tension. The people normally does not keep pace with the rate of popu-
who resent the loss of traditional ways and values lation increase.
may become alientated from the government.
Those portions of the population, not benefited by g. The population saturation point may occur in
the change, envy those of the same element within certain geographical areas within a developing
AGO 7884A
FM 30-31
for civil affairs operations, intelligence operations, ations in an insurgent war differ little from those
and psychological operations. These advisors will of other types of warfare. However, it is the re-
have some requirements in common in the six in- quirement for the other Army missions directly
telligence subject areas; however, each will have associated with stabilty operations which are dis-
his own special interest which must be met by tinct in counterinsurgency operations. As part of
operational intelligence. Intelligence advisors the stability operations effort during Phase II, in-
must continually bear in mind that their status telligence units, psychological operation units, and
may shift at any time from primarily an advisory troops engaged wholly or in part in civil affairs to
to a basic operational role, and that their basic include populace and resources control operations
intelligence requirements will increase accord- may be committed. This requires detailed, compre-
ingly. Thus, even though there may be no current hensive, and current data concerning the six sub-
indications of such a shift in their status and its ject intelligence areas (qara 5-3b). With the in-
accompanying requirements, their efforts con- volvement of U.S. combat units, the entire Army
cerning buildup of the documentary data base intelligence support capability—to include inter-
should be shaped around that eventuality. rogation, order of battle, counterintelligence, im-
agery interpretation, technical intelligence, aerial
5-8. Phase II and ground battlefield surveillance, signal intelli-
gence, and long-range patrols—becomes active.
a. Intelligence requirements generated at the in-
itiation of the military assistance program for the
use of advisors will continue to be applicable as 5-9. Phase III
U.S. military efforts are expanded during Phase a. U.S. Army participation in Phase III may
II. The U.S. military assistance program may be involve only support personnel and units, or it
greatly enlarged with more effort at the provincial may involve combat forces in tactical operations.
and lower level of the host country. U.S. Army With such involvement it can be expected that the
support units may be committed in Phase II to entire spectrum of stability operations missions
provide direct technical and specialized assistance will be encountered. Where U.S. buildup is
to host country military forces. Army aircraft, gradual from the initial phase into Phase III of an
communication, transportation, ordnance, and insurgency, the intelligence requirements for
medical units are examples of such support. U.S. Phase I and Phase II will have been formulated
Army combat units may also be committed in the based on advisory and support needs. In such a
later stages of Phase II. situation the involvement of Army units in sup-
b. In the determination of operational intelli- port of host country military forces will have little
gence requirements for the Army forces during effect on requirements, except for an obvious in-
this period, a significant factor is that the U.S. crease in the collection-production resources.
Army may become involved in some capacity in all Where Army involvement begins with little or no
five of the major missions associated with stability advance warning or buildup, an intelligence pro-
operations. Requirements may include combat in- gram to support all missions, tactical and nation
telligence for tactical operations against the insur- building, will be required immediately. Tactical in-
gent forces and intelligence to support all opera- telligence requirements in Phase II should be ex-
tions in the other four missions—civil (to include panded to meet the expected larger insurgent
populace and resources control), intelligence, advi- force structure.
sory assistance, and psychological operations b. During Phase III, U.S. Army intelligence
which are conducted concurrently with tactical op- staffs, specialists, and units will be helping to pro-
erations.
vide all tactical and nontactical stability opera-
c. Tactical requirements are concerned with tions intelligence needs. Working in coordination
finding, fixing, and destroying the insurgent with host country and other U.S. and allied intelli-
armed forces. FM 31-16 considers the specific re- gence agencies, U.S. Army intelligence will collect,
quirements for these operations in great detail. process, and disseminate current and detailed in-
Intelligence requirements for combat support and telligence necessary to support tactical, civil af-
combat service support units participating in the fairs, intelligence, and psychological operations on
tactical counterguerrilla effort are adequately es- a continual basis.
tablished in appropriate field manuals. The
combat intelligence requirements for tactical oper- c. As discussed in paragraph 6-2, combined mil-
itary intelligence operations with the host country will assist in a fully coordinated effort to exploit
are by far the most eifective in stability opera- all available intelligence assets :
tions. (Details on combined collection and counter- (1) Interrogation Center (for details, see FM
intelligence operations are contained in the classi- 30-15).
fied supplement, FM 30-31 A.) Early development (2) Document Exploitation Center (for de-
of such combined operations should lead to the tails, see FM 30-15).
establishment of combined intelligence production (3) Materiel Exploitation Center (for details,
centers during Phase III at both national and sub- see FM 30-16).
national levels. Additionally, establishment of the (4) Imagery Interpretation Center (for de-
following types of combined intelligence facilities tails, see FM 30-20).
intelligence collection plan. Further, he closely nator personnel, host country civilian, paramili-
coordinates with sources of information other tary and military personnel, and other U.S. mili-
than intelligence collection agencies. This coordi- tary and civilian organizations and agencies in-
nation includes operations and fire support coordi- country.
inside military areas and within civilian communi- with the land, its people, and the various insur-
ties. They also maintain files on people and organi- gent forces makes these units a lucrative source of
zations that may serve as further contacts for current intelligence information.
ground reconnaissance elements. (2) U.S. aid-type missions that provide as-
(2) Agent operations which provide a source sistance to the indigenous personnel of an area.
of information from within the enemy area. Often These organizations have contact with all types of
agents penetrate an area and gather information civilians at each level down to the local village and
not otherwise available to any form of overt hamlet. Their own personnel are actively engaged
action or which could only be procured by indig- in travel around the country. Their reference
enous personnel. material, contacts, and personnel all provide a
(3) Interrogation efforts by interrogation vast amount of useful information.
sections on prisoners, suspects, defectors, and ref- (3) The host country government has many
ugees that can produce much new information or of its own sources of information. The most im-
can assist in confirming or refuting information portant of these sources are those which extend
gathered from other sources. through all echelons of the governmental struc-
(4) Stay-behind units that can pick up con- ture. The major organizations in this category in-
tact with insurgent forces, maintain that contact, clude host country military and paramilitary
and furnish scheduled reports of their sightings. forces, civilian police, local governmental organi-
Stay-behind units are capable of remaining in con- zations; and religious groups.
tact for long periods of time, and the information
they furnish has a very high degree of reliability. S—7. Pllfflnniinig Ê©n$5deraîD®iras
(5) Technical intelligence specialists and doc- o. Frontlines and secure rear areas usually are
ument translators both of which offer valuable in- not established during stability operations. Tac-
formation gathered from enemy documents and tical areas of responsibility (TAOR) are assigned
materiel. Many items brought back from recon- to units within which a base camp is established
naissance patrols will furnish additional informa- and permanent responsibility for military control
tion once it has been identified and analyzed by and security is assigned. All terrain within the
one of these specialists. TAOR cannot be physically occupied due to the
(6) Recovered U.S. personnel can provide vasUsize of the area involved. As an alternative to
very valid information when properly debriefed physical occupation of the ground, aggressive
by intelligence personnel. The fact that he speaks ground surveillance and reconnaissance must be
English, has been trained to observe and retain utilized to effect security. - •
information of intelligence value, and has physi- b. For military operations outside of a unit’s
cally passed through insurgent territory, makes
TAOR an area of operation (AO) is assigned,
the U.S. returnee an excellent source.
usually at some distance from the TAOR. A unit
(7) Communications intelligence resources moves into an AO on a temporary basis to conduct
can provide an all-weather, day and night surveil- tactical operations. Once these operations are ac-
lance of enemy communications. complished, participating units return to their
d. Specialized Organizations. There are other TAOR or depart directly to a new AO for further
operations; however, even when physically sepa-
specialized organizations that can furnish as- rated from their TAOR, units remain responsible
sistance in gathering information. While their pri- for their security.
mary mission is not intelligence, their operations
do put them in a position where they have a lot of c. Security for a TAOR or AO requires all-
information available. Some of these organiza- around coverage, mostly by visual observation and
tions are— patrolling especially during periods of reduced
(1) Special Forcesvisibility. Special sensors
units in-country and mechanical devices,
which are
strategically located astride LOG, adjacent to such as ground surveillance radars, anti-intrusion
border crossing points, and near identified or sus- devices, night vision scopes, and searchlights can
pect insurgent areas of operations. They usually complement this effort, but all such equipment has
are placed within or adjacent to civilian occupied certain limitations, the most common of which is
areas. One of their major missions is to advise the requirement for ground line-of-sight. Ground
indigenous troops on patrols and combat opera- surveillance plans will require the coordination
tions within their local area. Constant contact and employment of all available surveillance
AGO 7334A
F
o
PENTAGON LIBRARY
«
fr
#