You are on page 1of 262

FM 30-5

FIELD MANUAL

HEADQUARTERS, DEPARTMENT OF THE ARMY


OCTOBER 1973
Pentagon Library (ANR-PL)
ATT£!: fáiiitary Documente Section
Fïccm 1A518, Pentagon
Washington, DC 20310-6050
i
COPY *
\ i k s.\
' i w
\ *FM 3&-5
/>
?,"■
FIELD MANUAL \ (^ Í-'' I HEADQUARTERS
' DEPARTMENT OF THE ARMY
rio. 30-5 WASHINGTON, D. C, 30 October 1973

COMBAT INTELLIGENCE
\

Parmgraph Pase
CHAPTER 1. INTRODUCTION 1-1,1-2 1-1
i Section
2.
I.
INTELLIGENCE FUNCTIONS, ORGANIZATIONS, AND OPERATIONS
Intelligence , 2-1—2-6 2-1
II. The Intelligence Officer 2-7—2-13 2-2
III. Organization 2-14—2-16 2-6
IV. Operations 2-17—2-20 2-1
V. Influence of the Operational Environment on Intelligence Operations 2-21—2-28 2-15
VI. Weather and Geographical Environment 2-29—2-31 2-18
CHAPTER 8. INTELLIGENCE DIRECTING (STANAG 2014, 2029, 2033, 2084, 2103;
SEASTAG 2014, 2029, 2084; SOLOG 123)
Section I. Introduction _u 3-1—3-9 S-l
II. Requirements 3-10—3-20 3-5
III. Determination of Indications 3-21—3-23 3-14
IV. Sources of Information 3-24—3-36 3-15
V. Agencies , 3-37—3-52 3-20
VI. Combat Surveillance, Reconnaissance, and Target Acquisition 3-53—3-56 3-24
CHAPTEB 4.
COLLECTION OF INFORMATION (STANAG 2014, 2029, 2033, 2084, 2103;
SEASTAG 2014, 2029,\2084; SOLOG 123)
Section I. Introduction 4_1( 4_2 4-1
II. The Collection Plan 4_3 4_io 4-1
III. Supervision of the Collection Effort ^ 4-11,4-12 4-6
CHAPTER 5. PROCESSING OF INFORMATION (STANAG 2022; SEASTAG 2022)
Section I. Introduction 5_1__5_3 5-1
II. Recording _, 5_4—5.9 5-4
III. Evaluation \. 5_10 5.14 6-11
IV. Interpretation ,_ 5_15_5_18 6-13
CHAPTEFi 6. DISSEMINATION AND USE OF INTELLIGENCE AND INFORMATION
(STANAG 2008, 2014, 2020, 2022, 2097, 2103, 2118, 2134, 3377; SEASTAG
2008, 2020, 2022, 2118; SOLOG 123)
Section I. Introduction 6-1 6_2 6-1
II. Dissemination Means , 6-3 6-22 6-1
III. The Analysis of the Area of Operations __^___^ 6-23 6-25 6-8
IV. The Intelligence Estimate .1 6-26 6-32 6-8
V. Operation Plan or Order and Reports j 6-33 6-35 6-11
VI. Maps i 6-36—6-39 6-11
VII. Aerial Imagery \_ 6-40—6-42 6-14
CHAPTEB 7. ORDER OF BATTLE (STANAG 2077)
Section I. Introduction _, 7_i 7_2 7-1
II. Elements of Order of Battle Intelligence j 7-3 7_io 7-2
III. Planning the Collection Effort 7-11, 7-12 7-4
IV. Processing Order of Battle Information/Intelligence __1 7-13 7-25 7-4
V. Dissemination of Order of Battle Intelligence 1 7-26, 7-27 7-17
CHAPTEB 8. COUNTERINTELLIGENCE
Section I. Introduction ;. g_i g_3 8-1
II. Counterintelligence Operations 8-4 8-13 8-3
III. Counterintelligence Planning and Orders ^ 8-13 8-16 8-8

a
• Thii manual »uporxdo« FM 3(W, 12 F.bruary 1971, ¡ncluding all chansu. /,£!2^ *0n L'^rary CWlO pi \
ATTP.:;
nc+ „ is« ""Son
rt
^^.ngton, DC 20¡íon.6050
3-18

ParaGraph Pose
CHAPTER 9. ADDITIONAL INTELLIGENCE CONSIDERATIONS
Section I. Small Unit Intelligence 9-1—9-6 9-1
II. Special Environmental Conditions 9-7—9-9 9-4?
III. Special Type Operations 9-10—9-17 9-4
IV. Electronic Warfare (EW) 9-18,9-19 9-8
V. Tactical Cover and Deception (TC&D) 9-20—9-23 9-9
VI. Stability Operations 9-24—9-29 9-10
VII. Training 9-30—9-33 9-15
VIII. Standing Operating Procedures 9-34—9-36 9-16
APPENDIX A. REFERENCES A-l
B. THE ANALYSIS OF THE AREA OF OPERATIONS B-l
C. AVAILABILITY OF INTELLIGENCE AGENCIES C-l
D. FORMAT FOR PERIODIC INTELLIGENCE REPORT (PERINTREP) D-l
E. EXAMPLE OF A PARTIALLY COMPLETED COLLECTION PLAN E-l
F. FORMAT AND EXAMPLE OF AN INTELLIGENCE SUMMARY (INTSUM)
(STANAG 2022; SEASTAG 2022) F-l
G. FORMAT FOR BOMBING, SHELLING, AND MORTARING REPORTS (STANAG
2008) G-l
H. REPORT FORMATS FOR REPORTING ENEMY NUCLEAR, BIOLOGICAL, AND
CHEMICAL ATTACKS (STANAG 2103) H-l
I. EXAMPLE OF CLIMATIC SUMMARY 1-1
J. INTELLIGENCE ESTIMATE (STANAG 2118; SEASTAG 2118) J-l
K. ENEMY STRENGTH COMPUTATION (STANAG 2077) K-l
L. FORMAT AND EXAMPLE OF ORDER OF BATTLE ANNEX TO PERINTREP
(STANAG 2014) L-l
M. COUNTERINTELLIGENCE ESTIMATE FORMAT M-l
N. EXAMPLE OF A DIVISION INTELLIGENCE ANNEX (STANAG 2014) N-l
O. EXAMPLE INTELLIGENCE WORKBOOK HEADINGS FOR STABILITY OP-
ERATIONS O-l
P. SAMPLE METHOD OF INTEGRATING INTELLIGENCE WITH OTHER
TRAINING P-l
Q. TYPICAL INFORMATION NEEDS IN AREA OF INFLUENCE OF VARIOUS
UNITS 0-1
E. AIRCRAFT HOSTILE FIRE REPORT R-l
S. EQUIVALENT CHILL TEMPERATURE CHART S-l
T. TYPICAL INTELLIGENCE INDICATORS T-l
U. SAMPLE SURVEILLANCE AND TARGET ACQUISITION ANNEX TO DIVI-
SION OPERATION ORDER U-l
V. COUNTERINTELLIGENCE PLAN FORMAT V-l
GLOSSARY GLOSSARY-1
INDEX INDEX-1
FM 30-5

CHAPTER 1

INTRODUCTION

1-1. Purpose and Scope intelligence. Also included are the intelligence
aspects of special environmental conditions, spe-
a. This manual furnishes guidance to com-
cial operational methods, and special purpose op-
manders, staff officers, military intelligence of-
erations including tactical cover and deception
ficers, and other personnel concerned with the
(TC&D) operations; and intelligence aspects of
collection, production, and use of combat intelli-
friendly employment of chemical and nuclear
gence in planning or conducting military opera-
weapons and protection against enemy chemical,
tions at all levels of command. It deals primarily
biological, and nuclear attacks.
with the organization of an intelligence section;
the functions of the intelligence officer; the intel- b. This manual is in consonance with the inter-
ligence sources and agencies ; the intelligence national agreements listed below. Applicable
aspects of terrain and weather ; and the planning, agreements are listed by type of agreement and
collection, processing, dissemination, and use of number at the beginning of each chapter.
NATO CENTO SEA TO ABCA
Title STANAG STANAG SEASTAG SOLOG

Bombing, Shelling, and Mortaring Reports 2008 2008 2008


Operf.tion Orders, and Administrative/Logistic Orders 2014 2014 2014
Operp.tiors\ Situation Reports - 2020 2020 2020
Intelligence Reports — — 2022 2022 2022
Methcd of Describing Ground Locations, Areas and Boundaries.. 2029 2029 2029
Interrelation of Prisoners of War 2033 2033
Enemy Crder of Battle Records for Combat Intelligence 2077 2077
Handling and Reporting of Captured Enemy Documents and Equipment... 2084 2084
NcunerclaUire for Soviet Bloc Army Weapons and Equipment 2097 2097
Repcrting Nuclear Detonations, Radioactive Fallout, and Biological and
C herr.icz 1 A ttacks — 2103 2103 123
R adiolcgical Surveys - 2112 2112
Intelligence Estimate... - 2118 2118 2118
Offensive Air Support Operations - 2134
Air Reconnaissance Intelligence Report Forms 3377 3377 3377

1-2. Recommended Changes be provided for each comment to insure under-


standing and complete evaluation. Comments
Users of this manual are encouraged to submit should be entered on DA Form 2028 (Recom-
recommended changes and comments to improve mended Changes to Publications) and forwarded
the manual. Comments should be keyed to the direct to the Commandant, US Army Intelligence
specific page, paragraph, and line of the text in Center and School, Fort Huachuca, Arizona
which the change is recommended. Reasons will 85613.

1-1
FM 30-5

CHAPTER 2

INTELLIGENCE FUNCTIONS, ORGANIZATIONS, AND OPERATIONS

Section I. INTELLIGENCE

2-1. General within his own command, or from higher, lower


or adjacent headquarters. Combat intelligence is
Every profession has a language of its own, a
derived from the interpretation of information
language which is used in the particular environ-
on the enemy (both his capabilities and his vul-
ment of that profession. The military is no excep-
nerabilities) and the environment. The objective
tion to this general rule. Therefore, when a
of combat intelligence is to minimize uncertainty
soldier speaks of information or intelligence in
concerning the effects of these factors on the ac-
general or combat intelligence, strategic intelli-
complishing of the mission. The commander em-
gence and counter-intelligence in particular, he
ploys combat intelligence to determine how to
attaches to these words a specific meaning in a
best use available resources in accomplishing the
specific context. The reason for this special lan-
mission and maintaining the security of his com-
guage is obvious—only in this manner will there
be a common understanding among the individu- mand. In noncombat commands, combat intelli-
gence provides a basis for security measures, for
als involved. From this standpoint, a knowledge
decisions as to the best use of the area of opera-
of the accepted usage of these words is impor-
tant. There is also a value in knowing their tions in accomplishing the mission, and for deter-
context, their interrelationships, and the environ- mining or anticipating future support require-
ments. The term "tactical intelligence" has
ment in which they are found.
essentially the same meaning and the two terms
are often used interchangeably.
2—2. Intelligence Versus Information
Information is unevaluated material of every de- 2—4. Strategic Intelligence
scription including that derived from observa- Strategic intelligence is intelligence which is re-
tions, communications, reports, rumors, imagery, quired for the formulation of policy and military
and other sources from which intelligence is pro- plans at national and international levels. Ori-
duced. Information itself may be true or false, ented on national objectives, it assists in deter-
accurate or inaccurate, confirmed or unconfirmed, mining feasible national intelligence objectives
pertinent or impertinent, positive or negative. and in furnishing a basis for planning methods of
"Intelligence" is the product resulting from the accomplishing them. Factors which influence the
collection, evaluation, and interpretation of infor- military capabilities, vulnerabilities, and probable
mation which concerns one or more aspects of courses of action of nations are considered com-
foreign nations or of functional or geographic ponents of strategic intelligence.
areas, and which is immediately or potentially
significant to the development and execution of
2-5. Interrelationship of Combat and
plans, policies, and operations. For definitions of
Strategic Intelligence
specific types of intelligence, see AR 310-25.
a. Distinctions. The distinction between stra-
tegic intelligence and combat intelligence is prin-
2-3. Combat Intelligence
cipally one of scope. Both types of intelligence are
Combat intelligence is that knowledge of the en- concerned with a knowledge of foreign nations
imy, weather and geographical features required and with geographical or functional areas of ac-
oy a commander in the planning and conduct of tual or possible military operations and are pro-
combat operations. It may be obtained from duced by the application of the same fundamental

2-1
Püvi S®=ä

intsíligence coilection and processiag tecbniques. ularly of amphibious and airborne operationsp
The components of strategic intelligence are bio- may have to depend upon strategic intelîigenes
graphic, geographic, transportation and telecom- for their initial knowledge of the enemy and the
munication, sociological, political, economic, area of operations. In this instance, the distinc-
scientific and Armed Forces intelligence. Combat tion between the two loses its effect.
intelligence focuses on the enemy and the envi= (2) Information collected by combat units
ronment, and is obtained through such means as assists in the production off strategic inteuiigence.
interrogation, ground and aeria! surveillance and Interrogation of prisoners of war and other indi-
reconnaissance, area intelligence, signals mtelli= viduals of intelligence interest (FM 30-15) pro-
gence (SIGINT), counterintelligence, technical vides strategic information on political and
intelligence, imagery interpretation, and sensory economic conditions within the hostile denied
data obtained from target acquisition and night area. Technical and physical characteristics of a
observation devices. newly encountered enemy weapon or other item f
of equipment, in addition to providing valuable
b. Derivation. Although combat and strategic
combat intelligence, may be used in producing
intelligence are treated as separate categories of
intelligence, there are several functional subcate- strategic intelligence to aid in determining the
gories of intelligence from which both are de- production of industrial or manufacturing
centers (FM 30-16). Much of what would be
rived. Included are the major subcategories listed
strategic intelligence in a conventional war be-
(1) Order of battle. comes combat intelligence in an internal defense
(2) Technical. and development (ÏDAD) action. During ID AD
operations, political, economic, sociological, geo-
(3) Target.
graphic and insurgency intelligence is as impor-
(4) Terrain. tant for day to day tactical operations as it is for
(5) Weather. strategic planning.
e. Overlapping Interests. Many subjects of
strategic intelligence interest are also of combat ¿ML ©s>ral?Qmí©ilDSfj@[ñ¡g®
intelligence interest. Counterintelligence is that aspect of military in-
(1) Information gathered and intelligence telligence devoted to offensive actions to destroy
produced for strategic purposes are useful in the or neutralize the effectiveness of adverse foreign
conduct of tactical operations. In this category intelligence activities and to defensive actions to
are maps and charts ; descriptions and studies of protect information against espionage, individu-
beaches, ports, rivers, towns, hamlets, and other als against subversion, and installations or ma-
terrain features; studies of transportation and teriel against sabotage. Counterintelligence is an
communications systems; data on trafficability, integral part of the overall operations security
cross-country movement, climates, and hydrogra- (OPSEC) program and is an essential element of
phy; political, sociological, and economic studies; TC&D planning. See FM 30-17, FM SO-ITA and
and order of battle studies on foreign armies, chapter 8 of this manual for additional discus-
navies, and air forces. Field ccmmandsrs, partie» sions.

;G3fto®¡ñ) Wíü s^my©^!gg ©ífoM


the intelligence officer to include coordination
a. Terms. The term "intelligence officer" is used with other staff officers, collection and processing
here and elsewhere to include the assistant chief of information, counterintelligence activities, and
of staff, G2, of headquarters provided with a co- the intelligence officer's responsibility for prepar-
ordinating staff, and, as appropriate, the intelli- ation of reports.
gence officer, or S2, below division.
h. Scope. This section deaSs with a discussion of §=§<, DlñlífeSílDgGKS© KostpGffiSÜibäßDG'DQG ©ff tíko
the relationships of the intelligence officer with
the commander and other staff members. FM The commander is responsible for all intelligence
101-6 discusses in detail the responsibilities of activities within his command to include gather-

2-2
FM 30-5

ing and reporting information on the enemy and e. During the execution phase of an operation,
the area of operations; converting information the intelligence officer supervises and coordinates
into intelligence; and disseminating intelligence intelligence operations to insure the successful
to higher, lower, and adjacent units. In connec- execution of the commander's collection orders
tion with the security of his command the com- and to develop information of the enemy situa-
mander is also responsible for taking appropriate tion as rapidly and completely as possible. As an
counterintelligence measures. application, intelligence derived from the enemy
situation is of critical importance to the com-
2-9. Intelligence Responsibilities of the mander in deciding when and where to employ
Intelligence Officer reserves of combat power in both offensive and
defensive operations.
a. The intelligence officer is the principal staff
officer assigned to advise and assist the com- /. The intelligence officer (G2/S2) assists the
mander in carrying out his intelligence and coun- operations officer (G3/S3) in planning cover and
terintelligence responsibilities. As such, the deception missions by furnishing an assessment
intelligence officer assists the commander (and of the enemy's intelligence system to include cap-
staff) by furnishing intelligence which is needed abilities and limitations ; by providing an analysis
to make decisions and to plan operations. The of enemy vulnerabilities, weaknesses, peculiari-
intelligence officer looks for ways to enhance the ties, and recent significant activities which could
execution of the commander's mission and recom- be exploited by cover and deception means; by
mends appropriate actions. Intelligence is pro- increasing the counterintelligence effort to deny
vided by the intelligence officer through written enemy attempts to detect friendly plans; and in
reports, estimates, and oral briefings. coordination with the EW/cryptologic staff offi-
cer, coordinates appropriate aspects of electronic
b. The intelligence officer must plan, making
deception.
logical assumptions about probable missions
which the command mamy expect to receive, and g. The intelligence officer is responsible for
collect all necessary information and intelligence. maintaining operations security (OPSEC) in dis-
Advance planning may be facilitated by main- charging his responsibilities for intelligence,
taining close contact with the other staff counterintelligence, and security. He recommends
members of his own headquarters and with the OPSEC plans and policies to the commander in
G2/S2 of higher, subordinate, and adjacent head- the areas under his responsibility concerning in-
quarters. telligence operations, communications, signal se-
curity electronic counter-countremeasures, train-
c. Once a mission has been received, the intelli- ing, and tactical cover and deception.
gence officer réévaluâtes the intelligence that he
has on hand and recommmends what additional
intelligence is needed by the commander for plan- 2-10. Relationship of the Intelligence Officer
ning operations and making decisions. The needs to the Staff
are usually related to enemy capabilities, enemy a. Primary coordinating staff responsibility for
vulnerabilities, and the environment in which the any one functional activity (Gl through G5) is
operation will occur. These intelligence require- exercised by the designated staff officer. Many
ments are recommended to and approved by the activities are closely related and may require
commander and form the basis for the collection close coordination among all members of the staff
effort. Essential elements of information (EEI) including the personal and special staff.
are a primary basis of determining intelligence
requirements and are determined by the com- 6. The G2 prepares the analysis of the area of
mander. operations and the intelligence estimate ; both are
used by all staff officers in estimating the effect of
d. The intelligence officer provides information, the environment and possible enemy courses of
estimates, and intelligence plans during the plan- action in their areas of interest. All general and
ning phase of an operation. He also prepares, special staff sections furnish, in turn, informa-
coordinates with the G3/S3, and recommends to tion to the G2. For example, the G5 furnishes
the chief of staff pertinent fragmentary orders to information within the political, social, economic,
initiate or modify intelligence and security opera- and psychological fields for inclusion in the analy-
tions. sis of the area of operations and otherwise assists

2-3
Pfifl è!@=è)

in intelligence activities involving TC&D, civil primary users of intelligence in the tactical orga-
affairs ana psychological opérations, suck as c;viT: nization. The intelligence demanded by the com-
censorship, identification and recommendation of mander and the staff members is published by the
potential sources and agencies, detection of en- G3/S3 in respect to its relationship with tactical
emy agents within the civilian population, and in operations, which are the primary purpose and
certain instances, proeureiEeni of civilian equip- activity of the combat units.
ment and supplies required for military intelli-
gence operations. g. The G2/S2 must work closely with the G3/
S3 and with the field artillery intelligence officer
c. Other specific intelligence data are furnished located in the TOG fire support element (FSE).
to meet the requirements of various members of In addition, the division artillery and its support-
the staff. Staff members who want specific intelli- ing target acquisition means (radars, aircraft,
gence state these desires to the G2 so that be may flash, and sound capabilities) can provide valua- 9
include them in his collection plan. Specific intel- ble information and intelligence. These sources
ligence demands may include such items as target should be considered when developing intelligence
intelligence, technical intelligence, reconnaissance estimates and summaries. In turn, these agencies
requirements, and maps. must be provided with all available intelligence.
The G3/S3 will plan his operations based on this
d. All the assistant chiefs of staff recommend
information and intelligence. The fire support co-
to the G2 essential elements of information ordinator (FSCOORD) will select targets and de-
(EEI) on enemy capabilities, vulnerabilities, and
termine fire support requirements by analysis of
area characteristics which have a major effect on the intelligence.
activities falling within their primary staff re-
sponsibilities. The G2 uses these recommendations h. The G2 coordinates with the G5 because the
and his own determination of intelligence re- population is a major source of information and
quirements as a basis for the EEI to be recom- intelligence. Psychological operations conducted
mended to the commander. in both hostile and friendly areas will also pro-
vide valuable information. The G2 provides infor-
e. The G2 assists the Gl by providing informa- mation to the G5 on which the civil military
tion on which to base personnel loss estimates for operations officer and units base their analysis
the whole command. In turn, the Gl assists the and estimate of psychological, political, sociologi-
G2 by insuring the availability of intelligence cal, and economic factors affecting the command.
specialists and by maintaining the strengtli of In turn, the G5 assists the G2 by providing the
intelligence units and information collection results of these detailed analyses to the G2.
agencies of the command. The G2 coordinates
with the Gl in intelligence aspects pertaining to
prisoners of war. 2=1111. KoC(s¡fe[ñ)s!alC¡5) ©(? tfi/í® fl[al{?©CflcU0(ñ;gQ ©ÄQP
fî®. McçUUîOO-, hafWms <s][ñX°] AiajjiSeQüüfi'
/. The G2/S2—G3/S3 relationship is necessar- (UJnüte
ily close due to the need for a constant two-way G. The intelligence ofïïcer furnishes intelligence
now of information, intelligence and operational and information to subordinate units, adjacent
data. The G2/S2—G3/S8 staffs normally operate units, and higher headquarters. This intelligence
a joint facility as part of the tactical operations may have been produced by the G2/S2 and his
center (TOG). The TGC facilitates the exchange staff or it may have been received from higher,
of intelligence and information especially during lower, or adjacent units. Intelligence or unproc-
a rapidly changing battlefield situation. When essed information may be disseminated based on
new intelligence or information is received it will the urgency and needs of the user. The distinction
be immediately evaluated and passed to the G3 between information and intelligence is fre-
staff. For example, information derived from op- quently a matter of degree. The point at which
erations may indicate a change of enemy inten- processing of information produces intelligence is
tions. This information will be processed and difficult to identify. As a general rule, intelligence
received from subordinate headquarters is
immediately passed to the G3 staff. Tlhe close re-
treated as information by the receiving echelon
lationship between the G2/S2 and the G3/S3 can
inasmuch as this information must be integrated
hardly be overstated. The G3/S3 is one of the into current holdings, compared with other data,
FM 30-5

and reassessed based on all data available at the assets based on the commander's EEL The intelli-
higher echelon. gence officer is responsible for the staff supervi-
sion of assigned and attached intelligence units.
6. The intelligence officer develops the plans
He recommends to the commander priorities for
and orders that govern the conduct of intelligence
intelligence collection and production. He antici-
activities and collection efforts of the command to
pates intelligence requirements and controls pro-
include ground and air reconnaissance. He issues
duction and dissemination of intelligence by
orders in the name of the commander and exer-
reviewing, modifying, and approving intelligence
cises staff supervision to insure their proper exe-
documents and reports produced by intelligence
cution.
resources of the command. In this respect he
c. The intelligence officer assists subordinate must be particularly alert to any enemy deception
commanders and intelligence staff officers in in- efforts to present false or misleading indications.
telligence matters. Such assistance frequently re- In conjunction with other staff sections, the G2
quires coordination with other members of the also supervises and monitors intelligence aspects
special and coordinating staffs. of training and maintenance of intelligence re-
lated equipment.
d. The intelligence officer maintains close liai-
son with the S2 or G2 of the next higher head- 6. The effective utilization of available person-
quarters to obtain early information regarding nel resources is the key to a G2's success. A
planned future operations and to anticipate the means of insuring effective utilization of person-
next decision or mission affecting his own com- nel is to establish a priority for each intelligence
mander. In addition, a close working relationship task, thereby minimizing the dissipation of limited
must be established with subordinate intelligence personnel resources.
officers to insure that responsive intelligence links c. In addition to supervising and coordinating
are maintained. In stability operations, the G2/ intelligence operations, the G2 must also keep the
S2 will be required to maintain close and continu- chief of staff and the commander informed of
ous liaison with both host country and allied significant intelligence, information, and activi-
forces, to obtain intelligence data and reports and ties. He must coordinate with members of all the
provide assistance in the form of intelligence general and special staffs of his own headquarters
studies, reports, and estimates which may be as well as the G2 of the next higher headquarters.
needed by allied forces located within, or in some
cases, outside of the area of operations. This liai- d. In the conduct of the intelligence effort, the
son permits the intelligence officer to collect in- G2 should carry out a number of periodic and
formation and to prepare analyses and estimates scheduled personal liaison visits to related intelli-
needed by the commander, other members of the gence organizations, including host country intel-
staff, and subordinate units to make their own ligence agencies in stability operations. Such
estimates and plans. The intelligence officer at the steps should prove to be mutually beneficial—a
next higher headquarters may be able to provide closer working relationship can be established.
additional intelligence specialists or units for a The quality of intelligence should also be im-
given operation. proved as each agency obtains an understanding
of the strengths and weaknesses of the other and
how each can provide support to others to resolve
2-12. The Intelligence Officer as Staff or minimize existing problems.
Section Chief
a. The primary function of the intelligence of- 2-13. Intelligence Officer Functions in Intelli-
ficer (G2) at echelons of division or higher is to gence Operations
supervise and manage the overall intelligence ef-
G2/S2 intelligence functions generally follow the
fort and resources in such a way as to provide
procedures set forth in the phases of the intelli-
effective intelligence support to the commander
gence cycle (discussed in greater detail in this
and staff. Normally the G2 will not become di-
and later chapters).
rectly involved in detailed intelligence production
procedures but will remain relatively unencum- a. At higher echelons, the production of mili-
bered by the daily routine of operations. He will tary intelligence is an operation which requires a
coordinate and supervise the entire intelligence more thorough, integrated, and systematic effort
collection system and task appropriate collection than is necessary at brigade and lower echelons.

2-5
FM s^s

Sources ars sicrs numerous and varieds agencies cific questions on such subjects as strength,
acquire larger volusres of information! to ulti- disposition and identity of enemy units and the
mately produce intelligence, and the intelligence location of enemy weapons, minefields and defen-
picture is so complex that it may be misinter- sive installations. Concurrently, the S2 must de-
preted unless the collected information and intel- termine the enemy's capabilities and probable
ligence are properly integrated into a meaningful courses of action. In determining the enemy capa-
whole. At the same time, the very order and logic bilities and probable courses of action, the S2
of an established, complex, integrated system for must also analyze the indications presented by
the production of intelligence can, if that intelli- the enemy to determine whether the enemy is
gence is accepted at face value, constitute a sig- attempting to deceive us or to counter our tactical
nificant vulnerability to the insertion of false cover and deception (TC&D) efforts. The S2
information and ultimate deception by the enemy. must coordinate most closely with the SS. At
b. At lower maneuver echelons the intelligence these levels the S2/S3 relationship can best be
officer (S2) devotes maximum effort to the pro- described by the term "dual function." That is, it
duction of intelligence on enemy capabilities and is imperative that the S2 and the S3 possess a
in determining the effects of those capabilities on firm, clear, and realistic understanding of each
the unit's mission as well as on the operation other's functions, and each must be prepared to
plans prepared for the mission. The S2 must de- assume for short periods of time the functions of
vote his effort to answering the commander's spe- the other concurrently with his own.

Í©SfD®lñ)

-M, ©¡rfpifDDZsitoifi) ©ff fflhi© IgQIñJS© pushed in consonance with command priorities
and determine the most efficient manner in which
a. General. to use his assets.
(1) The commander relies primarily on Ms (2) Another factor that must be considered
G2/S2 section, the attached military intelligence is the need for continuous (24-hour) operation of
elements and subordinate combat units for the the intelligence section. The intelligence section
combat intelligence he requires. Consequently, a must retain sufficient flexibility to meet peak
knowledge of these organizations—their composi- workloads without impairing the ability to con-
tion, capabilities, interrelationships and person- tinue operations during displacement. The G2/S2
nel—is a necessity. In an intelligence section maintains personnel in the TOC and may be re-
there are normally several factors which will af- quired to assist in the manning of an alternate
fect the organization and duty assignments. One command post.
such factor is the requirement placed upon the (3) There are a number of issues that the
intelligence officer to be responsible for the opera- G2/S2 will consider in organizing his section. He
tions of the section. In order that he may best must organize his section functionally because the
meet this responsibility, the detailed supervision table of organization and equipment (TOE) spec-
of the section should generally be left to an assis- ifies only the number of personnel authorized for
tant. Such a measure will assure the intelligence the intelligence section and does not prescribe a
officer of the continued operation of the section in functional organization. Under normal circum-
his absence. It will provide him the time neces- stances the "type" functional organization is mod-
sary to analyze properly the intelligence produced ified to meet the needs of the command in terms
by the section and to use this analysis as a basis of the mission assigned, the scope of the intelli-
for making sound recommendations to the com- gence activities to be performed, and the number
mander. G2/S2 and G3/S3 personnel must work of personnel available. It may be necessary to
together as a team in order to discharge their augment unit intelligence sections with represen-
joint responsibilities. The intellipence officer has tatives of other agencies, units, or services.
the responsibility to recommend friendly force b. Brigade and Battalion. In disdiarging their
courses of action to the G3/S3 or commander joint responsibilities, S2 and S3 personnel must
based on his analysis of the enemy situation. be prepared to assume the duties and functions of
Based on operational requirements the G2/S2 the other when necessary. Organizational guid-
must develop priorities for the tasks to be accom- ance required to accomplish the intelligence re-
2-<§
FM 30-5

T"
I
I
I
Operations
G2 Recon
and
I Counter-
Branch Surveillance
I intelligence
Branch
I Branch
l
I
I
J_
Plans I
Branch* I
I
— — _J

* When required by nature or scope of intelligence operations.

Figure 2-1. Type G2 sections (division, corpa, filed army).

sponsibilities at brigade and battalion levels is operations branch also maintains the collection
provided in appropriate FMs pertaining to a par- plan and publishes the commander's essential ele-
ticular branch of service and unit SOP. Intelli- ments of information (EEI) in the form of
gence guidance for units below battalion level, orders and requests for information to units;
where no intelligence organization exists, is pro- maintains enemy situation maps; prepares daily
vided in chapter 9. summaries; develops target data; and prepares
c. Division. Normally a type G2 section at divi- intelligence estimates, analyses of areas of opera-
sion level (fig 2-1) consists of four functional tions, intelligence annexes, and intelligence re-
branches—operations, G2 reconnaissance and ports. The branch engages in a variety of diverse
surveillance, counter-intelligence, and administra- but intelligence-related activities : conducting re-
tion. These branches perform the functions de- quired research projects; arranging for liaison
scribed below : with higher, lower, and adjacent headquarters;
(1) Operations Branch. The operations disseminating weather information ; supervising
branch accomplishes functions which encompass prediction of radioactive fallout from enemy-de-
the entire spectrum of the intelligence cycle— livered weapons and supervising the monitoring
directing, collecting, processing the information, and surveying of radioactive contamination from
and disseminating the resulting intelligence. The all weapons; supervising procurement and distri-

2-7
Pfifl §®-s

îistior. cf Ei&ps azid Eiap supplements; su^srvis» agencies. (For additional detail see FM 30-9, FM
iiQg the activities of the intelligence analysts and 30-20, FM 30-35 and FM 31-100 (TEST)).
eoordinating the activities of the intelligence in- (3) Counterintelligence (CI) Branch. Since
teirrogation (IPW) personnel of the attached mi2= there are no organic counterintelligence personnel
itary intelligence (ME) companies; coordinating assigned to the division G2 section, the chief of
and eozreuating signals intelügence (SIGïNT) ac- the CI section of the attached MI company
tivities of supporting USASA units; providing usually serves as CI branch chief. His responsibil-
¡recommendations and advice for cover and decep- ities include recommending, planning, and super-
tion operations ; supervising the operations of the vising counterintelligence measures; maintaining
long-range reconnaissance element (iff formed counterintelligence records, supervising the inter=
through division assets) which provides a deep rogation of personnel of CI interest ; maintaining
reconnaissance and target acquisition capability; records oí known and suspected enemy agents ♦
and providing intelligence training for division and collaborators; maintaining records on enemy
personnel. The division G2 obtains weather data intelligence organization and procedures, and ad-
from the assigned Staff Weather Officer (SWO). vising the command on methods to counter enemy
The SWO is supported by the Air Weather Serv- collection and deception efforts to include camou-
ice (AWS) Weather Team (WETM) assigned to flage; providing assistance and advice for
the division. This team relies upon the Weather friendly OPSEC and TC&B operations; supervis-
Center (WEGEN) at field army TOC (FATOC) ing the activities of the counterintelligence per-
for forecasting support. Further details on the sonnel of the attached MI company; preparing
extent and types of meteorological weather data counterintelligence estimates, plans, directives,
available are given in joint manual FM 31-3/ SOP, and reports ; supervising security training
within the command in conjunction with the G3;
(2) G2 Reconnaissance and Surveillance planning and supervising all aspects of signal se-
Branch. Personnel of this branch support the G2 curity surveillance activities; and conducting CI
Reconnaissance and Surveillance officer in his liaison.
staff responsibilities for planning and coordinat- (4) Administration Branch. The administra-
ing of reconnaissance and surveillance missions; tion branch fulfills the administrative, transpor-
advising the G2 on the available reconnaissance tation, and housekeeping requirements of the G2
and surveillance assets, their status, capabilities, section. The branch is responsible for maintain-
and limitations; and preparing the proposed re- ing the section journal, central files and records,
connaissance and surveillance pían. They exercise and duty rosters and establishes a G2 message
staff supervision for ground surveillance and tar- center for the handling of outgoing and incoming
get acquisition planning. They exercise staff su- correspondence and intelligence reports.
pervision of ail airborne SIGINT assets of the
supporting USASA division support units when (5) Supporting Elements. There are two ma-
SIGINT operational tasking authority has been jor support elements available to the division G2
delegated. G2 Reconnaissance and Surveillance section. The attached US Army Security Agency
personnel are responsible for establishing priori- Division Support Coznpany provides signais intel-
ties of requests for missions received from all ligence and electronic warfare support. The divi-
units and staff supervision over the staff weather sional MI company is attached from the ñeld
ofítce and related activities. Personnel of the army MI battalion to the division. It performs
branch are also responsible for maintaining aer- specialized intelligence and counterintelligence
ial reconnaissance maps and other essential rec- functions to include analysis and production, in-
ords. Once the imagery is obtained, the G2 terrogation of prisoners of war, imagery inter-
Reconnaissance and Surveillance branch super- pretation, and counterintelligence which require
vises the imagery interpreter's effort through the the employment of foreign languages or special
imagery interpretation section chief. The reprc- sldl's (fig 2-2). The MI company commander ad-
auction of the aerial imagery obtained from vises the G2/S2 on the employment of the unit to
Army ar.d ether services is accomplished by the insure that the company is responsive to the in-
imagery reproduction laboratory organic to the telligence requireraentg of the command.
¿ivisicna: MI company. The intelligence obtained d. Corps. The functions of the G2 section at
:s^hen distributed by the branch, in coordination corps (fig 2-1) are basically the same as those at
witl^ the operations branch, to all interested division. The scope of corps responsibilities is
-■0
FM 30-5

Military
Intelligence
Company
(Division or Corps)

Counter-
Company
intelligence
Headquarters
Section

Imagery Technical
Interpretation Intelligence
Platoon Section*

* With Corps military intelligence company only.

Figure 2-S. Military intelligence company.

larger and the volume of information is greater. veillance Airplane) which provides aerial recon-
Additional personnel requirements are necessary naissance and surveillance support for the corps.
because the corps G2 section is concerned with The engineer terrain detachment performs ter-
the collection efforts in a larger area of opera- rain analysis and provides reports and studies
tions than the divisions. "Furthermore, the lead- required by the intelligence officer in preparing
time required for intelligence planning of future his analysis of the area of operations. The engi-
operations is greater. Corps is supported by a neer staff and special engineer units have the
USASA battalion. The MI company is changed by responsibility and technical capability of per-
the inclusion of technical intelligence personnel forming detailed terrain analysis and evaluating
who operate under the supervision of the opera- the effects of weather on terrain. The G2 is also
tions branch. The organization of the corps G2 provided weather data and studies by the AWS
section includes a corps counterintelligence officer WETM assigned at the corps TOG. Psychological
who directs counterintelligence activities of the operations and civil affairs units have intelligence
corps. Other intelligence assets available to the personnel specifically trained to perform detailed
G2 include the airborne infantry ranger company analysis of psychological, sociological, and eco-
which provides a deep reconnaissance and target nomic factors and to evaluate the effects of their
acquisition capability and the MI company (Sur- operations on the corps mission. The target ac-

2-9
Pßa g®=§

quisition battalion supporting corps artillery pro- agery interpretation detachments operating with
vides a valuable target acquisition capability. The tactical USAF reconnaissance squadrons.
G2 section should work closely with the corps fire (4) The counterintelligence branch super-
support element to insure that the G2 section vises the activities of attached and supporting
¡receives all targeting information secured by ñeld censorship, signal security, and coimtermtel»
artillery observers, radar, and target scquisition ligence personnel.
batteries. The fire support element must be pro-
(5) A plans branch is added to the G2 sec-
vided with all available intelligence to insure tSi®
tion at field army level and to lower echelons
proper attack of all nuclear and nonnucleair
when required. This branch prepares and/or co-
targets.
ordinates action on intelligence plans,
e. Field Army. collection memoranda, specific requests
»
mation, EEÏ, and other intelligence r*
(1) The field army is supported by an as-
signed Military Intelligence Battalion (Field (S) Under the staff supervision of the G2,
Army), a Military Intelligence Battalion, Aerial the engineer staff officer at field army is responsi-
Reconnaissance and Surveillance (MIBARS) and ble for providing engineer topographic and geo-
an attached USASA Brigade. At field army there graphic intelligence products. To accomplish this
is a significant increase in the amount and scope intelligence function, an engineer topographic
of activities compared to that found at division battalion is assigned the mission of producing,
and corps levels (fig 2-1);, and the MI element storing, and distributing maps, performing topo-
has an increased strength and capability. Plan- graphic surveys, and preparing engineer intelli-
ning leadtime is greater, the area of interest is gence reports as required for the field army (FM
increased tremendously, and the intelligence re- 30-10, FM 5-146, and FM 5-1).
quirements are expanded to include strategic in-
(7) The Air Weather Service (AWS) of the
telligence. In the latter case there is a need for
US Air Force provides weather forecasts, cli-
target information from deep within the enemy
matic studies, and weather and climatic sum-
territory so that suitable targets may be located
maries through the SWO to the G2 based on his
for long-range weapons available at army level;
requirements. This data is provided by the
correspondingly, the field army must also counter
Weather Center (WEGEN) at Field Army TOG
enemy air and missile capabilities.
(FATOC). All weather teams in the Army in the
(2) The operations branch of the field army fieîd depend upon the WEGEN through the
G2 section performs the same basic functions as WETM/FATOC for short and extended period
at the lower levels plus strategic intelligence re- forecasting services. To be effective, the WETM/
search and analysis (SIRA) and technical intelli- FATOC must have a detailed knowledge of all
gence (TI) functions. Strategic intelligence aspects of tactical operations to tailor its fore-
research and analysis personnel provide studies casts to the weather needs of each particular mis-
in fields of strategic intelligence interests, process sion and the general battle plan.
information relating to the areas of assigned in-
terest, and disseminate intelligence. Technical in-
2=11 £>. [SGC<°](fB<s)!iSG!ruD[o) ©í (l[nlü'QB£%QB@Q iOSÖÜOH
telligence personnel plan and supervise the
Woift íSüG MlftaUry GDDiiQDiloiJQKSQ HUNDÍS
exploitation of captured materiel; coordinate ac-
tivities of scientific and technical intelligence a. General. The G2/S2 section (separate bri-
agencies in the field army area; assist special gade, division, coirps, and field army) is authoir-
staff and technical service intelligence personnel ized by TOE. MI personnel from the attached MI
in obtaining interrogation reports, translations of unit will be employed at all echelons based on the
captured documents, photographs, and other recommendations made by the MI unit com-
available data on enemy technical and scientific mander to the G2/S2. The MI unit commander
materiel; prepare technical intelligence sum- provides intelligence support to the G2 in the
maries and reports; and maintain collection di- specialized fields of intelligence analysis, imagery
rectives and plans, items-wanted lists, and interpretation, counterintelligence, and intsïli-
technical intelligence files. genee interrogation and, at corps and above, tech-
nical intelligence. Close liaison between tha
(S) The field army G2 Aiir branch is also intelligence ofäcer and the Ml unit commander is
responsible for the staff supervision of Army im- essential. They should work together as a team to

2-1] ©
FM 30-5

insure the proper utilization of intelligence per- 2-16. Relationship of Intelligence Section
sonnel. with Attached USASA Units
b. Assignment and Attachment of MI Units. The G2 has staff supervision over signals intelli-
MI units supporting separate brigades, divisions, gence (SIGINT) resources that are attached or
and corps are normally assigned to the MI Battal- under the operational control of the commander.
ion (Field Army) and attached to the supported This includes the coordinating of SIGINT opera-
unit. In order to establish and maintain close, tions and recommending the employment of SIG-
continuous working relationships, MI units INT resources. The G2 exercises staff supervision
should be assigned or attached to the supported over signal security (SIGSEC) surveillance activ-
commands early in the command's unit training ities to include compromising emanations control
activities. The G2 also recommends SIGSEC pol-
phase and should remain assigned or attached icy. The supporting USASA element assists the
with the displacement of the command. Personnel G2 in determining control measures necessary to
with linguistic or other highly specialized area- prevent exploitation of command facilities
oriented abilities should join the MI unit as the through compromising emanations. The support-
supported command is assigned new geographical ing USASA element also reviews those plans, di-
areas of operations. The appropriate parent unit rectives, and training materials submitted by the
G2 section which have communications security
in the new area of operations assumes adminis-
(COMSEC), electronic security (ELSEC), or
trative control of the supporting MI unit. See FM compromising emanations control implications.
30-9 for details of attachment and assignment of See FM 101-5 for further details of USASA/G2
MI units. relations.

Section IV. OPERATIONS

2-17. General that portion of the assigned zone or area of oper-


ations in which the commander is capable of di-
Intelligence operations concentrate on those essen-
rectly affecting the course of combat by the
tial elements of information (EEI) and other in-
employment of his own available combat power.
telligence requirements (OIR) concerning the
Normally, each commander will possess the
enemy and the environment needed by the com-
means for obtaining the information he needs
mander to accomplish his mission. The enemy
from within his area of influence.
situation and the area of operations are analyzed
(1) Although the area of influence can ex-
to determine the key elements which affect mili-
tend in any direction from the forward disposi-
tary operations. Key elements include such condi-
tion of the command, the significant direction and
tions as extremes of weather and terrain; enemy
dimension is that which extends forward from
use of particular forms of combat power; imple-
the forward edge of the battle area (FEBA). For
mentation of an enemy capability previously held
practical purposes the limit of the area of influ-
in restraint; disposition, attitudes and sociologi-
ence is set by the effective range of the available
cal factors pertaining to the local population; or
weapon systems since a commander will not nor-
use of resources and characteristics of the area
mally maneuver the subordinate elements of his
which affect the accomplishment of the friendly
commmand beyond the range of the supporting
mission.
fires available to him.
2—18. Geographical Areas of Intelligence (2) A weapons system includes the means to
Operations acquire targets for the weapon ; consequently, the
range of the system is just as effectively limited
a. General. Areas of intelligence operations are
by the inability to acquire targets as it is by a
assigned to units on the basis of areas of influ-
lack of weapon range. The area of influence, then,
ence and areas of interest. Such assignment pro-
is sensitive to terrain and weather conditions
vides for continuous surveillance of the entire
which reduce the target acquisition capability for
area of operations. The immediate zone has been
the weapon system involved.
established as an aid in intelligence planning to
be used in defining realistic areas of interest. c. Area of Interest. Intelligence operations are
b. Area of Influence. The area of influence is concerned not only with the area of influence but

2-11
FM 30-5

also extend further to the area from which infor- fluence of the next higher command. The next
mation and intelligence are required to permit higher commander, therefore, has combat surveil-
planning for the extension of the area of influ- lance over it and provides the bulk of the surveil-
ence or for the displacement of potential targets lance required in that portion of the subordinate
into the area of influence. commander's area of interest which is outside the
(1) The area of interest includes the area of subordinate's area of influence. The relationship
influence plus that area outside the area of influ- of the two areas is schematically depicted in fig-
ence containing enemy forces which, if employed ure 2-3.
in the area of influence, could jeopardize the ac- d. Immediate Zone. The immediate zone serves
complishment of the mission. as a quantitative guide in establishing the boun-
(2) The area of interest of a subordinate daries of the area of interest. The immediate zone
command is normally included in the area of in- establishes the distance beyond the area of influ-

• '"•/•/*••••/•/•/•/•

-~• ••••/•• •/•••••/*"/•/•


" " " '***************
—*********
******

FEBÂ FEBA

n
» EacoKjjaosos Aroa of Influonco
sa isa t^ œi ss si isi Inconpossos Aroa oí Intoiosí

Figura 2-3. Relationship of area of influaiaea to arac, of inteveat and tho mmaaiata song.

2=112
FM 30-5

ence which allows the commander the reaction b. Intelligence must be useful. Intelligence must
time to engage the enemy when he comes within increase knowledge and understanding of the par-
the area of influence. Thus, the immediate zone is ticular problem under consideration in order that
that area bounded by the distance at which a logical decisions can be reached.
commander must have immediate knowledge of c. Intelligence must be timely. The best intelli-
an enemy presence in order to act effectively gence is valueless unless it reaches the user in
when the enemy reaches the area of influence. time to serve as a basis for appropriate action.
(1) The immediate zone is determined by Adherence to this principle may involve some sac-
adding to the boundary of the area of influence rifice of completeness and accuracy in the intelli-
the distance the enemy can travel in the time it gence product. The intelligence officer must make
takes the friendly unit to react. This relationship the commander aware of the trade-off between
may be expressed as follows: (Enemy Rate of accuracy and timeliness so the commander can
Movement X Reaction Time) + Boundary of the state a preference in his requests for intelligence.
Area of Influence = Immediate Zone. The reac-
tion time is the total time it takes to detect the d. Intelligence operations must permit flexibil-
enemy, identify and locate the enemy, make a ity in procedures. Standard procedures generally
decision, and issue the appropriate command. The make intelligence operations more effective, pro-
enemy's rate of movement is the rate at which he vided the established processing does not lead to
can be expected to move under existing condi- routine acceptance of the resulting intelligence
tions. with increased vulnerability to enemy deception.
(2) In order that the immediate zone be real- Intelligence operations are based upon reason and
istic and useful, these factors are determined in judgment; procedures must be flexible to meet
light of their worst case, that is, the enemy's unexpected requirements. Procedures which can-
greatest expected rate of movement and the not be changed to meet the requirements of a
friendly unit's slowest expected reaction time. given situation generally lead to failure.
The effect is to make the immediate zone valid for e. Intelligence operations require imagination
all foreseeable eventualities. and foresight. Policies and procedures that limit
the imagination or initiative of subordinate
2-19. Basic Principles of Intelligence agencies are avoided. Intelligence personnel and
Operations agencies must be resourceful so that available
Although the product of intelligence operations in information can be developed and exploited to
the Army varies with the requirements posed by produce intelligence for the user.
the operational environment, certain basic princi- /. The nature of intelligence requires employ-
ples guide the conduct of all intelligence opera- ment of continuous security measures.
tions. Included are the following : (1) Unauthorized personnel must he denied
information about operations of intelligence
a. Intelligence operations and tactical opera- agencies, sources of information, and the intelli-
tions are interdependent.
gence product.
(1) Intelligence operations within the Army (2) The effects of compromise of complete
are an integral part of the operations of all units. intelligence studies and estimates are obvious.
The degree of success achieved by any unit in The cumulative effects of compromise of frag-
accomplishing its mission will be directly affected mentary information are also dangerous. The
by the intelligence which it develops and uses, compromise of a source may result in loss or
and the manner in which it is used. decreased value of that source to the intelligence
(2) Staff agencies with responsibility and element exploring it. Some sources are so pecul-
authority for preparing and issuing operational iarly susceptible to this that elaborate security
orders and those with responsibility for intelli- systems are required for protection.
gence operations must work as one. Only in this g. Intelligence processing requires free, com-
manner can orders and plans reflect available in- plete, and timely exchange of information and
telligence and take full advantage of available intelligence to permit production of a complete
knowledge of the situation and of enemy capabili- and usable product. Care must be taken to resolve
ties and vulnerabilities. Responsibility for coordi- the conflict between security measures and timely
nation rests jointly upon intelligence and other dissemination of information or intelligence to
staff agencies. those who need it.

2-13
FM 30~S

DIRECTING COLLECTING
• REQUIREMENTS • TROOPS
• PRIORITIES • INTEL SPECIALISTS
• INDICATIONS • SPECIAL UNITS
• SELECTION • DTHER SOURCES

USE DBSSEMJNATiNG PROCESSING


• COMMANDERS • TIMELY • RECORDING
• STAFF • USABLE • EVALUATION
® OTHIIS • iNTKiPiiTAT@©N

Figure 2-4- The intelligence eyela.

2-M
FM 30-5

2-20. Intelligence Cycle and requests are produced and sent to the collec-
tion agencies.
a. The activities connected with intelligence op-
c. Collecting the information is the next phase
erations generally follow a four phase cycle ori-
ented on the commander's mission. Supervising of the intelligence cycle. After the agencies with a
collection capability have been selected and sent
and planning are inherent functions involved in
specific orders and requests, the collection efforts
all phases of the intelligence cycle. The four
are supervised to verify that orders and instruc-
phases are :
tions are executed effectively and in a timely
(1) Directing the collection effort. manner.
(2) Collecting the information.
(3) Processing the collected information. d. Processing is the third phase. As the infor-
mation is collected and received, it is processed
(4) Disseminating and using the resulting into intelligence. Processing consists of :
intelligence. (1) Recording.
The intelligence cycle is continuous (fig 2-4) and (2) Evaluating the information to determine
all four phases may take place concurrently. At its pertinence, reliability, and accuracy.
the same time that new information is being col- (3) Interpreting the information to deter-
lected by intelligence assets, other information mine its meaning and significance.
previously collected is analyzed, processed, and
disseminated. e. Dissemination and use of resulting intelli-
gence is the final phase of the intelligence cycle.
b. Directing the collection effort begins with The completed intelligence product is dissemi-
determination of requirements and establishment nated through means of annexes, briefings, esti-
of priorities. A continuously updated collection mates, messages, reports, situation overlays, and
plan keyed to the mission of the command and summaries. A useful intelligence product is one
enemy situation must be developed. Based on this which will assist the commander and staff and
plan, orders and requests for the collection of provide a basis for evaluating and interpreting
specific information are sent to selected units and new information while providing further direc-
organizations (collection agencies). A typical col- tion to a new cycle of intelligence operations. The
lection plan is discussed in chapter 4 to show how commander's need for intelligence products that
it is related to the mission through the EEI and will enable him to execute his assigned mission is
other intelligence requirements, and to reveal the the sole justification for the production of intelli-
logical thought processes by which specific orders gence.

Section V. INFLUENCE OF THE OPERATIONAL ENVIRONMENT ON


INTELLIGENCE OPERATIONS

2-21. General successful accomplishment of the mission. Re-


quirements are based on the mission. Information
FM 100-5 presents a detailed discussion of the
obtained is processed for its significance in rela-
operational environment. While all elements of
tion to the accomplishment of the mission. These
the operational environment do not necessarily
considerations make it imperative that intelli-
influence every operation, «ach operation is influ-
gence personnel have a thorough knowledge and
enced by the commander's mission, the nature of
understanding of the assigned mission. In addi-
the conflict, the scale of use of nuclear and other
tion to the assigned mission, contingency mis-
weapons, the method of troop transport, the na-
sions will also generate requirements for
ture of enemy forces, the locale, the civil popula-
intelligence.
tion in the area of operations, and the friendly
forces available. 2-23. Nature of Conflict
Intelligence requirements are similar for all types
2-22. The Mission of conflict. However, in a given type of conflict,
The mission of the command is the paramount emphasis is often placed upon certain aspects of
consideration in conducting intelligence opera- these intelligence requirements.
tions. Intelligence operations must be conducted a. Cold War.
to produce the intelligence necessary to insure the (1) The frequent noncombatant nature of

2-15
KE S©=S

sri.^itsi^y aetf.vntr.ss f.a eoM wai? siteEtío2:§ isuiuui" guidance and procedures appüeabüe to th.® ©DE:-
enees intelligence requirements. WMÎe smilitasy duct of intelligence activities in stability opera-
aspects o£ the airea of operations aire smpîiasized, tions.
tune pokitieai, economics, technological,, soeiologiea!ls
and psyehclcgicaî actfons in the area gain in- ô. Limited War. Limited war is anssed eonfiiet
cireasedl iiaiportancs. Rsç'jiresîents foir infoFinsa" short of general war, exclusive of incidentsp in-
tiom on covert and overt activities and potential volving the overt engagement off the military
capabilities of dissident and insaifgent dements forces of two or more nations. In a limited war,
also are necessary to determine the nature of the intelligence operations are primarily of a combat
activities of these elements. An analysis of these intelligence nature. Although the immediate em-
activities is necessary to determine a counterac- phasis in intelligence operations is determined by
tion, to provide warning of an escalation of the the requirement to support the existing opera-
conflict to other types of conflict, and to provide tional situation, the consequences of a sudden ex-
for an immediate attack of targets if open eo&= tension of the conflict, particularly to a general
war, dictate that intelligence operations be condi-
tioned to this possibility. Intelligence operations
(2) Counterintelligence requirements are
must produce information and intelligence which
particularly significant. Since covert enemy activ-
will provide warning of an impending extension
ities such as espionage and sabotage; political,
of the conflict. The overall system, which includes
social, and economic subversion; guerrilla and m-
organization, equipment, personnel, and opera-
sergent activity, or any combination of these are
tions, must be maintained in such a condition so
normal operations, a contmuous effort is neces-
as to permit ready transition from a limited to a
sary to counter them. This effort is a responsibil-
general war.
ity of the highest to the lowest individual from
the highest headquarters to the lowest echelon. c. General War. General war is armed comffiet
FM 80-17 and FM 3Q-11A provide detailed coun- between major powers in which the total re-
terintelligence guidance and procedures applica- sources of the belligerents are employed, and the
ble to the conduct of counterintelligence activities national survival of a major belligerent is In
in stability operations. jeopardy. During the opening phases of a general
(S) Intelligence collection procedniires and war, the intelligence emphasis is on maintaining
techniques vary with the nature of the environ- the security of the command; providing early
meht. Troop commitments will influence the scope warning of the start of major enemy tactical op-
of the operations; in some cases regular military erations ; protecting intelligence collection means ;
forces may be required to conduct what are es- and providing such evaluated information con-
sentially combat-preventive operations. In this cerning the nature of the enemy, the weather, and
cold war environment, which encompasses stages terrain, as may be available and is required.
from simple political maneuvering between some When tactical operations begin, intelligence oper-
countries to insurgent warfare and low-intensity ations are. oriented toward securing the intelli-
conflict in other countries, changes in conditâbns gence necessary for accomplishment of the
in turn demand a change in emphasis oí proce- assigned tactical Edssicn.
dures and techniques. The need to honor political
boundaries often reduces the effective employ-
ment of airborne surveillance devices and ire- AgQKÍÍO
quires a modified use of these means and a Enemy employment of chemical and biological
greater emphasis upon human intelligence (WU~ agents introduces new factors into intelligence
MINT) collection assets. The nature of Phase 1 operations. The effectiveness of such agents, the
insurgency may limit the effectiveness of elec- difficulty of immediately detecting their employ-
tronic collection devices and combat intelligence ment, and the surprise with which they can be
teehniaues and may also require greater emphasis delivered present a formidable intelligence prob-
on HUMINT collection means. Collection means lem. They create requirements for means off de-
urust be selected in terms off their capability and tecting chemical and biological agents end
suitability within the nature of the situation. Bee obtaining information on the enemy!,s eapaMMty
chapter 9 for a discussion of înteîligsnes aspects and intention to employ these agents. This capa-
related to an insurgent warfare environment. FM bility will be inñueneed by weather conditions.
Siï~3]l and FM 30-18 provide detailed intdligene® Keeping abreast off current forecast weathei? èm-
% .'Jß
FM 30-5

ditions is essential in determining the probability requirements for detailed information on the po-
of potential chemical and/or biological attack. litical, social, and economic situations within the
The influence of weather on the effectiveness of area of operations. In planning combat opera-
friendly chemical agents and on friendly troop tions hostile civilian activities constituting a
safety distances requires detailed and reliable threat to the security of activities or installations
weather forecasts and observations. See TM 3- must be taken into consideration.
240 for field behavior of chemical and biological b. In stability operations, the civil population is
agents.
an important combat intelligence factor because
the insurgent war revolves around the people.
2-25. Enemy Forces Both insurgent and government forces attempt to
Enemy forces may vary from a well-trained, well- win the loyal support of the population. The in-
supported, highly mobile, and numerically supe- surgent has directly associated the people with
rior force to one that is a loosely organized group the insurgency through promises or threats in
of irregular forces operating with little or no order to gain their loyalty and continuing sup-
support. These latter forces can be expected to port, or, as a minimum, their neutrality. The in-
exploit opportunities for guerrilla warfare, sub- surgent depends on the support of the people to
version, and sabotage, and maintain sustained op- sustain his manpower requirements, logistical
erations under favorable conditions. The needs, and intelligence collection effort. This then
diversity of possible enemy capabilities corre- provides one of the most important distinctions
spondingly increases the scope of the intelligence between stability operations and conventional
requirements of the commander. Knowledge of warfare. Actions must be carefully considered as
enemy intelligence organizations and operational to their possible effect, weighing immediate
procedures is also a key factor in estimating en- effects versus long range effects, and effects on
emy capabilities, adapting adequate security meas- the enemy as opposed to effects on the people. In
ures, and employing effective countermeasures. the traditional, large land mass type of warfare,
the civil population will tend to have less relative
2-26. The Area of Operations importance than in insurgent type conflicts in an
An important intelligence task is to provide in- undeveloped area. Insurgent forces are dependent
formation about the area of operations. The mag- to a large degree on the support of the populace,
nitude of this task increases as the locale of thus creating a struggle not only for control of
military operations changes from a modern, well- the land area, but also for control of the populace.
developed, and well-documented area of the world See FM 30-31 for stability operations intelli-
to a more remote area on which little or no docu- gence.
mentation is available. In such an area, greater
effort must be expended on the collection of infor- 2-28. Friendly Forces
mation about the area of operations (particularly All friendly units are involved in offensive and
terrain and populace). defensive security measures. Intelligence opera-
tions are oriented primarily on aspects of the
2-27. The Civil Population operational environment external to the com-
a. The attitudes, actions, and capabilities of the mand. However, the conduct of intelligence oper-
civil population significantly affect intelligence ations is affected by the means available to the
operations. A friendly populace that actively as- friendly forces and the organization of the
sists the military force is an important asset in friendly forces.
collecting information and countering the en- a. Means Available.
emy's intelligence activities. Vigorous well- (1) The availability and capability of intelli-
planned civil-military operations, including civil gence units and information collection devices of
affairs, civic action, community relations, and friendly forces are important influences in intelli-
psychological operations programs will contribute gence operations. For example, a limitation in the
to development of a cooperative attitude on the number of aerial platforms may result in a reduc-
part of the populace. A hostile population makes tion in the tactical air reconnaissance/surveil-
the collection of information more difficult, in- lance capability. This in turn may require a
creases the scope and magnitude of counterintel- greater dependence upon collection by ground re-
ligence operations, and intensifies the connaissance/surveillance means.

2-17
VRâ §@=S

(2) All military units are means for collect- tions which would norînally be performed by a
ing information. The effort devoted to tMs aspect higher headquarters. ïn a small theater of opera-
of intelligence operations varies with the primary tions, a field army headquarters may be required
mission of the unit. Combat and combat support to perform the intelligence operations normally
units normally devote a significant effort toward conducted by a theater army headquarters. A di-
the collection of information, while other types of vision may be required to perform the intelli-
units may collect information of intelligence gence operations of the nest higher echelon when
value only as a byproduct of their normal activi- the necessary intelligence assets are attached.
ties. (2) In combined operations which involve
(3) The individual soldier is a valuable the armed forces of allied nations, certain intelli-
source of information. Intelligence is collected by gence operations should be assigned to a com-
the individual through his five senses (seeing, bined effort of all the participating nations.
hearing, feeling, smelling, and tasting) by noting Combined intelligence operations should be an es-
variations from the norm. From his past experi- sential characteristic of stability operations.
ences and training he will reach his own conclu- (3) In unified operations and joint actions,
sions. It is important that the individual soldier the basic intelligence function is unchanged. In-
be encouraged and trained to turn in captured telligence functions, responsibilities, and proce-
enemy documents, maps, and materiel and report, dures in unified operations and joint actions are
through command channels, observations that ap- conducted in accordance with Joint Chiefs of
pear to vary from the norm. Staff Publication No. 2, "Unified Action Armed
(4) The availability of support from other Forces (UNAAF)."
services for tactical air reconnaissance and sur-
veillance and meteorology affects Army intelli- c. Composition of Forces. The composition of a
gence operations. force determines some of its intelligence require-
(5) Other US governmental agencies may be ments. A predominantly armored force has some-
represented in the area of operations. The what different requirements for detailed terrain
agencies most frequently represented are the De- information than an infantry force. Weather in-
partment of State, Central Intelligence Agency, formation requirements of an airborne or airmo-
and the National Security Agency Central Secu- bile force are different from those of mechanized,
rity Service. motorized, or conventional infantry forces. An
(S) Specific agencies which collect or process enemy capability or vulnerability which is an im-
information are included in chapter 4. portant consideration to one force may not bs
equally important to others. These different intel-
b. Organization of the Forces. ligence requirements influence intelligence opera-
(1) The friendly force structure may dictate tions to include the determination of intelligence
that a headquarters conduct intelligence opera- priorities and methods of collecting information.

§G@tto®ra m. w^m&m. mm ©mmiAmm£& mmmwsmm


m WGSofeF approach of the enemy and allowing him to bring
Weather is analyzed in terms of visibility, clouds, fire upon the enemy.
precipitation, temperature, and wind to deter- (2) Clouds. Clouds affect aviation activities
mine its effect on tactical operations. by decreasing visibility. Natural illumination is
decreased by clouds, although cloud cover may
a. General Military Aspects of Weather. enhance the effects of certain types of illumina-
(1) Visibility. Fog, haze, and precipitation tion devices such as searchlights.
reduce visibility and provide varying degrees of (3) Precipitation. Heavy snow or rain
concealment from ground and air observation as affects mobility, personnel, and equipment.
well as lessen the effects of thermal radiation (4) Temperature. Extremes of temperature
resulting from nuclear detonations. Decireaseâ such as those found in deserts, jungles, arctic
visibility normally favors the attacker because areas, and mountains may adversely affect tacti-
disrupting actions, feints, ruses, and other decep- cal operations.
tive measures are aided. Good visibility favors (5) Wind. Wind speed affects the degree of
the defender by permitting him to observe the cold (i.e., wind chill factor). For example, pei?-
n^m
FM 30-5

sonnel can be fairly comfortable at temperatures e. Effects of Weather on Manmade Features.


down to 0° F; however, a 15-mph wind at 5° F, (1) Lines of communication such as railways
or a 30-mph wind at 15° F, can cause exposed and highways may be affected by heavy accumu-
flesh to freeze (app S). Wind may affect visibility lations of snow heavy or prolonged precipitation
by creating dense screens of blowing sand, dust, (monsoon rains), or by frost action in the soil.
or snow. Wind may play an important part in (2) Wire communication may be affected by
airmobile and airborne operations since aircraft formation of ice on wire lines, strong wind, and
and paratroopers are dependent on wind speed in frost action in the soil.
the planning and execution of air operations.
(3) Buildings and other installations may be
Wind also affects the accuracy of indirect fire
affected as follows :
weapons.
(a) Heavy snow accumulations may col-
&. Effects of Weather on Personnel. lapse roofs.
(1) Physical disabilities such as heat exhaus- (b) High winds, tornadoes, hurricanes, or
tion, frostbite, and snow blindness may be caused severe thunderstorms may damage or destroy
by failure to prepare properly for weather condi- structures.
tions. (c) Frost action may damage surfaced
(2) Resistance to many diseases is lowered roads and runways.
by the effects of weather on metabolism, level of (d) Hail may break exposed glass, plexi-
physical activity, and morale. glass, and similar materials.
(3) Seasonal patterns may cause common (e) High temperatures may be injurious
colds, influenza, and pneumonia. to paint.
(4) Physical and mental strain on personnel (f) Heavy or prolonged rains may weaken
is increased by prolonged exposure to severe foundations and may flood subterranean and
weather conditions. other installations constructed in low-lying areas.
(5) The incidence of communicable diseases
/. Influences of Weather on Tactical Activities.
is affected by the influence of weather on the
distribution of disease-causing and disease-carry- (1) Acquisition and exchange of information
ing agents. may be influenced as follows :
(a) Visual observation and photography
c. Effects of Weather on Equipment and are affected adversely by clouds, fog, smoke, dust,
Supplies. haze, and precipitation.
(1) Precipitation or humidity may cause de- (b) Photography may be affected ad-
terioration, corrosion or mildewing of rubber, versely by reduced illumination due to dense
leather, cloth, rope, wood, paper or metal. clouds or excessive light caused by sunlight re-
(2) Products such as food, medicine, film, flected from a snow surface.
and photographic chemicals require special han-
(c) The effectiveness of listening posts is
dling in areas where extremes of temperature
decreased by thunder, heavy precipitation, and
and/or humidity are encountered.
winds that reduce audibility.
(3) High winds may damage or destroy un-
protected equipment. (d) Sound ranging operations may be af-
fected by changes in temperature, humidity, and
(4) Communications-electronics equipment
wind.
is particularly vulnerable to the effects of ex-
treme temperatures and humidity. (e) Radar is affected by vertical distribu-
tion of temperature and moisture in the atmos-
d. Effects of Weather on Natural Features. phere. Clouds and precipitation produce "clutter"
(1) Soil trafficability is dependent upon the that obscures echoes.
effects of weather. For example, frozen ground
(/) Wire communication is affected by
affording excellent track and wheel trafficability
electrical discharges in the atmosphere and exces-
may, with a temperature rise of a few degrees,
sive ground moisture.
become an impassable sea of mud.
(2) Precipitation, rain run-off, and thawing (g) Radio transmissions are affected by
ice and snow affect stream levels and may cause humidity, precipitation and temperature.
floods. (A.) Light data pertaining to moonrise,

2-19
WA gSMà

H?.oonsst; phases of the moon, and twilight periods cation of weather conditions over large portioBs
are required for planning night operations. of tule battle area.
(i) Tidal variations may have an effect on
river crossings and amphibious operations. 2-g®. ÍQü-KgM
(2) Movement by air may fos aifected by a. General. Terrain is analyzed in terms of its
clouds, visibility, temperature, winds, and icing. five military aspects (observation and fire, con-
Surface movement may be affected by trafficabil- cealment and cover, obstacles, key terrain, and
ity and visibility. avenues of approach) to determine its effect on
(3) Weather may influence the use of weap= friendly and enemy courses of action. The engi-
ons as follows : neer staff and special engineer units are responsi-
(a) Muzzle velocity is affected by tempera- ble for special studies used in the analysis of the
ture. area of operations in support of the intelligence
(&) Trajectory is affected by wind, air effort. Before the military aspects of terrain can
density, and air temperature. be analyzed, the analyst must first consider the
(c) Smoke for screening purposes is influ- mission of the unit, the type of operation, the
enced by wind direction and speed, temperature level of command, the composition of forces in-
gradient, precipitation, and humidity. volved, and the weapons and equipment involved.
(d) Precipitation and wind influence Oie Additional considerations of the military aspects
effectiveness of incendiaries. of terrain are discussed in appendix B.
(e) The effectiveness of chemical and riot b. Observation and IFire.
control agents is influenced by temperature, tem- (1) Terrain influences the ability of a force
perature gradient, precipitation, humidity, and to exercise surveillance over a given area through
wind speed and direction. Most biological agents the use of personnel or sensors. The best observa-
are quickly destroyed by sunlight. tion generally is obtained from the highest ter-
(/) Wind speed and direction determine rain features in an area; characteristics of the
the distribution of propaganda leaflets by air and terrain which restrict observation include hills,
radioactive fallout. cliffs, vegetation, and manmade features. The
(4) The effectiveness of certain types of spe- best observation might not be obtained from the
cial equipment may be influenced as follows : topographic crest (the highest point). A fixed line
(a) Low clouds provide a reflecting sur- on the forward slope of a hill or ridge might
face that increases the effectiveness of battlefield afford maximum observation from the slope down
illumination; although clouds, fog, or precipita- to the base of the Ml] or ridge. This fixed line is
tion decrease the effectiveness of searchlight di- called the military crest. Visibility and observa-
rect illumination by scattering and diffusing tion are analyzed independently because the for-
light. mer varies with weather conditions which are
(5) Use of loudspeakers in psychological transitory and the latter varies with terrain COZî-
operations may be affected by any weather eEe- ditions which are relatively permanent. For ex-
ment that reduces audibility. ample, a high MU may provide excellent
observation (an aspect of terrain) even though
(c) Weather may have an effect on the
visibility (an effect of weather) is restricted by
effectiveness of surveillance, target acquisition
fog surrounding the Mil at a given time.
and night observation equipment. Rain and high
wind may cause false readings to be registered by _ (2) The term "fire," as it pertains to obser-
acoustic ground sensors. Dense fog may reduce vation and fire, encompasses the influence of the
the effectiveness of starlight scopes. Aerial deliv- terrain on both direct and indirect fire weapons.
ery of unattended ground sensors may be affected Indirect fire weapons such as mortars and how-
by adverse weather conditions. itzers are affected primarily by terrain conditions
within the target area which may inimenee the
g. V/eather Modification. Current state-of-the- terminal effect of the projectile. Direct fire weap-
art provides a limited capability for simalî-sealie, ons such as machir.eguns and automatic rif.es a^e
..oca! modification of weather conditions (i.e., fog primari-y affected by terrain ccnditioico wfcie}: af-
dissipation and precipitation augmentation). Fu- fect fields of fire (the area the weapon tmy cove?
ture technology holds promise for expanding effectively with fire from a given position).
these capabilities to provide a significant raodlifi- (S) The analyst identifies these terrain fea-
FM 3.0-5

tures within and adjacent to the area of opera- physical occupation. The critical element in deter-
tions which afford the friendly force favorable mining whether or not a given terrain feature is
observation and fire in his analysis of the area of key terrain rests in the judgment of the analyst
operations. The analyst must also consider the as to what constitutes a "marked advantage" in a
effects of terrain on the enemy's observation and given situation. "Marked advantage" normally
fire. implies a terrain feature of utmost importance
either to friendly or enemy forces, which, if ig-
c. Concealment and Cover. Concealment is pro- nored, will have a definite impact on the accom-
tection from observation; cover is protection plishment of the mission.
from the effects of fire. The analyst determines
(1) Level of Command and Type of Unit.
the concealment and cover available to both
friendly and enemy forces. (a) As an example of the influence of the
(1) Concealment may be provided by dark- level of command on the selection of key terrain,
ness, smoke screens and terrain features such as consider a circumstance in which a given city
woods, underbrush, snowdrifts, tall grass, or cul- provides a common terminus for a network of
tivated vegetation. Concealment from visual highways, railways and canals. To the field army
ground observation does not necessarily provide commander seizure or control of the city would
concealment from air observation or from elec- afford the marked advantage of control of a vital
tronic or infrared detection devices. Concealment link in his lines of communications ; therefore, he
does not necessarily provide cover. Daylight con- might properly select the city as key terrain. An
cealment may be removed by the effects of herbi- infantry battalion commander within that field
cide operations (see FM 3-3 for further details). army gains no advantage from seizing or control-
(2) Cover may be provided by trees, rocks, ling the city and would not consider it key ter-
ditches, quarries, caves, river banks, bunkers, rain. A terrain feature is not considered to be
folds in the ground, shell craters, buildings, walls, both key terrain and an obstacle by the same
railroad embankments and cuts, sunken roads, commander. For example, to the division a large
and highway fills. Areas that provide cover from city is considered to be an obstacle. If securing
direct fires may or may not protect against the that city is the mission of the division, then it
effects of indirect fire ; however, most terrain fea- becomes key terrain to the division. The structure
tures that offer cover also afford concealment. of friendly and enemy units also influences the
analyst in the selection of key terrain. An air-
d. Obstacles. borne battalion commander may select cleared
(1) An obstacle is any natural or artificial areas as key terrain for use as drop zones. A tank
terrain feature which stops, impedes, or diverts battalion commander may consider the same
military movement. areas of little or no consequence.
(2) Mission execution is influenced by obsta- (b) Types of terrain features frequently
cles. In the defense the intelligence officer identi- selected as key terrain for tactical units include
fies obstacles which stop or impede enemy high ground from which favorable observation
movement within the battle area. In the attack he and fire over a significant portion of the opera-
considers the obstacles within his unit's zone of tional area may be obtained, bridges over unford-
action which influence friendly movement. able rivers, assigned or assumed objectives, and
(3) An obstacle may constitute an advantage dominating terrain within a defensive sector. Ob-
or disadvantage. For example, obstacles perpen- stacles are rarely selected as key terrain, al-
dicular to a direction of attack favor the defender though a terrain feature may be analyzed
by slowing or canalizing the attacker. On the properly as key terrain at one level of command
other hand obstacles parallel to the direction of and as an obstacle at another. For example, use
attack may assist in protecting a flank of the of an unfordable river as a defensive line is ap-
attacking force. propriate to a commander who has been directed
e. Key Terrain. A key terrain feature is an to defend. At the tactical unit level, in normal
area whose seizure or control affords a marked terrain, the river is classified as an obstacle be-
advantage to the occupying or controlling force. cause of its primary effect of stopping or imped-
The term "seizure" implies physical occupation of ing military movement. The adjacent high ground
the terrain by a force whereas the term "control" is key terrain because its seizure or control
may or may not include physical occupation. Con- permits full utilization of the obstacle value of
trol can be exercised by the use of fire as well as the river.

2-21
(2) Mission of ¿he Unit eration is frequiently in conflict with the precede
(a) IVi the attack, key terra!?: features ing one.
usually Me forward of the friendly dispositions (e) Obstacles. Avoids those which are per-
and are often assigned as objectives. Terrain fea= pendicular to the direction of advance and, when-
tures in adjacent zones may be key terrain !f ever practical^ takes advantage of those whieîn
tneir control facilitates the conduct of the attack are parallel to the direction of advance.
or accomplishment of the mission. Terrain in &ïî (ci) Utilization of key terrain. Use of land
adjacent zone which gives the eneimy effective for observations orientation, and cover and coa-
observation along an avenue of approach which cealment for friendly troops, as well as enemy
may be used by friendly forces may be key ter- forces.
rain. Key terrain may be selected within friendly (e) Adequate maneuver space. Determina-
territory when its control is essential to the suc- tion of required maneuver space is based, in parts
cess of an offensive operation. For example, if the on consideration of deployment patterns, means
enemy can seize the terrain feature which pre- of mobility, and the area required for maneuver
vents or hinders the launching of the friendly to preclude presenting lucrative targets for nu-
attack, then the terrain feature affords a marked clear fires.
advantage and is therefore, key terrain. (f) Ease of movement. This consideration
(&) In the defense, key terrain is usually includes relative length of the avenue of ap-
located within the battle area. Infrequently, key proach, directness of approach to the objective,
terrain may be forward of the defensive area or soil trafficability, steepness of slopes, obstacles,,
in adjacent sectors. A terrain feature forward of direction of terrain compartments with respect to
the battle area or in an adjacent defensive sector the direction of movement and those aspects of
which gives the enemy a decided advantage of the terrain which enhance or restrict command
observation over defended localities, routes of and control.
communication, or enemy avenues of approach is (3) The ability of an opposing force to inter-
key terrain. fere with the use of an avenue of approach does
/. Avenue of Approach. not influence the analysis of that avenue of ap-
(1) An avenue of approach is a route for a proach whether this analysis is being made by the
force of a particular size to reach an objective. commander, intolligence officer, or any other stai?
To.be considered an avenue of approach a route officer at any level of command.
must provide enough width for the deployment of (4) In the attack, avenues of approach which
the size force for which the avenue of approach is lead from the line of departure to key terrain
being considered. Intelligence officers above corps within the objective area are analyzed and the
level consider avenues of approach which are ade- best avenues of approach available to the friendly
quate for at least a division. The intelligence offi- force are identified (fig 2-5).
cer at corps and lower levels usually considers (5) In the defense avenues of approach
avenues of approach adequate for the deployment which lead from the enemy's position to key ter-
of the major maneuver element directly subordi- rain within the battle area are identified and ana-
nate to his headquarters. Thus, the corps G2 con- lyzed. Avenues of approach available to the
siders avenues of approach which are adequate enemy are described as terminating within that
for a division. The division G2 considers those key terrain in the battle area which, if seized by
which are adequate for a brigade. The brigade S2 the attacker, will threaten the overall defense po-
considers those which are adequate for a brigade. sition. Such an avenue of approach begins a rea-
The brigade S2 considers those which are ade- sonable distance beyond the initial disposition of
quate for a battalion and the battalion S2 consid- the forward friendly forces of the unit for whom
ers those which are adequate for a company. the analysis is being made. This distance is
(2) The analysis of an avenue of approach at usually equal to the forward extent of the defense
any level of command is based on the following sector (fig 2-6). Avenues of approach are meas-
considerations: ured for determination of adequate maneuver
(a) Observation avd fire. Favorable obser- space at the point where they cross the forward
vation and fîre for the force moving on the ave- edge of the battle area.
nue of approach.
(b) Concealment and cover. Favorable con- 2-$ "ö. ßefefeHsiniGga) ©ff WQ®&öV œa ïocrgiora
ditions of concealment and cover. This consid- The last two paragraphs discussed separately the
g. ,25
FM 30-5

NOTE:
IN THE ATTACK, AVENUES OF APPROACH WHICH LEAD FROM THE LINE OF DEPARTURE TO KEY
TERRAIN ARE SELECTED FOR ANALYSIS. THE BEST AVENUES OF APPROACH TO THE OBJECTIVE
ARE IDENTIFIED FOR THE FRIENDLY FOftCES

Figure 2-ß. Avenues of approach in the attack.

elements of weather and terrain, however, these b. Terrain relief affects weather conditions; for
elements interact and affect the commander's example, moist air moving rapidly up the slopes
mission and cannot be treated separately. Exam- of a mountain, hill, or ridge often causes fog,
ples of such interaction follow : mist, or low-lying clouds over the elevated ter-
a. Changes in weather tend to alter the surface rain, while the nearby valleys remain clear. Mois-
condition of terrain. The same weather condi- ture at higher elevations may result in snow,
tions, for example, rain, may have decidedly dif- while the same amount of moisture may fall as
fering effects depending upon the type of rain at lower elevations. The terrain also influ-
terrain—a clay road becomes impassable while a ences other aspects of the weather, such as wind
road of sandy soil becomes more firm. velocity and humidity.

2-23
FM 30-5

FEBA FEBA

NOTE: IN THE DEFENSE, AVENUES OF APPROACH AVAILABLE TO THE ENEMY ARE


SELECTED FOR IDENTIFICATION AND ANALYSIS.

Figure 2-6. Avenue of approach in the defense.

2-24
FM 30-5

CHAPTER 3

INTELLIGENCE DIRECTING
(STANAG 2014, 2029, 2033, 2084, 2103; SEASTAG 2014, 2029,
2084; SOLOG 123)

Section I. INTRODUCTION

3-1. General tion the presence or absence of which would af-


firm or refute pertinent indications.
a. In his capacity as a staff officer, the G2/S2 (5) Select collection agencies and prepare
directs his efforts toward the support of the and dispatch appropriate orders.
planned or anticipated mission. This chapter pro- (6) Supervise the collection effort through
vides the G2 with intelligence directing and plan-
staff visits, review of records and reports, and
ning guidance to include determining and inspections to insure productive and timely collec-
understanding the intelligence requirements of tion of information. Redirection is accomplished
the commander, determination of indications,
as some questions are answered and others arise.
sources of information, agencies available to ob-
tain information, and coordination necessary for
effective intelligence directing. 3—2. Coordination
a. No intelligence action that affects the com-
b. Although planning is continuous throughout
mander's decision can be concluded without ap-
all phases of the intelligence cycle, it will be dis- propriate coordination with one or more staff
cussed most extensively in this chapter on direct-
agencies.
ing because of the importance of planning in the
initial stages of intelligence operations. Intelli- b. The following list exemplifies some of the
gence planning is guided by the mission. Fre- staff coordination which may be necessary in in-
quently the G2/S2 will recommend an operation telligence operations.
to the commander or G3/S3 based on developed (1) Interrogation of prisoners of war: Gl,
intelligence. Intelligence planning begins before G4, G5, staff judge advocate, provost marshal,
the planning of other staff sections. Until an in- aviation officer, EW/cryptologic staff officer, and
telligence estimate is available, detailed opera- surgeon.
tional planning cannot be completed. The (2) Censorship: Gl, G5, AG, and informa-
intelligence officer must be ready to provide an tion officer.
estimate for the next operation and revise the (3) Operations: All
current estimate to meet changed operational (4) Use of combat troops for intelligence
conditions. missions : G3.
c. The various steps in directing the collection (5) Escort, supervision, and briefing of visi-
efforts are as follows : tors: Gl, G3, provost marshal, information offi-
(1) Determine the intelligence required for cer, and headquarters commandant.
decisions and plans. (6) Location and construction of observation
(2) Determine the priority of need for each posts: G3, engineer, communications-electronics
of the different intelligence items. (C-E), and field artillery officers.
(3) Determine those enemy activities or (7) Examination of captured equipment: G4,
characteristics of the area of operations which C-E officer, surgeon, chemical officer, EW/crypto-
vould indicate the answer to the intelligence re- logic staff officer, MI technical intelligence per-
quirement. sonnel, and elements of division support
(4) Determine the specific items of informa- commands as appropriate.

3-Ï
(8) Nesds for maps, imagery, and studies: planning guidance. A similai? situation may exist
when a headquarters is activated or at the foegm=
Map procurement, storage, and distribu- ning of any war, campaign, or operation.
tion : G3, engineer officer and support com- c. Initial Phase. When a unit receives a new
EEExder. mission, an intelligence estimate (app J) is fur-
(10) Aerial reconnaissance, photographic nished to the commander and the staff so that
and visual: G3, air liaison officer, and field artil- operational, administrative, and logistical plan-
lery officer. ning may be initiated. A counterintelligence esti-
(11) Civilian internees: Gl, G5, staff judge mate (app M) may be prepared to determine and
advocate, and provost marshal. evaluate the enemy's intelligence capabilities and
(12) Intelligence training : G3. their possible effect on friendly operations. An
(13) Procurement and replacement of intelli- analysis of the enemy's intelligence capabilities
gence specialists : Gl and MÏ unit commander. must include not only methods by which the en-
(14) Signals intelligence: G3, C-E officer, emy is capable of gaining information but also
special security officer (SSO), and EW/crypto- how this would disrupt the effectiveness of
logic staff officer. friendly operations. Additional information is
presented at the initial staff conference to assist
(15) Engineer intelligence: Engineer officer. the commander in analyzing the mission and pro-
(IS) Electronic warfare intelligence: G3, viding planning guidance.
C-E officer, and EW/cryptologic staff officer.
(17) Procurement, replacement and mainte- â. Subsequent Phases. These phases consist of
nance of intelligence-related equipment: G4 and preparation, approval, publication, and execution.
MI unit commander. Preparation approval, and publication refer to
the operation plan and its various annexes; exe-
(18) Chemical intelligence: Chemical officer. cution is a final, preoperational stage during
(19) Cover and deception: G3, engineer, C-E which subordinate units complete their planning
officer, and USASA unit commander. and conduct rehersals. These phases, which start
(20) Audio-visual support: C-E officer, au- the definite planning period, include the concur-
dio-visual officer. rent preparation of various plans and studies,
(21) Medical intelligence: Surgeon. based on current intelligence and counterintel-
(22) Acquisition of targets for fîre support ligence estimates. The most important of these
operations : Fire Support Coordinator follow :
(FSCOORB) and FA S3. (1) Preparation of a counterintelligence plan
which contains an enumeration of appropriate
intelligence countermeasures required for the se-
curity of the operation and which may include
a. General. Intelligence planning is a continu- appropriate aspects of cover and deception.
ing process. Based on an analysis of planning (2) Completion of plans to obtain necessary
tasks, periods are established for the completion information not immediately available.
of certain tasks before the plan is further devel- (3) Preparation of a plan for securing and
oped. Further division of each planning period distributing intelligence aids. These aids include
into phases facilitates coordination between staff materials such as charts and models of the area
sections. The sequence of intelligence planning of operations, maps, photos and mosaics, imagery
phases, like that of the other staff sections, is interpretation reports, sketches and diagrams,
generally outlined in the following paragraphs. hydrographie charts, indigenous guides, and intel-
b. Preliminary Phase. Before the completion of ligence reports.
a euirrent operation and before the commander (4) Revision of the intelligence estimate
receives any directives or orders for further ac- after evaluation and interpretation of all availa-
tion, his staff considers what this further action ble information. The estimate, which is based on
ïS likely to be. When the comxnandeir receives a initial and subsequent assumptions and changes
directive or warning for further action, the intsl- in the known enemy and friendly situation, is
Hge^ce officer must have sufficient information constantly revised throughout the planning phase.
immediately available for the Commander to ana- (5) Revision and recommendation of ESI
lyse tlae probable mission and issue preîimm&iry and other inteHigence requirements (OIE) m°
EK.2
FM 30-5

eluding those prepared earlier which are still ap- targets in sufficient accuracy, timeliness and de-
plicable and those that concern the operational tail to permit the effective employment of weap-
phase. ons.
(6) Preparation of a collection plan based on
c. In making this estimate of surveillance and
the EEI approved by the commander and OIR.
target acquisition requirements, both by day and
This plan is used by the intelligence section to
by night, the intelligence officer should consider
develop collection missions. The collection plan is
the following factors :
updated continuously as the planning phase con-
tinues. (1) The percentage of the perimeter or area
of operation that must come under surveillance
(7) Preparation of an intelligence plan as an
and the ranges at which the requirements are
annex to the operation plan. (The operation plan
established.
becomes the operation order; thus, the intelli-
gence plan becomes the intelligence annex to the (2) Surveillance and target acquisition re-
operation order. ) sources available to the unit.
(3) Whether a specially equipped force
e. Intelligence Planning is Continuous. Existing
should be organized.
intelligence is revised as new intelligence is devel-
oped and the collection plan is altered to reflect (4) The extent to which surveillance and tar-
current intelligence needs. Preliminary planning get acquisition is affected by the type of defense
again commences in anticipation of future ac- and/or offense adopted.
tions. (5) The provision of reconnaissance ele-
ments for task forces and the provision for shift-
3-4. The Surveillance and Target Acquisition ing the emphasis of resources as required.
Plan (6) Probable enemy movement and suspected
a. Surveillance and target acquisition have tra- enemy assembly or base areas which require a
ditionally been the responsibility of all combat high degree of surveillance.
units. With the introduction of new technology (7) The requirement for surveillance in
such as defoliation and more sophisticated detec- depth and to the flanks.
tion equipment and the establishment of new (8) The effect of reduced visibility caused by
techniques of employment, it becomes necessary darkness, smoke or poor weather conditions.
to synthesize these separate plans and procedures
into one coordinated plan at major unit level. The d. The surveillance and target acquisition
surveillance and target acquisition plan incorpo- ground surveillance, aerial surveillance and/or
rates the thought process, analysis and best target acquisition plan. These plans may be pre-
courses of action which consider the commander's pared separately as an attachment to the opera-
assets. This results in a coordinated action for tion order or included in the basic plan, depending
systematic and effective employment of the re- on the magnitude of the operation and area to be
sources available to the commander in accom- covered. These plans must be coordinated to in-
plishing his surveillance and target acquisition sure effective execution.
mission. See appendix U for a sample surveil- (1) Ground Surveillance Plan. The ground
lance and target acquisition plan. surveillance plan covers the employment of pa-
trols, defoliation, observation posts, listening
b. The surveillance and target acquisition plan posts, unattended ground sensors, night vision de-
is prepared within the framework of the plans of vices and ground surveillance radars. The ground
higher headquarters. This plan integrates surveil- surveillance plan must be coordinated with fire
lance and target acquisition resources utilizing support and movement plans to preclude inadvert-
both ground and aerial surveillance means which ent disclosure of the location of friendly positions
include visual observation, thermal imagery, in- and activities when utilizing artificial illuminat-
frared, image intensification, radars, unattended ing devices (flares, searchlights, etc,) and/or to
ground sensors, photography, defoliation, and prevent target acquisition elements from confus-
special devices. The plan should insure that an ing friendly with enemy movements. The plan
enemy force cannot enter the unit's area of inter- must take into consideration the enemy's capabil-
est without early detection. It should also insure ity to employ night vision devices and/or to dis-
the detection, identification, and location of rupt the ground surveillance plan.

3-3
Wó\ c¿®-4¿>

(J?) Aerial Surveillance Plan. The aerial 012!?= as for the operation order. The following fasto^Q
veiiíance pian covers the employment of aviation are further guidance to preparation of the mtsiïi-
assets organic and in support of the unit and de- gence annex :
foliation. In addition to visual observation and (1) The aniñes is not intended to serve as a
aerial photography, the use of airborne radair, in- substitute for the intelligence collection plan.
frared, image intensification, relays, and other (2) It may be issued before distribution of
aerial electronic devices will be outlined. the operation order.
(3) Target Acquisition Plan. The target (3) An intelligence annex is normally pre-
acquisition plan will delineate zones of responsi- pared for each operation.
bility and means to be employed in acquiring tar-
(4) It must be kept as brief as is consistent
gets. It should also include target criteria to be with clarity.
followed when targets are eventually acquired or,
as a minimum, it should state where these criteria (5) Matters adequately covered in unit or
are outlined. command standing operating procedures (SOP)
should not be repeated.
e. The surveillance and target acquisition plan (6) Eeferenee may be made to appropriate
has no prescribed format. The paragraphing for intelligence reports provided addressees have the
the operation order should be used as a guide to reports.
insure that no significant aspects are omitted. À
(7) Material of limited interest or which in=
sample plan is included at appendix U. volves considerable detail may be included in ap-
pendixes to the annex. The most likely appendixes
§=§0 life DraiteDDoDQKg© ÄKifuOK ff© OOT) ©¡psRsiGtooT) are enemy situation maps or overlays, surveil-
©D'<2¡©0' ©7 PPsKñl lance and target acquisition plan(s), and map dis-
c. General. The intelligence annex (app î tribution tables.
FM 101-5) is one of the annexes of the operation
order. The intelligence annex is standardized and I!=é. pD@y AcRfay D[n)&@!DS<g©[n)g© [pflooïMDîf)
has a more rigid format than other annexes.
a. The field army G2 is concerned with strategic
6. Purpose. The purpose of the intelligence and combat intelligence. The scope and projection
annex is to : of field army operations and the simultaneous
(1) Disseminate information/intelligence planning for a number of operations affect intelli-
about enemy forces essential to the conduct of the gence planning as follows :
operation. (1) Preliminary and initial intelligence plan-
(2) Issue instructions to subordinate com- ning is based largely on assumptions. As planning
manders aiîd requests to higher headquarters to progresses, particularly as operational details are
collect information before or during the initial made firm, the assumptions may either be sub-
phase of an operation. stantiated or discarded.
(3) Provide intelligence orders or guidance (2) Intelligence planning is flexible. The far-
for handling of PWs, refugees, captured docu- ther an operation is projected into the future, the
ments and materiel during the operation. more likely it is that changes in the situation will
(4) Confirm the orders and requests for in- alter the plans.
formation that have been made in fragmentary (3) Concurrent planning by subordinate ech-
form and that are still current at the time the elons is usually limited to the forthcoming opera-
annex is issued.
tion due to limitations on information availability
(5) Provide counterinte1ligence orders or and the size of the planning staff at these eche-
guidance for the imp'ementation of operational
security measures.
(S) Preserve brevity, clarity, and simplicity ô. The conduct of current operations and the
in the body of the order. simultaneous planning of two or more future op-
(7) Amplify an order when information is of erations taxes the ability of the GP, section to op-
limited application to the entire command or is erate on a 24-hour basis. For more efficient opera-
primarily technical in nature. tion during peak workload periods, consideration
must be given to reorganization for planning fu-
c. Preparation. General instructions for the ture operations. One method of reorganizing the
preparation of the intelligence annex are the same G-2 section is to provide intelligence representa»
S-4
FM 30-5

tion from each branch to a headquarters planning 3-8. Division Intelligence Planning
group. Another is to organize within the G2 sec-
The intelligence planning at division in prepara-
tion an intelligence planning group representing
tion for combat is based on plans of the next
each branch. A third solution is to continue under
higher headquarters. The same planning phases
the normal organization and concurrently plan
are applicable, although the preliminary phase
and operate. The intelligence officer must decide
will be considerably shortened. In addition to ab-
which system to use based on requirements and
the personnel available. sorbing and disseminating the intelligence made
available as a result of intelligence activities at
higher headquarters, the division G2 develops in-
3-7. Corps Intelligence Planning telligence requirements, levies requests for infor-
Intelligence planning at corps is based on Army mation and exploits any other sources available to
plans and is primarily a matter of determining him. In view of the reduced time available to pre-
how, by whom, and when the intelligence func- pare for combat, the division G2 must keep him-
tions of the corps will be performed and setting self currently informed as to planning being un-
forth the details in a logical, understandable fash- dertaken at the next higher echelon.
ion. Each of the phases is generally the same as it
is for the field army, but the time available to 3-9. Lower Unit Intelligence Planning
corps will be less. During the execution phase of As at the higher levels, essentially the same plan-
an operation, the corps G2 section is primarily ning is carried out. Because of the sizes of the
concerned with the fulfillment of those functions units involved and their areas of interests, there
which pertain directly to the operation. It will will be a reduction in the number of operational
also be engaged in planning for future operations plans and planning leadtime. Normally, opera-
and may require a planning staff within the G2 tional planning at the lower levels is relatively
section. informal.

Section II. REQUIREMENTS


3-10. General 3-11. Essential Elements of Information
The commander's intelligence requirements are a. Essential elements of information are those
those facts he needs to know concerning the critical items of information regarding the enemy
enemy and environment to execute his assigned and the environment needed by the commander by
mission successfully. The collection capabilities of a particular time to relate with other available
a command are seldom sufficient to satisfy concur- information and intelligence to assist him in
rently all intelligence requirements. Therefore, reaching a logical decision. The decision involves
collection resources of a command are directed the mission of the command and the choice of
toward definite intelligence objectives in the courses of action to accomplish the mission. Any
priority of their need. Such priorities should re- enemy capability or characteristic of the area
flect the criticality of the need for a particular which is a governing factor in the choice of
type of information. Unfortunately no formula courses of action will be an EEI. Enemy capabili-
can be provided to determine priorities automati- ties or area characteristics which may affect but
cally. The determination is largely one of value which will not prevent the accomplishment of the
judgment based on relevancy to the mission. An mission, regardless of which courses of action are
intelligence priority in one situation or one com- chosen, will qualify as other intelligence require-
mand may not be a priority in another situation ments. Care must be exercised to limit EEI to
or command. Intelligence requirements generally only those critical items of information.
can be divided into two broad categories—essen-
6. The relationship between EEI and command
tial elements of information (EEI) and other in-
decisions dictate that the establishment, modifica-
telligence requirements (OIR). In a tactical situa-
tion, or cancellation of EEI must have the com-
tion, EEI and OIR are normally developed by the
mander's approval.
G2 and G3 in the tactical operations center
(TOC) or equivalent at every echelon, i.e., sepa- c. Although EEI have a special relationship to
rate brigade, division (DTOC), corps (CTOC), the needs of the commander, they may be origi-
and field army (FATOC) for approval by the nated by the staff in the form of recommenda-
commander. tions. These recommendations are coordinated

3-5
m §}©-§

and presented by the intelligence officer for com-


mand approval.
a. When announced to the command, EEI anc
d. An item of information or intelligence speci- OIR should be stated in such a manner as to pro-
ñed in the unit standing operating procedure vide guidance to the receiving agencies to allow
(SOP) for collection or dissemination may formulation of orders and requests for specific
become an EEL For example, an SOP may re- information. They should be stated as specific
quire all units to report immediately such items as questions to be answered in a specified period of
"known or suspected targets suitable for nuclear time dealing with—
attack or indications of their existence or develop- (1) Enemy order of battle factors.
ment." (2) Terrain, including natural and artificial
obstacles.
e. The nature and number of EEI will vary
(3) Weather.
with the type and phase of an operation and the
estent and accuracy of the available information (4) Social, political, economic and cultural
and intelligence. For example, in the planning factors.
phase of an airborne operation, there might be b. EEI are not announced in the foregoing man-
two EEÏ: (1) "What drop or landing zones exist ner to units which do not have an assigned intelli-
in our objective area? Special attention. . . ." (2) gence officer. For example, the battalion S2 does
"What are the enemy's air defense dispositions? not announce EEI to a company commander in
Special attention to . . ." During the execution the broad terms described above. He will, instead,
phase of the same operation, the EEÏ might be present specific requirements for information
reduced to one, the nature of which would be di- based on the EEI.
rected toward the enemy's nuclear capability. It
may be that limiting EEI to just those major
enemy capabilities—attack, defend, reinforce,
withdraw—which can impact on friendly mission a. EEI and OIR are disseminated to subordi-
accomplishment is best. This focuses commander nate, higher, and adjacent commands to guide
attention on the enemy courses of action with them in preparing collection plans and evaluating
which the commander should be most concerned. information by acquainting them with the com-
Normally, in this process, there are no more than mander's priority intelligence needs.
two EEL b. The intelligence requirements announced by
another headquarters are analyzed by the receiv-
ing headquarters to determine whether or not
that unit is capable of obtaining information per-
a. Concurrently with tasking of intelligence e'e- tinent to the requirements and whether or not the
ments to collect information required to satisfy collection of that information is compatible with
the EEI, consideration is given to tasking intelli- its mission. If not, the receiving headquarters
gence assets to collect information on other capa- does not repeat the requirements to its subordi-
bilities, vulnerabilities, and characteristics of file nate e'ements. The intelligence needs of higher
area of operations which may affect the accom- headquarters are modified by a lower unit as re-
plishment of the mission. Corection agencies may quired. Major modifications should be reported to
be able to collect information needed to satisfy higher headquarters so that the collection effort
OÏR concurrently with the collection of informa- may be redirected as necessary. For example, a
tion needed to satisfy EEI. In addition such infor- corps EEI may ask, "Where are possible crossing
mation of the enemy and of the area of operations sites on the COTTONWOOD River in the corps
which is needed to aid in the interpretation of the zone? Special attention to area between CRÂ-
results of the collection effort must be collected. TERVILLE and TRAIL CITY." Subordinate di-
b. OIE are derived from command require- visions upon receipt of the corps EEI, task their
ments which do not qualify as EEI and from staff subordinate units to satisfy the requirement
requirements. The formulation and/or announce- within the division zone. Special attention should
be directed to specific portions of the river line
ment of intellipence requirements and the alloca-
within the division boundaries.
tion of collection means to meet these reo.uire-
ments are staff responsibilities of the intelligence e. Intelligence requirements are disseminated
officer. by fragmentary orders or listed in paragraph 2 of
&■■&
FM 30-5

the intelligence annex to an operation order (app or countermeasures must be taken into account in
N) and they may be included only to subordinates planning the phasing of an operation.
in the coordination instructions of paragraph 3 of (3) Location, type, and strength of enemy
the operation order (FM 101-5). reserves. The commander will be concerned with
those enemy reserves which have the capability of
3-15. Cancellation or Modification reinforcing in time to affect the accomplishment
of his mission. For this reason it is essential to
EEI and OIR are canceled or modified by frag- locate and identify as to type, and determine the
mentary orders or by a new list published in an strength of enemy reserves in the area of opera-
operation order. Those which are concerned with tion. Unlocated enemy units must receive close
the enemy's adoption of a course of action prior to attention due to their possible commitment as re-
a specified time are automatically canceled when serve forces. It is the intelligence officer's respon-
that time arrives. The intelligence officer must in- sibility to determine the movement capabilities of
sure that effort is not wasted on collection of in- enemy reserves and keep the commander in-
formation against EEI or OIR which are no formed as to their capabilities.
longer valid. (4) Location, number, and type of enemy au-
tomatic weapons. Knowledge of the location, num-
3-16. Intelligence Requirements for Attack ber, density, and fields of fire of automatic weap-
a. General. Most of the commander's initial re- ons in the enemy's defensive area will influence
quirements must be satisfied during the planning the commander's choice of areas for his main
phase so that plans can be properly formulated. attack and planning of supporting fires.
Subsequent requirements, that is, information (5) Location, number, and types of enemy
which is needed during the attack, must provide supporting weapons. Supporting weapons include
the basis upon which the commander can decide mortars, field artillery, air defense artillery, mis-
the proper time and place for the commitment of siles, tank guns, antitank guns, or other support-
his reserves, employment of supporting weapons ing weapons which may bring fire to bear on
or units, and modification of his operation plan. friendly troops. Knowledge and location of these
weapons enables the commander to plan for re-
b. Specific Requirements for the Planning Phase ducing the effectiveness of these fires by employ-
of the Attack. ment of his own fires, choice of routes for his
(1) Location, type, strength, and morale of attacking force, timing of the attack, and use of
enemy units on line and in reserve. The locations countermeasures such as smokescreens.
of the enemy in contact and reserve shou1d be (6) Location of enemy outposts. An enemy
established down to the lowest unit practicaba. may use outposts or a security force to prevent
The type, strength disposition, and mora'e of the close ground observation of his main battle posi-
enemy are indicative of the manner in which the tion or mislead the opposing force as to the loca-
area will be defended, the extent of enemy resist- tion of his main defensive position. The com-
ance, the force necessary to overcome the resist- mander may use the element of surprise in his
ance, and the capability of the enemy to counter operations when he knows the location of the ene-
this force by employment of his reserves. my's outposts by denying them observation, cut-
(2) Location, type, nature, and extent of ting them off from the main body, reducing them
enemy defensive installations, to include support- through fire, or bypassing them.
ing weapons, screening units, and obstac'es. The (7) Location of enemy command posts. Lo-
magnitude and the complexity of the enemy's in- cating and neutralizing enemy command posts
stallations will influence the choice öf areas for aids in the reduction or elimination of command
the main attack, routes to the objective, areas for control over enemy subordinate units. This action
secondary attacks, and required destruction of ob- may be carried out through harassment, destruc-
stacles or installations necessary to accomplish tion, isolation, or electronic warfare.
the mission. The density of supporting weapons, (8) Location of enemy boundaries. Enemy
their caliber or delivery capability, and resupply boundaries may reveal information of the enemy
of ammunition help determine the pre-attack defense concerning time of attack, routes of ad-
preparation fires necessary and the main area of vance, and general employment of subordinate
attack. Screening units and obstacles, special units. If the enemy has moved into an area re-
units and/or equipment necessary to overcome ob- cently, shifted boundaries, or replaced units, he
stacles, timing of the attack, and use of deception may be vulnerable along boundary lines.

3-7
pßfl

Í9) Enzvng vulnembilüy to cover and decep- probable courses of action derived from pattern
tion. AssessHisnt cf enemy valnerability to cover analysis, signals intelligence, special intelligence
and deception includes an assessment oí the ene- units, or other means and agencies discussed in
rgy's preconceptions about us, ouir knowledge of succeeding paragraphs. Such indications must be
ibis intelligence collection liïTieans, and our ability considered in the light of possible enemy decep-
to conduct the cover £,nd déception operation. tion activities.
(10) Observation. Determination of the ene- (17) Command, control, and communications.
my's aerial and ground surveillance capabilities Knowledge of the enemy's command, control, and
and the location and capability of his electronic communications helps the commander plan effec-
surveillance means îieips the commander pian tive electronic countermeasures and signals intel-
effective countermeasures, determine attack tim- ligence operations.
ing, and pían for destruction, screening, or neu-
tralization of these capabilities. (18) Electronic countermeasures. Determina-
tion of the enemy's electronic countermeasures
(11) Concealment and cover. In planning the
capabilities enables the commander to plan effec-
attack, consideration will be given to those routes
tive counter-countermeasures and plan for the
ieading to the objective which offer concealment
possibility that his own command control and
from the enemy's observation and cover from his
electronic target acquisition devices may be dis-
fire. These factors must be viewed from the stand-
rupted.
point of the enemy's dispositions and his ability to
counter the apparent advantage of concealment (19) Location and type of enemy target
and cover along routes available. acquisition systems. Locating and neutralizing
(12) Location of obstacles. The presence and enemy target acquisition systems aids the com-
location of natural or artificial obstacles may be mander in an assessment of the enemy's vulnera-
determined by means of map, aerial, and ground bility and influences the commander's choice of
reconnaissance. The intelligence officer analyzes areas for his main attack and planning of sup-
the relationship between obstacles and the ene- porting fires.
my's dispositions in determining routes to the
c. Requirements During the Attack.
objective and planning a time schedule for the
operation. (1) Movement of enemy units. Units may be
(13) Weather and terrain. Key terrain fea- moved for deception, reinforcement, replacement,
tures and weather will be important factors in counterattack, blocking or withdrawal. Direction
determining the scheme of maneuver. of movement and location of vacated or newly
occupied areas may provide indications of the ene-
(14) Avenues of approach. In planning an
my's defensive plan.
attack, the commander is concerned with tihe
choice of direction of attack. The avenues of ap- (2) Displacement of weapons. The displace-
proach available will influence the choice of direc- ment of enemy weapons provides indications of
tion, when considered with available observation the enemy's plan of action. For example, weapons
and fire, concealment and cover, obstacles, maneu- displacing to the rear or deployed in depth may
ver space, ease of movement, utilization of key indicate a planned defense.
terrain, enemy disposition, and weather. (S) Degree of resistance of units on contact.
(15) Location, number and types of chemical, The degree of resistance which the enemy offers
biological, and nuclear weapons and the method of and the manner in which he withdraws may give
delivery. In the planning of an operation, consid- indications of the type of defense he will employ,
eration must be given to the possibility of enemy whether he intends to hold, delay, withdraw or
use of chemical and biological agents and nuclear counterattack, and the enemy's degree of disor-
weapons. Plans must be made to insure a continu- ganization.
ous collection of data on the enemy's capability to (4) Expenditure of ammunition and resupply
employ -CB agents and nuclear weapons. Based activities. The amount and type of ammunition
upon the enemy's capability, appropriate plans expended by the enemy may provide indications
for protective measures and countermeasures of the area the enemy most strongly desires to
must be made. defend, his fire plan, the degree of his resistance,
(16) Plans and capabilities. The commander and his current supply status. Resupply activities
is provided insights for developing his plans for may indicate the area to be most heavily de°
tiie attack through estimates on enemy plans and fended, the type of defense action, and the possi=
¿)-Q
FM 30-5

ble shortages which may illuminate weak points tween assembly areas and the line of contact
in the defense. tends to change as the attack plan progresses.
(5) Intelligence estimates. A continuing as- Early in the planning phase the assembly areas
sessment of the enemy's intelligence estimate of are usually farther to the rear, but they may
the situation can provide an important tool for move successively nearer the line of contact as the
the commander in the conduct of his own opera- time of attack nears. If such a pattern of move-
tions. Such insights into the enemy's estimate of ment is detected, it will further indicate an area
the situation may be developed from analysis of selected for the attack. Determination of assembly
his observation, surveillance and reconnaissance areas is of prime importance in target acquisition
capabilities and activities, signals intelligence, and for the employment of both conventional and nu-
other special means and activities. clear weapons. Map terrain analysis may provide
(6) Command, control, and communications. likely assembly area locations.
Continuing efforts are needed during the attack to (3) Location of enemy boundaries. The loca-
assess the capabilities of the enemy for executing tion of enemy boundaries is of significance due to
orders and acquiring information on friendly its influence on the enemy plan of attack. A
forces. knowledge of boundaries provides indfcations as
to the size of the force which may participate in
the attack and, possibly, the depth of echelons.
3-17. Intelligence Requirements for Defense
Consideration of boundaries and locations of
a. General. In the defense, many of the factors enemy units in contact and rear areas provides an
(of weather, terrain, and enemy situation) in- overall picture of the enemy situation.
cluded in planning for an attack are considered;
(4) Number and routes of enemy reconnais-
however, most of the factors take on a new
sance and/or combat patrols. To execute his
meaning and must be interpreted in a different
attack most advantageously, the enemy must
light. Whereas heavy rain may impede an attack,
collect information on the location of friendly se-
the rain may be an aid in defense because of its
curity elements, defensive positions, fire support
adverse effect on the enemy's capability to attack.
weapons, and reserves. During his preparation
b. Specific Requirements for the Planning for the attack, the enemy usually will stress re-
Phase of the Defense. connaissance and will attempt to locate and to
(1) Disposition strength and morale of exploit gaps in our defensive positions. He may
enemy units in contact, in reserve, or in position execute raids on our positions or installations,
to influence the action. As in the attack, the possibly even in our rear areas through successful
strength and morale of the enemy has a critical infiltration. Destruction missions may be expected
bearing on planning the defense. Disposition and prior to the commencement of the enemy's main
type of the enemy units may be indications of an attack. Extensive patrolling, as a countermeasure,
impending attack and help determine the planned may be employed by the enemy to cover or mis-
location of the main attack. Important indications represent other enemy activity, as a show of
can be derived from enemy unit movements which strength to cover weaknesses, or as a measure to
show the progress of plans for an attack and pro- force our forward outposts and listening posts
vide indications of weakened areas in the line of back. An analysis of the missions, routes, number,
contact. The number, type, and disposition of re- and probable, objectives of the enemy patrols will
serve units help determine likely areas of attack provide valuable intelligence.
and potential reinforcements. Such indications (5) Location and type of supporting weap-
must be considered in the light of possible enemy ons. The location and type of enemy supporting
deception activities. Unlocated enemy units are weapons help the commander determine the likely
important during the defensive planning stage as areas of attack and estimate the degree of force
those units may be used to penetrate friendly de- which the enemy may use. Movements of weapons
fensive positions. may also help to determine the enemy's scheme of
(2) Location of potential enemy assembly maneuver and the timing of the action.
areas. The location of enemy assembly areas is (6) Cover and deception. An assessment
influenced by the terrain and by the distance from should be made to determine the enemy's vulnera-
(the line of contact. The primary terrain consider- bility to cover and deception operations and his
ations are those of cover and concealment and likelihood of employing cover and deception with
routes into and out of the area. The distance be- his attack.

3-9
KV2 §©..§

(7) Observation and fire. An accurate detei?= determine the enemy's counterbattery capabilities,
mination of the most advantageous observation scheme of maneuver and timing of the action.
sites and fields of fire available throughout a
c. Requirements During the Defense.
sector with special emphasis on the avenues of
approach is important in defensive operations. (1) Areas of enemy's main attack and sec-
ondary attacks. Movement of enemy units, dis-
(8) Location of Tiatural and artificial obstc^
placement of weapons, routes of movement, type
des. The commander employs natural and artifi-
cial obstacles strengthen his defensive position. and size of units involved, movement of reserve
Natural obstacles should be considered in light of units, and location of unidentified or enemy
caused nuclear bursts serve as indications of the
limitations imposed on enemy mobility and
friendly counterattack. areas under main attack and secondary or diver-
sionary attacks. These are also factors to be con-
(9) Weather and terrain. The effects of sidered in planning counterattacks, displacements,
weather and terrain play an important role in the withdrawals, and the employment of reserves.
defense. Just as key terrain often must be secured
(2) Enemy tactics. Coupled closely with the
in order to attack successfully, so must it be held
foregoing factors are those indicators which dis-
in order to defend. Weather plays a key part in
close the enemy's scheme of operations. Unit
the operation, as the same weather conditions
movement, weapon disposition, formation, depth
may have an entirely different effect depending
upon whether an attack or a defense is planned. of echelon, and the type and size of units commit-
ted are significant considerations for early deter-
(10) Avenues of approach. The avenue of ap- mination of enemy tactics.
proach of most concern to the defending com-
(3) Intelligence estimates. Development of a
mander is the route most advantageous to the
enemy in his main attack. Enemy reconnaissance continuing assessment of the enemy's intelligence
activity may provide indications of consideration collection effort can provide an important tool for
of avenues of approach. Coupled with this, the the commander in the conduct of his own opera-
commander considers avenues of approach for use tions. This assessment can be made only through
by friendly forces in a counterattack. He also con- an understanding of the enemy's intelligence sys-
siders natural obstacles in the area with reference tem capabilities.
to their limitation on enemy mobility and on (4) Command, control, and communications.
friendly counterattack. Continuing efforts are needed during the defense
(11) Plans and capabilities. To the extent in- to assess the capabilities of the enemy for execut-
formation or estimates on enemy plans and capa= ing orders and acquiring information on friendly
forces as those capabilities may be affected by
bilities can be derived from enemy pattern analy-
friendly electronic countermeasures and other
sis, signals intelligence, intelligence units, or other
battle actions.
means and agencies discussed in succeeding para-
graphs, the commander is provided with invalua»
ble insights for developing his own plans for the =1®. DrafloHfoDiie© i mm\r¡§
defense. Such indications must be considered in ft© iKQQB^ (Ss^MiiftCQS
the light of possible enemy deception activities. a. General.
(12) Command, control, and communications. (1) Enemy capabilities are usually the first
Knowledge of the enemy's command!, control, and consideration in determining intelligence require-
communication capabilities assists the commander ments and their priorities, because of the com-
in planning effective electronic countermeasures mander's concern with intelligence which con-
and signals intelligence operations. firms, alters, or refutes the existing estimate of
(13) Electronic countermeasures. Determina- enemy capabilities and probable courses of action.
tion of the enemy's electronic countermeasures Enemy capabilities which appear improbable of
capabilities enables the commander to plan effec- implementation are not considered in formulating
tive counter-countermeasures and plan for the EEI or OIR. For example, when a delaying action
possibility that his own command control and is being conducted against advancing supsrior
electronic target acquisition devices may bs dus- enemy forces, priorities concerning enemy de-
impted. fense, delay, and withdrawal are not stated.
(M) Location and type of enemy target (2) Each enemy capability listed in the CUE^
acquisition systems. Locating the type of enemy erent intelligence estimate (chap S) is usually the
target acquisition systems helps the commander subject of either an EEI or OÍR. If knowledge of
g-ïï®
FM 30-5

the implementation of the particular enemy capa- defend. Requirements concerning reinforcement
bility or course of action is not available and this direct specific attention to known reserves and
knowledge is needed by the commander at the unlocated units.
time in order to make a reasonable decision, that
g. Nuclear Capabilities. When the enemy has a
enemy capability is an EEI rather than an OIR.
nuclear capability, the stated requirement may be,
(3) EEI and OIR pertaining to enemy capa- "Will the enemy employ nuclear weapons against
bilities are not answered completely until the us? If so, when, where, how many, of what yield,
enemy has committed himself to a course of and by what delivery means? Special attention to
action. Partial answers are produced continually very heavy field artillery units in the vicinity of
and result in progressive changes to the intelli- GROTE and possible missile launchers in the vi-
gence estimate. For example, efforts to determine cinity of AVON."
in what strength the enemy may reinforce troops
in contact often produce changes in the strength h. Chemical and Biological Capabilities. When
estimate of available enemy reinforcements and the enemy has a CB capability, the stated require-
the enemy's capability to reinforce. Similarly, evi- ment may be, "Will the enemy use chemical or
dence that the enemy has reinforced certain units biological agents against us? If so, what agents,
changes the estimate of the number of committed when, where, and by what delivery means? Spe-
forces. cial attention to field artillery, mortar, and rocket
units."
b. Attack Capability. An intelligence require-
ment concerning an enemy attack directs specific i. Air Capabilities. Requirements as to enemy
attention to definite areas and usually to specified air capabilities are rarely listed at division, corps,
times. The areas to which attention is directed are or units in the communications zone. Normally
usually avenues of approach determined by analy- intelligence on enemy air capabilities is dissemi-
sis of the area of operations and enemy disposi- nated by the field army or higher echelons. In
tions. If the enemy can attack using several ave- airborne, airmobile, and amphibious operations
nues of approach, only one requirement is stated. where enemy air activity is a significant factor, a
The different avenues of approach are indicated corps or division commander may appropriately
as areas to which special attention is directed. designate an air EEI, especially during the plan-
Specified times are most frequently stated when ning phases of the operation. However, heavy reli-
the command's course of action is to attack. Time ance will be placed on higher headquarters to pro-
may be given precisely or may be stated as "be- vide answers to such EEI.
fore our attack," depending upon whether the
;'. Electronic Warfare Capabilities. The stated
time of the attack has been determined.
requirements might be—
c. Defense Capability. Requirements concerning "Will the enemy employ electronic warfare in
enemy defense specifically state the line or area conjunction with his attack? If so, when, where,
concerned. and to what extent? Special attention to EW
units."
d. Withdrawal Capability. Requirements con-
cerning enemy withdrawal usually indicate the k. Tactical Cover and Deception Capabilities.
line or area beyond which the enemy's withdrawal The stated requirements may be—
is of particular interest and may direct attention "Does the enemy possess the capability to em-
to a line or area to which the enemy might with- ploy cover and deception operations? If so, at
draw and the withdrawal route. what level and with what type equipment?"
e. Delay Capability. Requirements concerning I. Miscellaneous Capabilities. Stated require-
enemy delaying actions also specify the lines or ments concerning other enemy capabilities might
areas along which delaying positions may be be—
formed.
(1) "Will the enemy employ guerrilla forces
/. Reinforcement Capability. Requirements con- in conjunction with his attack? If so, when,
cerning reinforcement ordinarily do not distin- where, and in what strength? Special attention to
guish between reinforcement of an attack and a the heavily wooded area north of MASLEM."
defense. They simply ask when and where availa- (2) "Will the enemy infiltrate our lines? If
ble reserves may be employed. Other requirements so, when, where, and in what strength? Special
ask specifically whether Lhe enemy will attack or attention to the swampy area east of HAYS."

3-11
PM ®(ö^S

(3) "Will ths enemy employ airborne or air- the effects of weather and terrain on his mission
mobile forces in our sector? If so, when, where, when he plans for and executes an operation ; as a
and in what strength? What will be the direction result, he strives for a thorough and accurate
and altitude of approach? What drop or landing knowledge of these factors. This knowledge, con=
zones will be used? Special attention to the area sidered together with the enemy capabilities, is
south of CUCHARA." required to insure the accomplishment of the as-
(4) "Will the enemy employ amphibious signed mission.
forces on our south ftank? If so, when, where, and (2) An analysis of the effect of all of the
in what strength? How many landing vehicles of conditions of weather and terrain upon our own
what type will be employed? Special attention to forces and the enemy constitutes the basis for
the beaches at SAVANAH and GEORGETOWN." estimates which may be made by the commander
and his staff. The answer sought is the best utili-
©•=11 ©o DrateDDEgooieQ ßG<°]iy>G[?©[nn)Qin)fls [pQFiteiDMgj zation of the weather and terrain based on the
mission and enemy capabilities.
G. Requirements may be designed for develop- (8) Terrain and weather influence the appli-
ing knowledge of enemy vulnerability ; that is, any cation of the principles of war, such as the ability
conditions or circumstances which make the to mass and maneuver. Properly exploited, terrain
enemy vulnerable to neutralization, deception, or and weather may allow a numerically inferior
defeat. Such requirements are to develop intelli- force to achieve relative superiority of combat
gence as to the nature, extent, permanence, or power. For example, a mechanized, well-equipped,
other details of the conditions or circumstances heavily-armored force drawn into marshy or rug-
which produce the vulnerability. ged terrain may well be defeated by a smaller,
lightly-equipped force, because the smaller force
b. The details desired may be listed in the is enabled, through mass, maneuver and surprise,
stated requirement or may be omitted if they are to apply superior combat power at the point of
numerous and routine. For example, for analyses decision.
of nuclear or chemical targets, information is de-
sired as to size, shape, composition, concentration, b. Weather.
vulnerability, recuperability, and permanence. (1) There are two types of weather informa-
Since these requirements are both numerous and tion requirements—those established by the Army
normal, details pertaining to them are properly and passed to the USAF Air Weather Service
omitted. The statement may ask what nuclear or (AWS) for action (weather forecasts, studies,
chemical targets exist in our zone and direct at- and summaries) and those established by the
tention to a specific area of activities. When USAF AWS and passed to the Army for action
enemy vulnerabilities result from faulty disposi- (local weather, temperature, and wind). The es-
tions, logistical inadequacies, or administrative tablishment, coordination, and consolidation of
deficiencies, the degree of permanence of the con- Army requirements are intelligence responsibil-
dition may have to be established before tactical ities. Figure 3-1 lists the usual requirements for
plans to exploit the vulnerability can be prepared. weather information required at all echelons
Hence, intelligence requirements may ask "if" and within the field army.
"when." (2) At brigade or battalion level, the intelli-
gence officer coordinates the requirements of his
c. Psychological vulnerabilities of the enemy command for weather information and interprets
force must be known in order to plan cover and weather information received from higher head-
deception and psychological operations. Such quarters in terms of its application to the local
questions as "Is the enemy commander predis- terrain and situation. When weather information
posed to expect a given friendly course of is required but has not been made available, the
action?" and "Will a particular theme appeal to intelligence officer should request such informa-
potential enemy defectors?" would be appropri- tion from the intelligence section of the nest
ate.
higher echelon. When regularly distributed fore-
casts are inadequate to satisfy particuîaïf irequire-
Ü—2©. Woc&iC'iniGF (snnê Yovmm DiniferiRfîsiÇo®^ ments such as a planned chemical operation, spe-
ßo^MOFOInniGÜTlte cial weather forecasts may be requested.
a. General. (8) There aïe tfore-s types of weather fore™ •
(1) The military commander must consider casts : Short, Extended, and Long Period. Foi? îuv-
3-Î2
FM 30-5

ri >

r
>
3
S
Ia
i
O
CD
m

I
2
4 o
3
£

n
■D
w
■<

r
fs*
O
c
o
i
i
f
-1
3
1
C

!
o m
m
7 O
m ao
3 3n
a. > o
S'
• o ? S I
? O
? f
1 3
5' i
3

l-WEATHER OBSERVATIONS
A. Surf oc*
1. Curran! obitrvatiom acd ocd
2. S.l.ct.d doto* acd] acd] cd, f
•12 acd «"13 acd ocd aedf ocd,
3. Forward araa Obtorvatloni
•l
ac • f
«i .
B. Low Lev.l . Soloclod Data* acd cde, aedf f
C. UpporAIr
1. Currant Obttrvationi cd,

2. Soloctod Dota* a acd a cd, «13 f f

ll-WEATHER FORECASTS/BRIEFINGS/CLIMATOLOGY
A. Control Foracaitt
1. 12 Hour cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd cd
2. 24 Hour ocd acd acd acd acd acd acd acd acd acd ocd acd ocd acd acd ocd ocd
3. 48 Hour acd acd acd acd acd acd acd acd acd avd acd acd aedf acd acd acd acd
4. 72 Hour acd acd acd acd acd acd acd acd ocd ocd acd ocd aedf acd acd acd acd
5. 3-5 Doy ocd acd acd acd acd acd acd acd ocd acd acd acd aedf acd acd acd acd
B. Spocial Forocaitt of Soloctod Paramotors
1. Fallout Windi acd acd
2. Aviation Route and Torminal ¿4 acd cd. 4 «14 ocd4 acd 4 '4
3. 12 Hour Aviation d4 acd cde 4 d4 acd4 acd4 f
4. 24 Hour Aviation '4 ocd cd. 4 ■U acd 4 acd 4 f
5. Stability to 2 motón and Surface Wind» ocd
6. Winds -Waco to 2,000 foot ocd cd .cd4 acd acd.f f
7. Pracipitation Typo and Amount acd cd icdf .«d4 ocd acd.f
8. Spocial Mission Forocasts acd ocd cd ocd f f
9. Upper Air for Ballistic Corrections cd
10. Refractive Index acd acd acd f
11. Dropione ocd ocd acd3 acd.l f
12. Sea Swell and Surf 0 acd a f
13. Sovere Weather Warnings acde acd acd ocd acd acd ocd acd acd acd ocd acd acdef acd acd ocd f
C. Weather Briefings and Display acd acd acd ocd
D. Climatology/Summaries
ac ac ac act
2. Climatic Studios ac ac ac acf f

3. Engineer Climate Information acd


4. Weather Summaries acd acd

LEGEND: FOOTNOTES:
a • Army area of interest 1 • Providod by organilotion requiring information
c • Corps area of interest 2 • Armored Cavalry Regiments only
d • Division area of interest 3 - Airborn. Infantry only
e • Interest area of units below division 4 - R.quir«d only by organic aviation
f v Interest area for operations deep in enemy held territory

* "Selected Data" are observations of selected weather elements taken at


locations and times, as required, by the user.

Figure S-l. Requirements for weather information within the field army.

ther detail as to type and duration of forecasts, of the Area of Operations and in the Intelligence
see paragraph 6-15Ö. Estimate (app B and J).
(4) At higher headquarters, climate and c. Terrain.
weather information is included in the Analysis (1) Normally the smaller the unit, the

3-13
PM ©(s^S

jjraat®!? t!te© imtsrest in details of the terrain. Tlhs (3) Avenues of approach.
higher headquarters may think in terms of moisn- (/) Traíñeability, and its effects on (c)p
tain ranges, a lower headquarters in terms of hill (d), and (e) above.
complexes, ar^d a small unit in terms of small (3) At higher headquarters, information on
ridges and draws on a single Mil. Detailed terrain terrain is included in the Analysis of the Area of
data become particularly valuable dmring stability Operations (app B). Terrain intelligence is pro=
operations when the area of operations includes vided by the engineer staff officer, engineer ter-
areas particularly suited for location of insurgent rain teams, and other engineer units; however,
base camps, headquarters, hospitals, etc. surveillance and reconnaissance reports, interro-
(2) Terrain is normally evaluated in terms of gation reports, imagery interpretation reports
the following factors to determine its effect on and maps, together with other intelligence sources
assist the intelligence officer in the overall analy-
(a) Observation and fire. sis of the area of operations. At lower echelons,
(&) Concealment and cover. information may be provided by higher headquar-
(e) (Obstacles. ters, adjacent units, local civilian inhabitants, and
aerial surveillance.

>>©3ííO®[ü] ®mm imTo©


operations since an analysis of all available enemy
a. Although EEI and OÏR announce the intelli- indications will be the basis for recommendations
gence missions of the command, collection agen- to the commander for specific courses of action.
cies normally are assigned specific tasks in the Typical intelligence indicators are found in ap-
collection of information of enemy activity or of pendix T.
characteristics of the area of operation.
&. Particular enemy activities or characteristics
a. An indication is any positive or negative evi-
of the area of operations indicate various courses
dence of enemy activity or any characteristic of
of action open to the enemy. A determination
must be made as to which of these enemy activi- the area of operation which points toward enemy
ties or area characteristics should comprise a part vulnerabilities or the adoption or rejection by the
of the mission of intelligence collection agencies. enemy of a particular capability, or which may
This determination is based upon the theory that influence the commander's selection of a course of
action.
probable enemy courses of action can be deduced
from the knowledge that certain enemy activities b. Indications include conditions which result
such as movement of units, increase in sapper from previous actions or from enemy failure to
activities, construction of roads or stcclcpiling of take action. For example, enemy dispositions may
weapons do or do not exist. Such knowledge of indicate a particular enemy capability or vulnera-
enemy activities forms the basis for deducing the bility. The enemy's logistical situation may favor
relative probability of various enemy courses of the adoption of a particular capability or may
action. This theory is extended to include enemy influence friendly selection of a course of action
capabilities, vulnerabilities, units, and installa- by indicating an enemy vulnerability. In a nuclear
environment the destruction of large enemy
e. A necessary step in directing the collection forces by nuclear attack may result in a vulnera-
effort is to determine those enemy activities or bility which favors friendly resumption of the of-
characteristics of the area of operations which fensive. Destruction of river-crossing means in
will indicate the answer to the intelligence re- ~~ one area by friendly forces may lead to forcing
quirement. This procedure is called "determina' the enemy to cross elsewhere. The presence of
tioîî of indications" and is a function of the intel- obstacles such as areas of poor trafficability may
ligence officer. The ability of the intelligence influence the adoption or rejection of a course of
©íñcer to "read indicators" (ñnduding recognition action by either force.
of eneîîmy deception and eounterdeception indica- e. Indications provide the basis for orders and •
toips) Esay contribute to the smceess of friendly requests. The specific information which collection
&-M
FM 30-5

agencies are directed or requested to supply is the b: The analysis requires a thorough knowledge
information which will confirm or deny the indi- of the enemy and of the characteristics of the
cation. area of operations which can affect military oper-
ations. Particularly valuable is detailed knowledge
d. Intelligence collection agencies must be alert
of the enemy organization, equipment, tactical
to the fact that indications presented by the
doctrine, and logistical methods; the probable
enemy may be false. The enemy will go to great
enemy knowledge of the area under friendly con-
efforts to deceive us by portraying indications
trol ; the personalities of the opposing enemy com-
which point to the adoption of a course of action
manders ; and the past performance of the oppos-
which he does not intend to adopt. Even though
ing enemy units.
the enemy's intention to attack, withdraw, or de-
fend is known and verified, we can still be de-
c. At every headquarters, lists of enemy activi-
ceived as to the strength, location, time, and
ties peculiar to each indication are compiled. The
tactics he will employ.
lists are disseminated to higher, lower, and adja-
cent units. For training exercises, FM 30-102 lists
3-23. Analysis of EEI and OIR activities pertaining to operations of the maneu-
a. EEI and OIR are analyzed to determine the ver enemy-aggressor.
indications which by their existence or nonexist-
ence provide an answer to an intelligence require- d. Having identified indications which reveal
ment. Normally, these are indications which are answers to the intelligence requirements, the in-
likely to exist when the enemy prepares to adopt telligence officer determines those specific enemy
or does adopt any particular course of action. activities which by their very nature and location,
Thus, a requirement which asks in part, "will the will, if present, establish each of the pertinent
enemy attack" is analyzed by determining the in- indications. These specific items of information
dications of attack which may exist during the constitute a basis for orders and requests to agen-
preparation or launching of offensive actions. cies. In formulating the specific items of informa-
These indications frequently include forward tion required to determine enemy indications,
movement of hostile units, forward displacement items which afford the best probability of detect-
of artillery, and strengthening of counterrecon- ing the use of false indications by the enemy must
naissance screens. also be formulated.

Section IV. SOURCES OF INFORMATION

3-24. General radioactive material, nuclear bursts, imagery,


maps, weather forecasts, studies, and reports.
a. A source is defined as a person, thing, or
d. Other sources of information include inform-
activity from which information is originally ob-
ants ; intelligence reports and studies prepared by
tained. Sources may or may not be under friendly
higher, lower, and adjacent units and other mili-
control.
tary services and governmental agencies.
b. The source of information to be selected to
fulfill a given intelligence requirement is an im- 3—25. Enemy Activity
portant consideration. For this reason, a knowl-
a. Enemy activity such as movements of troops,
edge of what sources of information are available
the presence of armor, weapons displacement,
is essential to the planning of a collection effort.
movement or stockpiling of supplies and materiel
c. The most common sources of information for construction, and the amount and types of weap-
intelligence purposes are enemy activities, prison- ons fire all provide valuable combat intelligence
ers of war, local residents, refugees, evacuees, dis- information. Enemy intelligence collection activi-
placed persons, civilian agencies, recovered US ties and surveillance methods also provide valua-
military personnel, captured enemy documents ble information. Knowledge of enemy intelligence
and materiel, enemy electromagnetic emissions organization, doctrine, procedures, communica-
and sounds, odors, duds, shell and missile frag- tions, and relationships with the local civilian
ments, craters, areas contaminated by CB agents, population provide vital information for planning:

3-15
FM ms
tlhs dscsptic^., coîiîîtsriîiteliigeîîcSs, ar.d ssetaríty gation of those who may be captured by corps
measures of the command. troops. (See FM 30-15 for guidance in PW inter-
rogation.)
b. Conversely, the lack of enemy activity or the
fact that the enemy has not engaged in certain e. When sick or wounded prisoners of war are
activities is often of great value. For ex&mpîe,, the undergoing treatment at medical treatment facili-
information that the enemy has not moved his ties, suitable arrangements for interrogations will
reserves or that he has not displaced certain sup- be coordinated with the medical officer in charge.
port units may inñuence the commander's course
of action. d. Procedures for interrogation and handling of
PW are standardized and are fully discussed in
c. The volume and type of information available FM 30-15 and FM 19-40.
from enemy activities are limited by the capabili-
ties of the means to detect and observe them and
the measures taken by the enemy to mask his
activities. As examples, the enemy may use hills. o. The term "civilian" includes local inhabit-
to cover troop movements from radar line-of-sight ants, line crossers, tourists, missionaries, dis-
detection or he may use the noises of field artil- placed persons and repatriates. Civilians who
lery fire to cover the sounds of vehicular move- have been within enemy controlled areas may be
valuable sources of information. They must be
screened carefully to detect line crossers and sub-
D~2<s><, IProsstni®^ ©{? WOG1 version, espionage and sabotage agents. Proce-
dures should be established which insure early de-
a. Prisoners of war (PW) ?ire valuable sources tection of these types of civilians and immediate
of information of immediate tactical value and notification of counterintelligence personnel. Gen-
the effects of friendly psychological operations. erally, the longer the delay in questioning, the less
Maximum information is obtained through skill- valid is the information obtained.
ful handling of PW from the time of capture until
the interrogation is completed. Intelligence inter- b. Civilian sources may provide information on
rogation personnel must stay abreast of current terrain in enemy-controlled areas and enemy in-
enemy OB, tactics and organization in order to be stallations and activities. They may provide data
effective in their interrogations. A thorough on climate ; economic, sociological and psychologi-
knowledge of current friendly operations is neces- cal factors ; local resources ; and enemy population
sary. Intelligence interrogation personnel are controls and counterintelligence methods. Civil-
briefed on the information desired and are pro- ians are particularly valuable sources of informa-
vided with aids such as maps and aerial photos to tion in cold war operations and of information on
assist them in the conduct of interrogations. PW immediate areas of operations for division and
of ccunterintelligence interest (for example, mem- smaller units.
bers of intelligence, reconnaissance or guerrilla
organizations) should be identified and separated e. The civilian population is a lucrative source
early from other PW. Counterintelligencs person- of information in stability operations. Some of
nel should be notified immediately. the population, although appearing as innocent
civilians, will be the insurgent, terrorist, or politi-
b. Since qualified intelligence interrogation per- cal organizer. The insurgent directs his efforts to
sonnel are not normally assigned or attached gain the support and the control of the people. In
below brigade level except for specified opera- stability operations the civilian population's
tions, PW are not formally interrogated at eche- knowledge of the insurgent and his activities is
lons below brigade ; however, brief initial tactical broader than in conventional warfare. The
interrogation is encouraged at the lowest echelon amount of information which may be derived
in order to determine information of immediate from the population will largely depend on their
tactical value. Tactical interrogation of selected existing loyalties which normally are accorded to
PW takes place at brigade and division and a the force which provides the greatest promise of
detailed interrogation at field army. Normally security and economic well-being.
corps is bypassed in the chain of PW evacuations.
A PW collection point, however, may he estab-
lished at corps for the temporary retention of se-
lected PW for special interrogation or for interro- Recovered US military personnel are sources of

-IKS
FM 30-5

information on the area of operations and enemy intelligence information of immediate value to
dispositions and activities. US escapees and evad- target intelligence, order of battle intelligence, of
ers are also sources of information on successful to the determination of enemy capabilities and
evasion techniques. Debriefing of recovered US vulnerabilities of tactical or strategic interest.
military personnel is conducted in accordance The production of technical intelligence is facili-
with AFM 200-3/FM 21-77A/NWP 43(A), and tated by a continuous collection and exploitation
regulations prescribed by the theater headquar- effort by combat and support troops. (See FM
ters. Within the limits prescribed, debriefing of 30-16 for detailed information on the handling
such personnel at division and lower levels is and disposal of enemy materiel.)
usually limited to obtaining information of imme-
diate tactical value. 3-31. Enemy Electromagnetic Emissions
Enemy electromagnetic emissions are valuable
3-29. Captured Enemy Documents sources of information of enemy plans and orders,
a. General. Maximum collection of enemy docu- unit identification and locations, locations of fire
ments is insured by appropriate training and su- control and surveillance devices, and similar data.
pervision of small units. Documents may contain Exploitation of these sources extends the depth of
enemy propaganda or may have been prepared intelligence and contributes significantly to intelli-
and planted by the enemy to be captured in an gence production (to include that used for target
effort to confuse and deceive. acquisition). Normally the means utilized to ex-
ploit these sources are capable of all-weather,
b. Handling, Reporting, and Evacuation of Cap- day-and-night operations and often may provide
tured Enemy Documents (CED). unique insight into enemy plans or actions (FM
(1) Captured enemy documents include any 32-10).
piece of recorded information which has been in
the possession of the enemy and subsequently 3-32. Duds; Shell and Missile Fragments;
comes into US possession. Handling of captured Craters; Areas Contaminated by
documents should be outlined in unit SOP. CB Agents and Radioactive/Radio-
(2) Captured documents, excluding those logical Fallout or Material; and
found on PW, will be processed through the var- Nuclear Bursts
ious echelons with each echelon extracting that a. Duds and missile and shell fragments are
data of immediate tactical significance. Docu- sources of information on the type and caliber of
ments found on PW will be delivered to the next enemy supporting weapons. This information is
higher headquarters by the guard(s) escorting the an aid in determining order of battle and enemy
PW. capabilities and vulnerabilities. Duds and crater
(3) At division level, the document will be analyses are used in target acquisition by provid-
assigned a category dependent on the type of in- ing direction to firing positions. See FM 6-121 for
formation contained in the document. These in- shell reporting procedures.
clude :
(a) Category "A"—Document(s) contains b. Examination of areas contaminated by chem-
information of immediate tactical or strategic ical and biological agents, analyses and identifica-
value. tion of agents used, and delivery means assist in
developing countermeasures and in evaluating
(b) Category "B"—Document(s) contains
enemy capabilities. Information of areas contam-
cryptographic items and information relative to
inated by residual nuclear radiation, chemical
enemy communications-electronics systems.
agents, or spore-forming biological agents is re-
(c) Category "C"—Document(s) contains quired in determining terrain use and troop
information of lesser value to intelligence staffs. safety factors.
(d) Category "D"—Document(s) contains
no information of apparent value to intelligence c. Nuclear, biological, and chemical (NBC)
staffs. (See FM 30-15 for further detail on cate- attack information is essential to commanders
gories assigned captured enemy documents.) and their staffs at all echelons for estimates of the
situation. The initial NBC-1 message will contain
as a minimum the location of the observer, the
3-30. Enemy Material azimuth from his location to the attack, and the
Captured enemy materiel may provide technical date/time of the attack. Additional information

3-17
FM 30-5

will be transmitted as it becomes available (FM (7) Correcting maps and making map supple-
21-40 and appH). ments.
d. The existence of an enemy biological attack (8) Recognizing both deception and counter-
may not be known for days or weeks depending deception indicators.
on the agent used. The first indication of a biologi- (9) Identification of enemy major pieces of
cal attack may be an apparent epidemic among equipment by type and model.
troops of the attacked unit and/or civilians in the (10) Accurate location and measurements.
surrounding areas.
d. Ground surveillance radar teams organic to
infantry, mechanized, airborne, armored, and air-
3-33. Imagery and Ground Surveillance mobile battalions, the armored cavalry squadron
Radar Reports and division artillery are a source of valuable in-
a. Imagery obtained by ground and airborne formation concerning the movement of enemy
sensors is an excellent source of information for personnel and equipment within the detection
terrain evaluation, damage assessment, and ranges of the radars used. These radars are espe-
enemy activities such as fortifications, weapon po- cially valuable during periods of poor visibility.
sitions, organization or tactical locations, move- The G2/S2 exercises staff supervision over plan-
ments, and relative size and location of assembly ning the employment of the ground surveillance
areas. Current types of image-producing sensors radars organic to or in direct support of his orga-
include photographic equipment, airborne in- nization and receives reports concerning moving
frared detectors, airborne radars, ground surveil- targets detected by these radars. The ground sur-
lance radars, thermal imaging devices, and night veillance radar section of the headquarters and
vision devices. headquarters battery of division artillery reports
b. Imagery obtained by ground-based sensors, target information to the division artillery TOC
for intelligence purposes, includes panoramic for immediate use as target intelligence. Likewise,
views of areas, large-scale coverage of specific ob- the artillery radar sections (countermortar) as-
jects and terrain features, flash recordings, and signed to the direct support battalion report to
repetitive imagery of specific areas for compara- the field artillery fire direction center (FDC) S2
tive purposes. A special type of coverage is pro- and the supported unit for immediate use as tar-
vided by comparative motion pictures with the get intelligence. Information orginating in these
capability of using selected frames as still pic- radar reports is also processed through normal
tures. Panoramic imagery taken from a dominant intelligence channels.
terrain feature may provide terrain information e. Night vision devices are classified as either
to supplement maps and aerial imaery for coordi- passive or active depending upon whether they
nating observation plans, ground reconnaissance make use of available light or require the use of
activities, field artillery fires, and orientation of artificial illumination.
personnel of subordinate echelons.
(1) Passive night vision devices make use of
c. Imagery obtained by sensors operating from available light, however limited it may be, and
airborne platforms, manned or unmanned, is par- electronically intensify and/or convert optical or
ticularly useful to combat elements in operational electronic images so that they may be seen in an
planning. Properly exploited, it is an excellent eyepiece or on a screen. Passive devices include
means for collecting information to assist in— so-called "starlight scopes," which intensify low-
(1) Locating enemy offensive and defensive light-level optical images so that they may be seen
installations; supply installations and lines of by the naked eye, systems employing low-light-
communications; and armored, motorized, and level television, and passive infrared viewers,
personnel concentrations. such as metascopes, which convert images pro-
(2) Analyzing terrain. duced by infrared light into visible images.
(3) Confirming or denying intelligence data (2) Active night vision devices require the
obtained from other sources or agencies. use of artificial illumination. Such systems usually
consist of an infrared light source, which emits
(4) Preparing target folders.
invisible infrared light, and an infrared viewer,
(5) Assessing damage. which converts images produced by reflected in-
(6) Preparing mosaics and panoramas for frared light into visib'e images. Active devices re-
planning purposes. quire more caution in employment since the in-
3-18
FM 30-5

frared rays emitted can be detected by the enemy noise. The various types of activity detected by
infrared viewer. the sensors are reported by radio frequency signal
to a monitoring station. The radio frequency sig-
/. Thermal imaging devices are passive sensors
nal produces an identification code at the monitor-
which detect and display emitted and reflected
ing station from which the operator is able to
thermal radiation coming from the terrain and
identify which sensor reported the activity. Sen-
objects on the terrain. The total emitted radiation
sors are used in detecting, locating, and monitor-
is a function of an object's temperature and its
ing enemy presence in the area under surveil-
emissivity. Emitted radiation differs between ob-
lance. Various types of sensors used in combina-
jects and the resultant differences are sensed and
tions provide a more accurate report of activity
displayed by the system. The sensor can detect
by resolving false activations caused by animals
minute differences and, therefore, differentiate be-
and other sources.
tween objects close to each other. Both a real time
pictorial display of the thermal images and the c. The G2/S2 exercises staff supervision over
recording of the sensor acquired images on film planning for the employment of unattended
are possible. This type of sensor is passive in that ground sensors, selection of locations for their
it does not depend upon detecting the reflection of emplacement, display and processing of the data
artificial illumination or transmitted energy. collected through their use, immediate dissemina-
Thermal imaging devices should not be confused tion of target data acquired, integration of sensor
with simple infrared viewing devices. data with information collected by other means,
analysis of the integrated information, and dis-
g. The G2/S2 is responsible for ensuring that
semination of the resulting intelligence.
all surveillance means are coordinated and inte-
grated to preclude undesired duplication or gaps d. Unattended ground sensors are an additional
in the surveillance effort. The G2/S2 considers the major resource available for use by commanders
mission of the unit or organization and the capa- as part of their total information gathering as-
bilities of each of the surveillance means availa- sets. Sensor information is reported and inte-
ble, and then prepares an integrated battlefield grated into the intelligence system as is informa-
surveillance plan. A new surveillance plan is pre- tion from other sources. Sensor data, correlated
pared whenever necessary, and each new plan is with information obtained from other intelligence
continually revised as the tactical situation or the sources, can materially assist the G2/S2 in pro-
mission changes. viding timely and factual intelligence for use by
the commander and his staff (FM 31-100 (Test)).
3-34. Unattended Sensors
3-35. Maps
a. Unattended ground sensors can be used in a
wide variety of military operations, to include Maps are a principal source of terrain informa-
both offensive and defensive situations as well as tion. Map accuracy is determined by the data used
special surveillance missions. In each application, in the preparation of the map. Maps are supple-
sensors are used to collect data concerning activ- mented by aerial or ground photographs, side-
ity and/or movement in the area under surveil- looking airborne radar (SLAR), sketches, visual
lance. If accurately emplaced, sensors may also be observation, trig lists, gazetteers, and other infor-
used to provide accurate target locations. Sensor mation. Trigonometric lists contain the exact loca-
activations may be used to cue other surveillance tion and elevation of benchmarks and survey
means to confirm or more accurately sense enemy points with a complete description of their char-
activity. Sensor data must be integrated with the acteristics. They are of particular value to fire
information obtained by the other collection support elements and engineer units and are re-
means available to the commander. quired for locating and orienting certain surveil-
lance devices. Engineer topographic units are res-
b. Unattended ground sensors detect various ponsible for providing these data.
types of activity. Some sensors detect seismic vi-
brations produced by movement on the ground
such as personnel walking and vehicle movement. 3-36. Weather Forecasts, Studies, and
Some sensors produce a magnetic field that de- Reports
tects the movement of ferrous metal within the a. The mission of providing direct weather
field. Acoustic sensors detect sounds that are pro- service for the field army is vested in a single US
duced by activity such as talking and vehicular Air Force Air Weather Service (AWS) organiza-

3-19
K

tizTi functicnElly aligned with, and under the op- serving and forecasting capability at each army,
erational control of the field army units that are corps, and division TOG. They also operate ais1-
supported. AWS Staff Weather Officers are spe- field weather observation units at major airfields.
cial staff officers to army, corps and division com- Air Weather Service units :
manders. They also normally command the at- (!) Maintain continuous surveillance over
tached AWS weather units. Within the Army, weather conditions in the operationl areas of the
these weather units are provided with Army units served, and advise commanders and staff
transportation, Army field and communications officers of signifAcant changes and developments in
equipment (except meteorological peculiar equip- the weather situation. This surveillance may in-
ment) and logistical support, and are linked to- clude operating tactical weather radar and meteo-
gether by special dedicated Army communications rological satellite tactical ground readout equip-
circuits. These dedicated communications circuits ment as well as acquiring conventional surface
are vital to Army weather support operations. It and upper air observation.
is an intelligence responsibility to assure that the (2) Provide weather observations, detailed
attached weather units receive their authorized operational and planning forecasts, weather brief-
support. See FM 31-3 for details of AWS opera- ings for combat missions, reports of current
tions.
weather, weather summaries, and climatological
b. The Army is responsible for satisfying cer- information as required to meet the needs of the
tain requirements of its own such as ballistic-me- organizations served.
teorlogical data and fallout wind data. The re- (3) Provide experienced weather personnel
sponsibility for ballistic-meteorological data is as required for consultation on special weather
carried out by field artillery meteorological sec- problems.
tions, which can measure or determine current (4) Collect, evaluate, and further disseminate
surface and upper air winds, pressure, tempera- weather data generated within the area.
ture, and humidity. Army aviators report weather
conditions within their areas of flight operations. c. AWS detachments send out tactical observer
All units can provide weather data obtained by teams to make weather observations required to
visual observation and, if required, they may be refine large area forecasts. Tactical units may be
equipped with instruments for collecting addi- required to assist by supplying local weather data.
tional weather data. The responsibility for fallout d. The Defense Mapping Agency Hydrograhpic
wind data is carried out by personnel of the tacti- Center (formerly, Navy Océanographie Service)
cal operations center (TOC) or rear area opera- will provide necessary marine charts and tidal
tions center (RAOC). Air Weather Service units data in areas where this information is important
operate tactical weather stations with weather ob- to tactical operations.

isf/cssD ^ A©[^0[!

posts; ground and airborne surveillance devices;


a. An agency is any individual or organization air and ground reconnaissance; reconnaissance is
which exploits a source to collect and/or process force and by fire; chemical agent detection a^d
information. To distinction is made between those identification; radiological monitoring and sur-
agencies which collect information and those vey; interception of enemy communications and
which process intelligence; all are regarded as noncommunications electromagnetic emissions ;
agencies. All subordinate adjacent, and higher and photography.
headquarters as well as certain intelligence per-
sonnel, are considered to be agencies (app C). In-
dividual Soldiers of the command afford the lower ïêîSSîS

echelon intelligence officer his most direct and a. General. After determination of the specific
basic means of collecting information. information required, available agencies are se-
lected to obtain the information. In making tills
b. Collection agencies use varying methods to
selection, the factors of capability, suitability,
collect information. The more common methods
multiplicity, and balance are considered.
are intelligence interrogation; examination of
documents; use of observation and listening b. Capability. An agency must be physicaîîy

S--2©
FM 30-5

capable of providing the desired information in a a. Physical characteristics of the friendly terri-
timely manner. For example, an armor unit in tory.
reserve is not asked for identifications of units in
b. Enemy PW and civilian internees.
contact, nor is artillery asked for information
which can be obtained only from prisoners of c. Crimes and offenses in the area of operation.
war.
d. Operations of patrols, checkpoints, and infor-
c. Suitability. The collection task assigned to a mation posts.
unit must be compatible with its primary mission.
Only the agencies best suited to furnish the de- e. Operations of confinement facilities and reha-
sired information are used. For example, infor- bilitation centers.
mation most readily secured by dismounted pa- /. Liaison with other civil and military law en-
trols should be obtained by infantry units rather forcement agencies in the area.
than armor units. Economy of personnel and ma-
teriel also is considered. p. Physical security of key facilities and instal-
lations, including special ammunition escort and
d. Multiplicity. Evaluation of information re- security.
quires that it be compared with information re-
ceived from other sources and agencies. Subject to h. Assistance in rear area security operations.
considerations of. capability and suitability, more i. Circulation control to include traffic control.
than one agency is used to obtain each item of
required information. /. Resource management.
e. Balance. Within the limits imposed by other
3-41. Civil Affairs Units
considerations, the collection workload is balanced
among agencies. Balance is a minor consideration C'vil affairs units acquire much information of
when compared with the importance of other fac- the physical and nonphysical characteristics of
tors. the area through contact with the civilian popula-
tion, the government, the economy, and the insti-
3-39. Troops tutions of the area. Information of intelligence
interests acquired by civil affairs units through
Combat and combat support units are especially day-to-day operations should be collected dis-
useful for collecting information of the enemy and creetly so as not to jeopardize the primary mis-
of the area of operations forward of the FEBA. sion of the civil affairs units in that area. See FM
Some units have exceptional capabilities for col- 41-10 for guidance on civil affairs intelligence
lecting information. For example, reconnaissance activities.
(para 3-55 below) is one of the primary functions
of an armored cavalry unit. Army aviation, air 3-42. Psychological Operations Units
defense, field artillery, and target acquisition
units are organized to collect information by ob- Physchological operations (PSYOP) units acquire
servation, radar, sound and flash equipment. information of use to supported commands. This
Some combat service support units are capable of information is generally in the area of psychologi-
collecting significant amounts of information dur- cal, political, sociological and economic intelli-
ing the conduct of their normal operations. Vir- gence, dealing with enemy, neutral and friendly
tually every military unit—combat, combat sup- groups. When authorized by the appropriate com-
port and combat service support—has intelligence mand, PSYOP intelligence personnel participate
collection capabilities. in detailed prisoner of war interrogations. Analy-
sis of enemy propaganda is a supplementary
source of intelligence information. Opinion analy-
3-40. Military Police Units
sis based on carefully prepared and executed in-
Due to their characteristic employment and na- terviews with prisoners of war, civilian internees,
ture of activities throughout the field army area refugees and similar groups is used to determine
of operations, military police units are valuable the attitudes of these groups, especially in stabil-
collectors of information. Military police units ity operations. The results of these analyses may
may have access to information of interest to in- be used as an index of the effectiveness of friendly
telligence and counterintelligence agencies in the operations. Psychological operations units conduct
following military police areas of responsibility: radio monitoring of enemy propaganda broad-

3-21
Pßfl ©@™g

casts. Analysis of enemy propaganda assists the i=4âo SipssüsH Äfmay QraîoDDDgQûîgQ (SOüPQSöCSKI
supported command's G2 in determining the yHDfc
effectiveness of friendly operations.
Special Army intelligence collection units furnish
information on activities in enemy areas of opera-
tions. These units furnish a liaison team to accom=
Some military intelligence personnel are also plish coordination with the command in whose
collection agencies. Typical of these are intelli- area they are operating (FM 30-18).
gence interrogators, imagery interpreters, docu-
ment analysts, counterintelligence personnel, area
intelligence specialists, and strategic intelligence a. Technical intelligence units operate in the
research and analysis personnel (see FM 30-9 for field army to perform the following functions :
organization and employment of intelligence units (1) Collect, identify(, and examine captured
and personnel). enemy materiel.
(2) Make preliminary tests and reports on
capabilities, limitations, use, and effectiveness of
enemy materiel.
Army Security Agency (US AS A) units support
field armies, corps, divisions, and seaprate bri- (3) Arrange for evacuation of selected enemy
gades by providing capabilities in the fields of materiel and recommend disposition of enemy ma-
signals intelligence (SIGINT), signal security teriel of no intelligence value.
(SIGSEC), and electronic warfare (EW). Inte- (4) Prepare questionnaires for use by intelli-
gration of SIGINT at the earliest possible mo- gence interrogation personnel.
ment into the intelligence collection effort is a re- (5) Instruct on recognition characteristics,
quirement for the most effective target acquisi- use, maintenance of enemy materiel, countermea-
tion, surveillance, and reconnaissance support to sures, and interchangeability of our own and al-
the tactical commander. SIGINT information can lied materiel.
complement, confirm, or refute and, in many in- (6) Evaluate effectiveness of our own and
stances, provide leads to other intelligence collec- allied weapons and ammunition against enemy
tion elements. SIGSEC support denies the enemy materiel.
information/intelligence from the commanders (7) Investigate intelligence targets to evalu-
communications network and electronic equip- ate enemy scientific and technical achievements in
ment. USASA is also tasked with the timely ex- research, development, production, and storage so
ploitation of known or suspected sources possess- that further detailed analyses may be made by
ing possible target exploitation or other informa- appropriate personnel.
tion (AR 10-122 and FM 32-10).
(8) Collect, evaluate, and interpret informa-
tion affecting the health and welfare of man and
i=4So SpOSDoD gQigMrfC^ B)0ß@]<SÜT)[nn;Q(n!fö animals in actual or possible areas of operation
Special security detachments (SSD) are attacbedl which is immediately or potentially significant foir
to field army, corps, and division tieaclquairteirs military planning.
from the US Army Special Security Group, a, b. Capture of special-interest equipment indud=
Field Operating Agency (FOA) of the Depart- ing ammunition containing chemical or biological
ment of the Army Staff. The detachments operate agents or radiological material or protective
the secure area for the receipt, storage, and distri- equipment, nuclear munitions, or communica-
bution of certain signals intelligence (SIGINT) tions-electronics material and cryptographic ma-
material within the supported command and are terial is reported to an appropriate technical in-
responsible for security, dissemination, and use of telligence team as standardized in STANAG 2084 ;
this material (AR 380-28 and AR 380-35). Each captured cryptologie material is reported to the
detachment is commanded by a Special Security supporting USASA element. The team either ar-
Officer (SSO) who provides information, advice, ranges for the item to be evacuated for examina-
and represents a direct link between the coaa- tion, examines the item at the location where it
siand, higher headquarters, and the Department was captured, or directs other dispositions of it.
cf the Army on matters related to the above func- Capture of explcsive-type ammunition or muni-
tions. tions which contain chemical or biological agents
9. 3^
fM 30-5

or radiological material is reported to an appro- chemical officer who supervises the technical as-
priate explosive ordnance detachment for safe- pects of these operations. Selection of areas in
rendering of the munitions prior to evacuation or which operations are to be conducted is a G2/S2
technical intelligence examination. responsibility. The G2, in coordination with the
G3, establishes mission priorities.
c. Technical intelligence units at Army level re-
ceive information and actual items from Army c. Engineer Officer. Information and intelli-
units as indicated. They evaluate and report on gence are provided on terrain, enemy fortifica-
these items, as appropriate, within their capabili- tions, engineer troops, tactics, materiel, and capa-
ties and assigned missions. They also arrange for bilities (FM 5-36). Terrain information includes
evacuation of appropriate items to the communi- stream data (width, depth, condition of banks and
cations zone or the United States, as necessary. bottom, and rate of flow); landing beach data;
Details of the operations of technical intelligence trafficability studies; traffic and road conditions
personnel are contained in FM 30-16. within the area of operations; port, railroad,
canal, pipeline, airfield, and bridge data ; and data
3-48. Engineer Topographic Units concerning target acquisition and site selection
Engineer topographic and intelligence units for atomic demolition munition (FM 30-10). Spe-
collect, evaluate, and disseminate terrain data, cial engineer units, including engineer terrain de-
produce terrain studies, and provide consultant tachments, prepare terrain studies, topographic
service in military geology and hydrology in sup- maps, terrain models, and map supplements. En-
port of programs of the intelligence officer of the gineers also provide flood warning service (FM
5-30).
appropriate command.
d. Surgeon. Information is provided on non-US
3-49. Special and Other Staff Officers health problems, training, and materiel used by
Special staff officers or elements having troops foreign medical services; status, capabilities, and
under their control can obtain information of in- limitations of foreign military and civilian medi-
telligence value in the conduct of their normal cal installations and facilities; data on medical
duties and furnish the intelligence officer with aspects of enemy combat operations and incidents
such information and intelligence. All special staff involving diseases resulting from enemy biological
officers are capable of advising on enemy activi- agent employment and casualties resulting from
ties which are similar to those within their own enemy chemical and nuclear operations; identifi-
areas of interest. The following special staff cation of enemy chemical and biological agents
officers can furnish information of the types indi- and radiological materiel; medical information
cated : from interrogation of selected prisoners of war,
refugees, defectors, and escapees; and disposition
a. Field Artillery Officer. Information which of captured medical materiel.
can greatly assist in building an accurate intelli-
gence picture of the enemy is available from the e. Provost Marshal. Information is provided on
following field artillery sources: forward observ- incidents involving enemy agents, saboteurs, guer-
ers, aerial observers, radars, flash and sound ele- rillas, bypassed units, enemy raiding parties, and
ments, survey/meteorological elements, and other other security threats.
liaison representatives.
/. Communications-Electronics Staff Officer. In-
b. Chemical Officer. formation is furnished on the capabilities, limita-
(1) Information and intelligence are pro- tions, and vulnerabilities of enemy communica-
vided on location, time, number, and extent of tions equipment and personnel. In addition infor-
reported enemy or unidentified nuclear, biological mation is also provided concerning the use and
and chemical (NBC) attacks; on location, size, technical characteristics of enemy electronics
duration, and effects of chemical and biological equipment such as radar, optical, infrared, laser
contamination; and on location, extent, and de- systems, and other peculiar type sensory devices.
gree of radiological contamination caused by or The status of enemy commercial communications
expected from nuclear weapons (FM 21-40 and sytems found in the area of operations is also
FM 3-12). analyzed to provide additional information to be
(2) Information obtained from airborne per- used in the deveopment of a more detailed intelli-
sonnel detector operations is provided by the gence data base.

3-23
Pitt §§>•§

g. Aviation Offîcsr. Information is provided OîI infantry ranger patrol in case of contact and/or
enemy aircraft and helicopter night characteris- exploit patrol findings. The principal factors that
tics, load capacity, speed, endurance and arma- limit the operations of AIRC are limited mobility
ment; enemy airmobile tactics; normal and spe- and the necessity to escape detection. Generally,
cial aviation uses with particular attention to air- patrols of the AIRC depend upon foot mobility;
borne surveillance devices; and eneaty state of thus, they cannot move rapidly from one area to
training. another in search of information. Furthermore,
h. Staff Weather Officer. Weather observatioms, their movement is limited by the threat of detec-
weather forecasts, weather summaries, and cli- tion and logistical problems. The threat of detec-
matic information are provided by the staff tion also limits their communications capabilities.
weather officer (provided by the Air Force Air c. US Army Special Forces (SF) consist of per-
Weather Service). sonnel trained in basic and specialized military
i. Other. Other staff officers who may provide skills, and organized into multi-purpose units.
information of value to the intelligence officer in- These units provide a training, advisory, or opera-
clude: civil military operations officer (G5), ex- tional capability in many functional areas, includ-
plosive ordnance disposal (EOD) officer, informa- ing intelligence. SF elements are usually con-
tion officer, civil affairs officer, fire support coordi- trolled by the theater headquarters and may pro-
nator or artillery officer, and air defense officer. vide intelligence from denied areas as a primary
mission or as part of another mission.
d. Although USASA units do not normally op-
Stay-behind units are combat elements deliber- erate in or over enemy-held territory, they do
ately positioned in the enemy-controlled area for have the capability of intercepting enemy commu-
the purpose of collecting information of enemy nications and noncommunications electromagnetic
activities or for target acquisition. To be most emissions that originate or terminate deep in
effective, units preselected for deliberate stay-be- enemy territory thereby providing target acquisi-
hind missions should be given special training and tion and intelligence information of enemy activ-
equipment. ity in that area.

§MiH. AgQifseoos fer ©¡pxaKsiifeinig i©!!^^ ëMSJ ¡äQJWQsil

a. Target acquisition and the collection of infor- a. The military intelligence company (aerial
mation concerning enemy activities deep in enemy surveillance) normally assigned to corps and sep-
territory are highly suitable missions for the air- arate task forces is capable of performing near
borne infantry ranger company, aerial reconnais- all-weather, day and night aerial surveillance and
sance and surveillance units. reconnaissance in support of the corps (FM 30-20
b. The airborne infantry ranger patrol from the and FM 30-35).
airborne infantry ranger company (AIRC) (FM b. A military intelligence battalion, air recon-
31-18) is normally controlled by field army or naissance support (MIBARS), normally is as-
corps. In requesting the use of the AIRC, the re- signed to each field army or independent corps.
questing headquarters must consider the time re- The MIBARS produces and disseminates intelli-
quired to process the request to the controlling gence information obtained from tactical USAF
headquarters and the time required for the de- reconnaissance elements operating in support of
sired information to be collected and reported the field army and provides liaison between the
back to the requesting agency. Requesting units field army and the reconnaissance elements of the
must also consider the need for reaction forces to supporting tactical Air Force (FM 30-20 and FM
be committed to extract or reinforce the airborne 30-35).

iosfcra wo. œiVunY MwußiULAMeü, sss ©M^ÄBiin^cti &m mmsîî &mwu§m©w


ligence purposes. Reconnaissance is a mission un-
Surveillance is the all-weather, day and night, dertaken to obtain information about the activi-
systematic observation of the battle area for intel- ties or resources of an eneïr.y or potential enemy.
3--20
FM 30-5

Surveillance and reconnaissance are related activ- planning the next operation. During fluid situa-
ities. The distinction between them lies in scope tions, continuous area surveillance is required to
and direction. Surveillance is a continuous watch assist in determining the enemy's course of action
and does not focus on a specific objective. Recon- and the location of his main efforts. In static situ-
naissance is finite in scope and time and has a ations, periodic area coverage may suffice.
specific objective. Target acquisition is the detec- (3) Division and lower echelon requirements.
tion, location, and identification of a target with At division and lower levels, surveillance require-
sufficient accuracy and detail to permit the effec- ments are characterized by the immediacy of op-
tive employment of weapons. Surveillance recon- erations. Continuous surveillance is required to
naissance, and target acquisition are closely re- defect or obtain information of movements into or
lated and the means to accomplish each of these within the area of interest, enemy dispositions,
activities are often identical. employment of supporting weapons, electromag-
netic emissions, nuclear detonations, chemical-bio-
3-54. Combat Surveillance logical-radiological contaminated areas, air
threats, weather, and topographical features. Pe-
a. General. Combat surveillance is a principal
riodic area surveillance is required for general
means by which the intelligence officer imple-
information of the enemy and terrain to supple-
ments his collection plan to provide for the detec-
ment current general intelligence. During fluid
tion of general enemy activity as well as to an-
situations, continuous area surveillance is re-
swer the commander's essential elements of infor-
quired. During static situations, periodic-coverage
mation (EEI).
of the area may suffice.
b. Combat Surveillance Requirements Within
Field Army. c. Ground Surveillance. Ground surveillance in-
(1) Field army requirements. At field army, volves the systematic and continuous observation
surveillance requirements are characterized by of selected areas, routes, or static locations such
the depth of penetration required and a lesser as crossroads, bridges, aircraft landing areas, or
need for continuous surveillance coverage. Enemy other specific type installations.'Ground surveil-
objects and activities subject to surveillance in- lance is characterized by line-of-sight limitations,
clude movement and general location of major re- dependence upon terrain for movement and site
serves, long-range missile sites, command posts locations, and a limited capability of surface
and combat service support comp'exes, and elec- transport to displace surveillance means in time
tromagnetic emissions. Other surveillance require- to be responsive to immediate requirements in
ments include information of the terrain, new areas. Units performing ground surveillance
weather, nuclear detonations, and chemical-biolog- missions provide current information by detect-
ical-radiological contaminated areas. Normally, ing, locating, identifying, and reporting informa-
periodic surveillance will suffice. The length of tion of military value. Ground surveillance is con-
time between missions will vary with the situa- ducted in all combat operations by all combat
tion. In fluid situations, continuous surveillance of units.
given activities or objects for short periods may (1) Surveillance Operations. When planning
be required. surveillance operations, the factors of mission,
(2) Corps requirements. At corps, surveil- enemy, terrain and weather, time and troops
lance requirements are generated by both immedi- available (METT), as well as available equip-
ate and future operations. They are characterized ment, will govern the organization and disposition
by deep penetration of the enemy territory and a of forces. Since surveillance usually consists of
general reliance upon aerial surveillance means. systematic and continuous observation of large
Continuous surveillance is required to detect and areas, long routes or several specific locations,
obtain information of movements of enemy re- units conducting surveillance missions normally
serves into or within the corps area of interest, commit the bulk of their forces to performing ob-
general location of enemy reserves and fire sup- servation while retaining a small reserve to assist
port weapons in the corps area of interest, missile elements that may be attacked by enemy forces.
attack, air attack, nuclear detonations, electro- Ground units performing surveillance missions
magnetic emissions, chemical-biological-radioloeri- will usually operate in rear areas, areas adjacent
cal contaminated areas, and weather. Periodic to the forward edge of the battle area (FEBA),
area surveillance is required for supplemental in- forward of the FEBA or provide dismounted ele-
formation on the enemy and terrain required for ments which can be airlifted into areas forward

3-25
í?'iia s®-y

of the FEBA. Surveillance missions are conducted frared imagery ; reduced visibility degrades visual
in a manner similar to that of a screening force or surveillance. Problems of coordination and control
a rear area security operation. Observation posts, of the use of the airspace may impose further
listening posts, and patrols are established to pro- limitations on its use.
vide continuous and systematic observation. A (1) Aerial Surveillance Missions. An aerial
surveillance force is not usually capable of offer- surveillance mission is characterized by the large
ing strong resistance to the enemy; however, it expanse of terrain that it covers and the fre-
must be capable of projecting itself. Air cavalry quency with which it is fiown. Aerial surveillance
units may extend the surveillance capabilities of is as continuous over the entire battlefield or area
ground units beyond the FEBA. The intelligence of interest as resources will allow. Generally, it is
officer plans and coordinates surveillance activi- conducted without regard to specific targets,
ties with the operations officer and consults with though major areas of interest may be empha-
appropriate members of the staff to insure coordi- sized. A surveillance mission normally is per-
nation of surveillance with other activities. formed with a large area coverage sensor such as
(2) Surveillance Tasks. Any unit or organi- radar or by visual or photographic coverage from
zation may be assigned a surveillance mission. higher altitudes so that a large ground area can be
Surveillance is routinely performed by units as a observed at all times. Radar and some photo-
part of normal combat operations. Surveillance graphic and visual surveillance flights can be
tasks which may be performed while conducting flown along or behind the FEBA parallel to the
other primary missions are : line of contact. Surveillance over-flights of enemy
(a) Determination by observation of mili- occupied areas may also be employed using visual
tarily significant activity (by the enemy or civil- observation, photography, or radar coverage to
ians influenced by the enemy) or the absence of both sides of the aircraft's line of flight. The
such activity. major advantages of aerial surveillance missions
(&) Location of targets for employment of are their ability to :
fire support means within assigned areas. (a) Cover large expanses of terrain rap-
(c) Observation and adjustment of fire idly.
support delivered against surface targets. (b) Maintain continuous surveillance over
(d) Damage assessment. large hostile areas while flying over friendly posi-
(e) Location and identification of enemy tions which increases aircraft survivability and
units moving or stationary within assigned areas mission accomplishment.
of operations. (c) Observe movement or changes as they
(/) Observation of enemy avenues of ap- take place on the enemy side of the FEBA which
proach and lines of communication. will provide the commander with an early warn-
(g) Observation of routes and key terrain ing of probable enemy intentions and identify spe-
within friendly rear areas. cific areas for further targeting of collection as-
sets.
d. Aerial Surveillance. Aerial surveillance com- (2) Visual Aerial Observation. Visual aerial
plements ground surveillance and is characterized observation by aircraft crews is limited by the
by a capability to extend line-of-sight; to become speed of the aircraft, the availability of visual
independent of terrain for communications, move- aids such as binoculars and night observation de-
ment routes and site locations; and to adjust or vices, the distance from which observation must
react rapidly to new requirements. The mobility be made, the enemy's air defenses and conceal-
of aerial surveillance platforms and their ability ment measures, and the existing visibility. Many
to operate free of terrain interference provide a of these limitations may be overcome by use of
capability to conduct surveillance over large sensors to verify and to supplement visual sight-
areas. The air cavalry and other aviation units of ings. The value of visual aerial observation lies in
the division, corps, and field army are used for the speed with which information of fleeting tar-
reconnaissance and surveillance missions. When gets can be relayed to friendly units capable of
aerial surveillance units are used for missions for- attacking such targets. There are four general
ward of the FEBA, commanders must give care- types of visual aerial observation—area search,
ful consideration to enemy air defense capabili- specific search, route reconnaissance, and artillery
ties. Generally, inclement weather will reduce the adjustment. The use of crews intimately familiar
effectiveness of aerial surveillance. Turbulence with the terrain will greatly increase the effec-
ana heavy precipitation degrade radar and in- tiveness of visual aerial surveillance.

S"2<§
GENERAL DETAILED
PHOTO COVERAGE INITIAL RECORD MAPPING RECORD
INTELLIGENCE RECORD INTELLIGENCE RECORD
(1)

General intelligence requirements, such as Conduct of current tactical operations. Study of specific targets or objectives for Preparation and revision of maps.
MAJOR USES basic infarmalian an terrain, routes of Target acquisition. information for immediate requirements
(2) communication, and enemy activities. and for specific planning.
Planning operations.
Mapping.

TYPES OF PHOTOS
Usually vertical stereo pairs Usually vertical stereo pairs. As required. Usually small scale vertical stereo pairs*
(3)

AREA OF COVERAGE Projected areas of operations. Unit area of influence and specified As required. As required.
(4) portions of the unit orea of interest.

As necessary to show seasonal changes. As required by the tactical situation, terrain As required. As required.
characteristics, and other variables. At
FREQUENCY times, daily coverage of only portions of
(5) the battle area is required. In moving
situations, only coverage of specified
areas and immediate objectives may be
required.

Normally requested by field army which Normally requested by divisions and higher As required. Normally requested by corps and higher
makes automatic initial distribution headquarters. headquarters and distributed to
DISTRIBUTION to subordinate units according to areas See FM-10M0-1 for typical allowances. topographic units.
of interest.
(Í)
Supplementary issues ore made as the
campaign progresses.
See FM 101-10-1 for typical allowances.

Often supplemented with large scale photos of culturally developed areas.

Figure 3-2. Categories of aerial photographic coverage. u


1
*4 £
pm g®=§

(3) Permamnt Record Imagery. Permanent night. As with airborne radar, the information
record iœagssry is highly ûesirabie bsfore, duringp obtained by these devices is normally corrobora
and after most operations. Aerial imagery pro- ated by other means, such as photography, which
vides recorded images which are studied, ana- can batter determine the nature of the detected
lyzed, and interpreted by trained imagery inter- activity. Airborne passive infrared and thermal
preters. Such analysis is more accurate than that detection devices are designed for coverage of lim-
derived from visual observations. The time lag ited areas. The infrared (IR) devices are suitable
between acquisition and interpretation o£ perma= for linear targets such as coastlines and communi-
nent imagery may reduce or negate the value of cations net. The aircraft must penetrate enemy
information collected concerning transient and airspace to accomplish its mission, with subse-
fîeeting targets. Permanent imagery may be ob- quent vulnerability to enemy aircraft or ground
tained through use of— fire. Passive IR and thermal detection devices are
(a) Photographic coverage—the general invulnerable to countermeasures but are suscepti-
categories of coverage are shown in figure 3-2. ble to enemy deception measures. The effective-
(b) Emission detectors (light and heat in ness of these devices is reduced by fog, clouds, and
the infrared portion of the electromagnetic spec- precipitation (FM 30-20).
(5) Collection Agencies.
ie) Radar. (a) The military intelligence (MI) com-
(d) Electromagnetic intercept devices. pany (aerial surveillance) is a specialized organi-
(4) Use of Radar and infrared Devices. zation containing Army aircraft and various
(a) Portrayal methods used by radar and types of sensors. This company provides the
infrared devices include scope presentation for in- Army with a limited organic means of collecting
stantaneous viewing, in-flight processing and information which can be obtained only by aerial
viewing for near realtime intelligence, imagery means in response to the commander's immediate
recording for retention and detailed study, and
transmission to ground stations. Airborne radar (b) The military intelligence battalion,
can produce acceptable imagery during most con- aerial reconnaissance support (MIBARS), field
ditions of visibility and is particularly valuable army, is a specialized organization created to pro-
during periods of degraded visibility. Infrared vide the Army an organic means of interpreting,
sensory devices produce acceptable imagery dur- processing, and disseminating intelligence infor-
ing' most conditions of visibility but are somewhat mation from aerial reconnaissance missions flown
degrade during bad weather conditions. by the Air Force or other services in support of
(b) Airborne radar can provide acceptable the Army's requirements. It also provides liaison
imagery during periods of darkness and in condi- personnel to the reconnaissance elements of the
tions of light rain, smoke, haze, fog, mist, and supporting services.
dust. It is valuable as a moving target indicator (c) Within the military intelligence organi-
(MTI), particularly in a controlled environment zation supporting the division and corps are im-
with the organic Army side-looking airborne agery interpretation (II) sections that are respon-
radar (SLAR) capability of in-flight processing, sive to the commander's needs.
interpretation and reporting. Information ob- (â) The Army Security Agency (ASA), in
tained can be supplemented by use of other addition to other supporting units, provides tacti-
means, such as infrared (especially at night), vis- cal units the capability to conduct the electronic
ual observation, and photography to aid in the countermeasures (ECM) and signals intelligence
exact determination of the cause of the activity or (SIGINT) portion of aerial reconnaissance and
other returns detected by the MTI radar. Air- surveillance operations in support of Army field
borne radar can quickly cover large areas. S'de- commands. The combined SIGINT Support Ele-
looking airborne radars can operate from behind ment/Electronic Warfare Element (SSE/EWE),
the forward edge of friendly dispositions. A limi- collocated within the TOC, is the tactical com-
tation of airborne radar is its dependency upon mand's integrated point of entry into the total
îine-of-sight which makes it susceptible to detec- SIGINT/ECM support system. The SSE/EWE
tion. coordinates and integrates the flow cf SIGINT
(c) Airborne passive infrared and thermal and ECM information into the command, and the
detection devices are valuable in detecting heat flow of the command's SXGINT and ECM support
emissions or differentials penetrating some types requirements into the SIGINT-ECM system! The
OA camouflage, and collecting information at SSE/EWE functions as intermediary between tks
S-28
FM 30-5

tactical command and the total SIGINT/ECM naissance with other activities. Adjacent and sup-
system to insure the proper level and type of SIG- porting units are informed of reconnaissance
INT/ECM support is provided. The SSE/EWE plans to preclude duplication of reconnaissance
operates under the staff supervision of the sup- efforts. Coordination is especially important to
ported command's EW/cryptologic staff officer. the success of night reconnaissance missions. Fac-
(e) Army aviation units of the division are tors to be taken into consideration in the planning
capable of performing visual aerial surveillance stage should include the formulation of the plan
missions. In addition, helicopters of the division itself, the selection of a unit, and coordination. In
are also capable of performing airborne personnel preparing the plan, broad generalizations such as
detector and other developmental sensory mis- "report strength and disposition of the enemy"
sions when provided the necessary training, should be avoided. The specific time that the in-
equipment and personnel. formation is desired or the latest time that the
(/) Tactical air reconnaissance provided information will be of value should be included in
by the USAF or other services is one of the the order or request. When more than one mission
sources of information available to the com- is assigned to a unit, priorities should be stated.
mander for planning and support of operations. Plans should include provisions for debriefing of
This support normally is tailored to meet the spe- participating personnel after the reconnaissance
cific tactical situation. has been completed.
(6) Aerial Surveillance Operations. Aerial (2) Once a unit is selected in coordination
surveillance operations are based on continuous with the operations officer the unit should be al-
requirements for information. The G2 Air may lowed sufficient time to prepare its plans, conduct
initiate a requirement, or he may receive it from the mission, and report the results. The assigned
another staff section or from a subordinate unit. mission should be within the capability of the re-
Division missions flown by organic corps aircraft connaissance agency.
are coordinated beforehand so that ground sensor
c. Fundamentals of Reconnaissance. The recon-
terminal (GST) and division imagery interpreta-
naissance techniques used by the combat arms are
tion support may be alerted to receive the results
described in branch field manuals. The principles
of missions as they are flown. Aerial surveillance
for reconnaissance patrolling are—
operations are covered in greater detail in FM
30-20 and FM 30-35. (1) To gain contact as soon as possible and
maintain it continuously. Ground reconnaissance
elements gain and maintain observation of the
3-55. Reconnaissance
enemy and by working continuously to the front,
a. General. Reconnaissance is a mission under- flanks, and to the rear, attempt to determine the
taken to obtain information by visual observation location, identification, disposition, and strength
or other detection methods, about the activities of the enemy force and the approach of enemy
and resources of an enemy or potential enemy ; or reinforcements. Army aviation may be used to
to secure data concerning the meteorological, hy- assist ground reconnaissance. Contact can be
drographie, or geographic characteristics of a maintained by observation and does not require
particular area. Reconnaissance missions provide engaging the enemy with fire. Once contact has
specific coverage of areas of general activity de- been made, it is not voluntarily broken without
tected by surveillance activities. They can also proper authority.
provide periodic coverage for areas where there is (2) To maneuver freely in conformity with
a high probability of enemy activity and there are operations. Patrols and reconnaissance units ma-
insufficient resources available to maintain contin- neuver freely to orient on the location or move-
uous surveillance. Reconnaissance missions obtain ment of the intelligence objectives, not on other
information which provides for the general devel- friendly elements. Reconnaissance of portions of
opment of probable targets in terms of identifica- the assigned area in addition to canalized routes
tion, location, and activity. such as roads, valleys, and ridge lines, will result
6. Planning and Coordinating Reconnaissance in the maximum collection of information.
Activities. (3) To fight only when necessary. Reconnais-
(1) The intelligence officer plans and coordi- sance is conducted preferably by stealth and ob-
nates reconnaissance activities with the opera- servation of the enemy without his knowledge.
tions officer and consults with appropriate mem- Combat is resorted to only to prevent friendly
bers of the staff to insure coordination of recon- casualties or capture, when prisoners are desired,

3-29
Pßfl ®@=s

or when the mission requires combat to obtain the dispersion of the battlefield, the greater the re-
desired mformatiom. ReeonnalgsaMce foreso ©F© quirement for reconnaissance and the more read
provided the means to accomplish their mission ily ground reconnaissance patrols can penetrate
by close combat, if necessary. enemy positions and obtain information. Mobility
(4) To report all items of information. Much and the availability of sophisticated aerial sensors
information has importance that is not obvious at do not eliminate the meed for aggressive ground
the time of its collection. Negative information reconnaissance.
shows where the enemy is not going, or where he /. Reconnaissance in Force.
is not located, at a given time. Information which (1) A reconnaissance in force is an attack by
seems unimportant to the observer may substanti- a considerable force to discover and test the ene-
ate the intelligence officer's suspicions of the use my's dispositions, strengths and weaknesses, and
of T&CD or counterdeception by the enemy. In- develop related combat intelligence. The primary
formation must be reported accurately, com- purpose of reconnaissance in force is to develop
pletely, and in a timely manner. the situation rapidly and in more detail than is
(5) To develop the situation. When enemy possible by other reconnaissance methods. The
contact is made or an obstacle is encountered, the objectives are to gain information and intelligence
situation is developed rapidly. The following on the enemy by causing him to disclose his
actions are taken on contact : planned fires or use of reserves. Normally, it is
{a) Deploy and report. used when there is an urgent need for informa-
tion concerning the enemy and when the effective-
(b) Reconnoiter. ness, speed, and availability of other collection
(c) Choose a course of action. agencies are inadequate. The reconnaissance in
{d) Report. force should be a carefully planned operation
d. Principles of Counterreconnaissance. The which weighs the potential value of intelligence
principles of counterreconnaissance operations against the inherent risks. The reconnoitering
are as follows : force may be assigned terrain objectives or may
be required to reconnoiter a particular area.
(1) Operations are adjusted to and oriented (c) Two general methods are associated
on the friendly forces being screened. with a reconnaissance in force : the limited objec-
(2) Enemy reconnaissance elements are de- tive attack in which the commander intends to
stroyed or neutralized by combat. hold terrain seized, if possible, and the raid, in
(3) Screening forces are echeloned in depth which the intention is not to seize and hold ter-
to provide mutual support and to limit penetra- rain. The limited objective attack may involve an
tions by enemy reconnaissance elements. The attack by one force, directed toward a particular
counterreconnaissance screen prevents enemy re- area within which information is sought, or it
connaissance forces from entering certain areas may consist of a series of aggressive probes along
or places. It may be a moving or a stationary one a front, conducted by several subordinate ele-
depending upon the activities of the force being ments of a large force to determine the enemy
screened. situation at several critical points. The raid is an
attack within any enemy position to accomplish a
e. Ground Reconnaissance. specific mission, without the intention of holding
(1) Ground reconnaissance units consist of the invaded territory. This method of reconnais-
personnel manning ground observation posts or sance in force varies with the size and type of
surveillance devices, elements of all combat arms, force conducting the raid.
and units especially organized or designated to (b) The reconnaissance in force operation
perform ground reconnaissance. is characterized by a limited knowledge of the
(2) The armored cavalry squadron is the enemy and an urgent requirement for additional
principal ground reconnaissance element of the information. While the reconnaissance in force is
division. In addition, each maneuver battalion has conducted generaîly the same as other attacks, the
an organic ground reconnaissance capability. The maneuver force should not become so decisively
range of these ground reconnaissance elements engaged as to risk defeat. The primary mission of
can be extended by providing them with air trans- this operation is to obtain information ; however,
portation. Aggressive ground reconnaissance is a the commander anticipates striking either enemy
positive means of determining disposition and weakness or strength and is prepared to exploit
identiftcation of enemy forces. The greater the unexpected success or to extricate the reconnoiter-
§-•§©
FM 30-5

ing force if this becomes necessary. In deciding to collection means required to increase the area cov-
reconnoiter in force, the commander weighs the erage capabilities of the Army and extend that
urgency and importance of the needed informa- coverage beyond the limits of organic Army aerial
tion against the possibility that the operation may collection means, the capabilities of air reconnais-
disclose future plans to the enemy or that it may sance elements of the Air Force, Navy, and Ma-
lead to a general engagement under unfavorable rine Corps complement those of Army aircraft as
conditions. The reconnaissance in force must be a part of a joint operation. These air reconnais-
conducted with sufficient strength to cause the sance elements perform reconnaissance missions
enemy to react strongly and definitely, thereby over the forward combat area and penetrate the
revealing his location, dispositions, strengths, airspace over and behind enemy forward combat
planned fires, and planned use of reserves. elements. Present collection means include visual
observation, photography, radar and infrared im-
g. Aerial Reconnaissance. USAF tactical air re-
agery, radar mapping, electronic reconnaissance,
connaissance missions are undertaken in direct
and weather reconnaissance. The greater speed of
support of tactical operations. Through the use of
the aircraft and the capacity of the sensors of
aerial platforms or vehicles equipped with visual,
these services enable them to cover large areas
optical, electronic and/or other sensory devices,
more rapidly and with greater survivability than
specific information about the activities and re-
Army aircraft; however, their speed requires
sources of an enemy or potential enemy is ob-
them to operate at higher altitudes and reduces
tained. In addition, data concerning the meteorol-
information gained by visual observation. The at-
ogical, hydrographie characteristics of a particu-
tached USAF tactical air control party and the
lar area are secured. Aerial reconnaissance must
Fleet Marine Force air/naval gunfire liaison com-
be coordinated with ground reconnaissance. Aer-
pany (ANGLICO) provide advice and detailed in-
ial reconnaissance provides greater range capabil-
formation concerning the employment of Air
ity and timeliness.
Force, Navy, and Marine reconnaissance re-
( 1 ) Army aviation. sources as appropriate.
(a) Army aviation supports and reinforces
ground reconnaissance. Army aircraft have the 3-56. Target Acquisition
range, speed, and special sensory equipment to
cover large areas rapidly. This capability permits a. General.
ground reconnaissance elements to concentrate on (1) Target acquisition is that part of combat
areas of greatest intelligence potential. Army intelligence that pertains to detection, identifica-
aviation can extend the range of ground. recon- tion and location of a target with sufficient
naissance elements by providing them with air accuracy and in such detail to permit the effective
transportation to their starting point and picking employment of weapons.
them up at prearranged locations. (2) Target acquisition elements in the divi-
• (&) Organic rotary-wing aircraft give the sion field artillery are specifically organized,
division a visual observation capability ; however, trained and equipped to accomplish the target
none of these aircraft except those of the air cav- acquisition mission. These elements are located in
alry and division artillery aviation sections have the division field artillery headquarters and head-
the primary mission of visual air reconnaissance. quarters battery and in each direct support field
(c) Attached or supporting aerial surveil- artillery battalion. Other field artillery target
lance units from corps or field army provide day acquisition elements, possessing equipment and
and night aerial photography, near all-weather capabilities not found in divisions, are available
aerial radar and infrared imagery, and daylight from corps and army resources.
visual reconnaissance. This support includes (3) Target acquisition normally is associated
transmission of infrared and radar images to the with field artillery and consists of indirect and
supporting ground sensor terminals. Aerial photo- direct target acquisition. Indirect target acquisi-
graphic imagery requires normal film processing tion can best be defined by use of the term target
before interpretation. development. A primary function of the field ar-
(d) FM 1-15, FM 6-20, FM 6-102, FM tillery target acquisition means is' the gathering
17-36, and FM 30-20 contain detailed procedures and reporting of information of importance to fire
for the employment of Army aviation reconnais- support operations of the combat force. Field ar-
sance and surveillance aircraft. tillery target acquisition elements are part of the
(2) Other services: By providing the aerial information collecting agencies of the force and,

3-31
Ffifl §@=s

as sneb, are a major componeEt of the combat intelligence processing or the use of circuitous re-
intelligence system at all echelons. The force G2 porting channels should be avoided.
makes full use of the target intelligence developed c. Direct Target Acquisition.
by all sources in formulating his collection plan. (1) Traditionally, direct target acquisition
Continual emphasis is placed upon ensmring the has been thought to be accomplished only by the
now of acquired information between the ñeld ar- application of means designed for that purpose
tillery target acquisition means and the intelli- (e.g., forward obseirvers, observation posts, aerial
gence structure. observers, countermortar/battery and ground sur-
veillance radars, flash and sound ranging devices,
b. Target întelligncee. and radio direction-finding equipment). These
( 1 ) Requirements for detail and accuracy. means are an integral part of the field artillery
(a) Target intelligence must be sufficiently fire support system designed to be employed spe-
detailed and accurate to permit an evaluatiom of cifically to acquire targets for all fire support
the target's importance in relation to the mission means. Implicit in the application of these ele-
of the command and to permit analysis to deter- ments is the requirement for detail, accuracy and
mine the most effective weapon or warhead for timeliness sufficient for rapid target analysis and
use against the target. Information collection and response (FM 6-121).
target acquisition agencies must be impressed (2) Direct target acquisition may be accom-
with the requirement to provide the most com- plished by other means (i.e., by units in contact,
plete and accurate target information in order to night vision devices, searchlights, patrols of all
satisfy specific needs of users. types, survey parties, imagery acquired by aerial
(b) Requirements for detail and accuracy means, signals intelligence, electronic warfare
will vary with the weapon or response to be em- support measures, ground and air reconnaissance
ployed (e.g., air strike, field artillery, maneuver elements, unattended ground sensors, airborne
force), the type ammunition (e.g., HE, chemical, personnel detectors, and virtually anyone who
or nuclear), the type fire (e.g., indirect or direct, sees a target and has the capability to communi-
observed or unobserved) and the effect desired cate the required information to a reaction
(e.g., neutralization, destruction, or harassment). means). At times many of these means will be
(c) Target information must be reported given the specific mission to acquire targets (e.g.,
as completely and accurately as time requirements long-range patrols, aerial imagery units, or sur-
and situations permit. This is not to imply that veillance radars which have been surveyed into
incomplete information should not be reported. the common grid). Although all the various means
Even minimum new information may serve to may not be formally included into a recognizable
validate available information. target acquisition system similar to the field artil-
lery system, they play an extremely important
(2) Requirements for timeliness. part in target acquisition in support of current
(a) Requirements for timeliness vary. operations.
Some information such as that gathered by unat- (3) Direct target acquisition is also accom-
tended ground sensors is immediately available plished by sensor-equipped armed Helicopters.
for interpretation. Other information such as pho- Available airborne sensor systems include air-
tographic imagery, requires processing before it borne searchlights, forward-looking infrared,
can be used. Requirements for timeliness vary moving target indicator radars, and low-light-
with the nature of the target (i.e., whether it is level television. These systems allow aerial acqui-
permanent, semipermanent or mobile; whether it sition of targets during periods of darkness or
is building up or dispersing; and whether it is an reduced visibility. Coupled with the helicopter ar-
immediate or future threat to the accomplishment mament system, they afford an accurate, realtime
of the mission). Forces in contact have the most acquisition and engagement capability. The effec-
stringent timeliness requirement. tiveness of these airborne systems may be limited
(5) To insure timeliness in target acquisi- when the threat of enemy antiaircraft forces heli-
tion, all commands and target acquisition agencies copters to fly nap-of-the-earth.
must be authorized to report information directly (4) Target damage assessment resulting
to whatever agency has the capability to react from direct target acquisition activities is fur-
rapidly. Every effort should be made to prevent nished to the intelligence subsystem to update the
any unnecessary delay in reporting target infor- intelligence data base and influence collection and
zcation/intelïigence. Belays caused by excessive operational planning activities.

g-S2
FM 30-5

CHAPTER 4

COLLECTION OF INFORMATION
(STANAG 2014, 2029, 2033, 2084, 2103; SEASTAG 2014, 2029,
2084; SOLOG 123)

Section I. INTRODUCTION

4-1. General 4-2. Supervising the Collection Effort


o. The intelligence officer has responsibility for To plan efficiently and to supervise the execution
defining collection tasks in terms of information of the collection effort, the intelligence officer
requirements and apportioning the tasks to collec- must thoroughly understand—
tion agencies. Assignment of collection tasks is a. The mission of the command.
based upon an analysis of the nature of the enemy b. The area of operations.
threat, the mission of the command, and the in-
formation collection assets available. This chapter c. The nature of the available sources of infor-
provides guidance concerning the implementation mation and the capabilities and limitations of the
of the collection plan and supervision of the available agencies.
collection effort. d. The steps in planning and executing the
collection effort.
6. Collection of information is made difficult by
the enemy's attempts to conceal strengths, dispo- e. The tactics, organizations, and characteris-
sitions, and movements; enforce censorship and tics of the enemy including the enemy intelligence
communications security ; disseminate false infor- and surveillance capabilities.
mation; and adopt tactical measures designed to /. Characteristics of the local populace, to in-
deceive. clude loyalties, religions, and social customs.

Section II. THE COLLECTION PLAN

4-3. General c. The collection plan is a continuously chang--


a. The collection plan is a means whereby an ing, working model. Since the collection effort in-
intelligence officer takes the intelligence require- volves continuous planning, an entirely new
ments as announced by the commander and, by collection plan is seldom prepared except when a
following a logical, orderly process, analyzes the unit first enters combat. The collection plan is
intelligence requirements for indications, trans- continually revised »s required. In effect, it is a
lates the indications into specific missions or re- slate on which new entries are written and obso-
quests, and tasks collection agencies. It is supple- lete entries removed.
mented, as required, by workbooks and other
plans such as aerial and ground reconnaissance d. Because information requirements are more
plans and observation plans. complex at higher levels of command, the collec-
tion plan is normally more extensive at such lev-
b. The collection plan assists the intelligence els. At any level, however, collection planning is
officer in the coordination and integration of the essentially a mental process and the collection
collection efforts of the collecting agencies and in plan—regardless of the format being used—is
keeping all elements of the intelligence structure merely an aid to assist the intelligence officer. It is
informed of collection activities directed by the not a substitute for thinking, and is maintained
headquarters. only to the extent that it assists the intelligence

4-1
oíñeer íK planning and supervising the collection is the basis for orders and requests to collection

(4) The agencies to be used to obtain


0. An invaluable aid in directing the collection
required information.
effort and in preparing the collection plan is the
(5) The place and time the information is to
coverage map. Plotted on the coverage map are
be reported if not specified in the unit SOP.
the extent and frequency of coverage of all collec-
(S) A column to indicate the progress of the
tion sources and agencies, including aerial and
collection effort and notes for future action.
ground reconnaissance, and any other activities
which provide information coverage to portions of h. Appendix E is an example of a partially com-
the battlefield. By use of a coverage map, the in- pleted collection plan.
telligence officer can quickly determine existing
gaps in coverage as well as coverage that is al- <Q=êo ©fdloFS OlñKol ß@(o]M)03if8
ready in effect against areas or targets of high
a. Formulation of Orders and Requests.
interest. At lower levels, the coverage map may
(1) Orders and requests for specific informa-
simply be an overlay to the situation map (para
tion are based on indications (app T). Collection
5—S).
agencies are directed or requested to supply the
information which will confirm or deny indica-
tions, but they are not given the responsibility for
a. The collection plan is not made up in any determining whether or not the information ob-
prescribed form. It can range from a fragmentary tained does confirm or deny an indication. If the
worksheet to a long, detailed plan, or it may be a îucaliort of hostile artillery in depth is a defense
mental plan alone. Although an experienced intel- indication, collection agencies are not ordered "re-
ligence officer can formulate his collection plan port whether or not hostile artillery is located in
mentally, the planning of the collection effort is depth." Instead, they are ordered to "report loca-
facilitated and is less subject to error when a tions of hostile artillery in your sector/zone." De-
formal, written collection plan is used. termination of whether the indication has been
substantiated is then based on the information
b. The type and makeup of the collection plan collected. Orders and requests for information
will depend upon the size of the unit, the mission, deal with a specific enemy activity, location, or
the situation, and the personalities concerned. At characteristics, or a specific terrain feature or
brigade and battalion levels, because of time and weather condition. These orders and requests are
operational limitations, the collection plan must specific as to what information is desired and
take the simplest form possible, consistent with where it may be found. For example, the forward
operational necessity. For example, the format of movement of hostile troops has been determined
the plan recommended for use at division and to be an indication of reinforcement. An analysis
higher levels (fig 4-1), may be modified by elimi- of the road nets, communications centers, and lo=
nating columns 1, 2, and 5. Greater flexibility and cations of enemy forces—integrated with a
mobility in future operations, together with the knowledge of the enemy's tactical doctrine—indi-
need for increased speed in the now of informa» cates what routes the enemy will most probably
tion, may preclude a formal written collection use and where the effort of available collection
plan. Regardless of what form of plan is chosen, it agencies should be concentrated. A proper order
must be patterned to meet the intelligence officer's to collecting agencies is "report volume, type, time
needs at any given time. and direction of traffic on the following roads."
(2) Orders and requests based on indications
4=§. ëooïiitooïite ©ff fllho ÊoDOoeÇooin) PDara of enemy vulnerabilities are formulated in the
a. A collection plan includes the following items same manner. For example, a battalion-sized
(fig 4-1): troop unit disposed within a given area may hav©
been determined to Ibe the minimum target suite-
(1) The EEI and other intelligence ïeqmï®» ble for nuclear attack. Collection agencies are Hot
Haent&—usually stated in question form. ordered to report locations of battalions vulnera-
(2) The indications pertinent to the EEI asid bl® to nuclear attack ; insteadp they are ordered to
to other intelligence rsquirements. report location, compesitior., dispodtioia, SíKS,
(S) The specific information sought im shape, and nudeaff defense sneasures of enemy
ecr^seticn with each indication. This iiafomaticm troop units. The intelligence analyst considers rs-
^2
UNIT:
Period covered: From:, .To:.

(1) (2) (3) (4) (5) (6)

List all available agencies

Essential Place and time


Indications
elements of Basis for at which
(analysis of Remarks
information specific orders information
items in
and other required or requests is to be reported
column (1))
intelligence items

List the EEI announced List opposite each item List the specific infor- Place a cross (X) under each agency Place: Headquarters or Notes for future actions
for the operation or period in column (1) those indica- mation sought in connec- that has or can get the information bear- staff section to which in- and to indicate progress
and other required intelli- tions that best provide an tion with each indication. ing on each indication. The agency (or formation is to be reported of the collection effort.
gence items, spaced suf- answer to the question agencies) finally selected to obtain the if other than the insuing
ficently to permit entry in asked or implied by each information is indicated by circling QQ headquarters. Time may
column (2) of all indica- item. except for SOP items for agencies under be a specific time, peri-
tions pertinent to each the control of the unit. odically, or as the infor-
item. mation is obtained.

NOTE: This plan it recommended for use at division and higher levels.

Figure 4-1. A collection plan. 61

t Î
D-'föi m-'â

portsä information collectively to develop the tair- information, are normally disseminated by means
get cata. of the intelligence annex. This annex normally
(3) Orders and requests for specific informa- accompanies each complete operation order issued
tion frequently deal with specific characteristics by division and higher commands. An example of
of the area of operatfosis. FOE1 exampüe, asi iîiteîli- an intelligence annex is shown in appendix N.
gence requirement may ask, "WJaat obstacles exist (a) Paragraph 3 of the intelligence annex,
in our zone?" A map study reveáis that streams '"Intelligence Acquisition Tasks," implements the
cross the axis of advance. This is an indication collection plan. ït contains a complete list of cur-
that natural obstacles may exist. The extent to rent orders and requests for information. Except
which a located stream is actually an obstacle be- for collection orders which are a part of the unit
comes the subject for orders and requests for spe- SOP, previously issued collection orders and re-
cific information. Accordingly, the order or re- quests not repeated in the intelligence annex are
quest to a collection agency may state, "Eeport automatically canceled. When orders and requests
width, depth, velocity, and condition of banks and are lengthy, they may be placed in an appendix to
bottom of JOH River between WALIS and HER- the intelligence annex.
(b) Paragraph 4 of the intelligence annex,
(4) Collection agencies do not restrict their "Measures for Handling Personnel, Documents,
efforts to items specifically mentioned in orders and Materiel," lists under a separate subpara-
and reports from higher headquarters. Pertinent graph the items which require action different
information, even if not specifically requested, is from those prescribed in the unit SOP. In prepar-
reported. If there is doubt as to the pertinency of ing paragraph 4, the intelligence officer consults
information, it should be repozted. supporling intelligence agencies, as appropriate.
(5) The wording of an order or request is not
necessarily the same as that used in column 8 oí
the plan. Several entries may be combined c. All available collection agencies usually are
into a single order or request because the same listed at the top of column 4. Military intelligence
specific information may be sought in connection units should be listed specifically. Material fur-
with several difïerent indications. For example, nished by these MI units would include intelli-
indications of attack may include "location of ar- gence interrogation, imagery interpretation, coun-
tillery well forward ;" indications of defense may terintelligence and order of battle information.
include a requirement to determine the "location All other units to include combat, combat support,
of artillery laterally and in depth." In both of and combat service support with an intelligence
these cases the specific information desired from collection capability are also listed.
collection agencies is location of artillery by type
and caliber. b. Opposite each basis for specific orders or re-
quests, an X is entered in the column of each
b. Dissemination of Orders and Requests. Or- collection agency capable of furnishing the re-
ders and requests for specific information are nor- quired information. The factors of suitability,
mally transmitted either as fragmentary orders multiplicity, and balance are applied, and circles
or by means of the intelligence annex of the oper- are drawn around the X's of the agencies to be
ations order. Security must be provided in the ordered or requested to furnish the information.
transmission of orders and requests because An exception to this technique is the handling of
enemy knowledge of our requirements would fur- SOP items for agencies under the control of the
nish him with a basis for countering our collec- headquarters.
tion efforts.
(1) Fragmentary orders are used most fre- c. The intelligence officer specifically selects
quently because information requirements contin- those agencies with which he has direct communi-
ually change. Operations orders have a prescribed cation. When information is desired from an
format; however, a fragmentary (operation) agency of a higher or lower headquarters, nor-
order has no prescribed format. Those elements mally the headquarters itself should be listed.
found in a comp'ete order are omitted when they
'¿ave not changed, are not essential, or are una- 0—©. {ffeeo ©Kd TOFKO ©i? So[ó;©Fíf5R|)
vailabls ox incomplete at the tims of isstie.
(2) Intelligence and intelligence instructions, a. Information may be required by or at a spec-
to include orders and requests for the collection of iñed time or times, at specified intervals, or upon

&-^,
FM 30-5

the occurrence of specific events. A one-time re- whether the indication concerned has been sub-
port, for example, on the condition of a river bot- stantiated.
tom, may be required by a specified time. Reports b. Notes on future cancellation or implementa-
on certain enemy activities may be desired at tion of orders and requests, modifications of EEI
specified times. Such reports may be required
and other intelligence requirements upon the
daily at the beginning of morning nautical twi-
occurrence of specific events, or other actions to
light and at the end of evening nautical twilight.
be taken as the collection effort progresses are
Reports of other enemy activities such as move-
also entered in column 6.
ment along particular roads may be required peri-
odically, that is, "every four hours beginning at
0800." Reports of identification of new units, 4-10. SOP Items
enemy aerial activity, artillery bombardment, a. As the collection plan is a means of facilitat-
nuclear activity, and similar items are usually ing analysis of the EEI and other intelligence re-
required as obtained. Periodic negative reports quirements and insuring that pertinent orders
pertaining to specified activities may also be and requests have been issued, entries are also
required. made concerning information items specified by
unit SOP (FM 61-100 and FM 101-5). For exam-
b. Entries in column 5 are determined in con- ple, the SOP ordinarily direct subordinate units to
sultation with the G3/S3. Information which ar- report newly obtained identifications immediately.
rives too late is of no value. Information received Nevertheless, the collection plan is completed with
too soon may be inaccurate by the time it is used. respect to new unit identifications exactly as it
would be if the SOP did not require such report-
c. When the collection agency requires time for ing. For such items, however, the X's under agen-
preparation, allowance is made for the time cies to be used need not be circled and the abbre-
needed by the collection agency to issue orders viation "SOP" may be entered in the "Remarks"
prepare personnel for the mission, execute the column to indicate that an order is not necessary.
mission, and report the results.
b. If the basis for specific orders or requests
directs attention to a specific area, the item is
4-9. Remarks treated as if it were not an SOP item even though
a. Miscellaneous notes on the progress of the it may be information of a type covered in the
'collection effort and notes for future action are unit SOP. For example, the unit SOP may pre-
recorded in column 6, "Remarks." A code consist- scribe reporting the location of hostile minefields,
ling of plus and minus signs, check marks, and demolitions, and other defensive works. However,
icrosses may be used for designating whether posi- a requirement for reporting the location of mine-
•tive or negative reports were received, whether fields in the vicinity of a specific area is not
(Lhe information received was adequate, or treated as an SOP item.

Section III. SUPERVISION OF THE COLLECTION EFFORT

4-11. General mander and others informed of the enemy situa-


tion and capabilities in the area of operations, the
Active supervision of the collection effort by the intelligence officer is faced with the problem of
'intelligence officer is necessary to insure the efficiently employing all available collection agen-
success of the collection effort. This is particularly cies to collect information. The commander re-
'true of the collection agencies organic to or at- quires on a continuing basis, reliable information
tached to brigade and lower units. Supervision on the disposition, strength, composition, and
can be best achieved by personal staff visits—by movement of hostile forces as well as information
the intelligence officer himself or by members of
his staff. For example, an S2 may brief members on the area of operations. All means are employed
of a patrol before departure and debrief them, as to gain information of the enemy forces in his
'a group, upon their return. sector/zone and in other areas which may affect
the preparation of plans and the accomplishment
4-12. Significance of the mission. Failure to exploit properly each
'Because his primary function is to keep the com- source of information may deny important infor-

4-5
FM 30-5

mation of hostile dispositions, movements, and op- collection effort must, therefore, be an integral
erations and prevent the exploitation of enemy part of the intelligence officer's responsibilities in
peculiarities and weaknesses. Supervision of the the collection of information.
FM 30-5

CHAPTER 5

PROCESSING OF INFORMATION
(STANAG 2022; SEASTAG 2022)

Section I. INTRODUCTION

5-1. General ble future value, is normally completely processed


before being: disseminated.
Processing is the phase in the intelligence cycle in
which information becomes intelligence. Process- c. Evaluation and interpretation may occur si-
ing consists of three operations— multaneously followed by immediate dissemina-
tion. For example, information from a reliable
a. Recording. The reduction of information to
source and believed to be true may state that the
writing or some other form of graphical represen-
enemy is about to launch a major attack. In this
tation and the arranging of this information into
case, recording is of secondary importance and
groups of related items.
the intelligence report that an attack is imminent
6. Evaluation. The determination of the pertin- is disseminated as soon after receipt as possible.
ence, reliability, and accuracy of the information. d. Reporting of information to higher echelons
c. Interpretation. The determination of the sig- may occur concurrently with processing. For ex-
nificance of the information in relationship to in- ample, to decrease the production time of intelli-
formation and intelligence already known and the gence related to nuclear targets, a commander
drawing of deductions as to the probable meaning may order that all information concerning speci-
of the evaluated information. fied enemy units, areas, or activities be reported
concurrently with processing at lower headquar-
ters.
5-2. Processing Procedure
e. Figure 5-1 illustrates a sample flow of proc-
a. Information is processed as received without essing at a division, corps, or field army headquar-
waiting to collect additional information. The in- ters having a tactical operations center (TOC).
telligence derived from fragmentary information The upper portion of the figure reflects processing
may be particularly essential for nuclear targets which occurs when the message is first received at
or fast moving stability operations. Normally the TOC ; the lower portion reflects the processing
there is a time lag between the buildup of a target which takes place when the message is first re-
and the time that the information becomes availa- ceived at the G2 section. The latter portion may
ble; in fa^t, complete information on the target also apply equally as well to processing at brigade
may not become availably until after the target level except that those references to the G2 and
has begun to vanish. If time permits, a search is TOC are not appropriate at this leve.l
directed for additional information to complete,
confirm, or refute the intelligence developed from /. A sound collection program and proper utili-
fragmentary information. zation of the various collection agencies and
sources of information will result in a heavy vol-
b. The sequence in processing depends upon the ume of information which flows into the respec-
nature and urgency of the information. Recording tive intelligence staffs' processing element. Many
is usually the first step ; however, on urgent items, of the intelligence requirements can only be met
recording may occur simultaneously with evalua- by reporting minute details on a great variety of
tion and interpretation. Information needed im- subject areas. Each one of these details may ap-
mediately by higher, lower, or adjacent units is pear unrelated to others and insignificant by it-
disseminated before it is completely processed. In- self. However, when painstakingly mapped and
formation not of immediate concern, but of possi- otherwise chronologically reported over long peri-

5-1
I w

TOC UCIIM*
•r Eliwitf»
WKMI AffMfriat»

□ AN «paratian «r rtctIvlnf «fvacy

0
(MM Af«*cUt
WW« Af f ra^rivt» Opvratitit limUiiif ■ yvt «r ii* ivcltl««
DiitMiination (To
Agtncics Vhich
Nttd It Immtdiolcly,
t-a- FSE/TASE)

C3 0f
(CJ CIMMI)

kUp C.ntf»!
hi Furttivr
DiiimlulUn ■■
OlrMtvJ iHcUAftf
02 Jfcti«

•o- -o- -o- ■o-

EvalMtla» 01
(t«11«k¡llty) (T.
(AcMracy) ifMdn
I.tl.di.f TOO

<G2 VariiUak)
(C2 W.r4W.k)
(fll.il

Figure 8-1. Flow of proeeaaing.


FM 30-5

ods of time and analyzed in the light of other reliant on intelligence produced by its subordinate
details reported, they may lead to definitive and units. Each echelon must have some independent
predictable patterns of enemy activity. This tech- capability for producing intelligence. Each intelli-
nique is known as pattern analysis. In developing gence officer must exercise independent, critical
the intelligence picture, the intelligence officer evaluation to detect enemy deception efforts to
must decide what data he wants to compile by present false information through our intelligence
subject category. The types of overlays and cate- system.
gories of subjects plotted thereon will, therefore,
c. Interpretation. Interpretation of information
vary extensively according to the needs. The use
at higher headquarters is a progressively more
of a graphic keying system and color schemes in
complex task. The same abundance of information
conjunction with large scale maps will greatly fa-
and intelligence that makes determination of the
cilitate data analysis.
significance of an item relatively more simple
makes the task of selecting the appropriate infor-
5-3. Processing of Information at Corps and
mation and intelligence for comparison more dif-
Field Army
ficult. Moreover, the higher the headquarters, the
As the scope of intelligence activities and the vol- less comparative significance an individual item
ume of information increase, a more elaborate has ; and the linking of the item with those which
and intricate system of processing is required. in the aggregate have a major significance is more
a. Recording. Above division, the wealth of in- difficult. When there are large volumes of both
formation requires thorough and painstaking re- new information and accumulated information
cording to prevent loss of items. and intelligence, efficient interpretation depends
on systematic recording and precise analysis.
b. Evaluation. Evaluation of information is
(1) The evaluated information and pre-
more complex at higher echelons because of the
viously produced intelligence used in determining
amount and variety of information received. This
the significance of new information are carefully
is partly compensated for by the greater number
recorded so that items required for reference are
of sources and agencies that permit more specific
available to the intelligence officer when he inter-
determination of the accuracy of a given item, the
prets a new item of information.
reliability of the source, and the reliability of the
(2) Analysis of each new item of information
agency obtaining the item. Evaluation above divi-
is made to relate it to information already availa-
sion may also be aided by the use of specialists
ble. Every component part is judged in relation to
who become experts on a particular enemy unit,
known facts ; and the significance of the parts, as
geographic location or source of information. This
well as the whole, is determined. Once this has
technique, although requiring considerable human
been accomplished, the effect of the information
resource allocation, can be highly productive.
on the current intelligence picture is established.
(1) Pertinence. The pertinence of informa-
Information has then been converted into intelli-
tion is more than just a matter of determining
gence.
who needs it and when. There must be a sifting of
the valuable information from that of little im- d. Advent of Automatic Data Processing Sys-
portance or relevance. tem (ADPS). With the advent and application of
(2) Reliability. Determination of the reliabil- an intelligence data processing system in the field
ity of the source and agency may be relatively army, it is envisioned that the present-day prob-
easy because of the more frequent exploitation of lems of recording, storing, sorting, transmitting,
a given source or use of a particular agency. Over retrieving, and displaying intelligence data will be
a period much data accumulates on the accuracy somewhat alleviated. Intelligence data would be
and reliability of sources and on the ability, train- stored electronically and recalled and displayed
ing, and experience of the collecting agency. either in graphic or hard-copy form. Access to
(3) Accuracy. The accuracy of information data within the system may be provided through
may be readily determined because of the compar- the use of area communications, with storage of
ative wealth of corroborating evidence. Fre- data at one or more central points, perhaps in-
quently, however, a lower headquarters may use cluding division level. Developments in the ADPS
the same information to produce intelligence that area would therefore reduce the large amount of
agrees with the intelligence separately produced time spent by intelligence personnel in procedural
by a higher headquarters. These headquarters, actions and allow additional time for analysis of
therefore, must be careful not to become unduly intelligence trends and studies.

5-3
FM §©=£

3gîc®iû DL Bi€@S!§)l!M@

1-4. JlñlQü'Elü result, to include dissemination given to reports


or information received and other internal G2 re-
a. Recording makes subsequent interpretation
cording (workbook, situation map).
easier and more accurate and facilitates prepara-
tion of intelligence reports by conveniently draw-
ing together all available information on a specific
subject. The recording means used must be ade- a. The situation map is a temporary graphic
quate to handle the volume of information and display of the current dispositions and major
intelligence received and to serve the needs of activities of the enemy. Information of friendly
those who must have access to it. Means and tech- forces on this map is usually limited to bounda-
niques of recording must permit timely dissemi- ries ; locations of command posts of higher, lower,
nation of information and intelligence. and adjacent units; reconnaissance units; and the
b. At headquarters above division, recording is forward edge of the battle area. Separate overlays
of increased importance and complexity. Maxi- are often used to display separate categories of
mum use should be made of mechanical equipment information. A typical overlay shows fortifica-
and, when available, automatic data processing tions; another shows potential nuclear and chemi-
(ADP) systems. cal targets ; and still another presents details of
order of battle. The latest time at which the activ-
c. Common aids currently used in recording are ity was observed or the disposition confirmed
the — should be indicated when plotting enemy activities
(1) Journal. and dispositions. The intelligence officer keeps the
(2) Situation map. situation map or overlay as simple as possible. He
(3) Intelligence workbook. uses authorized conventional signs, military sym-
(4) Intelligence files. bols, and abbreviations. (See FMs 21-30 and
21-31 for authorized military and map symbols.)
(5) Coordinates register.
b. Other information and intelligence aspects of
the situation may be recorded on situation maps.
Chemical officers at respective headquarters, for
a. The journal is a permanent chronological
example, record reported nuclear bursts and
record of reports and messages that have been
chemical and biological data on situation maps;
received and transmitted, of important events
and engineer officers similarly record mine and
that have occurred, and of actions taken in re- obstacle data.
sponse, covering a stated period, usually 24 hours.
Figure 5-2 is an example of a page from an intel- c. Permanent recordings of the information on
ligence journal, illustrating the types of entries a situation map is achieved by overlay tracing or
normally made. The operations branch of the G2 periodically photographing the map. Periodic ov-
section normally maintains the section journal. erlays made from the G2/S2 situation map will
The journal is of great significance at division provide quick reference to past enemy activity in
level and below. a given area, can record locations of "hard tar-
gets" such as bunkers, trenches, or antiaircraft
b. The commander of a brigade may prescribe
emplacements, and can assist the G2/S2 in deter-
the maintenance of one journal for the unit or
mining patterns of enemy movement and inten-
require the maintenance of separate journals by tions.
each staff section.
d. Maintenance of the situation map at brigade
c. Journal entries should reflect—
and battalion levels is usually a joint S2/S3 action
(1) An accurate and concise statement of the
• while at higher levels a separate situation map is
message, report, or event.
maintained by each section. The friendly situation
(2) A notation as to the sender or individual
is basically the responsibility of the S3 while the
making the report, to include unit duty position or
enemy situation is basically the responsibility of
section, such as S3 1/60 Inf.
the Si?. During operations, personnel from either
(3) The time of receipt or dispatch and section may plot friendly or enemy entries on the
method of transmission. situation map and perform other processing func-
(4) Action actually taken (not intended) as a tions.
S=4
FM 30-5
DAILY STAFF JOURNAL OR DUTY OFFICER'S LOG FAOE NO. NO. OF RAOES
For ui« o{ this form, ••• AR 220-15; *• proponen« agency it
OHlce of Deputy Chief of Staff for Military Operation*. 1
OnaANIZATION OR INSTALLATION LOCATION | PERIOD COVERED j
| FROM TO
G2, 20th Inf Division BURGEN (LA 567 275) HOUR DATE HOUR DATE |
GERMANY
0001 07 Dec 70 2400 07 Dec 70 |
ITEM [ TIME
INCIDENTS. MESSAGES. ORDERS. ETC. ACTIOM TAKEN INI-
NO. IN OUT TIALS 1

1 Journal opened 0001 ftst)


2 0030 Ist BDE: 2/20 Inf at 0005 during night recon

patrol vie LA 888 912 discovered en supply

dump. Search continues M, WB, G3, F, C


W
3 0055 ALL UNITS: Aug alt chal/passw. Prim comp'd

at 070045 S.F.C. Zfa


4 0200 Ist BDE: Follow-up msg to J-2: Search results

12xAT mines, 30,000 rds NATO 7.62 ammo.

6 rls barbed wire. Equip dest'd inplace M, WB, G3, F, C <&.


5 G2 & OB OFF departed HQ for Corps Brief.

at 0630. ETR approx 0930 DO j


tob
6 0700 DIST A: Wx forecast for 24 hrs: Free: None;

Ceiling: Uni; Wind: S&SW at 6 KTS; Temp:

62-85; Humidity: 152


A ¿A
7 Div HQ red'd en arty fire at 0900. Fires

lifted 0910. HQ ree'd approx 30 rds, unk

cal. Damage unk at present. T, F, WB, M, C ' <M

81 Journal closed 2400 ( 'm


zi*^
SUMMARY

There was no en contact during period.

but Div HQ ree'd 32 rds 8in arty fires

with no major damage. One en ammo dump dest'd \


TyPEO NAME AND GRADE OF OFFICER OR OFFICIAL ON DUTY

ROLAND B. WYNOT, MAJ, MI


Tv>W<l & SlxWc^
DA .: ov 6a I O 94 PREVIOUS EDITION OF THIS FORM IS OBSOLETE. • <■ » ooviiMiuiT nXTyi. ornci IM10 «•WIM

Figure 6-2- Sample intelligence journal.

5-5
P^ ss>=s

3. Tha sit^atioK Kssp Provides a basis for ecE£= (2) To provide a basis foi? eoEaparison m
ipairion of the ensscy situation against the order to determine the significance of newly »s=
fnendly situation. F^om the intelligeîîee officer's ceived data pertaining to the enemy forces.
standpointj pertinent information of the enemy is (3) To provide a background and basis for
ireeorded graphically on the situation map for re£= briefings and other required intelligence reports.
Oî^SïîCS and study. Whenever possible, both the sit- (4) To provide the basis for overlays wMeh
uation map and the S2 workbook will be main- graphically portray the enemy situation.
tained. However, in a fast moving situation when
(§) To assist in the determination of pat-
the volume of messages is such that both cannot
be maintained effectively, priority should be given terns of movement of guerrilla or insurgent
to keeping the situation map current. The infor-
mation posted varies with the size of the friendly (S) To focus attention on possible inte!li=
unit. The smaller the unit, the more detailed is the gence gaps which require redirection of the collée-
information recorded. Division situation maps, tion effort. For example, the need to locate and
for example, how the location of enemy units identify enemy units reported for the first time.
down to battalions (two echelons down) ; how- g. The secondary intelligence uses of the situa-
ever, some smaller elements, particularly fire de- tion map are to post—directly on it or in its mar-
livery means are shown. The following types of gins—the followiîig information :
entries pertaining to the enemy should bs posted (1) Computations of enemy personnel and
on the situation map :
(1) Unit identification. (2) Organization charts of specified enemy
(2) Unit dispositions.
(3) Boundaries. (3) SSmmBaarisatiom of weatker andl terrato
(4) Location of weapons, to incSudle =
(a) Automatic weapons positions. (4) A listing of priority intelligence require-
(&) Supporting mortars. ments.
(c) Antitank gun positions. (5) Notations pertaining to current patrol
{à) Artillery positions.
(3) Closing time eomput&tiom.
(0) Armored vehicles.
{!) A listing of friendly attachments.
(8) A listing of unlccated enemy units be-
tions. lieved to be in the area of operations.
{g) Air defense artillery positions.
(5) Minefields. h. The intelligeîtc® officer may consider the îise
(S) Roadblocks. of the following means of maintaining the situa-
tion map :
C?) Entrenchments.
(1) Rather than attempting to plot all entries
(8) Other obstacles or defensive installations. on a map by means of conventional or improvised
(9) Logistics and command facilities. military symbols, a xiumber or letter may be plot-
(10) Activities. ted in the area where tlhe activity was observed. A
(11) Terrain data. corresponding letter or number can then be en-
(12) Aircraft or helicopter staging areas. tered into a space alongside the map and a nota-
(13) CBR contaminated areas. tion entered as to the activity observed. The num-
ber or letter used may also be easily cross-indexed
(14) Enemy radars and other ground surveil- to the journal or message file, for a complete re-
lance devices. port. Use of the situation map in analytic applica-
(15) Major roads or trails for movement of tions and as a briefing aid is limited and caution
personnel, weapons and equipment. should be exercised in these applications.
/. Tlhe purpose of the mteligenee sitiaatsoB saap (2) A variation of the above would be to
is to contribute to sound tactical decisions. The draw a line from the descriptive passage or state-
pnmai?y mtelligencs uses of tbs situation ma^ ment to the exact location on the map where the
erra- - activity was observed.
(1) To display the enemy disposition amd sit= (3) Care must be taken to prevent over-
aaüoHo crowding of the map. One method of doing this is
&-Ó
FM 30-5

to group entries by categories on a series of ace- destroyed by bombing. Estimated out of action for
tate overlays. 30 hours." "J2" refers to the journal serial num-
(4) An enlarged sketch map can also be pre- ber, and the date-time group entered refers to the
pared to cover overcrowded areas. This will allow time of occurrence of the event. When appropri-
the posting of additional details. ate, the intelligence officer should make written
(5) When separate maps are used by staff comments on his evaluation and the possible sig-
elements in a headquarters, care should be taken nificance of the information following the appro-
to insure that acetate overlays are readily inter- priate entry.
changeable between maps within that headquar-
ters. This precaution will permit easy comparison 5-8. Intelligence Files
of the current enemy situation from the G2/S2's Files are necessary to permit ready access to all
map with the disposition of friendly forces on the available information. The files most commonly
GS/SS's map, and easy comparison of enemy ob- maintained are the —
stacles, barriers, and minefields with planned
routes of march for friendly operations, etc. a. Journal File. The journal file contains a
record copy of each message or document noted in
5-7. The Intelligence Workbook the journal. It supports the journal and is also a
permanent and official record.
a. The intelligence workbook is a systematic ar-
rangement by subject heading which aids in the b. Information or Reference File. All informa-
sorting, evaluation, and interpretation of infor- tion of possible future value is cross-indexed in
mation and in the preparation of intelligence re- this file. Much information is collected which has
ports. It is not a permanent record and it is not no immediate interest but which may be of future
distributed to an outside agency. The workbook is value. Because of the large volume of information
kept current and obsolete entries are deleted. Spe- filed at field army and higher headquarters, de-
cialized workbooks are usually maintained by vices such as punch cards and electronic sorting
each branch of the intelligence section at field machines are used where possible.
army and higher headquarters. c. Order of Battle Files. These files are dis-
6. There is no prescribed form for the work- cussed in detail in chapter 7.
book. At division and lower headquarters index
tabs are labeled to assist in the preparation of 5-9. Coordinates Register
paragraphs of the intelligence summary (IN- The coordinates register is a recording device pri-
TSUM). At corps and higher levels, index tabs marily designed to provide the brigade and lower
are utilized to assist in the preparation of the echelon intelligence officer with a workable^ coun-
periodic intelligence report (PERINTREP). Fig- terpart to the extensive intelligence files and
ure 5-3 shows a type workbook generally used at workbooks maintained at higher echelons. Intelli-
corps and higher levels. A type workbook for sta- gence data should be organized by some means
bility operations is contained in appendix O. into related groupings or into systematized forms,
in order that interpretation of them can be accom-
c. Information from incoming messages and re- plished readily and without time loss. The coordi-
ports is entered in the workbook under appropri- nates register affords such a means; and it can
ate headings. For example, information on a also be compact enough to facilitate carrying the
newly identified infantry unit would be recorded document on the person with the advantage of
under item 3A, "new units," as well as item 2A ready access.
"Infantry." A message that furnishes information
on different subjects results in several entries, a. Form of Coordinates Register.
none of which usually quotes the entire message. (1) The register most commonly consists of a
For example, a message containing information looseleaf notebook. Each page of the notebook per-
oh the locations of a reserve armor unit and an tains to a single grid square on the operational
artillery unit results in extracts under item 2A map, covering the geographical area of operations
"Armor" and under "Artillery." Each entry in the or area of interest. This geographical area should
workbook based on an incoming message includes include the enemy area, friendly area, and areas
a reference to the journal serial number of that of concern on both flanks.
message. For example: "J2, 091200 April, from (2) The pages of the coordinates register are
20th Engr Cbt Bn: Bridge at LINDEN (91246) of two types. One type of page is designed for

5-7
FM 30-5

2C & D OTHER
(AIRBORNE
IRREGULAR)
2E NBC

ELECTRONIC
WARFARE
INTELLIGENCE (G2) WORKBOOK 2G
IOTHER NEW TACTICS,
WEAPONS, ETC)
(PERINTREP) 3A
ORDER OF BATTLE
NEW UNITS
3A
FROM: NEW
— PERSONALITIES.
(HOUR AND DATE) 3A
ENEMY MOVEMENTS
TO:
3B
(HOUR AND DATE! EMENY STRENGTH
(KIA) I
HEADQUARTERS: 3B ENEMYf
EQUIP, DESTROYED,
CAPTURED__L
30 I
PLACE: PRISONER OF WAR I

COUNTER-
INTELLIGENCE

WEATHER

TERRAIN
7A
I ENEMY CAPABILITIES
75
ENEMY
VULNERABILITIES
7C
CONCLUSIONS

CLASSIFICATION

NOTES: 1.
NUMBERS ON TABS REFER TO PARAGRAPHS IN PERIODIC INTELLIGENCE REPORT.
2. THE CLASSIFICATION IS STAMPED AT THE TOP AND BOTTOM OF EACH PAGE.

Figure 5-3. Type intelligence workbock.


5-8
FM 30-5

GRID SQ.UABE 2815

ITEM TIME COORD STATEMENT NOTES

1. O92235 28381539 MG Fired on Recon Ptl Have next Ptl


from A Co check this area

O92318 Veh noise - Tk? - Heard Ask Air OP


direct N. of A Co OP #2 to look
28321507

IOO6OO Special OB report on Div OB wants


3.
Wpns & Fortifications more info on
wpns strength

28021523 to Trenches & Bunkers


28lUl527

28141527 to Wire
28221529

286ll51+5 to Platoon on line Same MG as


2878155I has 2 MG's Yesterday?
Check this!

288II55I to Extensive trenches


29OOI599 and firing Psns

k. IO2335 2839153O to B Co Ptl Rpts wire New since


286915^1 and AP Mines O818OO

IIO6OO 28^31588 Res Unit (Co?) (From Div PIR)


5.
in Gen'1 Area

6. IIO63O 28381557 Med Tank spotted How many


"by L Plane more???

T. III32O 28731581»- and Active mortars


28l5156li-

8. 120010 2861156^ Flash from small At? AA? Gun?


Cal. Arty not over 75 RR or Bazooka
7
Ask higher H Q

Figure 5—4. First type of page for the coordinates register.


5-9
FM 30-3

GRID SQUARE 2815


NOTATIONS: LEGEND
1. Elms Of 1st & 3rd Bns X - Incoming Arty
66 Rifle Regt G- En Patrol Contact
B- Bunker

82 MM
Î
?
82 MM III

n II

O X 10
G I 122 Arty
%ï%\^ I

10 X 1 10
G 120 M G I 122 Arty
X | 10
G I 122 Arty

Figure 5-5. Second type of page for the coordinates register.

written entries which describe enemy activities, An enlarged grid square is drawn on the page and
locations, weapons, and similar items. These en- entries are made as shown in figure 5-5.
tries are preceded by a date-time group and map b. Uses of Coordinates Register. Some of the
coordinates. The S2 may, if desired, add his per- most important uses of the coordinates register
sonal comments or notations to any entry. Figure are as follows :
5-4 illustrates the composition of this type of (1) Interpretation. To develop patterns of
page for the coordinates register. enemy activity and to follow the progress of con-
(3) The second type of page is designed to struction, laying of minefields, and other activi-
represent a single grid square schematically. En- ties.
tries are plotted on the square in a manner com- (2) Planning.
parable to that used in plotting the enemy situa- (a) To determine routes of movement,
tion map. This page of the register shows graphi- areas of main and secondary attacks.
cally any data applicable to a single grid square. (&) To provide guidance in selecting mis-
5-10
FM 30-5

sions which should be assigned to patrols and to c. Maintenance of Coordinates Register.


brief patrol personnel. (1) The coordinates register should be re-
(c) To assist in formulating the friendly viewed periodically when unit movement to a new
fire plan in either defensive or offensive situa- area necessitates addition of new data and dele-
tions. tion of obsolete data. Timely maintenance of the
coordinates register might not be practical in
(d) Data from the coordinates,, register can fast-moving situations such as pursuit, delay, and
be plotted on a vertical aerial photograph that has exploitation.
been annotated with grid lines. A scale of (2) The register should be maintained, when-
1:25,000 or larger is desirable. By plotting se- ever possible, on strong semi-transparent paper
lected order of battle information on the photo, an such as bond paper. The transparency of bond
analysis of the terrain can be conducted simulta- paper is sufficient to allow the use of a grid scale
neously with a correlation of information on the underneath the schematic page, thereby allowing
enemy. The photo provides an excellent means of a more accurate and rapid plotting of or reference
briefing commanders down to platoon level on the to the entries.
area of operation and the enemy situation. Tar- (3) The scale of the schematic page normally
geting can be done in a more precise manner by may be made a matter of SOP. Such standardiza-
using a photo instead of the traditional 1:50,000 tion assists in dissemination of intelligence data
map. from higher to lower echelons.
(3) Reference. Answers the questions of the (4) For security reasons the friendly situa-
S2 and his immediate commander and the ques- tion normally will not be plotted in the coordi-
tions of higher headquarters. nates register.

Section III. EVALUATION

5-10. General b. Needed immediately, and if so, by whom.


Evaluation includes determining the pertinence of c. Of possible present or future value, and if so,
the information, the reliability of the source and to whom.
agency through which the information was de-
rived, and its accuracy. Evaluation of information 5-12. Reliability
at the lower echelon is a simple step compared to a. The source of information and the agency by
the procedures employed at higher echelons. From which it was collected are both evaluated for reli-
the viewpoint of the brigade or battalion S2, in-
ability. The principal basis for judging the relia-
formation which relates to the unit's area of in- bility of a source or an agency is previous experi-
terest is pertinent; information relating to areas
ence. Other criteria include a knowledge of the
outside the area of interest may or may not be training, experience, and past performance of
pertinent. The brigade or battalion S2 may not be
troop units.
able to judge the reliability of a source because he
may not have repetitive contact with a given b. The headquarters closest to the source or
source. This difference between higher and lower agency is ordinarily the best judge of the reliabil-
echelons is largely due to the fact that informa- ity of the source or agency. Consequently, a
tion received from higher headquarters normally higher headquarters normally accepts the reliabil-
has been processed, evaluated and interpreted, ity evaluation of the lower headquarters and will
and the information collected by organic agencies consider only the reliability of the reporting head-
at lower echelons is generally acquired by direct quarters.
observation or actual contact with the enemy.
5-13. Accuracy
5-11. Pertinence a. Accuracy means the probable truth of the
The examination of information for pertinence information. Judgment of accuracy is based on
specifically determines whether or not the infor- the answers to the following questions :
mation is— (1) Is it possible for the reported fact or
a. Pertinent with regard to the enemy or to the event to have taken place?
characteristics of the area of operations. (2) Is the report consistent within itself?

5-11
FM 30-5

(3) Is the report confirmed or corroborated However, when the source of an item and the
by information from different sources or collecting-reporting agency are evaluated differ-
agencies? ently, only the lower degree of reliability is indi-
(4) Does the report agree or disagree in any cated.
way with other available information?
(5) If the report does not agree with infor- c. Evaluation of the accuracy of an item of in-
mation from other sources or agencies, which one formation is indicated as follows :
is more likely to be true? 1—Confirmed by other sources.
2—Probably true.
b. The most reliable method of judging the 3—Possibly true.
accuracy of a report is by comparing it with simi- 4—Doubtfully true.
lar information which may already be available 5—Improbable.
under the proper category in an intelligence file or 6—Truth cannot be judged.
workbook. When possible, the intelligence officer (1) If it can be stated with certainty that the
obtains confirming or refuting information reported information originates from a source
through different agencies and from many other than that for already existing information
sources.
on the same subject, it will be classified as "con-
c. Marked differences in the evaluation of the firmed by other sources" and will be rated "1."
accuracy of information may occur between (2) If no proof in the above sense can be
higher and lower echelons. The reason for this established, and if no reason exists to suspect that
difference is the fact that higher echelons, which the reported information comes from the same
have more sources of information and intelligence source as the information already available on
than lower echelons, have a correspondingly this subject, it will be classified as "probably
greater opportunity to confirm, corroborate, or re- true" and will be rated "2."
fute the accuracy of reported data. Regardless of (3) If the contents of the report are con-
the source, the accuracy of incoming information firmed in essential parts by information already
and intelligence is reevaluated at each echelon. available, the above procedure, (2), will also
apply to unconfirmed information contained in the
5-14. Evaluation Rating report.
a. The evaluation of each item of information is (4) If the investigation reveals that the re-
indicated by a standard system. The evaluation of ported facts—on which no further information is
reliability is shown by a letter and the evaluation yet available—are compatible with the previously
of accuracy by a numeral as depicted in the para- observed behavior of the target, or if the known
graphs to follow. Evaluation ratings are made at background of a person leads to the deduction
the lowest headquarters possible. that he might have acted as reported, the infor-
mation received will be classified as ('possibly
b. Evaluations of the reliability of source and true" and will be rated "3."
agency are as follows : (5) Reported but unconfirmed information,
A—Completely reliable. the contents of which contradict the estimate of
B—Usually reliable. the development or the hitherto known behavior
C—Fairly reliable. of the target, will be classified as "doubtful" and
D—Not usually reliable. will be rated "4" as long as this information
E—Unreliable. cannot be disproved by available facts.
F—Reliability cannot be judged.
(6) Reported information which is not con-
(1) An "A" evaluation of a source is as- firmed by available data and which contradicts
signed under only the most unusual circumstan- the experience hitherto assumed to be reliable
ces. For example, this evaluation may be given with regard to the development of a target or
when it is known that the source has long experi- issue is classified as "improbable" and will be
ence and extensive background with the type of rated in category "5." The same classification is
information reported. A rating of "B" indicates a given to reported information that contradicts ex-
source of known integrity. An "F" rating is as- isting data on a subject originally rated "1" or
signed when there is no adequate basis for esti- "2."
mating the reliability of the source.
(7) If the investigation of a report reveals
(2) Agencies are ordinarily rated A, B, or C. that a basis for allocating ratings "1" to "5" is
5-12
FM 30-5

not given, the reported information will be classi- improbable. In such a case, the evaluation of the
fied as "Truth cannot be judged" and will be rated information is A-5. A source known to be unrelia-
"6." ble may provide raw information that when con-
(8) The statement that a report cannot be firmed by reliable sources is accepted as accurate
judged as to accuracy must always be preferred to information. In such a case, a report is evaluated
an inaccurate use of the ratings "1" to "5." If E-l. A report evaluated F-6 may be accurate and
there is no sound basis for a rating of "1" to "5," should not be arbitrarily discarded.
because of the complete absence of other informa- e. A report disseminated to higher, lower, and
tion on the same target, the rating "6" has to be adjacent units contains the evaluation for each
given. item of information. For example, "The division
(9) It must be recognized that the scale "1" artillery of the Aggressor 46th Tk Div can fire
to "6" does not represent progressive degrees of nuclear rounds of 0.5 KT yield (C-3)."
accuracy. The stress must be given to the literal /. The evaluation and interpretation of infor-
rating represented by the numeric symbol. mation atihe brigade and battalion is a simplified
d. Although both letters and numerals are used mental process ; thus, the standard evaluation rat-
to indicate the evaluation of an item of informa- ing has more limited application. This system as-
tion, they are independent of each other. A com- sists the S2 in processing information received
pletely reliable agency may report information ob- from other headquarters and, when appropriate,
tained from a completely reliable source which, on to evaluate information he disseminates to other
the basis of other information, is judged to be headquarters.

Section IV. INTERPRETATION

5—15. General of enemy activities or the influence of operational


area characteristics on the mission of the com-
The processing of information continues with in-
mand. In the process, more than one hypothesis
terpretation, which consists of three steps—anal-
may be formulated based upon existing intelli-
ysis, integration, and deduction. It is during this
gence.
phase of the intelligence cycle that information
becomes intelligence. ft. Integration, particularly the development of
hypotheses, requires the same good judgment and
5-16. Analysis thorough background knowledge essential to mak-
ing a good analysis. In formulating hypotheses,
a. Analysis is the sifting and sorting of evalu-
the intelligence officer must avoid preconceived
ated information to isolate significant elements
opinions and hypotheses based solely on personal
with respect to the mission and operations of the
experience or preference. He must attempt to
command. Analysis requires judgment and a thor-
place himself in the role of the enemy commander
ough knowledge of the principles of military oper-
in the development of these hypotheses.
ations, the characteristics of the area of opera-
tions, and the enemy situation, to include enemy c. After they are formulated, all hypotheses are
doctrine and past practices. analyzed and tested. Analysis of an hypothesis
includes determining the indications that should
b. Analysis at headquarters above division level
exist if the hypothesis is a valid one. Testing in-
often involves detailed research with greater dif-
cludes verifying the existence or non-existence of
ficulty caused by the increased volume of informa-
these indications within the limitations of availa-
tion. The many individuals who will be involved
ble time and means.
in performing analysis must relate their efforts to
the mission of the command in order to avoid the d. Integration may be a mental process com-
needless expenditure of time and effort. pleted in a few moments or it may be a lengthy
process involving the collection of a large volume
5—17. Integration of additional information.
a. Integration is the combination of the ele-
ments isolated in analysis with other known in- 5-18. Deduction
formation to form a logical picture or hypothesis The last step in the interpretation of information

5-13
FM 30-5

is deduction. Here meaning is deduced from the of action and for keeping the intelligence estimate
hypothesis developed ; it is then tested and consid- current. Deduction should also answer the ques-
ered valid as a result of integration. Deduction is tion, "What does this information mean in rela-
designed to answer the question, "What does this tion to the enemy's use of TC&D or counterdecep-
information mean in relation to the area of opera- tion?" The resulting answer will reduce friendly
tions and the enemy situation ?" The resulting an- vulnerability to being deceived or from the false
swer provides a useful conclusion which can serve belief that friendly TC&D operations are being
as a basis for determining future enemy courses believed by the enemy.

5-14
FM 30-5

CHAPTER 6

DISSEMINATION AND USE OF INTELLIGENCE AND INFORMATION


(STANAG 2008, 2014, 2020, 2022, 2097, 2103, 2118, 2134,
3377; SEASTAG 2008, 2020, 2022, 2118; SOLOG 123)

Section I. INTRODUCTION

6-1. General (3) The intelligence produced at levels above


division by specialized means must also be dissem-
Dissemination is defined as the timely conveyance
inated to lower echelons.
of information and/or intelligence in an appropri-
ate form and by any suitable means to those who c. Dissemination of intelligence is judged in
need it. The primary purpose of timely dissemina- order of priority by the following criteria :
tion of intelligence is to enable the commander to (1) Information and intelligence are placed
make decisions with confidence; a secondary pur- in the hands of the ultimate user in time to per-
pose is to provide knowledge, in the light of which mit his evaluation and interpretation, formulation
new information may be processed. Intelligence is of plans, and initiation of action under the exist-
used in much the same manner at all echelons. ing situation before the intelligence picture
The means of dissemination are likewise similar changes. If the information is of such value that
at all levels, with variations occurring in the vol- time does not permit complete processing before
ume, coverage, and frequency. the information is disseminated, the recipient is
made aware of this fact. The source of the infor-
6—2. Dissemination Criteria mation being sent is given if security permits.
a-. One objective in disseminating intelligence is (2) Only intelligence which can be used by
to insure that the intelligence staffs at various the unit concerned is disseminated; however, if
echelons of command have the same general pic- there is any doubt as to the usefulness of the
ture and use the same frame of reference in plan- intelligence, it will be disseminated.
ning their operations. Coordination and coopera- (3) Dissemination means selected are those
tion among units is essential. that, based on priority, interfere least with opera-
tional messages.
b. Intelligence is disseminated within the pro-
(4) The information being disseminated is in
ducing headquarters, to next higher, next lower,
such form that the recipients may readily identify
and adjacent units. Dissemination to lower and
items of interest.
adjacent units is more difficult and yet important
because— d. During stability operations, it is imperative
(1) The intelligence picture at lower echelons that dissemination of appropriate information
changes more rapidly. and intelligence be made to both host country and
(2) The requirement for a greater amount of allied forces operating in the area of operations
detail may result in delay. consistent with security requirements.

Section II. DISSEMINATION MEANS

6-3. General mates, analyses of the area of operations, and


written reports.
a. Dissemination within a headquarters is
usually made by personal contacts, oral reports, b. Dissemination to higher, lower, and adia^ent
briefings, and by distribution of intelligence esti- units is by means of reports, summaries and stud-

6-1
pn &<&=•§

j.eSs, intelligence estimates and analyses oí the area lected over an extended period of time, and may
of operations, operational pians and orders, over- include items contained in INTREP (para 6-5) or
lays and maps. Command SOP will dictate how INTSUM (para 6-7).
mtelligence reports will be disseminated between b. The nature and content of data contained in
US/allied and host country units. the SUPINTREP dictate the specific dissemina-
tion. At the commander's discretion, the SUPIN-
<2>=4„ §[p®fl ß©[p®[rte TREP is passed to higher, lower, or adjacent
Spot reports are one-time reports used by all eche- units.
lons to transmit intelligence or information of im- c. The SUPINTREP normally is produced on
mediate value. Since the information or intelli- special request or in support of a particular oper-
gence may have an immediate and significant ation, and is dispatched by the most suitable
impact on current planning and operations, speed means available.
of transmission of the spot report is essential.
The spot report is afforded the most expeditious d. There is no prescribed format for the SUP-
means of transmission consistent with requisite INTREP except that the term "SUPINTREP"
security. No format is prescribed for the spot re- will appear at the beginning of the report.
port; however, the spot report should as far as &—7. DffüftsDIlDgjeiñxs© iüSKrainrasiir^
practicable, answer the questions who?, what?,
where ?, when ?, and how ? a. The INSTUM contains a brief summary of
information of intelligence interest covering a pe-
riod of time designated by the commander. Al-
(sML OffitfsDOSgjsinis© [S©ip®irte (DCWßllP)
though the length of the period will vary with the
a. The INTREP is a standardized intelligence desires of the commander, the INTSUM is nor-
report which, based upon its importance, is dis- mally prepared as often as required by the com-
seminated without regard to a specific schedule. mander. The INTSUM provides a summary of the
Consideration will be given to dispatch of an IN- enemy situation in forward and rear areas, enemy
TREP when facts influencing the enemy capabili- operations and capabilities, and weather and ter-
ties have been observed, or when a change in rain characteristics. The INTSUM is in fact an
enemy capabilities has taken place. aid in assessing the current situation and updates
h. The INTREP is passed to higher, lower, and other intelligence reports. Negative information
adjacent units at the discretion of the commander will be included in the INTSUM but non-opera-
producing the report. tional information will be excluded. The INTSUM
reflects the intelligence staff officer's interpreta-
c. The INTREP will be dispatched as quickly as
tion and conclusions as to enemy capabilities and
possible following receipt of the information and probable courses of action.
will be sent by the most expeditious means availa-
ble. b. The INTSUM normally is prepared at bri-
gade and higher echelons and is disseminated to
d. There is no prescribed format for the IN- higher, lower, and adjacent units.
TREP except that the word "INTREP" will be
the first item to appear in the report. However, c. An INTSUM has no prescribed format except
when involved in joint service operations, origina- that the word "INTSUM" will be the first item of
tors of INTREPs will use the prescribed format the report. However, when involved in joint serv-
as contained in Chapter V, JCS Publication 12. ice operations, originators of INTSUMs will use
the prescribed format as contained in Chapter V,
e. Whenever time permits the INTREP should
JCS Publication 12. Non-essential detail should be
include the originating office's interpretation of
excluded from the INTSUM, but, as indicated bj
the information or intelligence being reported.
the example format, information concerning the
issuing unit, date-time-group (DTG) of issue,
(sML S[y:[p[p!fe;ñÁ:Q[ñ)ec3][ry DrafîQDDogiQKS© ßepsrö brief discussion of capabilities and vulnerabilities,
and conclusions should always be included. A typs
a. The SUPINTREP is a NATO standardized format and an example of an INTSUM are
irepoirt form used for more comprehensive reviews vided in appendix F
concerning information en one or several specific
intelligence targets. In addition, the SUPINTREP (sMio {Persodae 'GSQ^gQ [SQ¡ó;@7ÍÍ
Kay also contain selected intelligence data col- a. The periodic intelligence report (PERM-
0=2
FM 30-5

TREP) is a summary of the intelligence situation imagery interpretation reports. The basic types of
for a specified period, normally 24 hours in a tac- imagery interpretation reports are the mission re-
tical situation. The PERINTREP is a means of port, hot report, initial imagery interpretation re-
disseminating detailed information and intelli- port, supplemental imagery interpretation report
gence. It covers the enemy situation, operations, and the general imagery interpretation report. A
capabilities and vulnerabilities; characteristics of detailed discussion and examples of these reports
the area of operations; and counterintelligence. are contained in FM 30-20. In addition, during
No details of friendly forces which may be of joint service operations the applicable portion of
value to the enemy are included. Other intelli- JCS Publication 12 will used.
gence documents such as technical intelligence
summaries, intelligence interrogation reports, 6-11. Intelligence Interrogation and
translations of captured documents, and weather Translation Reports
and climate summaries may be disseminated as
annexes to the PERINTREP. The PERINTREP Intelligence interrogation and translation reports
is concise, but complete, and makes maximum use summarize the results of interrogations of prison-
of sketches, overlays, and annotated maps. The ers of war, civilian detainees, or refugees and
use of abbreviations and unnecessary references translations or summaries of enemy documents.
to map coordinates are avoided. The correct for- Information of immediate value is disseminated
mat for the PERINTREP is shown in appendix in spot reports. Other information is disseminated
D. in the most convenient form considering the needs
of the users. At corps and higher echelons, de-
b. The PERINTREP normally is prepared at tailed interrogation and translation reports
corps and higher echelons. Corps may dispense usually are distributed as annexes to the PERIN-
with the PERINTREP if the situation does not TREP (or the PERINTSUM in joint service op-
permit timely dissemination. At field army, a erations). For a detailed discussion of specific in-
PERINTREP is always issued. Dissemination is telligence interrogation reports, see FM 30-15.
made by the most suitable means—usually by liai-
son officers or messengers—to the staff, adjacent
6-12. Bombing, Shelling, Mortaring
units, and to the subordinate and higher head-
(BOMREP, SHELREP, MORTREP) and
quarters at the next two higher and lower eche-
Aircraft Hostile Fire Reports
lons. The period covered by the document varies
with the tempo of intelligence activities. Nor- a. Information on enemy bombing, shelling, or
mally, a 24-hour period is covered during combat. mortaring activity is initially disseminated by
The PERINTREP should be disseminated in time means of a BOMREP, SHELREP, or MORTREP,
for use in daily planning. as appropriate. Submission is a responsibility of
the affected unit. Reports are rendered as normal
c. In joint service operations, the PERINTREP messages and are transmitted by the fastest
is replaceed by the periodic intelligence summary, means available (app G). Each transmission is
PERTNTSUM. The correct format for the PER- preceded by the code word "SHELREP" in the
INTSUM is contained in Chapter V, JCS Publica- case of enemy artillery, by the code word "MOR-
tion 12. TREP" in the case of an enemy mortar or rocket
fire, and by the code word "BOMREP" in the case
6-9. Weekly Intelligence Summary of an enemy air attack. The text of the message is
transmitted in the clear except that the current
The weekly intelligence summary generally fol- call sign of the unit or origin will be used rather
lows the format of a PERINTREP (or the PER- than referral to unit'identification. Also the posi-
INTSUM in joint service operations). It serves to tion of the observer will be encoded if it discloses
highlight trends that are useful in planning fu- the location of a headquarters or an important
ture operations and in processing current infor- observer post (app G).
mation. This report normally is prepared at field
army and higher headquarters. b. The Aircraft Hostile Fire Report should be
completed by the air mission commander at the
end of each day's activities or after each mission
6-10. Imagery Interpretation Reports completion. Intelligence officers at each level of
Information or intellie-ence obtained by imagery command should require the submission of a re-
interpretation is disseminated through the use of port in each instance where an aircraft was en-

6-3
"M g®--g

gags 'cr^T-atic^ ecntainsd in the irepoTt use of nuclear weapons are prepared in the
will be incorporated into the inteíligence situa- of the TOC or similar agency, before and after
tion. The information contained in the report the burst and provide information which is used
should be substantially as indicated in appendix as a basis for planning and estimating. Fallout
predictions are reports which indicate the proba-
ble areas of contamination resulting from a nu-
clear burst; dose rates are not predicted. The re-
(SlrCSötrDCts^D ñW^sk K©[p®:n¡!3 ports contain information for estimating the time
of arrival in a certain area. Fallout predictions
a. General. Initial reports and data of enemy or
are based on current or forecast meteorological
unidentified nuclear detonations and reports of data and actual or assumed ground zero, yield,
enemy or unidentified biological or chemical at- height of burst, and cloud data. Fallout predic-
tacks are disseminated from the source level tions are distributed to interested staff sections;
through designated headquarters to the highest agencies; and higher, adjacent, and subordinate
headquarters in the area of interest. Reporting
units. For details concerning radiological survey
will be by flash precedence. Type formats used
data and sign-posting of radiologically contami-
when reporting NBC attacks are shown in FM
nated areas, see FM 3-12; for information on
21-40 and appendix H. Initial and followup re- friendly nuclear strike warning, see FM 5-2S and
ports are evaluated at each headquarters and the FM 101-31-1. Detailed procedures for predicting
results are appropriately disseminated. fallout are contained in TM 3-210.
b. Warning of expected contamination from a
nuclear burst or biological or chemical attack is ê-li SF äste
disseminated by the first headquarters capable of
determining such information. a. A weather forecast is a prediction of the
weather conditions at a point, along a route, or
c. Information pertaining to the submission and within an area for a specified period of time. The
transmittal of NBC reports is contained in FM accuracy and reliability of weather forecasts de-
21-40 and FM 3-12. pend upon such factors as characteristics of the
area, available weather data, reliability of
weather communications facilities, length of fore-
cast period, and the experience of the forecaster.
Reliability of forecasts generally decreases as the
a. Radiological contamination information is forecast period increases. Weather forecasts are
disseminated by means of an NBC-5 (nuclear) in coded (numerical), graphical (pictorial), or
report (app H) and by means of current or future written (plain language) format. Weather fore-
radiological contamination overlays. The current casts for use by troop units are usually in plain
radiological contamination overlay is a plot of language form. The contents of weather forecasts
dose rate contours of operational interest ex- are as shown in ñgure 6-1.
tracted from the radiation situation map main-
tained by the Chemical, Biological,, and Radiologi- b. There are three types of weather forecasts : a
cal Element (CBRS) within the appropriate short period forecast which is any forecast cover-
TOC. In future radiological contamination re- ing up to a 48-îiour period; an extended period
ports, decay factors are applied to estimate the forecast which covers a period of between 3 and 5
radiation situation at future times. Current and days; and a long period forecast which covers a
future contamination reports and overlays are period of 5 days or longer. ïn addition to the
disseminated to interested headquarters, staff sec- forecasts mentioned, an outlook may also be given
tions, and agencies. Contamination overlays or re- as an extension to the basic weather forecast ; e.g.,
ports are prepared and disseminated by the a 48-.hour outlook beyond a 24-hour weather fore-
C3RS of the command as directed by the G2 (see cast. (For details, see USAF Air Weather Service
FM 3-12 for details). If there is no CBRÏÏ within Reg 55-1.)
the TOC, the G2 assumes these responsibilities. e. Because of the changing nature of weather
The G3 exercises staff responsibility over the em-
forecasts, especially short period forecasts, timeli-
ip!cy;2?.ent of friendly nuclear weapons and í'aüout
ness is a critical factor in their dissemination.
predictions for friendly employed weapons.
Weather forecasts normally are transmitted by
b. Fallout predictions from enemy or friendly electrical means.

Ô-4
FM 30-5

WEATHER FORECASTS CLIMATE DATA

GENERAL SPECIAL STUDIES


Aviation CBR
K> GO K >3. no ■no_ a m 3
a3 r 3 m if c Q
X X
K>
c * S" ■o5H 'S.33' 3 S M < o
3
IO A 3 i
3' s
X X X X A n-
o o
c c o
c C F <• o o o
c S c c 5" 1- c O
a
■a
3
«
■<
VI
V
o f ■<
% 3
o
• •
>> •5 <
(1 3
9 5 -o 3 Ut
1 >
ELEMENT DESCRIPTION m
5Q_ o a
-4
o
1 |.
ro S* o_
o
9
5'
3
Q
o

s
3
9
O
A
O
> 8 íT a. a
m ¡^
C

a
ri
3 £ i?

CL.
"U
O O o i c -3 3
i'o 3 ■s-
A
3.
i- 3
5'
n
A
O 3 >3 m
3
a. M A
e.
S 3M So
O
3
s
"F T
SYNOPTIC Frontal types, location, movoments and intensities; • ••• •S ■y y i "1
i
CONDITION location and movement of major surface High and t
Low pressure systems. 1
1
T
l
SKY CONDITION Cloud cover in eights, height of bases and tops above • • ■y y y y • y <*S l
the surface in hundreds and thousands of feet, times l
1
of significant changes.
■y S • S 1 1
• y y
Cloud types. S

Cloud cover, height of bases and amount in general •s
•i
terms.
•S
^ i
y

Frequency of occurrence of various cloud conditions. ¡ i


i y

Sky conditions in general terms - fair, cloudy, etc. T


i J y y y
1" +
VISIBILITY Surface horizontal visibility in miles and fractions •S • •S .• •s • y • */ •y •y V i
AND of miles, time of significant change, Obstructions. i
i
OBSTRUCTIONS >> yy y
TO VISIBILITY
Surface visibility in general terms with Obstructions. y y
^
Flight level visibility. TO X

PRECIPITATION Type, location, character, intensity, time of S ■y y s• y y y y •y *s y y y ES y


X 70
beginning and end. m m
Accumulation. y
Character and intensity in general terms. 1 y yy y y
Frequency of occurrence by type and amount. i y

WEATHER Tornadoes, thunderstoims, lightning, squalls, hail, • *f • *s «• y • y •y y >s •y y y


^
PHENOMENA etc.

TEMPERATURE Surface temperature, -daily maximum and minimum • • ■s «• 's •y •y *s y


in degrees Fahrenheit, abrupt changes and times
thereof including freezing, thawing, and wind chill
factor. i
Surface temperature in degrees Fahrenheit, and y 1
temperature gradient, as a reflection of stability,
between 0.5 and 2 meters.
<y <y 1
Aviation terminal temperatures in degrees
Fahrenheit. 1
Surface temperatures in general terms ■ cold, warm,etc. y y

Surface temperatura range. y y y

Frequency of occurrence of temperatures. y

Flight level temperatures in degrees centigrade. y y y ¡ i

Temperature variations from o mean.


1 y
1 i
Temperatures aloft in degrees centigrade, to 30,000 y y
feet above sea level, at 2,000 foot intervals. 1
Temperature profile - from the surface to 30 km. -y
J_ L

Notes:
1. Weather section of Intelligence Summary is derived 4. Based on predetermination of what " severe weather"
from this forecast. means.
2. Data provided on an "as required" basis only. 5. Climate data contents are established locally. Listed
3. Data provided only for specific operations having elements are typical.
weather effect criteria.

Figure 6-1. Elements of weather forecasts, climate studies, and weather and climate summariea.

6-5
Pí$ s®-s

r" i

GENERAL
WEATHER FORECASTS

SPECIAL
CLIMATE DAÏi

STUDIES

| Asiotion CBR
> c
ê
ri
?c
V
Oí r Ni
PS)
r 3! rn
'S. % 3
Sa
H
S
3
M"
m
S"
-<
a
'S.
H

|, f Qï
f 3 o O
o o O o e i-
% 1 o
< 5' o â' 3-

ift'
c C c S. ça' o 3* o
ELEMENT ; DESCRIPTION ■3 O 3 ô
> > L s I 0 >
r
m o" IS*
H o O C
o I 1. I o
5'
o_
5'
3 5 r >
o
m o_
Q.
3
o O
Q- 3
O
e_
3
SI G s a'
S •a •3
-o
o o
3
o Q s
o
a.
3- s m
o o ta o a
CL. w
5 "3.
a'
r:
S
s 2
o
o

HUMIDITY Relativer humidity in porcont. <• >• V 1 ! ^


•S >•
AND Relativo humidity in gone ral tormo - humid, dry, otc. • */ 1 I
^
DEW POINT
Surface dow point temparature in dogrooo Fahronhoit. ^ ■*f ■S 1- ——— ——
Relativa humidity in percent, from the surface to IS km. •S I
r-
WINDS Surface winds, ovo rogo speed in knots, direction in •* • • \S v^ • */ •y •S
tens of degrcoc, oicnificant chengoo thereof, maiimum
wind speeds and gusts.
Wind direction to eight points of the compass, v/ind •S sS
speed in milos per hour.
Frequency of occurrence of spocifiod wind directions !7 y Z7
and speeds.
Surface to four motors • effective wind direction in
-0- — —
dogroos and wind spood in knots.
-Í- -!-
V/ind direction in dogroos end spood in knots at surface y */ *s >•
and at 2,000 foot abgvo tho terrain.

FligSt lovol winds - direction in tons oí dogroos and >/ •y s î


spood in knots. I

Wind direction in tons of degrees and spood to noaroat ^ s/


■j> >
fivo knots at 2,000 foot intonrals to 30,000 ioot.
*/
■■¡a 70 —
V/ind direction in tons of mils and wind speed in knoîs
for 2,000 motor zonos to30 km.
S3
ç ç
Eifoctivo winds for ostimoting movomont of nucloor m m
———
¡s •y V •*s
clouds.
V/ind direction in dogroos and spood in knots from the •s I
surface to 30 km. L I l

PRESSURE Altrmotor sotting and density altitude _r_ •y ^ s I I
I
AND -/ i
Pressure in millibars for from tho surface to 30 km. HL i
-!-
DENSITY
Soa lovol pros euro in millibars 1 I J •s v^
SURFACE
CONDITIONS
State of tho ground in gonoral torms - wot, dry, snow
covered, icy, otc.
*/ •s"
t •• -• i
I

T
I
I
Vi"

TUR3ULEKCE
AMD ICIKG ALOFT

INDEX 0?
Typo and relative intensity.

Qualitative and quantitative.


1 ■¿> • s^

v ••
I
I

I
i

i
ANOMALOUS I i
PROPAGATION I i

<s *s >s
LIGHT DATA ttoen pîiasoG, moon rico and ßot. < i
i
i

Bcf)inning end end of nautical and civil îwiligSt. 1 -s-


i •

Sunrico and cuncot. \ J_ >• •s
'-- — ~~ =
SEA State of soa and surf including direction, period <• - >• ^ I
I
i
CONDITIONS end hciçht of waves, ¿irocticn of swell, end
I i
(iV'horo noodod) hoieht of brocîioro.

Notes:
1. V/cattior section of Intolligonco Summary is derived 4. Based on prodetormination of «rhat "aovara woothor" tnoens.
from this forecast. 5. Climato data contants ore ostablishod locally. Listod elements
2. Data provided on on "as roquirod" basis only. oro typical.
3. Data provided only for tpocific operations having woathor
effect criteria.

Figure (S—l*—Continued.

Ôô
FM 30-5

d. The intelligence officer makes provisions for year, season, or month, at a given point, along a
timely dissemination of severe weather warnings route, or within an area. Climatic summaries are
to enable units to take necessary preventive compiled from historical records of weather ob-
action. Severe weather warnings usually cover servations over long periods. Format or content
tornadoes, thunderstorms, dust or sand storms, are not prescribed. Appendix I contains an exam-
extremely heavy precipitation, freezing tempera- ple of a climatic summary.
tures, winds above specified speeds, and freezing
precipitation. Warnings are issued by the sup- 6-18. Climatic Studies
porting air weather service detachment, as re- A climatic study is the compilation of the climatic
quired. Flood warnings are the responsibility of data (climatic summary) and the analysis and in-
the unit engineer. Severe weather warnings are terpretation of that data in the light of its possi-
normally disseminated as spot reports. ble effects on military operations. Cfimatic studies
usually are prepared at corps and higher head-
6-16. Current Weather Reports quarters. Detailed climatic studies for strategic
These reports contain information on existing areas of the world are included in the National
weather conditions or specific weather elements. Intelligence Survey (NIS). The supporting air
They may be oral, written, or graphic representa- weather service element, at the request of the in-
tions prepared by Army aviators, field artillery telligence officer, prepares climatic studies to meet
target acquisition units, field artillery meteorolog- the particular requirements of the command. Cli-
ical sections, or air weather service detachments. matic studies are disseminated on the same basis
Other units furnish current weather reports as as weather and climatic summaries.
directed. Reports of current weather conditions
are used in connection with the operation of air- 6-19. Technical Intelligence Bulletins and
craft, use of indirect fire weapons, nuclear weap- Summaries
ons, chemical agents, or other activities requiring Technical intelligence bulletins and summaries
this information. Normally these reports are dis- are prepared at corps and higher headquarters to
seminated directly to the user by the collection disseminate the results obtained from an exami-
agency. nation of enemy materiel. Bulletins usually deal
with individual items while summaries are
6-17. Summaries of Weather and Climate broader in scope. They are disseminated through
a. Summaries of weather and climate are infor- command, technical intelligence, or combat service
mation summaries used as a basis for other esti- support channels depending upon the scope and
mates and plans. They are usually prepared by nature of the contents. The current NATO stand-
the supporting air weather service detachments at ardized nomenclature for Soviet Bloc army weap-
the request of the intelligence officer and dissemi- ons and equipment described in FM 30-16 will be
nated in intelligence documents such as written used in technical intelligence reports when possi-
analyses of the area of operations, intelligence es- ble.
timates, and PERINTREP, or the PERINTSUM 6-20. Geographic Intelligence
in joint service operations.
Engineer units provide terrain reports and spe-
b. A weather summary is a description of the cialized engineer reports in support of the G2.
weather at a point, along a route, or within an
area during a specified period. Weather summa-
6-21. US Army Security Agency Reports
ries are used in analyzing the effects of weather
on recent operations and in estimating the effects USASA units provide intelligence reports, both
of weather on future operations. They are re- spot and periodic reports, in accordance with the
quired for engineer forecasts of streamflow, con- desires of the G2 of the appropriate command.
dition of ground, and trafficability. Weather sum-
maries have no prescribed format or content. The 6-22. Order of Battle and Handbooks
contents of a weather summary are determined by Order of battle books contain lists, histories, code
the requester based on intended use. names, and other data of foreign units, and bio-
c. A climatic summary gives statistical data in graphical data on foreign military personalities.
terms of averages, extremes, and frequencies of Order of battle handbooks contain data concern-
occurrence for a specified period of time such as a ing the political structure, military system and

6-7
PÍVS ®©-§

GTgzTÀz&tion, eçu.ipnîsnt, and tactical doctrine of the Army and theater headquarters. Field
foreign nations. Order of battle books and hand- may issue supplements to keep these dccumeEte
books are usually prepared by the Department of current.

goSÍCOlñ) ra mñimí
<^=2i)o ©OKORèDO ration of an entirely new analysis or the updating
The analysis of the area of operations is a de- of an existing analysis.
tailed comprehensive study with emphasis on b. An analysis of the area of operations is pre=
weather and terrain data designed to enable the pared before the mission is received, if a logical
commander to determine the effects of the area of mission can be assumed based upon the known
operations on the opposing forces. It may include situation. Analyses based on assumed missions
information about the people in the area, their are reevaluated upon receipt of the actual mis-
economy, sociology, religion, and psychology. Its sion.
preparation is the responsibility of the intelli- c. Analyses usually require revisions in light of
gence officer, although other staff officers assist in the commander's decision, the uncovering of new
its preparation. The analysis includes use of intel- areas, or the receipt of additional or more accu-
ligence to serve as a basis for development of rate information.
specific friendly courses of action and enemy cap-
abilities (courses of action) in the commander's ê=2%. $<s)?m off Ppesofflííofifeiñ)
estimate, the operations estimate, the intelligence
estimate, and other staff estimates. The analysis a. At corps and higher headquarters, the plan-
is oriented on the mission of the command with ning of projected operations requires the prepara-
limiting considerations such as operational envi- tion of a written analysis of the area of opera-
ronment, time, and boundaries. Appendix B pro- tions.
vides additional guidance and information cosi= b. At division level and below, an abbreviated
cerning the preparation of the analysis of the form of the analysis is included in the intelligence
area of operations. estimate (app J). As with the other contents of
the intelligence estimate, this abbreviated analysis
is given orally. A written analysis at division level
is usually prepared for future operations or when
a. An analysis of the area of operations is re- changes in the mission, enemy, or environment
quired for each mission. It may involve the prepa- render the previous analysis obsolete.

Refera m. wn mYmmmΠMmmnm


great to cover the entire situation of a large area
a. The intelligence estimate is a logical and or- or it may be so narrow in scope to estimate only
derly examination of the intelligence factors af- those factors concerning a special operation or
fecting the accomplishment of a mission. It pro- series of related operations. In combat operations
vides the commander with an analysis of the area the varied forms of estimates may run from the
of operations, enemy strength and enemy capabili- simple intelligence briefing given to the personnel
ties that can influence his mission. It provides the about to undertake a bombing mission, beach re-
commander with a basis for planning operations connaissance, or scouting patrol, to the elaborate
and for disseminating intelligence to his staff and presentation of detailed data to an area com-
to other headquarters. It may be in many forms mander whose assigned mission is the neutraliza-
and prepared at any level. However, due to lim- tion of the enemy's industrial potential and the
ited intelligence assets below division, the intelli- destruction of his military forces. Because suffi-
gence estimate is written at division and higher cient time is normally available during the plan-
headquarters and briefed down to battalion. It ning phase of an operation, the intelligence esti-
May be presented to the commander formally or mate should be a written document. In additicr.,
informally and may be written or verbal, detailed for large operations, there is usually such a vast
or summarized. It may be of scope sufficiently amount of material available to the iateiligeKC®
ß=Q
FM 30-5

officer that it is almost mandatory that the esti- of operations and enemy forces which must be
mate be written so all of the necessary and impor- collected prior to or during operations.
cant material may be presented to the commander
in a clear, concise form. 6-28. Responsibility
b. On the other hand, the subsequent continuing a. The intelligence staff officer has the responsi-
or running estimates made as the operation prog- bility of assisting the commander in making
resses are generally called for on such short notice sound and timely decisions and assisting other
and normally based on such a small amount of staff members to meet their responsibilities. The
new material that these estimates would be pre- intelligence officer does so by preparing an esti-
sented orally, supported perhaps by a situation mate of the enemy situation. His duties are not
. map and hurriedly compiled notes. However, these finished with writing only one estimate, because
changes must be incorporated into the basic esti- intelligence estimating is a continuing process. As
mate as soon as time permits. the factors with which it is concerned change, the
estimate must be revised. Preparation of esti-
c. The requirements of each command level for
mates is a continuing responsibility of the intelli-
an intelligence estimate determine the scope,
gence officer. He must not, however, allow this
form, and substance of the estimate. These re-
process to become so routine and uncritical that it
quirements are based on a consideration of the
becomes vulnerable to the presentation of false
following :
information in support of the enemy deception
(1) Purpose for which the estimate is made.
story and objective.
(2) Ultimate uses of the estimate.
(3) Degree of guidance in the estimate re- b. An estimate of the situation will be fur-
quired by subordinate and adjacent commands. nished the commander by the intelligence officer,
(4) Desires of the commander whose intelli- either upon his own initiative when warranted by
gence staff prepares the estimate. developments in the situation, or when required
by the commander. It will summarize the enemy
6-27. Purpose of the Intelligence Estimate situation and capabilities. The intelligence officer
will usually be able to anticipate the necessity of
a. The intelligence estimate is designed to bring
such an estimate; but in any case, he must be
together significant aspects of the area of opera-
prepared to furnish it to his commander when
tions and of the enemy situation, present the ene-
required.
my's capabilities, analyze them in relation to one
another, and consider each capability in its rela-
tion to the friendly mission. With the intelligence 6-29. Continuing Intelligence Estimate
estimate, the commander can balance enemy capa- a. The commander must know immediately of
bilities against his own courses of action and any significant changes in enemy capabilities. To
thereby choose his own most favorable course of keep him apprised of such changes, the intelli-
action. gence officer must maintain in current status a
continuing intelligence estimate. This estimate—
b. The primary purpose of the intelligence esti-
sometimes called a "running intelligence esti-
mate is to determine the courses of action open to
mate"—continually recomputes enemy strength,
the enemy or potential enemy and, if possible, the
reappraises the enemy situation, and performs
probable order of their adoption. Secondary pur-
new analyses of enemy capabilities. Outdated and
poses include the following :
irrelevant intelligence is eliminated and new or
(1) To disseminate information and intelli-
newly appropriate material is added. The last for-
gence on the possible area of operations and the
mal estimate is only as current as the date and
enemy military situation to the commander, the
hour of its completion. It is constantly overtaken
staff, and interested superior, subordinate, and
by new events and newly acquired intelligence.
adjacent commands.
Whenever an intelligence item bears on the capa-
(2) To disseminate to intelligence officers of
bility of the enemy to affect our chances for
subordinate commands the intelligence officer's as-
success in the planned operation, there is a possi-
sessment of the identification, strength, and dispo-
ble need for a new intelligence estimate.
sition of enemy forces which might be employed
against each such subordinate command. b. The continuing estimate performs the same
(3) To determine the essential elements of function as all other estimates ; it analyzes enemy
information (EEI) concerning the possible area capabilities. But frequently it also reveals the

6-9
¡Äi SS) ë

nssd; fo? spscific friendly action caused by speciñe estimate that its form, scope, and content bs
and new enemy circumstances. Cccassionaliy, it is geared to its primary rather than secondary pur-
concerned with the overall enemy situation ; but if poses. After all, there are ether intelligence vehi-
the intelligence officer has been thorough ir. his cles specifically designed to accomplish the second-
previous estiir.ates, the continuing estimate will ary purposes. When, there is difficulty a^d conflict
iliuminats some particular enemy capability of in preparing an estimate intended to accomplish
imTT-sdiate ecncern. both the primary and secondary purposes, the pri-
mary purpose of determining enemy capabilities
c. The continuing estimate is usually contained
receives overriding consideration.
in a loose-leaf binder in order that new material
can quickly and easily be inserted without de- c. The intelligence estimating process contrib-
stroying the entire document. It must allow for utes significantly, however, to the intelligence
new intelligence constantly being obtained and for collection plan. The glaring gaps in the estima-
operations continually changing. Maximum use is tor's knowledge of the enemy may frustrate even
made of overlays, plots, and short summaries, as the seasoned intelligence officer. Never does one
these media increase the flexibility of the estimate have sufficient information on the enemy. It is
and make it easier to revise. easy to see why this can occur when one recalls
that even the operations officer seldom has all the
d. Accuracy in determining the most probable
infornnaticn he wants on his own friendly foFeeSp
enemy courses of action is particularly important
but for him the information is relatively easy to
in preparing the continuing intelligence estimate,
obtain. However, the enemy has an extensive se-
since its efFect on our own tactics is immediate.
curity program designed to prevent disclosure of
Occasionally, it produces intelligence of so drastic
information concerning his own forces. As the in-
a nature as to change completely the commander's
telligence estimate is prepared, these gaps in the
decision. In these circumstances, the continuing
knowledge of the enemy are phrased into ques-
estimate would provide a valuable basis for the
tions (EEI) to be answered by the intelligence
new formal intelligence estimate of the situation.
collector. When the questions are answered it is
probable that the new information will change the
<ss™;!©„ ^Qgosoon fee P@§!Í<£p ®{F Ptoüroíñ) tsiifttdl Isopo estimate. As the estimate is revised, new ques-
a. The form and scope of the intelligence esti- tions will be indicated by new gaps in known in-
mate are designed specifically to satisfy the pri- formation, so that a new series of SEI are
mary purpose of determining enemy capabilities formed. Thus a cycle of estimating, collecting, and
against the command preparing the estimate. other intelligence activities is formed.
They are not particularly suitable for accomplish-
ing the secondary purposes listed above. In accom-
plishing its primary purpose, the intelligence esti- IntelJ.igence estimating, like estimating in other
mate serves as ah initial essential step in the staff sections, is basically problem solving and all
process by which the commander evaluates and use the problem, solution process. Eowever, an in-
compares the enemy and friendly situations, de- telligence estimate is unique in that it cannot be
cides upon a course of action in light of these based on the wealth of firm facts which are avail-
situations, and plans the conduct of that course. able to other staff members for estimates of their
b. The degree to which the intelligence estiir.ate own forces. The intelligence estimate can never be
accomplishes its secondary purposes is limited. any better than the basic intelligence which goes
The estimate can never include all the informa- into it. If that is unreliable, inaccurate, or incom-
tion and intelligence required by other staff divi- plete, these deficiencies will be refiected in the
sions and subordinate commands. Such an esti- estimate.
mate would be too lengthy and unwieldy. Like-
wise, it cannot always provide sufficient basis for
determining all the essential elements of informa- a. 'J.t must be remembered that the appropriate
tion required. Some essential elements cf informa- treatment of any topic included in the cutlins
tien often a-e not determined until the command- which fcllovv's is determined by the sense in
er's estimate cf the situation, or perhaps the oper- which, and the extent to which, that topic applies
ation plan, is being prepared. For these reasons, it to the particular operation and possible area cf
is essential during preparation of the intelligence operations under consideration. When cogent rea-
c> ■:$
FM 30-5

sons exist, the estimate may be modified or sup- readily available to the user of the intelligence
plemented to permit appropriate treatment of any estimate.
topic. If the discussion of any topic is not perti-
nent nor applicable to the specific estimate, the c. The conclusions paragraph of the intelligence
discussion is omitted and so noted in the estimate. estimate should include:
(1) All enemy courses of action which might
b. One important consideration is to keep the affect the accomplishment of the commander's
intelligence estimate concise, clear, and brief. An mission listed in the order of relative probability
estimate is not encyclopedic. Coverage must be of adoption.
adequate but must also be distinctly limited to the (2) Enemy vulnerabilities.
specific mission at hand. Briefness is not neces-
sarily a virtue but it makes the intelligence esti- d. Appendix J and FM 101-5 contain examples
mate a simpler document for other members of and additional guidance on content and format.
the staff to use. References to other documents e. In joint service operations, where interna-
should be held to a minimum ; however, reference tional standardization agreements do not apply,
may be made to overlays, enemy situation maps, the intelligence estimate outlined in JCS Publica-
or previously published documents which are tion 12 will apply.

Section V. OPERATION PLAN OR ORDER AND REPORTS

6-33. Operation Plan or Order intelligence reports. Subsequent paragraphs con-


Intelligence on enemy forces is disseminated in tain specific collection requirements and instruc-
paragraph la of the operation plan or order .The tions. Appendix N is an example of a division
paragraph may make reference to an intelligence intelligence annex to an operation order; however,
document such as a summary or annex or include in joint service operations, where international
specific intelligence or information. Paragraph 3, standardization agreements do not apply, the in-
"Coordinating Instructions," may be used to dis- telligence annex shown in JCS Publication 12 will
seminate orders to obtain or report specific items be used.
of information and to disseminate intelligence
countermeasures applicable to two or more units. 6-35. Operational Situation Report (SITREP)
The operational situation reports are the prin-
6-34. Intelligence Annex cipal means used to report to higher authority
The intelligence annex is a formal intelligence information of the tactical situation and such
tasking document that may accompany an opera- administrative information as may affect the tac-
tion plan or order. Its first paragraph gives a tical situation. Although its preparation and dis-
summary of the enemy situation required to un- semination is a staff responsibility of the opera-
derstand the plan or order and may refer to anno- tions officer, the intelligence oflftcer prepares
tated maps, enemy situation overlays, or current paragraph 1 (Enemy) of the SITREP (FM 101-5).

Section VI. MAPS

6-36. Responsibility c. Intelligence officers of units below division


are responsible for determining the map require-
a. The intelligence officer prepares plans and
ments for the command and normally store and
policies concerning military maps and determines
distribute military maps; however, the logistics
map requirements for the command.
officer is responsible for the procurement of mili-
b. At division, the division support command is tary maps.
charged with the procurement, storage, and distri-
bution of military maps in accordance with poli-
cies established by the division G2. At corps and 6-37. Military Maps
field army, the engineer officer is charged with the The term "military maps" refers to all maps
procurement, storage, freproduction, and distribu- (other than aeronautical and hydrographie
tion of maps and map substitutes in accordance charts) used for military purposes. Military maps
with policies established by the respective G2. are classified generally according to scale which is

«-11
FM 30-5

indicative of their precision, detail and general (9) Terrain Model. A three-dimensional rep-
use. General classifications are commonly used to resentation of an area, modeled in plaster, rubber,
indicate the extent of geographic information or other materials. It is distinguished from other
given as well as the manner in which it is por- map types by showing some cultural and terrain
trayed. features realistically instead of symbolically.
o. Military Classification. (10) Pictomap. A photomap type product
(1) By scale. usually published at the scale of 1:25,000 or
(a) Small scale. 1:600,000, and smaller. larger, depicting terrain and vegetation in near
(&) Medium scale. Larger than 1:600,000, natural colors and with important cultural fea-
but smaller than 1:75,000. tures and drainage systems overprinted in red
(c) Large scale. 1:75,000 and larger. and blue, respectively. Names, contours, grids,
(2) By use or description. and marginal data are depicted.
(a) General. Maps smaller than (11) Joint Operations Graphics (JOGS). A
1:1,000,000—used for general planning purposes. 1:250,000 scale series of maps printed in a ground
(&) Strategic. 1:1,000,000—used for stra- (G) or air (A) version. JOGS are designed to
tegic planning purposes. provide a common base map of an area for com-
(c) Strategic-tactical. 1:250,000 (1:500,000 bined air/ground operations. The ground version
alternate)—for use when other scales are unsuita- shows elevation and contours in meters while the
ble or unavailable. air version emphasizes air landing facilities, and
(d) Road. 1:250,000—for tactical and ad- depicts elevation and contours in feet.
ministrative troop movements. (12) Tactical Commander's Terrain Analysis
(e) Tactical. 1:50,000 (1:100,000 alter- (TACCTA) Maps. Contingency maps that are pe-
nate)—for tactical and administrative purposes. riodically updated for issue only when troops are
(/) Artillery. 1:50,000—for artillery fire committed in the area covered. These maps con-
control. tain, or have printed on their reverse sides, signif-
(g) Photomap. 1:5,000-1:60,000 (1:25,000 icant information not found on ordinary tactical
preferred)—for tactical and administrative pur- maps.
poses.
(/i) Town plan. 1:12,500. 6-38. Requirements
6. General Classification. a. General. Timely planning is necessary to in-
(1) Planimetrie map. A map showing only sure that sufficient quantities of suitable maps are
the horizontal (flat) position of features. available to units at the time and place needed.
(2) Topographic map. A map that presents The basic factors that govern this planning are—
the horizontal and vertical positions of the fea- (1) The area of map coverage.
tures represented. (2) The map scales required.
(3) Plastic relief map. A topographic map (3) Initial allowances.
printed on plastic and molded into a three-dimen- (4) Replenishment issues.
sional form. (5) Replacement issues.
(4) Photomaps. A reproduction of a photo- (6) Emergency issues.
graph or photomosaic on which grid lines, mar-
ginal data, place names, and boundaries are b. Initial Allowances.
added, and which, in some instances, depicts relief (1) Initial allowances prescribe the number
graphically. of copies of map sheets, by type or scale, that can
(5) Plastic relief photomap. A photomap be requisitioned by each organization without fur-
printed on plastic and molded into a three-dimen- ther approval. Initial allowances furnish units
sional form. sufficient numbers of map sheets by scale. Diffi-
culties of production, distribution, and storage ne-
(6) Photomosaic. An assembly of aerial pho-
cessitate economy in map issue. Various factors
tographs to form a composite picture.
such as the strength, composition, and functions
(7) Military city Tnap. A large-scale topo- of a unit are combined with experience data to
graphic map (usually 1:12,500) of a town or city. determine the quantities of maps to be allowed the
(8) Special maps. Maps for special purposes, unit in tables of initial allowances. The allowances
such as trafficability maps, transportation maps, prescribed in FM 101-10-1 are based on experi-
and boundary maps. ences of World War II and are a guide only. The
6-12
FM 30-5

vide dispersion required by the nuclear battlefield technical information on methods, facilities, and
jiay require increased allowances. quality of reproduction.
(2) Tables for determining map require- (6) In the above illustration, it is assumed
ments and discussions of the subject frequently that the division is calculating its own initial al-
employ the terms "sheet" and "copy." The term lowances. Initial allowances for a division are de-
"sheet" is used to describe a map of given scale termined at field army in most situations.
that covers a given area of ground. It is a single
c. Replenishment Issues. A replenishment issue
piece of paper. The term "copy" designates any
is based on replenishment allowances that include
exact counterpart or facsimile of a sheet. Physi-
authorized supplemental issues to cover normal
cally, as an imprinted piece of paper, a sheet and
losses and authorized quantities to cover areas of
a copy are identical. As used in connection with
new interests. Replenishment requirements are
map requirements, the term "sheet" conveys the
calculated by applying a percentage factor to the
idea of an area of terrain cartographically de-
number of copies required for initial issue. The
picted on a piece of paper. The term "copy" con-
sum of the initial requirement plus the replenish-
notes quantity.
ment requirement for each sheet represents the
(3) Initial map requirements for the division
total number of copies of each sheet that the field
are determined jointly by the G2, G3, and support
army is prepared to distribute.
command commander. The G3 outlines the opera-
tional plan. The G2 and G3 determine the types d. Replacement Issues. Replacement issues
and scales of maps to be used. The support com- refer to recalling or voiding old map issues and
mand commander advises on the availability of issuing new editions. Replacement issues are
maps, including types and scales. The G2 marks made on the same basis as initial allowances.
the projected boundaries of the division and its
e. Emergency Issues. Emergency issues are
subordinate units and the overall area for which
made to fulfill immediate combat requirements.
coverage is desired. Allowance is made for the
time necessary for procurement and distribution.
The G2 also informs the support command com- 6-39. Distribution
mander of other factors involved in the scheme of a. General.
maneuver which are pertinent to map require- (1) The distribution of maps is keyed to the
ments. operation plan. Changes in tactical plans may
(4) The Support command commander calcu- have an immediate effect on map requirements.
lates map requirements for the division essen- The map distribution system must provide for
tially as follows : timely issue of maps in response to changes in
(a) Determine the projected division area tactical plans.
for which coverage is desired taking scale into (2) Premature issue of maps not of immedi-
consideration. ate interest to friendly forces is inadvisable. The
(b) Indicate tentative battalion and bri- issue may be a needless one due to a change in the
gade boundaries in the division area outlined on operation plan, and, once issued, the maps can
the map index. Project these boundaries forward seldom be withdrawn for reissue to another unit.
to cover the area for which map coverage is de- Logistical limitations prevent maintaining exces-
sired at each scale. sive reserves of maps; hence, map distribution is
(c) List the identifications of each sheet carefully controlled to prevent waste.
within the boundaries of each echelon from bat- (3) In a mobile situation, detailed issues to
talion to division. individuals and small units are difficult to make.
(d) Determine the number of copies of The bulk of maps needed to cover any substantial
each sheet required at each echelon from the expe- area makes it impractical to supply a unit with
rience table. maps for any prolonged period of mobile opera-
(e) List the total number of copies of each tions. In airmobile situations, detailed issue to in-
map sheet required. These are planning figures dividual aviators and small aviation units is nec-
for initial issue. essary. The G2 normally provides organic and at-
tached aviation units with a bulk issue of maps
(5) The support command commander re-
for the operational area and updates the issue as
quisitions, stores, and issues maps in addition to
necessary.
advising on availability and determining specific
requirements. The division engineer provides b. Maps and Intelligence Documents. Maps are

6-13
pm §@-g

valuiabla scjirces of information concerning the c. Fáap Designations. The intelligence annes to
area of operations and are classifíed as intelli- the operation order designates the maps to hs
gence documents. Because they are considered as used during an operation. In paragraph 5 of the
intelligence documents rather than as items of annex, the intelligence officer lists the maps that
standard supply, maps are handled through an
independent system. Corps, primarily a tactical will be supplied to each unit, in the number of
headquarters, is an integral part of the map sys- copies of each classification or scale, and includes
tem. Divisions requisition and draw their maps instructions concerning special requisitions and
from corps rather than from field army as in the distribution.
case of standard am

Dgfcírü /hmim, Pimtgimr


mally provide oblique imagery extending to the
horizon on each side of the aircraft's line of flight
a. Aerial imagery is normally broken down into
while also providing verticle coverage directly be-
three basic types: photographic, infrared, and
neath the aircraft. Panoramic photography can
side looking airborne radar ZSLAR). Each is dis-
provide rapid coverage of areas in one pass over
cussed separately below. For additional informa-
the target area.
tion see FM 30-20.
(4) Stereopair. A stereopair consists of two
b. Photographic Imagery: Photographic im- aerial photographs in which a portion of the total
agery includes the following types : area projected thereon is common. Examination
(1) Vertical. Vertical photography furnishes of such pairs with a stereoscope gives an exagger-
coverage of a target photographed from directly ated three-dimensional view of the terrain in the
overhead. It provides photography of relatively area of overlap. Limited stereoviewing can be
constant scale which allows the interpreter to accomplished with overlapping oblique and pano-
achieve the best stereovision and the most accu- ramic photography ; however, the best stereoview-
rate measurements. It is, therefore, the most suit- ing is achieved through vertical and split-vertical
able type of photographic imagery for use in con- type photography. A special type of stereopair is
junction with mapping requirements or construc- the vectograph which is two specially printed ov-
tion of mosaics or terrain models. A variation of erlapping airphotographs. These give the illusion
the conventional vertical photograph is the split of the third dimension when viewed with polaroid
vertical which provides essentially two side=by- spectacles.
side vertical photographs with minimum center (5) Wide-Angle Photo. A wide-angle photo is
overlap. an aerial photograph taken with a camera that
(2) Oblique. Oblique photography furnishes has a wide-angle lens which photographs a cone of
coverage of a target area photographed at an approximately 90°.
angle from the vertical. Oblique photography e. Infrared (FR) Imagery.
closely resembles the normal eyeview and allows (1) An IE system is a passive sensor which
the interpreter to "see" into an area in a more detects emitted and reflected thermal radiation
normal fashion rather than seeing the target as it coming from the terrain and objects on the ter-
appears from directly overhead. It allows inspec- rain. With the use of a replaceable niter, cuïrexrô
tion of cloud covered areas normally obscured in IR systems filter out reflected radiation and
vertical photography. High oblique photography record only that radiation emitted by the target
includes a portion of the skyline behind the target area and objects. The total emitted radiation is a
area ; low oblique photography does not. function of an object's temperature and its emis-
(3) Panoramic. There are two types of pano- sivity. Emitted radiation will differ between ob-
ramic photography, both of which are taken with jects and the resultant differences will be sensed!
special cameras capable of wide-angle viewing. and recorded by the IR system. The ¿R sensor can
Oblique panoramic photographs include a portion detect minute differences and, therefore, differen-
of the horizon and are usually taken in a for- tiate between objects close to eaeî?. other. T©
ward-viewing made and referred to as "forward achieve the maximum capability, the IR system
pans." Vertical panoramic photography will nor- must operate at low altitudes as its scan coverage

(Ml 4
FM 30-5

is limited to the area directly below the flight path 6-41. Aerial Photographic Coverage
of the aircraft ; therefore, it is used normally only
a. Aerial photographic coverage includes
for point, linear, or small area targets.
ground area represented on aerial photographs,
(2) IR aircraft are equipped for both a real photomaps, and mosaics. It falls into two general
time pictorial display of the IR returns as the classes of permanent record imagery and mapping
aircraft is passing over the terrain and the re- photography as follows :
cording of the sensor acquired information on (1) Permanent record imagery. The three
strips of film for later development and interpre- categories of permanent record imagery com-
tation. Some versions of Army IR aircraft can monly used by the imagery interpreter are initial
also transmit their imagery to a ground sensor record, general intelligence record, and detailed
termina} (GST) thereby providing a real-time intelligence record.
presentation of the target area to personnel on the
(a) Initial record. The initial record is
ground. When available, the GST also records
complete permanent imagery coverage, flown sea-
these presentations on film which is developed by
sonally, of a projected area of operations usually
a recorder-processor-viewer and available for in-
extending from the line of contact with enemy
terpretation within 20 to 60 seconds.
ground forces to deep within the enemy territory.
d. Side-Looking Airborne Radar (SLAR). Photographic coverage is of small scale (1:20,000
to 1:60,000) and suitable for stereoscopic study.
(1) SLAR is an active electronic device
The initial record imagery provides basic infor-
which emits energy and senses that portion of the
mation about enemy installations and defenses,
emitted energy which is returned by reflection off
cultural features, trafficability, and soil and vege-
the terrain and objects thereon. The radar's en-
tation. Its principal value is to provide a basis for
ergy may be directed at terrain to the left, right,
evaluating changes in enemy-occupied territory.
or both sides simultaneously along the flight path
Areas subject to seasonal changes are recorded
of the aircraft. Energy reflected from objects on
under conditions characteristic of each season to
the ground, both fixed and moving, is recorded on
eliminate the observed differences caused by these
strips of film. It should be noted that since the
changes. Vertical initial record serves as a map
radar pulse is line-of-sight, any high ground or
substitute or supplement. The field army normally
tall objects in the path of the radar pulse will
supervises the automatic initial distribution to
block out radar returns from any smaller objects
subordinate units according to areas of interest,
which they mask. This causes SLAR returns to
and supplementary issues are made as necessary.
leave blank spots called radar shadow or non-
Typical allowances are shown in FM 101-10-1.
sensed areas wherever these hidden areas occur.
(6) General intelligence record. The gen-
(2) The SLAR produces two images simulta- eral intelligence record is vertical, medium scale
neously: one depicts fixed target information (1:10,000 to 1:20,000) imagery covering the field
(FTI), such as terrain features and buildings, army's area of interest. It provides current intelli-
and the other depicts moving target information gence and is compared with initial record imagery
(MTI) ; however, in order for the SLAR to to determine current location and disposition of
acquire MTI, movement of the object must be enemy installations, troop concentrations, troop
greater than 2.5 mph. These two strips of film movements, equipment, and supplies. This type of
when developed are called SLAR imagery. Army imagery is normally requested by divisions and
SLAR aircraft are equipped to process exposed higher headquarters.
film continuously and provide the airborne sensor
operator a pictorial display of the returns while (c) Detailed intelligence record. Detailed
the aircraft is still in flight. Time delay from the intelligence record is obtained to supplement the
time of film exposure until it is developed and general intelligence record by providing large-
ready for viewing is approximately 2 minutes. scale imagery of areas of specific interest in the
Like the Army IR aircraft, some Army SLAR battle area. It provides the imagery for detailed
aircraft have a capability for transmission of im- analyses of selected terrain features, installations,
agery data to ground sensor terminals. When and equipment. It is frequently necessary to use
available, SLAR sensings are received at the GST more than one sensing or recording system over
and recorded on film, developed, and ready for the target. Types of detailed analyses are—
viewing by image interpreters in approximately 2 1. Vertical analysis. The study of large
minutes. scale (1:10,000 and larger) photography reveals

6-15
Pitt ss^s
the plans and heights of installations not shown in consistent with the type of coverage desired, ia-
general intelligence record. tended use, size of area to be recorded, time allo=,
2. Oblique analysis. The study of air pho- cated for the mission, type of aircraft and sys-
tographs taken at an angle from the vertical re- tems available and the degree of urgency of the
veals installations from the elevation viewpoint. desired information. Due to the special factors
This type of imagery is particularly important in inherent in stability operations the following pho-
the analysis of features not suitable for vertical tography imagery scales are recommended : initial
analysis, such as concealed or well-camoufíaged record 1:10,000 to 1:26,G00 ; general intelligence
installations. record 1:6,000 to 1:10,000; ma detaiM intelli-
3. Concealment analysis. Installations gence record 1:5,000 or larger.
and equipment hidden from observation are de-
tected and subjected to study by special recording ê=SÏ *!®0SIC(s3
techniques ; for example, a camouflage net located
A mosaic is an assembly of overlapping aerial
through general intelligence record photography
photographs that have been matched to form a
may be identified as a covering for mechanical
continuous photographic representation of a por-
equipment when the area is subjected to infrared
(IR) search. tion of the earth's surface. There are four types
of mosaics: controlled, semicontrolled, uncon=
4. Deception analysis. Enemy measures
trolled, and strip.
designed to develop and confuse friendly intelli-
gence collection agencies are detected through a. A controlled mosaic is laid on ground control
analysis and comparison of photographic and elec- to provide an accurate representation of distances
tronic presentation such as radar, infrared, and and directions. It can be made quite accurate if
electronic intelligence. sufficient control data exist, but its preparation is
(2) Mapping photography. Mapping or chart- slow and tedious. For controlled mosaics, photog-
ing photography is taken for the purpose of pre- raphy taken by a mapping camera should be re-
paring or revising maps and charts. It is generally quested.
taken at much smaller scales (1:20,OQO to
1:50.000) than intelligence phtography and is b. A semicontrolled mosaic is constructed of un-
used for intelligence purposes only when no other altered contact prints aligned to plotted control
intelligence photography is available. This photog- points and mounted on a stable base. The photo-
raphy is taken with specially stabilized cameras graph is oriented for mounting by matching prin-
and other equipment. The flight pattern and ele- cipal points and flight lines with no regard for
vation are carefully controlled. matching detail.

b. Imagery obtained by the use of Army air- e. An uncontrolled mosaic is made without the
craft is a type of detailed intelligence record. Air check of scale or position that would be given by a
observers or photographers equipped with suita- framework of control points. In comparison with
ble cameras can, in many cases, provide com- a controlled mosaic, its preparation is quite rapid,
manders with low-altitude (orientation) obliques but it is much less accurate.
and limited vertical phtography under conditions
and at times when high-performance aircraft are d. A strip mosaic consists of one strip of aerial
photographs taken on a single flight. Depending
unable to meet Army requirements. This is in ad-
on the time and the amount of control available, it
dition to the Army capability with conventional
may be controlled or uncontrolled. For a mosaic to
mounted cameras. Commanders should fully ex-
ploit the employment of Army aviation in a sup- provide maplike presentation, vertical photogra-
phy normally is used. For special mosaics such as
plemental photo-reconnaissance role.
coastlines, head-on views of mountainous terrain
c. In stability operations, the scale of coverage, or built-up areas, oblique photography can be
as a general rule, should be the largest possible

&-m
FM 30-5

CHAPTER 7

ORDER OF BATTLE
(STANAG 2077)

Section I. INTRODUCTION

7-1. General (a) Personalities


(b) Unit history
a. Order of battle (OB) is the identification,
(c) Uniforms and insignia
strength, command structure, and disposition of
(d) Code names and numbers
the personnel, units, and equipment of any mili-
tary force. Complete OB data is not normally fur- b. Order of battle intelligence is an integral
nished the commander. Instead, he is provided part of combat and strategic intelligence. In de-
conclusions, estimates, or analyses of enemy prob- termining enemy capabilities and probable
able courses of action based on collated OB infor- courses of action, the intelligence officer must con-
mation. In campaigns involving irregular force sider order of battle intelligence together with
units all such units as well as auxiliary and un- other intelligence pertaining to the weather and
derground elements will be included. OB consists terrain. The significance of OB in stability opera-
of evaluated information regarding the following tions is discussed in detail in FM 30-31.
elements :
c. In general, order of battle personnel are res-
(1) Composition ponsible for all information concerning foreign
(a) Unit identification military forces. In order to accomplish this mis-
(b) Organization sion, the order of battle analyst has to consider
(2) Disposition and develop intelligence concerning the order of
(a) Geographical location battle elements as they pertain to foreign military
(b) Tactical deployment forces. Order of battle techniques employed in
(c) Movements support of stability operations parallel those used
(3) Strength during conventional warfare ; however, the nature
(a) Personnel of stability operations, particularly of the enemy
(b) Weapons and equipment forces encountered, will require modification of
(c) Type of units techniques and expansion of the scope of order of
(4) Training status battle to include both military and nonmilitary
personnel of significant interest.
(a) Individual
(b) Unit
(c) Special 7-2. Relationship to Other Intelligence
(5) Tactics Military intelligence is developed in many fields
(a) Tactical doctrine outside the scope of order of battle but all intelli-
(b) Special operations gence is ultimately related to it. For example,
(6) Logistics technical intelligence produces intelligence on the
(a) Systems capabilities and characteristics of a weapon or
(6) Current status weapons system but order of battle intelligence
determines the effect of the weapon capabilities
(7) Combat effectiveness
and characteristics on enemy tactics, combat
(a) Combat experience effectiveness, and organization. Enemy military
(b) Morale intelligence organizations are of primary interest
(c) Other factors to counterintelligence, but as part of a military
(8) Miscellaneous organization, they are also of interest to order of

7-1
FM §©-§

îcattle analysis. SIGÂNT can contribute to devel- gence ana othe? military intelligence cannot be
opment of order of battle and other information. ove
The relationship between order of battle intelli-

¡OSÍLODH miMiiariü @? ©'mm m HâWUI o^üiy^^eE


^^o (2®!niï[°;®GDG,C©[a) accepted. When one of these regiments is located
it may be reasonably assumed that the remaining
Composition is the identification and oTganization
elements of the division are also in the area.
of units. It applies to specific units or commands
as opposed to type units.
a. Unit identification is often called the key to
order of battle intelligence because it leads to the Disposition consists of the location of enemy units
answers to many questions concerning the enemy. and the manner in which these units are tactically
Unit identification consists of the complete desig- (or administratively in times of peace) deployed.
nation of a specific unit by name or number, type, In addition, disposition includes the recent, cur-
relative size or strength, and usually subordina- rent, and proposed (cr probable) movements of
tion. Through identification, the order of battle enemy units.
analyst is able to develop a history of the composi- a. Location refers to a geographical area or po-
tion, training, tactics, and combat effectiveness of sition occupied by a unit or units. Knowledge of
an enemy unit. Combined with organization, the the strength and location of an enemy assists the
identification of a specific unit alerts the analyst intelligence officer in determining the capabilities
to the possible presence of other unidentified units of this force and its effect upon the accomplish-
of the same organization. ment of the mission. Data of this type are also
b. Organization is the structure of a unit and collected during times of peace; however, knowl-
the relationship of the various echelons within the edge of foreign military forces is severely limited
structure. Knowledge of the organization of a mil- due to limitations on collection elements.
itary forces aid in developing accurate intelligence b. Tactical deployment is the relative position
concerning strength, tactics, training, logistics, of units with respect to one another or to the
and combat efficiency. Enemy capabilities are dif- terrain. Tactical formations are designed for exe-
ficult to assess accurately without knowledge of cuting the various tactical manuevers. If this de-
his current organization. ployment can be predetermined, it may lead to an
c. The basic, self-sufficient, tactical unit (in the accurate appraisal of probable enemy courses of
US Army a combat division) must be considered action. The knowledge of how enemy units are
when developing intelligence concerning composi- echeloned may indicate (if the enemy assumes the
tion. In some countries the field army is consid- offensive) which units will be used in the initial
ered the basic, self-sufficient, tacíücal unit. The attack and which units will be employed in sup-
importance of this concept lies in the term self- porting and reserve roles. Tactical deployment
sufficient. Units subordinate to self-sufficient tac- with respect to terrain is also important. A study
tical units, although capable of limited independ- of dispositions, coupled with an analysis of tho
ent action, cannot sustain themselves over rela- area of operations leads to conclusions concerning
tively long periods of time. They are dependent enemy capabilities, vulnerabilities, and probable
courses of action.
upon their self-sufficient headquarters or upon
that unit which by design is self-sufficient. Subor- c. Movement of enemy units is another subele-
dinate units are seldom employed independently ment of disposition. Movement is the physical re-
or separately from the basic, self-sufficient tacti- location of a unit from one geographical point to
cal unit. For example, a new enemy mechanized another. Patrol activity may be an indication of
regiment is reported in the area of operations. planned movement but, in itself, is not movement.
Knowing that the mechanized division is the Movement is significant because it autcmatieaüy
basic, self-sufficient, tactical unit and! its Si^ee changes the tactical deployment of the opposing
mechanized regiments are seldom employed inde- forces. When an enemy has moved, is moving, or
pendently, the presence not only of a new reeiment will possibly move in the future, it may become
but of a new mechanized! division is tsKtatively capable of a number of actions which affect the
V-^i
FM 30-5

order of battle situation. Such a unit may be mov- organization. The thoroughness, degree and qual-
ing into an attack position, or moving to rein- ity of individual training received by the recruit,
force, or to replace a unit, or to perform other specialist, NCO, and officer are major factors in
missions unknown to friendly forces. In view of determining the overall efficiency of an armed
these possibilities, movement of an enemy unit force. Unit training, normally conducted in sea-
becomes important and units must be monitored sonal cycles from small unit exercises to large-
at all times in.order for the OB analyst to provide scale maneuvers, is an essential part of the train-
correct and detailed data on enemy dispositions. ing necessary for a unit to operate at its full po-
tential. Each type or phase of training accom-
7-5. Strength plished by a unit adds to its capabilities and effec-
The term "strength" covers the description of a tiveness. Therefore, the combat effectiveness of an
unit or force in terms of men, weapons, and enemy unit is more easily appraised when the de-
gree and quality of its training are known.
equipment. Information concerning strength pro-
vides the commander with an indication of enemy
capabilities, and assists him in determining the 7-8. Logistics
probable courses of action or options open to Logistics also is closely related to combat effec-
enemy commanders. A lack of strength or a pre- tiveness. The adoption of a course of action is
ponderance of strength has the effect of lowering influenced by the ability of the logistical system to
or raising the estimate of the capabilities of an support that action. Knowledge of the enemy's lo-
enemy force. Likewise, a marked concentration or gistics facilitates a more accurate evaluation of
buildup of units in an area gives the commander enemy capabilities, strength, combat efficiency,
certain indications of enemy objectives and proba- and disposition. Types of logistic information in-
ble courses of action. During peacetime, changes in clude—
the strength of potential enemy forces are impor- (1) All classes and types of supply.
tant factors which indicate the enemy's intention (2) Requirements.
to wage war. Strength computations are discussed
in appendix K. (3) Procurement.
(4) distribution.
7-6. Tactics (5) Transportation.
Tactics in order of battle intelligence include tac- (6) Installations.
tical doctrine as well as tactics employed by spe- (7) Terminals.
cific units. Tactical doctrine refers to the enemy's (8) Evacuation and salvage.
accepted principles of organization and employ- (9) Maintenance.
ment of forces for the conduct of operations.
Tactics, on the other hand, describe the manner in 7-9. Combat Effectiveness
which the enemy conducts an operation. From a
knowledge of tactical doctrine, the OB analyst Combat effectiveness is a term used to describe
the abilities and fighting quality of an enemy unit.
knows how the enemy may employ his forces
under various conditions and in certain type situ- Combat effectiveness affects the capabilities of a
unit or army and may be predicted by analyzing—
ations or special operations. Conventional enemy
forces normally can be expected to perform a. Personnel strength.
according to certain patterns within the frame-
work of tactical doctrine. There are established b. Amount and condition of weapons and equip-
principles and patterns for the employment of in- ment.
fantry, mechanized, armor, and artillery in the c. Status of training.
offense and defense. Any predetermination of the
probable patterns of employment and enemy d. Efficiency of the officer and noncommissioned
action or reaction is extremely important in the officer corps.
planning phase of an operation as well as in the e. Length of time a unit has been committed in
execution phase. combat.
/. Traditions and past performance.
7-7. Training
Individual and unit training can significantly con- g. Personality traits of the unit commander.
tribute to the combat effectiveness of any military h. Geographical area in which committed.

7-3
Fföl ®®=§

i. Morale, health, discipline, and political relia- cerned. The development of unit history is impor-
bility (or belief in the cause for which they fight). tant because it aids in determining the capabili-
ties and limitations of a unit. Military or paramil-
3. Status of technical and logistical support of
the unit. itary units, like individuals, develop characteris=
tics which distinguish them from other units. Just
k. Adequacy of military schooling at all levels. as they consider the various qualifications and
traits of enemy personalities, order of battle per-
I. National characteristics of the people.
sonnel must also consider an enemy unit as a
"personality" in analyzing its capabilities and
limitations.
Miscellaneous data include various types of sup- c. information on uniforms and insignia is an
porting information needed by an analyst to con-
important part of know-your-enemy intelligence.
tribute to the development of the other order of This information assists in establishing unit iden-
battle elements. Miscellaneous data include basic tification and organization and in determining
intelligence that can be described as "know your, morale and esprit de corps.
enemy."
d. Some foreign armies use systems of code
a. Personality files contain information on cer- numbers (and names) to conceal true designa-
tain characteristics and attributes which describe tions (or affilitation) of units, field post numbers
individual members of an enemy military force. Â and vehicles. These code number systems, when
knowledge of personalities is important as an aid properly analyzed, are valuable sources of infor-
to identifying units, and, in some cases, predicting mation related to composition and disposition.
the course of action the unit will take. Personality
data, therefore, is valuable because the tactics and e. The order of battle analyst must be able to
combat efficiency of particular units are closely recognize and appreciate the capabilities and limi-
related to key individuals. tations of foreign weapons and equipment. Al-
though technical intelligence agencies are primar-
b. Unit history includes information and intelli- ily concerned with the determination of weapons
gence on component elements of a specific unit; on and equipment characteristics and capabilities,
present and past parent units; personalities who the analyst uses this intelligence to analyze the
have commanded the unit; and other details such effects of these items on the organization, disposi-
as past performance and activities which describe, tion, tactics, and combat effectiveness of the mili-
limit, or clarify the capabilities of the unit con- tary force.

¡SGfifclñ) PIM

7=^ H. ßosipsffDsSyfloCy 7-12. C©Ill@sSô®ra


Order of battle analysts assist the G2 in continu- Order of battle analysts do not have a collection
ously planning the collection effort. They may be capability; therefore, most of the information is
required to draft collection memorandums for the received from agencies and sources outlined in
guidance of collection agencies. As intelligence is paragraphs 3-24 through 3-52. The G2 section
sends incoming information to the analysis and
developed, the need for new information arises production section for detailed processing. From
and every effort is made to maintain a continuous the standpoint of report and source evaluation,
flow of order of battle information by timely re- order of battle analysts must know which agen-
quests to the collection agencies. cies are available and their capabilities to collect
accurate information.

5©SííS®OH w. mm ©mm ©IF IäTöTLI »©ßimTO^/flOTißAutg^ci

F—ligio 0[ñ)tfD'©<a¡(yie(?D®íñ) battle information. The intelligence and informa-


The analysis and production section of the mili- tion received and processed by an analysis and
tary intelligence company is responsible to the in- production section normally becomes voluminous
telligence officer for the processing of order of within a short period of time. In organizing this

7^
FM 30-5

information, order of battle analysts maintain ex- These studies are usually detailed, technical in na-
tensive and systematic filing and compilation sys- ture and provide a wealth of special information
tems. Specific items of intelligence and informa- not otherwise available.
tion must be located on short notice and incorpo-
rated into comprehensive reports or analyses. 7-15. Recording Order of Battle Data
These requirements necessitate a high degree of
a. The recording aids outlined in paragraphs
efficiency in the processing of data received.
5-4 through 5-9 may be adapted to order of battle
use (for example, the index tabs on the workbook
7-14. Order of Battle References corresponding with the order of battle factors).
Typical order of battle references currently pub- Order of battle records and files are consulted
lished are— continually for the purpose of producing new in-
telligence. Files are established to catalog incom-
a. Order of Battle Handbooks. Order of battle
ing information for easy reference and for use as
handbooks contain background data including de-
a basis for comparison and contrast in the pro-
scriptions of a foreign nation's political structure,
duction of new intelligence. Order of battle files
typical organization of that nation's military es-
should be simple, complete and effective. One or
tablishment, tactical doctrine applicable to var-
more of the typical aids discussed below may be
ious types of military units, and other more tech-
used ; the type used depends upon the existing sit-
nical data, such as the logistic system used and uation and the echelon maintaining the files :
the characteristics of weapons and equipment.
The Handbook of Military Forces is largely a his- (1) Unit workbook.
torical and capability study of a nation's military (2) Order of battle workbook.
forces. Since it does not depict unit locations, as (3) Order of battle situation map.
do OB Handbooks, the data is of a less perishable (4) Order of battle card file.
nature. (5) Personality file.
b. Order of Battle Books. Order of battle books (6) Military installation file.
are compilations of current intelligence which (7) Organizational file.
show the composition and disposition of the mili- (8) Strength file.
tary establishment of foreign nations. They are (9) Topical file.
normally published by higher commands or at the
department level. Unlike the order of battle hand- b. Other file systems or forms are developed
books, they contain established intelligence data locally to cope with special situations; however,
on major identified units and their subordinate the primary purpose of these other file systems is
elements. They may also contain personality data, the production of intelligence.
lists of logistic installations, unit history data,
and other order of battle data. Changes or up- 7-16. Unit Workbook
dated versions normally are disseminated on a The format of the unit workbook depends upon
regular basis by the publishing headquarters. the structure of the foreign army being monitored
c. Installation Handbooks. Ideally, installation and consists typically of a collection of unit work-
handbooks contain complete information concern- sheets arranged by type of unit or in numerical
ing every military installation in every city in the sequence (fig 7-1 and 7-2). Analysts may use
country or area of interest. They are useful, par- them as unit workbooks by inserting additional
ticularly during peacetime, for establishing dispo- pages as new information is received. The enemy
sition of forces. parent unit listed on the unit worksheet should be
in consonance with the analyst's level of com-
d. Miscellaneous References. Other publications mand. The analyst is charged with maintaining
and periodicals prepared at departmental ard records two levels below his own. Personalities
area command levels are of value to the order of are listed on the worksheet as a ready reference
battle analyst. These references may deal specifi- to the personalities of the enemy unit. Unit,
cally with order of battle or any and all phases of postal, and vehicle numbers are noted on the
combat and strategic intelligence. Civilian organi- worksheet and are used in determining order of
zations under contract to the Department of De- battle changes or as confirmation of current data.
fense make special studies on various subjects Details which may reveal any facet of the enemy
concerning foreign and enemy military forces. unit's order of battle are noted in the remarks

7-5
FM 30-5

Figure 7-1. Example of a j//nit workbook.

7-6
PARENT UNIT 110 Mechanized Division

SUBORDINATE ID OR
CITY COORDINATES INSTL PERSONALITIES CODE NO REMARKS
UNITS

Division Stein PV818147 1 8. 3 CG G/D Murdock PW No 26, Captured


Headquarters Edward R 2 Feb 68

96 Mechanized Deutsch PU81934 CO - COL Oldham 16181 Document captured


Regiment Ernest B 19 March 68

145 Mechanized Eilenburg PU852961 16182 Deserter 21 March 68


Regiment

3d Battalion Gladbach PV891024 Gladbach residents report


battalion subordinate to
Headquarters in Eilenburg,
3 Feb 68

63 Medium Tank Linburg PV863106 CO - COL Bhartrhari, Agent report 26 May 68


Regiment Kerala N

358 Transportation Lehrt PV825158 16195 Order of Battle Book


Battalion

Figure 7-2- Example of a unit worksheet from a unit workbook.


f
FM 30-5

1. COMPOSITIONS.
DISPOSITION

2. STRENGTH

3. TACTICS

ORDER OF BATTLE
4. TRAINING
WORKBOOK

G2 SECTION. rnpps 5. LOGISTICS

FROM-
(HOUR AND DATE)
TO: 6. COMBAT
(HOUR AND DATE)
EFFECTIVENESS

MISCELLANEOUS
DATA

CLASSIFICATION

Figure 7-3. Example of an order of battle workbook.

7-8
FM 30-5

030040
XX

01 1400 cm 22

1- 02Ó330
II
CZJ
( » ) ?
14C
011010
Í; 1 122
II ¿022301)

i 24
^ i
II
021410
24 = 23 ( >
C ï 24

/ 04U30
040900
II

2
^
24
^5
^1 24
012230 032120

041700

t i

A 1 X 2 24 "55
72 24

STRENGTH UNLOCATED UNITS LEGEND

COMMITTED FORCES

NR PEES WPN Recon Co, 22 Div I Irregular


Mech Bn 5 2625 160mm Mort Bn, 22 Div
Mdm Tk Bn 2 3&* 62xMdm Tk How Bn, 22 Div
Gun-How Bn, 22 Div
FIRE SUPPORT Meta Tk Regt, 22 Div
Gun-How Bn 1 l8xl5ânm Gun-How RL Bn, 22 Div
Mort Bn 1 l8xl60nim Mort
At Bn 1 iSxlOOmm Gun
How Bn 1 l8xl22imn Hov
MRL Bn 1 iSxlUOnm Rkt
RL Bn 1 2x20Cttm RL
2xJJERQN0
AD Bn 1 18x5?™ Gun

REIAPORCEMEHTS
Mech Bn 1 252
Mdm Tk Regt 1 8^2 95xMdm Tk
3xAMÎH Tk
6x57nini AD Gun(SP)
Mech Regt 1 2350 31* Mdm'Tk
3xAMFH Tk
Irregular Co 1 95
Recon Co 1 129 12xAMPH Tk

Figure 7-4. Order of battle Situation map.

7-9
PföJ s®=s

column. Ssports of branch insignia, number and what will be omitted on order of battle maps. The
type of weapons, and statements of local residents time and date of the informatiion are entered
are entered in this column in abbreviated form. below each symbol or plotting. During stability
The date and the source of information are en- operations, however, it may be necessary to plot
tered for each entry. The installation column of enemy/insurgent units down to the squad levels
the worksheet shows the numerical designation since, depending on the situation and the area,
assigned a particular enemy installation when there may be no large sized units operating
plotted on a sketch, map sheet, or town plan at- against friendly forces.
tached to the workbook.
&. A caption box on the order of battle situation
map is an annotation containing information
J-W. ©rdbr off laWD© W which helps to identify and explain the order of
a. The order of battle workbook aids in the battle situation graphically. Although any number
sorting, evaluation, and interpretation of infor- of caption boxes may be used, normally three
mation and in the preparation of intelligence re- types are necessary—strength, unlocated units,
ports. Its purpose and use are identical to those of and legend caption boxes.
the intelligence workbook (fig 5-3). (1) The entries in the strength caption box
usually consist of a digest of strength computa-
&. There is no prescribed form &>r the order of tions in numbers of personnel, types of units, and
battle workbook. At corps level and higher, the weapons and equipment categorized as committed
order of battle workbook is tabbed to conform forces, their fire support units, and reinforce-
with paragraphs of the order of battle annex of ments (fig 7-4). Since a reconnaissance company
the periodic intelligence report (PERINTREP). is part of an aggressor mechanized division, it is
Figure 7-3 shows the method of tabbing the considered a reinforcement which is unlocated
workbook. since its position is unknown. Assumptions such
c. Information is entered under the appropriate as these must be made to portray significant
heading or headings as either a complete report or enemy probable capabilities.
a digest of the original report. All entries contain (2) It is important that the order of battle
a journal date and number in addition to identifi- analyst be aware of that which is not known
cation of the source. Comments, when appropri- about the enemy. The unlocated units caption box
ate, are added after each entry to show the signif- calls to his attention existing units which remain
icance of the report when compared with the unlocated. It is a reminder that maximum effort
overall tactical situation. must be directed toward establishing the disposi-
tion of unlocated units in the area of operations
and that these units pose a threat to the accom-
plishment of the friendly mission.
The order of battle situation map is a graphic (3) A legend caption box is included on the
portrayal of current enemy order of battle, either order of battle situation map when it becomes
confirmed or unconfirmed. It shows identification necessary to improvise symbols for enemy units.
and disposition of the enemy units and any other Within this caption box, the exact meaning of
information which will assist in developing the each improvised symbol is explained.
enemy order of battle (fig 7-4).
a. As a general rule, enemy units down to and ^-"üf. ©j-aGF ©ff IcaWH© Qmé
including two echelons below the analyst's own Order of battle card files are used to maintain
level of command are plotted by using the appro- accurate and complete data on any enemy unit
priate symbols in FM 21-30. For example, at divi- (fig 7-5). Order of battle cards should be main-
sion, enemy regiments and battalions are plotted ; tained at all echelons down to and including divi-
at corps, enemy divisions and regiments. Higher sion or such lower levels as may be necessary. (To
units are plotted to the extent practicable. The meet the requirement for more detailed recording
foregoing information is only a guide. Analysts at and filing or order of battle intelligence, particu-
theater level who are responsib'e for nub'ication larly at higher levels, a supnlementary filing sys-
of order of battle books may plot separate battal- tem may be maintained. This system generally
ions. Peculiarities of enemy organization, the tac- will be based on the component parts of the order
tical situation, and time and personnel available of battle card.) Normally, one card will be main-
determine more precisely what will be plotted and tained on each enemy division or any other unit in

y=
ORDER OF BATTLE CARD (STANAG 2077)

1. TITLE-NATIONAUTY: 2. CODE NAME: 3. NICK NAME:

k. PARENT FORMATION: 6. FIELD POST NO. 8. COMMANDER:

5. SUBORDINATE FORMATIONS/UMTS : 7. INSIGNIA:


(List only major subordinate elements) FPN COMMANDER a. Personnel: (Attach patch)

b. Equipment: (Sketch)

9. UNIT HISTORY: 10. MISCELLANEOUS:


a. Logistics:

b. Training:

c. Tactics:

d. Other:

NOTE: This card is a summary of OB information pertaining to the division. Other card files containing information
pertaining to the subordinate elements are necessary.

Figure 7-5. Format for Order of Battle Card (STANAG 2077).

?
11. LOCATION:
?
Ol

12. TABLE OF PEKSONIffiL AND MAJOR ITEMS OF EQUIPMENT (Ref STANAG 2077)
PERSONNEL: TOE | ARMOR: TOE | ARTILLERY: TOE || AIR VEHICLE: TOE 1 GEN VEH: TOE
DATE J No LOSS REPL EFF f> LOSS REPL EFF % LOSS REPL EFF <f, || LOSS REPL EFF # LOSS REPL EFF i

tt
TOTALS
1
Li. UOMHAT KiyiClKNCÏ:
a. Strengths : b. Weaknesses:

Figure 7-5—Continued.
FM 30r5

a position to affect current operations. The order 7-21. Military Installation File
of battle card contains the following minimum in- Military installation files normally are maintained
formation, numbered as follows : during peacetime by higher echelons to facilitate
1. TITLE (number and designation of unit/formation) publication of installation handbooks. A collation
—NATIONALITY or explanatory sheet contains all information that
2. CODE NAME (official name assigned by the enemy has been collected on each installation to include
for convenience) the number and types of buildings and their
3. NICKNAME (unofficial popular name) capacities, personnel uniforms and insignia, and
4. PARENT FORMATION
5. SUBORDINATE FORMATIONS/UNITS major items of unit equipment (fig 7-6). Maps,
6. FIELD POST NUMBER (FPN) town plans, or sketches showing the location of
7. INSIGNIA each installation within the city supplement this
(a) Personnel file.
(b) Equipment
8. COMMANDER
9. UNIT HISTORY 7-22. Organizational File
10. MISCELLANEOUS The organizational file provides a convenient
11. LOCATION method of showing types of units within an armed
12. TABLE OF PERSONNEL AND MAJOR ITEMS force. Organizational files depict the complete
OF EQUIPMENT (to include initial and effective
strengths and casualties)
breakdown of all units from the highest type
13. COMBAT EFFICIENCY headquarters to the lowest unit including person-
Note. Data contained in Items 11, 12, and 13 are sub- nel and major weapons strengths. Since this is
ject to frequent change and are listed on the back of the rarely possible on a single sheet of paper, a chart
card. showing the general organization of the major
unit and individual charts for each of its subordi-
7-20. Personality File nate units are prepared. Principal weapons and
Personality data on designated categories of indi- equipment charts may be prepared to supplement
viduals are recorded in a personality file. The pur- organizational charts (fig 7-7).
pose of this file is to provide reference material
used in the development of other order of battle 7-23. Strength Worksheet
intelligence. Information on key military figures The strength worksheet (fig 7-8) is used to main-
can be of significant value in the establishment of tain a running numerical tabulation of the ene-.
unit identifications, tactics, and combat effective- my's personnel and equipment strengths. This in-
ness. The file is kept in alphabetical order. The formation is recorded on committed units, fire
card (or sheet) contains information concerning support units, and reinforcements.
the individual's name, rank, current assignment,
date and place of birth, civilian education, politi- 7-24. Topical File
cal affiliation, nicknames, and physical peculiari- This file is maintained when detailed information
ties. Reference also is made to the individual's is desired on new items of enemy equipment,
school, qualifications, awards, decorations, chro- changes or clarification of tactical doctrine, or on
nology of assignments, campaigns, engagements, any additional data which will clarify enemy
demonstrated performance in leadership assign- order of battle. Cards or sheets are filed alphabet-
ments, and important activities participated in, as ically by subject.
well as character traits' such as morals, reputa-
tion, appearance, and mannerisms. Source and 7-25. Evaluation and Interpretation
date of information are recorded with each entry. The same methods of evaluation and interpreta-
The personality file also includes information tion discussed in chapter 5 are used. An analysis
which will aid the commander, G2 and G3 in of the order of battle elements is required in the
TC&D planning and operations: such as habits interpretation of order of battle information. The
that make the enemy commander and staff vulner- interrelationship of these elements is such that it
able to deception, those aspects that present the is difficult to place a greater importance on one
least likely deception target, the degree of free- than another. Similar difficulty is encountered in
dom the enemy commander allows his subordi- analysing one element without reference or de-
nates, the enemy commander's reaction time to pendence upon another. Therefore, a combination
new situations, and how the enemy commander's of data pertaining to all elements is required to
fear of the unknown influences his actions. accomplish complete interpretation.

7-13
2
o
t
TOWN HEIMERZHEIM CÔORD 33ULB 5220

r
CIME LAST
INSTL LOCATION DESCRIPTION USE CAPACITY STRENGTH UNIT INFO EVAL REMARKS

1 523208 5 story, red brick bldg. Unident koo Unk Unk 0758 B-2 Many high ranking officers
(201-lrth Flagpole extends from Hq and official sedans observ
St) 5th story window

2 522211 !*x 2-story, wood barracks Trps 500 350? Engr? 0758 C-2 Sentry observed wearing
(Hwy 2 be- surrounded by 8' board engineer insignia.
tween fence
K & L Sts)

3 531215 6x h-stoTy, red brick bar- Trps 1,000 850 Unident- OU58 B-2 Sentry observed wearing art
racks with 2-story bldg ified insignia. Known to local
Array residents as "Kaiser 'W

k 533218 8x 1-story garage-type gun 0l*58 B-2 Probably belongs to unit in


(N of bids park Instl 3. 9xl00mni guns
Instl 3) observed

5 511*231 2x 3-story, stucco bldg Trps Bn Bn 1st Bn 1257 A-l


19th Mtz
R Regt

6 535211 Local tng area, obstacle ... — 01*58 B-2 Believe used by trps from
course in NW corner both Instl 2 and 3

7 55U205 Several underground bunkers Ammo 10 Tons 1257 F-6


inclosed by 8' barbed wire dump (est)
fence. Guard towers
located on each corner.

Figure 7-6. Example of an installation handbook explanatory sheet


MECHANIZED BATTALION, MECHANIZED REGIMENT

SMALL ANTITANK
PERSONNEL* ARMS MORTARS AAA ARTILLERY VEHICLES ELECTRONIC

14.5-mm ANTIAIRCRAFT

ANTITANK LAUNCHER
z z
O
O

82-mm SQUADRON
UJ

57-mm ANTITANK
UJ
m z _j
z z a: u.
m X <
UNIT

MACHINEGUN
u u h- CE
a < < _J
UJ :£ o u «/»
LU o
>- o

(DUAL)
U h- > E U
I E
< u z o

GUN
U. _l O E■ E■
U_ Z Ul a. a: < <
O ID _l X oo
IN
CO <

Rifle Company (3) 315 27 18 27 27 3 15


18

Mortar Battery 5 43 6 4 2 3

Support Battery 5 48 2 3 3 6 2 3

Headquarters and
Service Company 10 81 48 10 1 13

TOTALS 38 487 27 18 6 2 3 27 3 85 17 1 34

* Individual weapons: Officers - pistol; Enlisted men - 5 percent pistol, 35 percent submachinegun,
60 percent rifle.

Figure 7-7. Example of a principal weapone and equipment charts u


? I
?
CO

?u
STRENGTH WORKSHEET UNITS BY TYPE

ARMOR
1. COMMITTED FORCES PERSONNEL HV AMPH MDM ASLT GUN

FIRE SUPPORT

2. REINFORCEMENTS

Figure 7-8. Strength worksheet


FM 30-5

Section V. DISSEMINATION OF ORDER OF BATTLE INTELLIGENCE

7-26. General 7-27. Order of Battle Annex


The methods of dissemination are discussed in de- An order of battle annex is a document containing
tail in chapter 6. The analysis and production sec- order of battle information/intelligence which
tion is normally responsible for most of the enemy normally is disseminated with the PERINTREP.
situation of the intelligence estimate (app J). Since it is a means of disseminating newly devel-
Paragraphs J-6 through J-ll, are primarily its
oped intelligence, only the intelligence produced
concern. Although paragraphs J-12 and J-13
usually involve the order of battle analyst, other during the reported period is presented. Appendix
intelligence personnel may also contribute to these L provides additional guidance and a sample
paragraphs. annex.

7-17
FM 30-5

CHAPTER 8

COUNTERINTELLIGENCE

Section I. INTRODUCTION

8-1. General sion. They include counterreconnaissance, coun-


terespionage, countersabotage, countersubversion,
a. Security is essential to the preservation of
deception programs, to include confusion and har-
combat power and is a recognized principle of
assment, electronic countermeasures against hos-
war. A command achieves security by protecting
tile SIGINT and ESM collection activities, camou-
itself from espionage, observation, sabotage, an-
flage, and the use of smoke to deny enemy obser-
noyance and surprise.
vation. Offensive counterintelligence measures
b. Counterintelligence is that element of mili- vary with the mission of the unit.
tary operations which deals with neutralizing or
destroying the effectiveness of the enemy's intelli- 8-3. Counterintelligence Responsibilities
gence systems. It is an essential element in the a. The individual soldier has ultimate responsi-
success of any military operation and is a major bility for counterintelligence. Defensive counter-
part of the overall operations security concept. By intelligence operations depend upon his ability to
denying information to the enemy and thereby carry out proper security, camouflage, and obser-
decreasing his ability to use his combat power vation and reporting procedures in his daily activ-
effectively, counterintelligence aids in reducing ities. It is also important for the individual sol-
the risks of a command. Achieving surprise and dier to evade the enemy if cut off from his unit,
maintaining the initiative is dependent upon relia- and, if captured, to resist enemy interrogation,
ble intelligence and effective counterintelligence. adhere to the code of conduct, and escape if possi-
Counterintelligence provides a significant contri- ble. Evaders and recovered US prisoners of war
bution to friendly tactical cover and deception are valuable counterintelligence sources for ob-
(TC&D) and operations security (OPSEC) activ- taining information concerning enemy intelligence
ities. activities, including subversion.
b. All units have counterintelligence responsi-
8-2. Counterintelligence Measures
bilities since they must implement appropriate
a. Defensive. Defensive counterintelligence counterintelligence measures to keep information
measures are designed to conceal information on their activities, locations, and disposition from
from the enemy. They include measures such as the enemy. Some units such as US Army Security
operational security, personnel security, security Agency units and censorship units have special-
of classified or sensitive documents and materiel, ized counterintelligence functions based on the na-
installation security, signal security, movement ture of their missions. Every staff officer and com-
control, resources control, noise discipline, light mander must be aware of the counterintelligence
discipine, border and frontier security, popular aspects of his particular activity.
control, censorship, camouflage, and use of con-
cealment and electronic counter-countermeasures. c. Counterintelligence personnel are assigned to
Defensive counterintelligence measures are read- military intelligence companies, battalions, and
ily standardized in the unit SOP regardless of the groups (FM 30-9) to provide the command with
specific nature of the unit's mission. an operating element in the field of counterintel-
ligence. Typical staff agencies with which a coun-
b. Offensive. Offensive counterintelligence mea- terintelligence officer can expect to coordinate
sures actively block the enemy's attempts to gain are:
information or to engage in sabotage or subver- (1) G2 Operations—Development of collec-

8-1
FM 30-5

tion requirements, collection tasking of other than (11) ACofS, Gl—Personnel aspects of coun-
counterintelligence organizations, integration of terintelligence.
counterintelligence information, information of (12) Adjutant General—Assignment of per-
counterintelligence interest, security training. sonnel to sensitive positions, security of message
(2) G2 Reconnaissance and Surveillance— center operations, reproduction of classified docu-
Sorties to check countersurveillance measures. ments, TOP SECRET control.
(3) ACofS, G3—Operational security, coun- (13) Surgeon—Security implications of drug
tersurveillance and counterreconnaissance mea- abuse.
sures, tactical cover and deception operations. (14) Chaplain—Morale.
(4) Commander, Supporting USASA Organi- (15) Inspector General—CI support of
zation—Signal security. inspections.
(5) ACofS, G4—Critical installations, lines (16) Staff Judge Advocate—Legal aspects of
of communications, rear area security, storage of counterintelligence investigations and activities.
special weapons. (17) Engineer—Barrier plan, LOG critical
(6) C-E Officer—Security aspects of signal points, camouflage.
arrays. (18) Indigenous officials—Selected counterin-
(7) ACofS, G5—Control of civilians. telligence liaison.
(8) Civil Affairs—Political intelligence, in-
d. Agencies such as the US Army Criminal In-
digenous officials.
vestigations Command (USACIC), Naval Investi-
(9) Provost Marshal—Military police intelli- gative Services Office, the Office of Special Inves-
gence, military police assets, physical security of tigations (USAF), the Coast Guard's Intelligence
restricted and other sensitive areas, security of Division, the State Department, the Treasury De-
PWs of CI interest, security of special weapons. partment, the Justice Department, and the De-
(10) Headquarters Commandant—Security fense Investigative Service perform functions
of the TOC. that assist Army counterintelligence operations.

Section II. COUNTERINTELLIGENCE OPERATIONS

8-4. General situation. Denial of information to the enemy is


a. Operational Categories. Counterintelligence one of the most important aspects of counterintel-
operations may be divided into the three general ligence operations at the tactical level and re-
categories of counterintelligence investigations, ceives greater emphasis during actual operations.
counterintelligence services, and counterintel- Counterintelligence operations within the field
ligence special operations. Counterintelligence in- army under tactical conditions generally consist
vestigations include specific investigations of indi- of personnel security; physical security; special
viduals or incidents through personnel security weapons security; civil security; and counteres-
investigations (PSI) and complaint-type investi- pionage, countersabotage, and countersubversion.
gations (CTI). Counterintelligence services en- Each of these can comprise a major factor of
compass specific security services provided by operational security (OPSEC) operations and
counterintelligence personnel and units to assist programs. See FM 30-17 and FM 30-17A for de-
commanders at all echelons in planning, imple- tailed discussion of counterintelligence operations
menting, and maintaining proper and adequate and AR 530-1 for OPSEC.
safeguards against the threats of sabotage, espio- (1) Personnel security includes security
nage, and subversive activity. Special operations clearances and security education programs. Per-
are concerned with sophisticated and highly spe- sonnel clearance programs are based upon
cialized techniques in the areas of counteres- "proper clearance" and "need-to-know" and must
pionage, countersabotage, and countersubversion be designed to insure maximum protection for
(FM 30-17A). classified information while insuring flexibility of
command under tactical conditions. Security edu-
b. Functions in Combat Operations. The empha- cation programs are aimed at the protection of
sis of counterintelligence operations will vary classified information and security awareness on
with mission, echelon of command, and tactical the part of all personnel. Command security mea-
8-2
FM 30-5

sures require strict adherence to security regula- G2/S2 channels to maximize the overall security
tions on the part of the individual soldier. When posture of the installation.
considering security measures during the security (3) Special weapons security is concerned
education program, the following measures should with the security of components, ancillary equip-
be stressed : ment, and supporting documents of special weap-
(a) Personal or official information should ons systems during use, storage, and transporta-
not be carried on the person during tactical opera- tion. Counterintelligence personnel assist special
tions. weapons unit commanders and others with re-
(b) Incidents of agitation or other at- sponsibility for these systems in establishing ade-
tempts to promote disaffection or subversive activ- quate security measures. Assistance is provided in
ity must be reported immediately through intelli- the form of CI surveys and inspections, monitor-
gence channels. ing of shipments and deliveries to sites or depots,
(c) Receipt of unsolicited correspondence and in conducting effective security education pro-
of an inflamatory nature or correspondence seem- grams, and coordinating with other units (E.G.,
ingly designed to lower troop morale should be military police) responsible for providing security
reported through intelligence channels. for these systems.
(4) Civil security is concerned with all coun-
(d) Personnel must be encouraged to exer-
terintelligence activities affecting the civil popula-
cise self-censorship in their personal correspond-
tion of an area. Civil security operations are ex-
ence. tensive in commands with large territorial re-
(e) All correspondence, both personal and sponsibilities, heavily populated areas, and in cold
official, must be destroyed when no longer of war situations. Civil security measures include
value. population-resources control, civil censorship, se-
(/) Commanders, staff, and individuals curity screening of civilian labor, monitoring of
must be cautioned against establishing patterns suspect political groups, and industrial plant pro-
which may indicate a pending operation. tection. Close coordination should be maintained
(fir) Code of conduct requirements must with civil-military operations staffs, G5/S5, and
stress the individual's responsibility to escape and civil affairs units operating in the area.
evade and to resist enemy interrogation if cap- (5) Counterespionage, countersabotage, and
tured. This information should be stressed in countersubversion include both offensive and de-
briefings, promoted in security training, and in- fensive operations of a special nature directed
cluded in locally published directives and SOP. against hostile intelligence organizations and
(h) Individuals should be made aware of activities. At tactical levels these operations will
their communications security responsibilities. be oriented toward tactical operations and closely
(2) Physical security comprises a system of coordinated with military intelligence units hav-
controls, barriers, and other devices and proce- ing area intelligence responsibilities. See FM
dures to prevent destruction, damage, and unau- 30-17, FM 30-17A, and FM 30-18 for further
details.
thorized access to Army facilities/activities.
Counterintelligence personnel must provide instal- (6) Censorship, as an additional function of
lation and unit commanders with survey and counterintelligence, may be employed in combat
inspection services to insure protection against operations to prevent information from reaching
physical penetration and compromise of classified the enemy or to collect information. The G2 has
information and materiel. Physical security mea- primary staff responsibility for Armed Forces,
sures will be coordinated with military police per- and enemy prisoner-of-war and civilian internee
sonnel. The mobility and frequent displacement of censorship (AR 380-200, AR 380-235, and FM
installations, their proximity to the indigenous 30-28). Civil-military operations staff officers
population, and the complications presented by coordinate with the G2 in planning and imple-
combined operations. Recommendations for use of menting civil censorship (AR 380-83 and FM
45-20).
unattended ground sensors for physical security
should be coordinated with unit sensor officer.
Counterintelligence surveys and inspections by CI 8-5. Brigade and Battalion
units and signal security surveys conducted by US a. A basic counterintelligence function of the S2
Army Security Agency units complement each consists of implementing and supervising counter-
other. These efforts will be coordinated through intelligence measures directed by higher head-

8-3
quarters. Hs is responsible for reporting informa- pects of evasion and escape, and conduct in the
tion of counterinteiiigence interest through ccun- event of capture.
terintelîigence channels. At lower echelons the
emphasis is on denial (defensive) measures—
measures which are applied to prevent the enemy
from obtaining information—rather than detec- a. The counterintelligence section chief of the
tion (offensive) measures used to expose and neu- division MI unit is usually designated chief of the
tralize the enemy effort. Deception measures are counterintelligence branch of the G2 section and,
employed to mislead the enemy as to the true sta= as such, is responsible to the division G2 for im-
tus or purpose of friendly activity, personnel and plementation and execution of the division coun-
weapons, strength, disposition, and logistical terintelligence efforts.
buildup. These denial measures are directed and b. Counterintelligence operations at division
controlled by higher headquarters through the use level should include internal security measures
of standing operating procedures (SOP), commu- and counterintelligence coverage of the area for
nications-electronics standing instructions which the division is responsible. The primary
(CESI), communications-electronics operating in- concern of the division counterintelligence section
structions (CEOI), adminstrative orders is denying combat intelligence and target infor-
(ADMIN O), and operation orders (OPORB). mation to the enemy. Activities appropriate for
The application of the measures should be closely supervision by the division counterintelligence
coordinated with other command and staff person- section and performance by security personnel
nel, particularly with the S3 (who has staff re- may include—
sponsibility for deception measures), and the (1) Personnel security, physical security, and
communications officer.
special weapons security. These measures provide
b. The S2 functions as a staff advisor for the internal security to the division headquarters,
application of counterintelligence measures in an communications centers, and other division instal-
operational situation. Operational activities, such lations and areas through counterintelligence sur-
veys, inspections, checks, and personnel security
as the establishment of outposts, listening posts,
investigations. Specific counterintelligence mea-
and ambushes, which are normally S3 functions,
sures to be adopted for a tactical operation must
also have counterintelligence implications. These
be established early in the planning phase. Be-
activities are designed not only to protect the
cause these measures support the accomplishment
unit, but also to counter the enemy's collection
of the mission, they should be closely coordinated
effort. Therefore, the location of such positions or
with the command and staff elements concerned.
activities should be selected based on their secu-
Of particular concern are special weapons secu-
rity and operational values. To arrive at such a
rity measures for the neutralization of enemy tar-
determination, close coordination and joint plan-
get ■ acquisition efforts directed toward locating
ning by the S2 and S3 are required.
friendly nuclear weapons systems.
c. The counterintelligence section of the mili- (2) Screening of refugees, linecrossers,
tary intelligence company attached to the division defectors, and PW of counterintelligence interest.
provides direct counterintelligence support to the Refugees fleeing the battle area or evacuees being
division. Counterintelligence personnel are de- moved to safer locations pose a threat to friendly
ployed throughout the division area of responsi- tactical units. Large numbers of refugees or eva-
bility as needed, but are normally not deployed cuees may hamper the movement of friendly
lower than brigade. CI teams may be temporarily troops and supplies. In addition to hampering
attached to brigades in accordance with the tacti- friendly movement, refugee groups may be used
cal situation. These CI teams become fully respon- by hostile agents as a cover to infiltrate friendly
sive to the counterintelligence needs of the bri- positions, either for short-range or long-raRge
hostile activities. The control of civilians includ-
ing legal residents in the tactical area and the
d. The B2 assists in pïaianmg asid supervising detection of hostile personnel require close and
counterintelligence training conducted for person- continuous support on the part of combat units,
nel of lower echelons. The training off these troops military police elesnents, civil affairs teams, and
should include both unit and individual securfty counterintelligence elements within the area. Ref-
m®as«r®3 to imcrade the covmterintelligenc® as- ugees, linecrossers, and PWs are valuable sources

&=<}
FM 30-5

of information regarding enemy imposed security large influx of refugees into the division area and
measures, resource controls, and intelligence agen- the necessity of reducing an unusually large num-
cies within the denied area. ber of high-priority counterintelligence targets. In
(3) Identity, exploitation, and neutralization such cases, counterintelligence augmentation per-
of counterintelligence targets assigned to the divi- sonnel may be requested by the division G2 from
sion and targets of opportunity. Specific targets the G2 at the higher echelon.
include enemy intelligence agents; installations
used by enemy intelligence, counterintelligence or d. The division counterintelligence element will
paramilitary organizations; enemy communica- be concerned with informants having information
tions media; selected enemy personnel in the po- of immediate tactical significance. Informants as
litical and scientific area; records and files of in- sources of information of strategic and non-tacti-
telligence and counterintelligence interest, and— cal significance are of concern to the field army
and theater army counterintelligence units. Dur-
(a) Personalities. Known individuals and ing stability operations the divisional element will
their locations are listed and disseminated to all usually be concerned with internal and installa-
intelligence and nonintelligence agencies requiring" tion security only; informants will be the concern
this information. of the unit charged with area coverage.
(ft) Organizations. Identified political, un-
derground, partisan, insurgent infrastructure, or
8-7. Corps
other groups of counterintelligence interest are
listed by priority of importance to the command. a. Normally, corps has no area responsibility;
This information is disseminated to agencies con- therefore, the military intelligence company at-
cerned. tached to corps normally confines its counterintel-
(c) Installations. Buildings, offices, utili- ligence activities to internal security functions of
ties, storage facilities or other installations of the corps headquarters and to other security func-
counterintelligence interest are cataloged in the tions, such as military, civil, frontier and travel
appropriate CI file for further exploitation. security and censorship operations, which are re-
lated to the mission of the corps. However, there
(d) Lists. Each counterintelligence unit is
may be instances when nuclear battlefield condi-
responsible for the preparation and dissemination
of target lists. For ease in identification a color tions, independent actions, or increases in work-
load and responsibilities of the field army military
code has been established to indicate the area of
counterintelligence interest. intelligence company (counterintelligence) re-
quire the counterintelligence section of corps to
1. White List. Contains a listing- of
friendly targets which may require protection or assist in area coverage or counterintelligence op-
evacuation. erations that are normally the responsibility of
2. Grey List. Contains a list of targets counterintelligence personnel of field army and di-
vision.
whose purposes and motives are not known.
3. Black List. Contains a list of targets b. The corps is the lowest headquarters which
that in some manner pose a threat to the com- has a counterintelligence (CI) staff position. Typ-
mand. ical responsibilities of a coordinating staff CI
(4) Contributing information regarding officer are as follows :
enemy intelligence collection capabilities to the G2 (1) Advises on CI aspects of operations,
for TC&D operations. The counterintelligence sec- counterespionage, countersabotage, and counter-
tion through its data base aids the G2 in determin- subversion measures, and censorship require-
ing the weaknesses and vulnerabilities of the ene- ments.
my's intelligence collection effort which might be (2) Prepares CI estimates, plans, directives,
susceptible to a TC&D operation. The section is reports, the CI portion of the intelligence annex
also cognizant of the ground truth which is pre- of operations plans and the CI portion of required
sented to the enemy intelligence collection effort periodic reports and develops counterintelligence
by the friendly force. collection requirements.
c. Frequently, situations may arise that are be- (3) Supports operational security and tacti-
yond the capability of the counterintelligence sec- cal cover and deception operations as required.
tion of the supporting MI Company. Examples (4) Advises on the counterintelligence as-
include the security screening of an abnormally pects of countersurveillance activities and assists

8-5
in insuring that appropriate countersurveillanc® and related actions which may require immédiat©
measures are carried out. action.
(5) Develops and administers a program foir (15) Insures the establishment and dissemi-
the safeguarding of defense information. nation as needed of counterintelligence target in-
(a) Promulgates security directives and formation and is responsible for source control.
procedures. (IS) Maintains, as necessary, counterintel-
(b) Directs the programming of CI serv- ligence situation map, counterintelligence mea-
ices. sures worksheet, counterintelligence collection
(e) Advises concerning security violations. worksheet, and other operational aids.
(17) Establishes counterintelligence security
(d) Recommends and directs or monitors
requirements for Tactical Operations Center and
investigations.
insures that the requirements are followed.
(e) Establishes requirements and directs (18) Advises the G2 on signal security mat-
or requests technical assistance for protection off
sensitive areas and areas utilized in accordance (19) Provides staff guidance regarding signal
with AR 381-14. security (SIGSEC) surveillance.
(/) Processes the designation of restricted (20) Programs security monitoring and re-
areas in accordance with AR 380-20. views USASA SIGSEC analysis reports.
(S) Prescribes and monitors a program of (21) Coordinates the signal security activi-
security indoctrination of personnel in accordance ties of supporting USASA organizations.
with AR 380-5 and AR 381-12.
(7) Administers the personnel security pro=
gram,, maintains a master file of clearances within a. Counterintelligence operations at field army
the HQ and supporting activities, and verifies are similar to counterintelligence operations at di-
clearances for access purposes. vision and include responsibility for area cover-
(8) Develops or controls counterintelligence age. Operations are broader in scope because of
operations within the command's area of respon- the greater number of units, the larger area in-
sibility. volved, and the requirement for longer-range
(9) Collects information and maintains files planning. The territorial responsibilities of the
regarding matters of intelligence interest and se= field army result in more extensive counterintel-
curity significance, prepares reports regarding in- ligence operations pertaining to civil security and
cidents and personnel of CI interest, and deter- special operations than at lower echelons. Field
mines appropriate dissemination of counterintel- army counterintelligence operations pertaining to
ligence information: civil security are based upon support of tactical
(10) Has operational control over the coun- operations as well as considerations for support
terintelligence section of the attached military in- of rear area security requirements.
telligence organization. b. The field army continually conducts counter-
(11) Monitors the CI investigative activities intelligence operations within the field army and
of intelligence elements attached to the HQ and corps areas. Such activities are coordinated witSi
subordinate units, promulgates directives relating the corps intelligence officer to avoid conflict
to CI activities, and levies requirements pertinent duplication of effort.
to CI coverage of the corps area. e. Normally, a counterintelligence team of
(12) Directs interrogations and debriefmgs field army military intelligence company (coun-
of individuals of counterintelligence interest, in- terintelligence) will provide area counterintel-
cluding military evaders and escapees, members ligence coverage for each corps area. Other teams
of reconnaissance, espionage, sabotage and guer- will be so located as to maintain effective counter-
rilla organizations, and selected civilians. intelligence coverage in the remaining field army
(13) Performs counterintelligence liaisoB area. The counterintelügence element may be aug-
with counterintelligence security, police, and mented as necessary by personnel from theatei?
otfce? appropriate agencies, both US and mdi.g®° counterintelligence resouirces.
Koms.
(14) Coordinates with appropriate operating ©-©o Aray @7@K¡p)
personnel and agencies in sensitive investigations Army group has no territorial responsibilities saaû

¡X3
FM 30-5

conducts only such counterintelligence operations (1) Personnel security investigations and
as are necessary to maintain the security of the complaint type investigations.
army group headquarters. Counterintelligence (2) Counterintelligence surveys and inspec-
plans of army group are usually general in nature tions.
and take the form of policy guidante to coordinate (3) Counterintelligence support for Army
counterintelligence operations of subordinate nuclear weapons systems and facilities.
units. Major emphasis is placed upon security of (4) Counterespionage, countersabotage, and
military operations. This involves considering countersubversion operations.
enemy activities which threaten military security
(5) Interrogation of suspected guerrillas and
and the necessary civil and military security
prisoners of war captured in the TASCOM area
countermeasures. Counterintelligence operations
who are of counterintelligence interest.
in support of the army group cover those of sub-
ordinate units. (6) Operation of a central records facility
(CRF) on information of counterintelligence in-
terest within the theater.
8-10. Theater Army Support Command
(TASCOM) (7) Assistance in the security education pro-
gram for TASCOM personnel.
a. The TASCOM commander has the responsi-
bility for rear area security throughout the com-
8—11. Theater Army
munications zone down to the field army rear
boundary. The TASCOM commander normally a. Theater army counterintelligence activities
delegates this responsibility to the commander of are usually confined to the coordination of opera-
the theater army area command (TAACOM). To tions of subordinate commands, the administra-
assist in the performance of rear area security, a tive control of counterintelligence personnel as-
military intelligence group, counterintelligence, is signed to the theater echelons, and the conduct of
assigned to TAACOM. This group provides coun- highly specialized counterintelligence operations
terintelligence support for all installations and (FM 30-17 and FM 30-17A). The theater army
activities in the communications zone, to include coordinates and supervises counterintelligence op-
the headquarters of theater army and TASCOM. erations by—
(1) Publishing policy statements and direc-
b. Denying the enemy information of the sup-
tives.
plies, service installations, nuclear weapon sys-
tems, and transportation and communication (2) Planring arid supervising the assumption
means, and their protection against sabotage, are of counterintelligence control of army rear areas
vital to the accomplishment of the TASCOM mis- by TASCOM when the field army moves forward.
sion. Thus, TASCOM requires extensive counter- Coordination usually takes place between the ar-
intelligence operations of all types. Although the mies and TASCOM or the TAACOM.
scope and emphasis may vary, counterintelligence (3) Coordinating the activities of subordi-
procedures and techniques are similar to those at nate commands to insure complete counterintel-
field army level. ligence coverage.
(4) Planning the procurement of counterin-
c. The subordinate military intelligence compa-
telligence specialists.
nies of the military intelligence group (counterin-
telligence), normally are attached to the area sup- b. The theater army commander exercises oper-
port groups to provide area coverage throughout ational control over the military intelligence
the communications zone. Strengths may be group, theater army, assigned to his command.
shifted to cope with varying workloads and levels This MI group provides specialized support, such
of activity. Companies are responsive to the staff as theater-wide special operations and technical
intelligence or security officers of the area support intelligence analysis, which requires centralized
groups although operations are centrally coordi- control and direction. The counterintelligence ele-
nated at the group headquarters under the staff ment of the military intelligence group is a mili-
supervision of the ACof S, security, plans, and op- tary intelligence detachment, counterintelligence.
erations, TAACOM. The following functions con- The detachment conducts CI special operations in
stitute most of the workload of the military intel- support of national, theater, TA field army, and
ligence group (counterintelligence) : TASCOM requirements.

8-7
FM 30-5

8—12. Counteríntelligence Support to the are concerned with internal security of their com-
Theater Army Civil Affairs and Air mands. The air defense command requires coun-
Defense Commands teríntelligence support to insure the protection of
The counteríntelligence assets of the theater army weapons and target acquisition means. The civil
provide counteríntelligence support to the theater affairs command requires counteríntelligence sup-
army civil affairs and air defense commands. port directed toward civil security to include the
Both the civil affairs and air defense commanders civil aspects of port, frontier, and travel security.

Section III. COUNTERÍNTELLIGENCE PLANNING AND ORDERS

8-13. General sures or increased emphasis on current counter-


measures.
a. Counteríntelligence planning is accomplished
concurrently with the planning and conduct of b. The estimate is based on knowledge of the
theater army operations plans and policies and order of battle of enemy units and agencies which
include both offensive and defensive aspects. collect intelligence data and conduct sabotage and
Counterintelligence plans at lower echelons are in- subversive activities—of special interest are orga-
creasingly detailed but flexible to insure adequate nization, training, equipment, doctrine, tech-
support for all phases of operations of the sup- niques, and deployment.
ported units.
c. The counterintelligence estimate is applicable
b. Planning the counterintelligence measures in to all echelons of command. However, a written
support of any operation is concurrent with the estimate will not normally be prepared below divi-
planning and conduct of the operation. It begins sion. The counterintelligence estimate is normally
with the inception of the operation plan and con-
prepared for the intelligence officer by the chief of
tinues until the operation is completed. The proce- the counterintelligence branch, G2 section. In pre-
dures used in counterintelligence planning gener- paring such an estimate the counterintelligence
ally are similar to the planning of the collection branch chief must consider the entire range of
effort described in an earlier chapter. enemy intelligence, sabotage, and subversive capa-
c. The counterintelligence officer has three sepa- bilities. He, therefore, must obtain detailed infor-
rate roles in carrying out his responsibilities : mation from all available sources such as ASA,
(1) He directs intelligence agencies in obtain- other branches within the G2 section, other staff
ing intelligence concerning the enemy's reconnais- sections, air defense units, engineer elements, civil
sance, battlefield surveillance, signals intelligence, affairs and PSYOP units, MI elements, Air Force,
guerrillas, espionage, sabotage, and subversion etc. The counterintelligence estimate may be pre-
capabilities. pared in support of a single tactical operation or
(2) He is collector and producer of intelli- in support of a long-range broad mission assigned
gence concerning the enemy's intelligence capabil- to a unit. The format of a counterintelligence esti-
ities, especially his covert capabilities. mate may be found in appendix M.
(3) He plans for, recommends, and monitors
counterintelligence measures throughout the en- 8-15. Counterintelligence Measures
tire command. See FM 30-17 for more details on Worksheet
combat counterintelligence operations.
Based upon the conclusions reached in the coun-
terintelligence estimate, the counterintelligence
8—14. Counterintelligence Estimate measures worksheet is prepared or revised. This
a. The counterintelligence estimate is an evalua- worksheet (fig 8-1) is an essential aid in counter-
tion of the enemy's intelligence, sabotage and sub- intelligence planning and is the basis for prepar-
versive capabilities to determine the relative ing counterintelligence plans, orders, and re-
probability of enemy adoption of these capabili- quests. It is designed to assist the intelligence
ties. It includes the effects of these capabilities on staff officer in developing a comprehensive and
friendly courses of action, how effectively existing detailed listing of defensive and offensive intelli-
friendly countermeasures can negate enemy capa- gence countermeasures required for a specific op-
bilities, and the need for additional countermea- eration. It also includes the identificatipn of

8-«
FM 30-5

units/agencies which are recommended for exe- mentation of a simple security procedure to aug-
cuting the countermeasures as well as appropriate mentation of a cover and deception operation.
staff coordination required.
b. The intelligence officer's principal contribu-
tion to the commander's operational security con-
8-16. Counterintelligence Plan sists of the formulation of the counterintelligence
a. One of the problems of modern warfare is to plan. It is a systematic listing of all intelligence
deny knowledge of impending operations to the countermeasures to be carried out by a command,
enemy, who seeks that knowledge through use of indicating the units/agencies responsible for the
varied and sophisticated intelligence means and execution of each task. It is prepared from the
battlefield surveillance capabilities. In addition, counterintelligence measures worksheet, and,
the order and logic of our established staff proce- when completed, becomes an appendix to the intel-
dures and command decision-making process con- ligence annex to the operation order or is included
stitute vulnerability for prediction by the enemy. in paragraph 6 of the intelligence annex. The G2/
The commander must, therefore, insure that all S2 must continuously coordinate with G3/S3 on
elements of his command contribute to the imple- proposed intelligence countermeasures. The coun-
mentation of operational security measures which
terintelligence plan, or parts of it, may be dissem-
are designed to preserve the element of maximum
surprise in the conduct and planning of tactical inated in message form or through a fragmentary
operations. Such measures are both defensive and order. A sample counterintelligence plan format
offensive in nature and may range from the imple- may be found in appendix V.

UNIT:
Period covered: To;

(1) (2) (3) (4) (5)


Phases or periods SOP counter measures Additional counter Units/agencies responsible for execution Instructions, notes for
of operation requiring emphasis measures to be of countermeasures future action, and staff
adopted coordination measures.

Figure 8-1. Counterintelligence measures worksheet.

8-9
FM 30-5

CHAPTER 9

ADDITIONAL INTELLIGENCE CONSIDERATIONS

Section I. SMALL UNIT INTELLIGENCE

9-1. General 9—2. Requirements for the Attack


a. This section provides the small unit com- a. In order to execute his attack order success-
mander with additional guidance in determining fully, the company commander requires timely
his intelligence requirements and in formulating and accurate intelligence concerning the enemy's
means and methods for the collection of informa- capabilities. In general, the commander will al-
tion and the dissemination of information and in- ways require information on the enemy and the
telligence. The scope of intelligence activities at environment which will enable him to influence
the company level is much reduced from that at the outcome of the action through proper deci-
higher echelons. An urgent need does exist for the sions. Some examples of actions which are influ-
collection of information and the application of enced by the intelligence available to a com-
intelligence to the tactical plan or mission of the mander are—
company. (1) Positioning of the reserve.
(2) Employment of weapons.
b. The company commander must make the
(a) Location.
greatest possible use of the time and means avail-
(b) Type of fire.
able to him in order that collection of information
(c) Priorities for fire support.
and the use of resulting intelligence will fulfill the
maximum number of his requirements. The com- (3) Location of the company commander.
pany commander has a realistic and urgent re- (4) Commitment of the reserve.
sponsibility to supply the information needed by (5) Requests for support from higher head-
the battalion S2. It is largely through the efforts quarters.
of the individual companies that the battalion S2 (a) Fire support.
is able to produce the intelligence necessary for (b) Other support.
the commander and the subordinate elements of b. During stability operations the company
the command.
commander will require intelligence data concern-
c. One of the most difficult links in the intelli- ing not only the traditional aspects of enemy,
gence chain is the dissemination of tactical intelli- weather, and terrain, but also intelligence data
gence from the S2 to the company commander. oriented toward the sociological, political, and eco-
The company commander relies upon the battal- nomic aspects of the population.
ion S2 to furnish him with much of the intelli- c. Intelligence is important to the company com-
gence necessary for planhing his assigned mission. mander in the attack because knowledge of the
The S2 must make maximum effort to insure that manner in which the enemy is conducting his de-
the information flows down to small unit leaders. fense allows the commander to take a positive
Simple sketches, pencil INTSUM's, and annotated approach in influencing the action, enables him to
aerial photos are invaluable tools for planning at maintain the initiative and exploit his own suc-
the company level. cesses as well as enemy weaknesses, and it per-
d. The company commander, like the S2, is mits him to apply the force available at the most
often unable to satisfy all of his requirements for advantageous moment.
information. This means that he must establish a
working priority for his requirements after con- 9—3. Requirements for the Defense
sidering the mission of the company and the a. As in the attack, intelligence requirements
enemy situation as known afr the time. for the conduct of a successful defense will vary.

9-1
irVvl SS)—§

Generally, the following requirements will be c. Company as a Reserve Force.


given priority during the period prior to the (1) When a company is designated as the
enemy attack which can be anticipated in a de- reserve or as part of a larger reserve unit, plan-
fense situation : ning for employment in at least one, but usually
(1) Locations of avenues of approach into several roles is necessitated. The company com-
the friendly position. mander must use reconnaissance to ascertain the
(2) Locations of obstacles. best utilization of terrain for each role in which
(3) Locations and strengths of opposing his unit may be employed. Weather information
enemy forces, including his reserves. and its effect on terrain must be weighed and
(4) Locations of enemy automatic weapons. studied. Enemy capabilities as they affect each
(5) Locations of likely enemy assembly role must be determined. Since the company is in
areas. reserve, the opportunity for using organic means
(6) Weather forecasts and information. to acquire information is limited or nonexistent.
b. As in the attack information or intelligence Requests must be made of the battalion S2 for the
concerned with these requirements will enable the intelligence necessary to plan for the various mis-
company commander to take a positive approach sions anticipated. The S2, on his own initiative
to influence the action and will enable him to ex- and in coordination with the S3, must take posi-
ploit fully his own capabilities and the enemy tive action to provide the maximum amount of
weaknesses. (See chapter 3 for additional guid- available intelligence to the reserve force.
ance. ) (2) In reserve, the company commander will
frequently be charged with an area security re-
sponsibility. As a general rule when increased dis-
'Í/ML Diniî'tsOBôgtgoTie© ioqjtuiDO'simiOûTiÇs fep ©ffcs-
persion is necessitated by the enemy's capability
to employ nuclear weapons, the area security mis-
a. Withdrawal. A withdrawal conducted during sion will require utilization of most, if not all, of
daylight or at night poses definite intelligence re- the company's personnel. The security mission
quirements. One of the most important means of will necessitate the employment of some of the
fulfilling these requirements is reconnaissance. counterintelligence and security measures men-
The company commander must select routes to tioned in chapter 8.
assigned or designated assembly areas; these
routes should provide security from enemy obser- d. Other Actions. Regardless of mission or role,
vation and fire. Terrain and weather will play an the company commander is responsible for the
important part in selection of routes. Security for security of his unit. Insuring the security of a
company while it is in movement presents many
a withdrawal begins with the inception of plan-
problems. All security measures which do not in-
ning and continues until the movement is com-
pleted. Security must include both security for the terfere with the accomplishment of the mission
force and security measures designed to deny the should be implemented. Security measures must
enemy knowledge of the withdrawal before, dur- be developed for each situation on an individual
basis.
ing, and frequently after the action is completed.
b. Company as a Security Force. The company ©=i). [l(í\líl@DÍB§@[ñlg@ M©®lñl8 £W<2]5E(2]yQ
may be designated as a security force for the nest
The company commander must accomplish the S2
higher echelon or as a part of a larger security
functions since he has no personnel whose pri-
force for the division. Security forces are used to
mary duty is intelligence. With the urgent need
provide security, deception, and flexibility, and
for intelligence at this level, the company com-
add depth to the defense of a larger unit. Security
mander must organize his unit to provide for the
forces should have greater mobility than the
handling of collected information and the dissemi-
enemy ; a similar result may be achieved by use of
nation of intelligence.
deception, movement in darkness, and retention of
the initiative. The company commander continues a. Organic Collecting Agencies. All subordinate
to have responsibility for rapidly passing mfor= éléments of the company must be trained and pre-
mation and intelligence to the echelon controlling pared to function as collection agencies as a sec-
the security force. Requirements will be focused ondary mission. Available to the commander are
on terrain, reconnaissance, and the effects of ihe his tactical elements (platoons), his organic sup-
weather forecasts. porting weapons obssicverss, and each individual of

©=2
FM 30-5

the company who can observe enemy activity or gence is produced at higher echelons and is dis-
ts effect. The main problem in transmitting the seminated to lower echelons. The majority of in-
information available to the company commander, telligence used by the platoon and squad is pro-
and through him to the battalion S2, is one of duced at company or higher.
command emphasis on the training and conduct of o. Platoon Intelligence Requirements. As a
personnel to insure that items of significant infor- major subordinate element of the company, the
mation are recognized and reported expeditiously platoon comprises the main tactical echelon of the
to the commander. company. Needs will vary with the different types
b. Attached or Supporting Collection Agencies. of platoons within the company, based on the mis-
The company commander should insure that per- sion, assignment, and capabilities of each. Platoon
sonnel of attached or supporting units such as leaders will develop some intelligence information
forward observers of supporting ground surveil- at their level for use of the platoon and squad.
lance radar teams from the combat support com- Care must be taken, however, that the company
pany, and personnel manning outposts in the com- provides the broadest coverage and that informa-
pany area of responsibility report information of tion developed at platoon and squad level is
possible interest or significance to him for his con- viewed in its proper perspective. Effective train-
sideration. In addition, personnel of other sup- ing and supervision will increase the value of in-
porting arms such as a forward air controller or a formation reported by the individual Soldier. Pla-
naval gun fire spotter and reconnaissance ele- toon leaders must transmit expeditiously to com-
ments from the next higher echelon which are pany that information acquired. It must be recog-
attached to or operating in the unit area may nized that the effective production of intelligence
provide significant intelligence data to the com- requires the participation of all elements of the
pany commander. command.
b. Squad Intelligence. As the lowest tactical en-
c. The Company Commander's Intelligence tity of the company, the squad intelligence needs
Role. The company commander can analyze, col- are commensurate with the mission assigned to
late, evaluate, and produce intelligence on a lim- the squad. Because of the small size of squads and
ited scale for the use of his company and its sub- the limitation of the area of knowledge, most of
ordinate elements. This process is largely mental the squad's information requirements will be met
and instinctive, but it does encompass the ele- by higher echelons. Intelligence produced at squad
ments associated with the production of intelli- level is limited and subject to distortion unless
gence. A requirement exists for designation of correlated with intelligence developed at company
personnel and means of communication for re- and higher level. It is the squad leader's responsi-
ceiving the information from the collection agen- bility to insure the receipt of intelligence from
cies with some means of recording information in above and to disseminate it to each of the mem-
the absence of the company commander. The com- bers of the squad. Equally important is the squad
pany commander has the responsibility of insur- leader's responsibility for training the members
ing the uninterrupted flow of these items of infor- of his squad in intelligence matters, particularly
mation to the next higher echelon. in the need for immediate and accurate reporting
of all items of information (FM 21-75).
d. Dissemination. Equally as important as the
receipt of information and production of intelli- c. Company Patrols. Company-directed patrols
gence is timely dissemination to personnel and are those patrols that the company commander
units concerned with the use of these items. This feels necessary to maintain contact among ele-
requirement alone justifies the procedure of insur- ments of the company, adjacent units, and pro-
ing that certain personnel are assigned intelli- vide early warning and security. Battalion-di-
gence duties. In addition to reporting (disseminat- rected patrols are dispatched by the company
ing) information to the battalion S2, the company commander at the request of the S2 to obtain
commander must keep his assigned, subordinate, information, provide contact with adjacent units,
attached, and supporting elements informed. and serve as screening or counterreconnaissance
forces. These patrols are briefed and debriefed by
the S2 in coordination with the battalion S3. The
9-6. Intelligence at Lower Levels S2 includes in his daily patrol plan those patrols
Generally, information is collected at lower eche- which must be coordinated with higher and adja-
lons and flows up to higher echelons while intelli- cent units.

9-3
irtjvj S©=a

îosfeK DDo S^IKSOñL [iKM®^ii!K]¥Âl €©M[D)3TC©^Í

ty-I, (gsKorsiO moving cross-country and for living and fighting


for prolonged periods in extreme weather is an
œ. Information concerning extreme characteris-
essential intelligence requirement.
tics of weather and terrain is a prerequisite to the
initiation of an operation. In addition, the effects c. Preplanning is necessary to minimize the ef-
of these on both friendly and enemy courses must fects of weather extremes on intelligence collec-
be considered. tion efforts. Extremes of cold or heat affect the
operation of sensory devices ; prolonged periods of
b. Operations in extremes of weather and ter=
rain affect intelligence operations by creating reduced visibility Himit the effectiveness of recon-
unique intelligence requirements and by generally naissance/surveillance and the effectiveness of
impeding collection and dissemination of informa- visual and photographic capabilities; and sudden
storms place limitations on all battlefield surveil-
tion and intelligence. Specific intelligence require-
lance operations.
ments and problems posed by extremes of weather
and terrain are discussed in certain field manuals
of the 31-series. Paragraphs 9-8 and 9-9 empha-
size significant intelligence considerations. a. Extreme terrain features increase the com-
plexity or difficulty of the effort required to collect
needed information. Because of the extreme ter-
a. Provisions must be made for frequent rain variations, more detailed information is re-
weather forecasting and for rapid dissemination quired for planning purposes. Jungle areas re-
of forecasts to the lowest echelons. Forecasts quire close examination in order to penetrate the
must include special items of particular signifi- jungle cover; mountainous regions limit observa-
cance to the military operation. For example, tion, especially when the high ground cannot be
wind speed in arctic operations is extremely im- occupied ; and northern regions or deserts are con-
portant because of its use in determining the wind spicuous by their lack of easily identified and lo-
chill factor. In mountain operations, storms of all cated terrain objects.
types are a critical factor in the conduct of opera- b. Generally, areas of extreme terrain lack
tions. Weather forecasts and forecasting capabili- accurate geodetic and map coverage. This creates
ties must be responsive to these special conditions. a requirement for greater detail in the collection
Additional equipment or units may be required to of terrain information.
meet the need.
c. Early examination and evaluation of the
5. Extremes in weather affect intelligence re- collection efforts required and prior planning and
quirements concerning enemy capabilities. Spe- preparation will minimize collection problems
cific information of the enemy's capabiMties for during tlie conduct of the military operatioa.

SSSCOK) wmmi Twi ®^A¥i


(4) Weather information must be broader m
a. The production and dissemination of intelli- scope and more detailed; weather forecasts must
gence are influenced by the following characteris- be more frequent than for ground-based opera-
tions.
tics of joint airborne operations :
( 1 ) Planning is concurrent. (5) Counterintelligence measures are strin-
(2) Higher headquarters provide most of the gent and rigidly enforced. However, intelligence
information and intelligence for airborne units disseminated to subordinate units is as extensive
during the planning phase. and detailed as practicable.
(8) Tsrrain analyses are more detailed. Spe- b. Certain enemy eapafoilities receive special
cial emphasis is placed upon the location of suita- emphasis. Examples are his capability to employ
ble drop zones and assault aircraft landing zones. nuclear weapons, chemical and biological agents,
These locations are developed by means of a point and airstrikes against the airborne force in the
ïanding area study. departure area, en ircute, aad in th© objeetiv®

©^3
FM 30-5

area; his armor capability; and his air defense (3) Lack of opportunity for supplemental
capability (FM 57-1). ground reconnaissance prior to initiation of land-
ing.
9-11. Airmobile Operations (4) Difficulty in dissemination of intelligence
a. Initial Entry Into an Area of Operations. during the initial stages of the landing.
(1) Normal combat intelligence collection, b. Intelligence requirements that receive special
processing, and dissemination procedures will emphasis include information about beaches and
normally not satisfy initial intelligence require- the terrain inland to the beachhead line, including
ments without assistance from higher echelons. obstacles and demolitions on beaches and under
Increased requirements exist for maps, weather water ; weather conditions ; and current informa-
forecasts, and up-to-date intelligence on enemy tion of the enemy situation just prior to and dur-
antiaircraft capabilities, with dissemination down ing the assault landing (FM 31-12).
to company level. Airmobile operations are nor-
mally based on continuous offense with extensive 9-13. Unconventional Warfare
requirements for rear area security, population
controls, and heavy logistical support require- Intelligence requirements at all command levels
concerned with the conduct of unconventional
ments. Therefore, airmobile operations require si-
warfare operation encompass the entire spectrum
multaneous consideration of strategic and tactical
of intelligence. Unconventional warfare includes
information for defensive and offensive opera-
the three related fields of guerrilla warfare, eva-
tions at all times by all echelons.
sion and escape, and subversion, conducted within
(2) Battalion and brigade commanders are
hostile areas by predominately indigenous person-
forced in many instances to make their own intel-
nel, usually supported and directed in varying de-
ligence estimates. This is due primarily to the
grees by an external source. The planning and
rapid pace of decision-making in airmobile opera-
conduct of unconventional warfare encompasses
tions. The battalion and brigade S2 must develop
the entire spectrum of intelligence and counterin-
a much broader awareness of intelligence require-
telligence activities at all command levels con-
ments and prepare increasingly detailed and com-
cerned with this type of warfare.
prehensive briefings for their commanders.
a. Guerrilla Warfare.
b. Stable Base Area of Operations.
(1) Intelligence requirements include terrain (1) Planning and conduct of intelligence and
analyses of landing areas, detailed and frequent counterintelligence activities to support guerrilla
weather forecasts and accurate locations of enemy forces are normally centralized in the J2 and J3
air defense installations. staff sections of the Joint Unconventional War-
(2) The determination of aerial avenues of fare Task Force (JUWTF) of the unified or speci-
approach and landing zones are major require- fied command. Once unconventional warfare oper-
ments. Normally, these requirements cannot be ational areas (UWOA) have been designated by
fully accomplished by ground reconnaissance. For the theater commander, Army Special Forces op-
areas immediately in front of the FEBA, infor- erational detachments are infiltrated into these
mation can be obtained from the units in contact. areas. To provide a focal point for planning and
Aerial reconnaissance (visual, SLAR, IR) is em- conducting unconventional warfare operations in
ployed in the objective area and in other areas these areas, Special Forces is given the primary
beyond the capability of the units in contact (FM task of organizing an area command headquarters
57-35). for integrating Special Forces operational detach-
ments and the resistance forces. (See FM 31-21
and 31-21A for details.)
9-12. Amphibious Operations
(2) Guerrilla forces conducting overt offen-
a. Special considerations that affect intelligence sive operations in UWOA will be primarily inter-
requirements for amphibious operations include ested in acquiring combat intelligence for use in
the following: their own operations. To this end, guerrillas nor-
(1) Length of time elapsing between the ini- mally will employ conventional information gath-
tiation of planning and the execution of the opera- ering techniques such as patrols, observation
tion. posts, and area and target site reconnaissance,
(2) Dependence upon higher echelons for in- supported in varying degrees by information from
formation and intelligence. their auxiliary and underground forces. Guerrilla

9-5
forces must employ agent/informant networks (3) Hequirements concerning enemy proce=
Ç/ry-f
gs.::aii :£ÍÍ02í/irAÍeIligs3ice in support of dures and techniques in countering the evasion
operations. The expansion of insurgent operations and escape operation are collected primarily by
increases the problem of security ; therefore, guer- interrogation of knowledgeable prisoners of war,
rilla forces must have a well-developed counterin- refugees, escapees, and evaders.
telligence capability to prevent enemy security (4) Details on evasion and escape are dis-
forces from penetrating the main guerrilla force cussed in FM 21-73 and FM 21-77A.
organization by infiltrating informants or agents.
(3) Intelligence requirements in support of c.Subversion.
military objectives are dictated by the nature and (1) Subversion consists of those actions de-
scope of unconventional warfare operations to be signed to reduce the military, moral, political, eco-
conducted in the designated UWOA. They are pri- nomic, or psychological strength of any enemy.
marily directed toward information which— One of the objectives of indigenous underground
(a) Provides a thorough background resistane groups, in coordination with its guer-
knowledge of the UWOA area to include an inti- rilla forces, is to attempt to undermine or over-
mate understanding of the population within the throw a government or occupying power.
UWOA and an evaluation of their resistance po- (2) The success or failure of the under-
tential. ground resistance movement to operate effectively
(&) Aids in determining political trends. in a hostile environment hinges largely on the
(c) Aids in determining enemy activities effectiveness of its intelligence networks to pro-
and capabilities. vide the intelligence needed for planning and con-
(d) Supports guerrilla psychological opera- ducting subversion against the enemy government
tions. or occupying power. These intelligence networks
(e) Supports the expansion of guerilla op- must be sufficiently broad in scope to cover every
erations. facet of the society and government, including
(/) Provides weather and terrain data. enemy military forces. Correspondingly, it must
(4) The employment of guerrilla forces as have a well-developed counterintelligence capabil-
intelligence collection agencies for commanders of ity to prevent opposition security forces from
theater and component forces is restricted by penetrating vital operational elements of the un-
communication limitations and the nature of their derground.
collection effort to support their own operations. (3) Due to the sensitive nature of such
The security of guerrilla forces dictates restric- operations and the need to communicate with un-
tions on radio traffic and, consequently, the derground leaders in utmost secrecy, military
amount of intelligence that can be provided. This intelligence requirements levied on the resistance
limitation notwithstanding, guerrilla forces are underground organization may be greatly circum-
ideally suited to contribute to the theater intelli- scribed. Normally, this will be accomplished
gence effort—chiefly through the collection of in- through the area command headquarters in the
formation in the areas of target acquisition, dam- UWOA. However, other channels of communica-
age assessment, and enemy order of battle (FM tion may be used (FM 31-21A).
31-21 and FM 31-21 A).
b. Evasion and Escape.
(1) Information and intelligence of the area a. The enemy's chemical and biological capabili-
of operations and enemy procedures and tech- ties and the effects of chemical or biological
niques are required for an effective evasion and agents on the area of operations are considered in
escape program. analyses of the area of operations, intelligence es-
(2) Information on the area of operations is timates, and collection plans. The surprise with
collected using all available resources in addition which chemical and biological agents can be used
to normal tactical intelligence collection methods. and the difficulties involved in the immediate de-
Specific requirements include information on usa- tection of their use—but particularly verification
ble routes for escapees and evaders, cover and of a biological attack—make indications of the use
concealment, sources of water and subsistence, of these agents an important element in intelli-
areas to be avoided, areas safe for use as removal gence collection planning.
areas, borders, and the attitude of the local popu-
lation according to social, ethnic, religious, politi- b. Current US policy renounces the use of tox-
cal, and economic groups, if possible. ins and biological agents as methods of warfare

&=^
FM 30-5

and first use of lethal and incapacitating chemi- 9-16. Rear Area Operations
cals (FM 101-40). Effective use of chemical mu-
It is anticipated that there will be a major threat
nitions or agents, as a retaliation in kind, requires
in the form of guerrilla attacks, sabotage.and
information and intelligence on targets and target
terrorist attacks in the areas to the rear of corps
areas for attack by friendly forces. Predictions
boundaries in future conflicts. These attacks may
are required as to the effects of the characteristics
be generated by organized enemy special forces
of the area of operations on the use of chemical
type units, local partisans or other individuals,
munitions or agents. Specifically, information is
and small groups hostile to US forces. When such
required on the surface wind speed and direction,
hostile conditions prevail, they generally parallel
temperature, temperature gradient, relative hu-
the threat presented in stability operations. Many
midity, and precipitation. In addition, data on the
of the operational concepts of stability operations
type of soil, surface contour, and vegetation, and
intelligence will also apply in rear area protection
civilian population are needed. Physical protec-
(RAP) operations.
tion available to target personnel (such as fox-
holes, overhead cover, or bunkers) is needed for a. The threat will be subversive and clandestine
accurate effects assessment. Further personnel in nature and involve the local population. For
protection afforded the enemy by protective cloth- this reason, maximum use must be made of civil
ing is a required item of information (FM 3-10 affairs and military police units in the area.
series and TM 3-240.)
b. Maximum use must be made of host country
c. The unit counterintelligence plan includes or indigenous police and security elements in ob-
measures to prevent the enemy from learning of taining intelligence.
our intentions regarding the use of chemical c. Intelligence information will need to be dis-
agents or other countermeasures. seminated on a wide basis to the following as a
minimum:
9-15. Psychological Operations (1) Military police, Criminal Investigation
Division (CID), and other security elements.
a. Psychological operations are conducted (2) Local police and security elements, when
against enemy troops and hostile civilians to cause appropriate.
disaffection. They are directed toward friendly or (3) Separate and often isolated facilities in-
neutral civilians in order to win their support or stallations.
to influence their behavior so as to preclude inter- (4) Transportation as well as military police
ference with US tactical operations. In stability when information indicates possible threats to
operations the objectives of PSYOP programs are lines of communication.
to gain the support of the people for the host (5) Rear area operations center (RAOC) ele-
government, exploit PSYOP susceptibilities of the ments.
insurgent elements, provide a psychological basis (6) Civil affairs elements.
for accepting and rehabilitating returnees, (7) Area commands and headquarters.
strengthen friendship and cooperation between (8) Tenant and transient units in an area.
the host country and the US, and influence neu-
tral groups. 9-17. Mine/Countermine Operations
b. Intelligence is required concerning the enemy a. In most areas of the world, mine/counter-
and hostile and friendly civilians to identify sus- mine operations will play an important role in
ceptible groups and their potential vulnerabilities ground warfare. Knowledge or lack of knowledge
toward which psychological operations can be di- of the enemy's mine capabilities and his ability to
rected in order to cause surrender or disaffection. counter friendly mine efforts could contribute im-
c. Intelligence is required concerning personnel mensely to success or failure on the battlefield. As
whose loyalties are unknown to help identify key evidenced by recent unconventional warfare expe-
individuals or groups and those social, ethnic, reli- riences in Vietnam, enemy mine and boobytrap
gious, political, or economic attitudes toward efforts can take a heavy toll in personnel casual-
which we can direct our psychological operations ties and vehicle losses.
in order to win their support.
6. Accordingly, a concentrated effort must be
d. For detailed psychological operations intelli- taken for the continuous collection of all informa-
gence requirements see FM 33-1 and FM 33-5. tion on enemy mining activities in order to pro-

9-7
PM §¡®~§

duce the necessary intelligence or. enemy patterns enemy mine threat constitutes a serious impedi=
of employment by frequency, area, type and ment to friendly operations, consideration should
trend. Experience has shown that adequate infor- be given to the creation of a theater mine warfare
mation will reveal definite operational procedures center. This center would receive all information
and preferred areas for the enemy's mining effort. on enemy mines and mine doctrine. After evalua-
Thus, defining the mine threat will provide a real- tion and processing, this intelligence would be dis-
istic basis for committing the proper resources to seminated to all troop units and personnel in the
counter it. theater of operations. Creation of the theater
mine warfare center, however, would not lessen
c. In addition to intelligence received from in=
the G2/S2's responsibilities in the detection, re-
telligence units in the field, spot reports of enemy
mines and minefields or of attempts of the enemy porting and dissemination requirements pertinent
to lay mines should be encouraged and solicited to enemy use of mines in the forward battle area.
from unit personnel, friendly patrols and indige-
nous personnel in the area. e. For further information on reporting both
friendly and enemy mines and minefields, see FM
d. In large theaters of operations, where the 20-32.

íosímiñi m. nnneüM« WMFAH! (m?)


CM]©. VttjDonso-tôiMoG'DQs ©Ç OfJOiïîg© sures (ECCM) program to combat enemy ECM
(FM 32-20).
c. All frequencies of the electromagnetic spec-
a. The unimpeded performance of communica- trum are vulnerable to enemy ECM. For example,
tions-electronics (C-E) systems is desirable for the airborne infrared sensor, despite its passive
effective military operations. Degradation of C-E state, can be subjected to countermeasures such as
systems will seriously impair the command and jamming by high-intensity light sources or decep-
control of a unit and adversely affect the capabili- tion through the deliberate placement of heat dis-
ties of intelligence, operations, and support sys- persing objects. The overall military use of these
tems to effectively support tactical operations. devices occurs in communications, target acquisi-
.&. All radiations, intentional and unintentional, tion and tracking, battlefield surveillance, missile
emanating from C-E equipment such as radios, guidance, weapons fusing, and control systems
radar, and electro-optical devices are susceptible and navigational aids.
to interception, direction-finding and analysis.
The intelligence officer must be aware of the <gM <i>. Qi¡a11<aDQ5§j3¡ñ¡®a (QÄe/s MG 'm BM
threat posed by hostile SIGINT and EW activities The intelligence officer has two responsibilities in
which seek to disrupt, deceive, harass, or other- the area.of EW. He must plan and coordinate
wise interfere with the friendly command and inteligence support for friendly ECM and othep
control capability and its supporting intelligence EW operations. He must evaluate the vulnerabil-
activities. The enemy's exploitation may be ori- ity of friendly C-E systems to hostile EW.
ented toward signals intelligence (SIGUNT) sup-
port of his fire and maneuver elements, his intelli- a. Vulnerability of Friendly C-E Systems. The
intelligence offiecr must consider the potential vul-
gence operations, or electronic warfare support
nerability of C--E systems to hostile ECM. He
measures (ESM) in support of electronic counter-
must coordinate with other staff elements to in-
measures (ECM). Essential elements of friendly sure the unimpeded interface of collection assets,
information (EEFI) are types of information communications media and data processing re-
that a commander would not want known to an sources. Degradation through electronic jamming
enemy about his unit. EEFI are invaluable in de- or deception will have an adverse effect on the
termining what information must be denied an entire command. The G2/S2 coordinates with t!he
enemy SIGINT effort. The consequences of inter- G3/S3 and the C-E staff officer to insure th&t
ception and exploitation can be reduced through personnel engaged in such C-E activities reeeiv®
the adoption and enforcement of the strictest sig- adecúate training and supervision in SIGSEC
nal security practices to minimize enemy exploita- procedures and electronic counter-eounitermea-
tien and a strong electronic couater-coomtermea- sures (ECCM) techniques.

©=§
FM 30-4

(1) In the case of jamming the enemy seeks operations must be obtained from all available
to deny the effective use of C-E and sensor equip- sources. The enemy's jamming and deception po-
ment by interferring with a single frequency or a tential must also be determined for the develop-
range of frequencies. The specific effects on the ment of effective ECCM circuitry and operational
victim equipment depend on the enemy's selection procedures. Tactical commanders also use .this in-
of jamming modes, their modulation by interfer- formation for evaluating the effectiveness of
ence signals, and the kinds of C-E equipment, friendly and enemy EW operations.
both friendly and enemy. For additional detail (2) The data required for effective employ-
refer to FM 24-18 and FM 32-20. ment of ECM is referred to as electronic warfare
(2) Hostile electronic deception can seriously support measures (ESM). This information is de-
degrade the capabilities of all our C-E systems as rived from all-source intelligence and may consist
well as operations, intelligence, combat support, of the following information requirements :
and combat service support functions. Imitative (o) Electronic order of battle, including
deception is the intentional introduction of fraud- communications and noncommunications emitters.
ulent traffic into our C-E system. Hostile impostor (b) Technical parameters of C-E and EW
traffic passed over radio nets carrying intelligence equipment (e.g., operating frequencies, power
information could cause the production of faulty input, and modulation type).
intelligence. The enemy, through the deliberate (c) Communicative procedures.
radiation, reradiation, alteration, absorbtion, or (d) Overall SIGINT and DW capabilities.
reflection of electromagnetic energy can cause (e) Communication procedures (notably
false target presentations on friendly sensors for imitative deception).
which distort the actual enemy situation. The (/) SIGINT capability (notably for manip-
likely result is a miscalculation of enemy capabili- ulative deception).
ties. Manipulative deception employing the ene- (3) The intelligence officer is responsible for
my's own electromagnetic radiations is a deceptive insuring coordination among the G3/S3, C-E
tool directed against friendly SIGINT, surveillance officer and the SIGINT Support Element/Elec-
and target acquisition resources. For details refer tronic Warfare Element (SSE/EWE) through
to FM 31-40 and FM 32-20. the EW/Cryptologic staff officer relative to the
b. Intelligence Support of EW. intelligence aspects of current and planned EW
(1) The vulnerability of enemy C-E systems operations. For example, the potential tactical ad-
to EW can be exploited by friendly forces to fur- vantages to be gained from jamming hostile radio
ther the attainment of tactical objectives. In order transmissions must be weighed against the possi-
to plan and conduct EW operations, intelligence ble loss of SIGINT. For further details regarding
data concerning the enemy force and the area of electronic warfare see FM 32-20.

Section V. TACTICAL COVER AND DECEPTION (TC&D)

9-20. General tions and measures which are being employed


against friendly forces. (See FM 31-40 for fur-
a. With the employment of highly sophisticated ther details on TC&D.)
methods, techniques, and equipment in modern
b. Communications-electronics cover and decep-
warfare, deception is an increasingly effective in-
tion is of paramount importance to the success of
strument of war for the opponent as well as for
TC&D operations (FM 31-40 and FM 32-20).
ourselves. Tactical cover and deception can be em-
The communications-electronics staff officer is
ployed effectively both in cold war and in actual
capable of furnishing advice and assistance rela-
hostilities. It is essential that indications of decep-
tive to communications-electronics aspects of all
tion efforts against friendly forces be uncovered
and the true intent be identified as early and as cover and deception operations.
expeditiously as possible. Hostile deception will c. Continued success of TC&D operations de-
probably employ the same visual, electronic, sonic, pends in part upon convincing the enemy that his
olfactory measures which friendly forces use failure was due to faulty evaluation of informa-
against the opponent. Intelligence personnel must tion. To accomplish this, the normal pattern of
continually analyze hostile activities from the op- intelligence activities is continued during and
ponent's point of view to unmask deception inten- after TC&D operations.

9-9
im s®-s

©■ ®\ )^so ©Sso7 L02oo^©jîo:i5;:JjecQ8 intelligence is produced by the coordinated use of


DOT] Y€iiis) all available normal collection means and full ex-
ploitation of communications intelligence capabili-
a. Tactical cover and deception piar.- (a G3 ties.
staff responsibility) are based particularly upon
knowledge of the enemy vulnerabilities, to include
weaknesses, peculiarities and recent significant
activities which are exploitable by TC&D means. The security essential to successful TC&D opera-
In planning TG&D operations, the intelligence of- tions is dependent upon effective counterintel-
ficer is responsible for providing information and ligence. The counterinteiligence plan (para 8-17)
intelligence on enemy intelligence collection sys- must prescribe the necessary countermeasuers
tems, to include means, capabilities and limita- within the overall OPSEC efforts of the command
tions ; how the enemy processes information to to insure the enemy does not obtain prior knowl-
include weak links in their intelligence cycle and edge of the operation. Considerations for security
what the enemy considers to be indicators of discipline, personnel, documents, material, instal-
friendly capabilities ; the enemy command level lation security, and censorship are incorporated
which is expected to react to friendly TC&D ef- into counterinteiligence planning for TC&D. This
forts; and personalities and weaknesses of the detailed effort is coordinated with the next higher
enemy commander and his key staff officers who and adjacent units when appropriate. Tactical
react to our efforts. This information and intelli- cover and deception instructions are disseminated
gence is derived in part from studies of enemy only on a need-to-know basis. To safeguard this
procedures and order of battle on enemy units information, special procedures such as restricted
that collect and process information. areas, security checks, special passes, and special
b. The G2 is responsible for TC&D efforts in handling of documents and equipment may be es-
the areas of combat intelligence collection, coun- tablished as necessary.
terintelligence, security, and certain aspects of
electronic deception and jamming. Through these
functions he provides information on the enemy The basic principles of camouflage are followed in
commander, his capabilities, and his collection re- an offensive operation as well as in a static or
sources required in developing the TC&D estimate defensive situation. The responsibility for camou-
and plan. He manages the tasking of ground and flage rests on the commander. All troops must be
aerial surveillance assets and coordinates with the aware of the principles and techniques of camou-
EW/Cryptologic staff afficer to insure the affec- flage. Technical advice and assistance are pro-
tive utilization of these SIGINT/EW assets is vided by the engineers. The division engineer,
accomplished without compromising sensitive in- under the general staff supervision of the division
telligence sources. Inherent in these responsibil- G3, is responsible for camouflage planning in
ities is the necessity of providing accurate assess- coordination with the division G2 and G4. In a
ment of enemy capabilities and maintaining a fast-moving offensive situation it is doubtful if
constant vigil for situations in which TC&D may time will allow extensive artificial camouflage
be advantageously applied. The G2 is also charged measures. However, engineers advise and assist
with detecting and alerting the commander to other troops in the utilization of natural features
enemy employment of TCesB operations to our which will aid in camouflage. During preparation
advantage. for offensive operations, special attention is given
c. To execute TC&D operations, it is essential to to camouflage, concealment, and disguise of units
have intelligence on the progress of the operations and activities which may reveal friendly plans.
and early warning of enemy suspicions that a de- Additional information on camouflage practices
ception operation is being used against him. Such and techniques can be found in FM 6-20.

iogfifoH imisyw ©ipmM^M


with insurgency. US Army participation in such
o. The US Government has provided for secu- assistance is called stability operations. Stability
irity assistance to friendly host nations threatened operations include advice and assistance in the

«¿M;©
FM 30-5

training of host country military and para-mili- imperative that there be close and continuous liai-
tary ground forces. Stability operations are coor- son between all elements which directly or indi-
dinated with other US military services and gov- rectly contribute to or receive intelligence data
ernment agencies. necessary for operational efficiency. This is espe-
cially true between counterintelligence and
b. A significant variation in stability operations combat intelligence units because information/in-
intelligence is that intelligence must place greater telligence on the insurgent's infrastructure di-
emphasis on the population in addition to the rectly complements tactical intelligence. During
three traditional considerations of the enemy (in- all phases of an insurgency US advisory and oper-
surgent), weather, and terrain. The population is ational elements will work closely with host coun-
both the primary target of the insurgent and a try intelligence resources at all echelons to assure
principal source of his intelligence, cover, person- continuity of effort and management of intelli-
nel, and logistical support. Therefore, the civilian gence assets commensurate with the mission.
population as well as the insurgent military forces When possible, combined intelligence operations
represent major intelligence targets. with the host country will be used to efficiently
c. Because of the broad scope of stability opera- establish joint interrogation, document and mate-
tions, intelligence data base requirements differ riel exploitation, and imagery interpretation cen-
greatly from those needed for conventional mili- ters. Furthermore, intelligence officers from US
tary operations. Stability operations require elab- operational units should establish liaison with the
orately detailed intelligence concerning sociologi- intelligence staffs of any area coordination centers
cal, political, geographic, and economic informa- (ACC) in their tactical areas of responsibility
tion which may have significant impact on inter- (TAOR). For detailed discussion of stability op-
nal defense and development (IDAD) operations. erations see FM 30-18, FM 30-31, and FM 31-23.
Commanders and intelligence staffs must give
these requirements the same consideration given 9-25. Intelligence Collection
to the usual tactical requirements concerning the
enemy military forces. Furthermore, collection of Intelligence collection during stability operations
such data is vitally needed for the support of psy- will differ somewhat from conventional collection
chological, populace and resource control, and due to the nature of the insurgent environment.
civil affairs operations which play a prominent Intelligence requirements will be satisfied only by
role in stability operations. Military operations reporting information in minute detail and ana-
may detrimentally affect the population. The com- lyzing and scrutinizing all data reported in order
mander must take equal consideration of both tac- to accurately and rapidly assess the insurgent
tical and non-tactical intelligence requirements so capabilities and possible courses of action. Infor-
that operations will produce the least detrimental mation must be compiled on the local populace to
effects and thus increase the probability of gain- determine if support or aid is being provided the
ing and retaining the support of the people. insurgent and to assess the overall strength of the
insurgent movement. The intelligence needs for
d. The task of obtaining timely information in a stability operations are based upon broader con-
stability operations environment is made more siderations of the insurgent situation and the op-
difficult by the nature of insurgent activities. The erational environment. Based on all available in-
insurgent has the capability of changing units or formation, an intelligence estimate for stability
organizations, blending with the populace, using operations is develped based not only on tradi-
border areas as sanctuaries, infiltrating host coun- tional information on the enemy, weather, and
try forces, and living to a degree off the land, with terrain, but also on the population, including non-
little logistical support, particularly in the early tactical data such as psychological, political,'eco-
phases of an insurgency. Although conventional nomic, and sociological factors relating to the in-
intelligence doctrine remains valid for stability surgency. US Army intelligence organizations can
operations, there must be some modifications obtain this nontactical data from host country in-
made both in operational techniques and in the telligence organizations as well as from their nor-
organization of intelligence units to fully exploit mal day-to-day contacts with the population in
the peculiarities of the insurgent, the locale in their area. Tactical operations involving the popu-
which the insurgency is taking place, and the lation offer opportunities to gather nontactical in-
effectiveness or ineffectiveness of friendly opera- formation from the people. Specific groups of in-
tions to that point. In stability operations, it is dividuals who may be able to furnish information

9-11
FM 30-5

to friendly collection agencies include the follow- g. Exploitation of captured documents and ma-
ing: teriel.
a. Leaders of dissident groups within the coun- h. Extensive counterintelligence, countersub-
try. version, and countersabotage activity directed to-
ward elimination or neutralization of the insur-
b. Captured insurgents.
gent threat.
c. Defectors from the insurgent ranks.
i. Establishment of intelligence files.
d. Insurgents who have been recruited or who
j. Resources control to deny the enemy food and
volunteered to work for friendly forces.
logistical support.
e. Businessmen, to include merchants, wholesal-
ers, etc. 9-27. Insurgent Intelligence System
/. Medical personnel (doctors, nurses, pharma- Since the insurgent intelligence system utilizes
cists). overt, covert, and clandestine collection activities,
g. Bar owners. the identification of these activities will require
extensive data on the insurgent elements to in-
h. Prostitutes. clude mission, organization, strength, and loca-
i. Religious leaders of all groups within the tion. Counterintelligence operations are compli-
country. cated by the degree of reliance which must be
placed on local organizations and individuals, the
j. Political leaders of opposition parties. difficulty in distinguishing between friendly and
k. Labor leaders. hostile members of the population, and political
considerations which will frequently hinder
I. Government agencies such as hospitals and proper counterintelligence operations. Normally
agricultural agencies. there will be a requirement for a larger number
m. Friendly US or foreign nationals such as of intelligence and counterintelligence personnel
missionaries and business representatives who are in all phases of an insurgency than required in
established and/or long term residents of the normal combat operations due to the many and
area. varied intelligence requirements in the insurgency
(FM 30-31).

9—26. Intelligence Activities


9-28. Combat Intelligence
Intelligence activities conducted during stability
operations are characterized by extensive coordi- a. The role of the individual soldier is much
nation with host country intelligence agencies and broader in stability operations since the need for
participation in intelligence activities to include locating the insurgent and reporting information
the following : of intelligence value becomes of prime impor-
tance. Detailed collection plans are prepared at all
a. Penetration of the insurgent infrastructure. echelons, and requirements for information entail
b. Extensive interrogation of suspected insur- requests for data of both tactical and nontactical
gent elements. significance. Patrolling becomes of paramount im-
portance during tactical operations since patrols
c. Compilation and maintenance of extensive provide a basis for reporting both positive and
dossiers of individuals of intelligence interest to negative information on insurgent activities.
include leaders and members of its infrastructure Effective ground surveillance and reconnaissance
as well as leaders of the insurgent armed forces. become particularly difficult in an insurgency
since friendly units seldom fight in the traditional
d. Surveillance of individuals of intelligence in- manner and are more apt to be employed in rela-
terest. tive isolation. Airborne Infantry Ranger Com-
e. Censorship activities appropriate to the de- pany elements will be of particular value in an
gree of insurgent activity. insurgent environment in providing detailed in-
formation on remote portions of the area of inter-
/. Complete documentation of civilians for easy est. Special Forces units, located astride lines of
identification. communication (LOG) or near suspected insur-

9-12
FM 30-5

gent base areas, will also be constant sources of bilities, organizations, outside support, and loca-
current information of intelligence value. tions of insurgent elements. The basic principles
and techniques for intelligence interrogation of
b. In addition to providing intelligence data on
prisoners of war are valid for stability operations
a conventional nature, friendly forces must also
except that in the case of an insurgency, the intel-
be alert for indirect evidence(s) of insurgent
ligence interrogator will be faced with the prob-
activity within the area of operations. These in-
lem of interrogating not only captured military
clude:
personnel but also friendly, hostile, or suspect
(1) Built-up areas not recorded on maps.
civilians located within the area of operations.
(2) Abandonment of villages, food producing
One solution to this problem is the cross-attach-
areas, or equipment.
ment of CI and IPW personnel available, which
(3) Civilian activity in isolated areas of the
country. not only improves the overall effectiveness of
counterintelligence efforts but also expands the
(4) Areas being cleared of foliage for no ap-
scope and knowledge of the interrogation element.
parent reason.
Interrogations during stability operations dictate
(5) Unexplained movement of people from
that the intelligence interrogator have a detailed
one area to another.
familiarity with the military and political organi-
(6) Abnormal traffic on roads, paths, or wa-
zation of the insurgent elements and a complete
terways.
and detailed knowledge of the area of operations.
(7) Roads or paths constructed in relatively
Treatment of prisoners of war is governed by the
remote areas of the country.
guidelines outlined in the Geneva Conventions
(8) Unidentified activity detected by sensor
(FM 27-10). To insure maximum exploitation all
devices, particularly during the hours of darkness.
prisoners, whether military guerrillas, returnees,
(9) Absence of adult males of fighting age.
political cadre, suspects, or deserters, should be
(10) Increased nighttime activities.
treated firmly but fairly.
(11) Decrease in the amount of goods and
produce at local markets. /. Another valuable source of information is the
c. During stability operations, tactical opera- person who has traveled through or has worked in
tions are oriented on locating guerrilla or armed an area known or suspected to be a hiding place
elements rather than the seizure of terrain. Once for insurgent elements. Woodcutters, farmers, no-
the guerrilla or armed element has been located mads, or individuals who have been conscripted
and neutralized, friendly elements can extend and have been forced to work for the insurgents
their control into the area. Strict operational se- may provide invaluable information on order of
curity, therefore, must be established to avoid battle, terrain, capabilities, caches, base camp lo-
early detection of friendly forces by either the cations, or other intelligence information.
insurgent element itself or by sympathizers who g. Funds should be made available to reward
may signal the approach of friendly forces. Ade- informants and other persons providing valuable
quate safeguards must be taken to insure that intelligence information. It ds imperative, how-
personnel in the area of operations, to include ever, that such funds be controlled since monetary
women or children, are provided with no indica- reward serves as an incentive not only to the re-
tion of the friendly courses of action. porter of factual information, but also to the "in-
d. Prisoners should be taken whenever possible, formant" who provides false or fabricated infor-
and every opportunity should be given the insur- mation either solely for the material gain or for
gent to surrender or defect. Psychological opera- deliberately misinforming. Extreme caution in the
tions should include themes which encourage sur- evaluation and use of information provided
render or defection. The success of such a plan should enable the agency buying the information
depends on the treatment provided insurgents to distinguish the factual from the false reporter.
who join the government side. Reasonable treat- To prevent the buying of the same information
ment normally will generate additional defections from the same source by more than one agency,
—particularly when immediate exploitation is control records should be organized collectively,
made by the capturing unit. by geographical area, rather than having each col-
lecting unit maintain its own. Collective control
e. Intelligence interrogation of returnees, pris- could also facilitate the timely discovery and ex-
oners of war, and other persons detained play an posure of persons providing fabricated informa-
important role in the determination of the capa- tion or misinformation.

9-13
FÍM 3®-S

h. information on known insurgents should be surgent organization. Prostitutes, racketeers,


distributed as widely as possible consistent with small-time hoodlums, and corrupt officials may be
security requirements. Suitable rewards can also forced, under a threat of disclosure to police, to
be established for information concerning insur- provide information and support to the insur-
gents. gents. The insurgent organization may actively
enter or take over existing crime syndicates (or
i. Maximum use should be made of aerial sur- initiate their own) to finance insurgent activities,
veillance and reconnaissance throughout all disguise insurgent activities, or infiltrate legiti-
phases of an insurgency. Aerial reconnaissance mate business and the host country government
can provide tactical commanders and patrol lead- through the syndicates' connections. The methods
ers with updated imagery on specific areas. Aerial of obtaining funds and equipment necessary for
surveillance can provide a continuous day-night an insurgency provide a source of intelligence for
capability and can often assist in locating insur- police agencies. An increase in the demands for
gent base camps, and gun positions and directing money or supplies or in the theft of matériels
forces or fire to destroy them. Visual surveillance such as explosives or weapons which could be used
also achieves confirmation of certain terrain in- by the insurgents are examples of activities on
formation when integrated with other imagery. which the police can base their predictions of in-
The effectiveness of visual observation generally surgencies. Police intelligence may well be the
increases as pilot and observer perform repetitive first means of detecting an impending insurgency
search of a specific area. By observing the same or the elements of the population supporting the
topography, the same manmade objects contained insurgency. The integration of police intelligence
there, and the same activities which take place and combat intelligence is of extreme importance
day after day, observer personnel will more read- during stability operations. The intelligence sec-
ily detect changes which may indicate insurgent tions of the National Internal Defene Coordina-
activity. tion Center (NIDCC) and the Area Control Cen-
j. Intelligence collection operations involving ters (ACC) should insure that proper coordina-
human sources are highly sensitive and demand tion and liaison is promoted among the intelli-
that they be conducted by specially trained intelli- gence community.
gence personnel. Such operations are usually
highly centralized with tight control exercised to
protect both the operations and sources involved. a. Since stability operations are basically aimed
Information of a tactical nature is normally at the restoration of internal security in the area
passed to the area tactical commander whose in- of operations, they demand a vigorous and coordi-
telligence staff must evaluate it not only in the nated counterintelligence effort. Liaison and ex-
light of other information available but also based change of information between both military and
on the source reliability rating given to the origi- civilian counterintelligence agencies and related
nal source reporting the information. The tactical agencies, such as police, are essential to the
commander is responsible for providing the re- success of the counterintelligence effort (FM
porting unit with an evaluation of the report and 30-18 and FM 30-311).
furnishing data regarding the results of combat
response taken based on the information fur- b. Many counterintelligence efforts are defen-
nished. This will greatly assist the reporting sive in nature and are aimed at the protection of
unit's assessment of the source and its conduct of installations against sabotage, personnel against
future intelligence collection operations involving espionage and subversion, and information
this source. For additional information see FM against compromise. Examples of defensive coun-
30-18. terintelligence measures which may be employed
are the following :
k. Police intelligence is of special importance in (1) Maintenance of files on organizations, lo-
the latent and incipient phase of insurgency for it cation, and individuals of counterintelligence in-
is then that the gradual changes in the social, terest, to include the insurgent infrastructure.
economic, and political conditions of a country (2) Background investigations and records
which establish the basis for an insurgency may checks on persons in sensitive positions and those
be found. Forgers, safecrackers, counterfeiters, whose loyalty is questionable.
smugglers, and assassins may be enticed or (3) Indoctrination of personnel in all fields
coerced into performing certain tasks for the in- of security.

<D«il<J
FM 30-5

(4) Inspection of the internal security of in- terial which could aid insurgent forces such as
stallations and units. maps, batteries, communication wire, medical
(5) Population resources control measures to supplis and food.
include identification systems used to minimize (10) Investigations of terrorist or sabotage
the possibility of insurgents gaining access to incidents in conjunction with EOD, military
areas in the proximity of, or within installations ; police, and technical intelligence personnel in an
curfews; travel restrictions; and coordination of attempt to identify the terrorists and saboteurs.
search procedures in the installation with military
police elements. c. Counterintelligence operations must place
(6) Raids on suspected insurgent meeting great emphasis on offensive operations against the
and hiding places to include cordon operations. insurgent infrastructure so that it can be identi-
(7) Coordination of censorship activities fied, neutralized or destroyed. One of the signifi-
with those staff elements or units given this pri- cant variations to the overall collection program
mary responsibility. and the selection of collection agencies in stability
(8) Debriefing of selected personnel, friendly operations is the heavy reliance on police, secu-
and hostile, to include combat patrols, aircraft pi- rity, and counterintelligence units and agencies.
lots, or other elements which may unwittingly As a result of the subversive nature of an insur-
possess information of counterintelligence inter- gency, these agencies which are normally charged
est. with the conduct of countersubversion operations,
(9) Coordination with military police ele- have the best capability to satisfy a wide range of
ments concerning control of black marketable ma- high-priority intelligence requirements.

Section VII. TRAINING

9-30. General ligence training of their units. The operations of-


Intelligence training, including counterintelligence ficer has primary responsibility for matters per-
training, is given to all personnel. Personnel taining to overall training of the command. All
whose primary duties are concerned with intelli- staff officers are responsible for the intelligence
gence are given additional training appropriate to training of their staff sections.
their assignments. b The intelligence officer, in coordination with
a. Intelligence training is integrated with other the operations officer, supervises intelligence
training (app P) except for specialized subjects training within the command. He prepares the
and orientation. It is not conducted as a separate intülligence training program, conducts intelli-
activity distinct from all other training. gence schools, supervises intelligence training,
conducts tests, and assists lower units in obtain-
b. Intelligence training emphasizes speed of ing training aids and qualified instructors. He in-
collection and processing of information and the forms the operations officer of the time needed for
extension of collection activities to the depth of intelligence training and requirements for facili-
the unit's area of interest. It should constantly ties, training aids, and instructors. Close coordi-
stress proper security practices. When appropri- nation between the intelligence officer and other
ate, this training should be supplemented by addi- members of the staff helps insure the integration
tional hours of specialized instruction in stability of intelligence training with other training.
operations. Army Subject Schedule 30-9 provides
uniform guidance in the conduct of combat intelli- c. Unit training in reconnaissance and the
gence training in all components of the Army. collection of information is planned and super-
vised by the intelligence officer. Orders directing
c. In training exercises, units should be pro- unit intelligence training are issued by the opera-
vided with the intelligence means normally re- tions officer in the name of the commander.
quired during combat operations. Realistic train-
ing situations requiring the use of these means 9-32. Specialized Intelligence Instructional
should be provided. Methods
a. The methods of instruction prescribed by FM
9-31. Responsibilities
21-6 are applicable to specialized intelligence
a. All commanders are responsible for the intel- training. In most cases, specialized intelligence

9-15
FM 30-5

training is best accomplished by centralizing in- manders, staffs, and troops conscious of the
struction. enemy as a real opposing force. FM 30-102 pro-
vides guidance concerning intelligence training
b. A system of intelligence schools within the
planning and training phases and means of simu-
command helps establish standard practices
lating intelligence play.
throughout the command.
(1) Establishment of theater-level intelli- b. Intelligence training during maneuvers in-
gence schools for officers and selected noncommis- clude aerial and ground reconnaissance and sur-
sioned officers assigned to intelligence duties veillance, use of sensor devices, crater analysis,
should be considered. This training can provide interrogation of PW and other detainees, debrief-
area orientation and familiarization of conditions ing of refugees, acquisition and exploitation of
peculiar to the command and intelligence func- enemy documents and materiel, safeguarding mil-
tions and procedures. itary information, camouflage and camouflage dis-
(2) Division-level schools should be estab- cipline, communications discipline, signals intelli-
lished for instruction of officers and selected non- gence, identification of enemy materiel to include
commissioned officers assigned to intelligence du- aircraft, radiological monitoring, reporting of nu-
ties. Subordinate units should conduct intensive clear bursts, identification and marking of
intelligence training of intelligence personnel and friendly and enemy chemical-biological-radiologi-
personnel in intelligence-related positions. Schools cal areas, detecting and reporting chemical and
and training are conducted by unit intelligence biological attacks, preparation and distribution of
officers, with the assistance and under the super- photographs as supplements to maps, and the re-
vision of the division intelligence officer at each quisition and distribution of maps.
echelon. Preferably, instructors should have at-
tended the school established at the next higher c. Intelligence training should include training
level. individuals to understand the effects of weather
upon tactical operations, personnel, weapons,
c. Training is not concluded with the completion
equipment, terrain, and movement. Particular em-
of the intelligence schools ; it is conducted on a
phasis should be given to training the individual
continuous basis and perfected by integration of
soldier in the timely, accurate, and factual report-
intelligence training with on-the-job and other
ing of information.
military training.
d. Training should emphasize intelligence oper-
9—33. Intelligence Training and Maneuvers ations during all phases of stability operations to
a. Intelligence play in maneuvers should fur- include coordination and liaison with host country
nish realistic training in every aspect of combat intelligence resources and the collection and inter-
intelligence. The use of aggressor as a maneuver pretation of political, economic, and sociological
enemy improves realism and helps make com- data.

Section VIII. STANDING OPERATIONAL PROCEDURES

9-34. Section SOP b. A description of the responsibilities and du-


ties of all personnel.
The intelligence officer prepares the intelligence
SOP for the intelligence section. The format and c. Assignments and instructions pertaining to
content of the SOP will depend upon the level of duty shifts.
command, the nature of the operations, and the
d. Security procedures within the section.
desires of the intelligence officer. Under certain
circumstances, it may be advisable to prepare c. Administrative procedures to be followed in
both a garrison and a tactical or field SOP. A recording, filing, and message handling.
typical intelligence section SOP may contain the
following : /. Detailed procedures to be followed in the
processing of information.
a. A description of the functional organization
of the intelligence section, accompanied by appro- g. Procedures pertaining to the maintenance of
priate diagrams. the collection plan.

9-16
FM 30-5

h. Instructions concerning coordination and for directing the collection effort and prescribe
staff liaison with other staff sections and subordi- dissemination and reporting format and proce-
nate units. dures.
i. Instructions concerning the procurement and b. While the intelligence part of a command
distribution of maps, imagery, and map substi- SOP contains instructions pertaining to signifi-
tutes. cant, routine intelligence matters, the intelligence
annex to an operation order contains special in-
;. Instructions concerning the preparation and structions pertaining to intelligence tasks in a
dissemination of intelligence reports. specific tactical operation (app N). An effective
k. Internal training procedures, such as the command SOP can assist the intelligence officer in
cross-training of section personnel. preparation of the intelligence annex. The intelli-
gence officer will find it convenient to organize the
intelligence portion of the SOP into major para-
9-35. Command SOP graphs similar to those prescribed for the intelli-
a. The intelligence officer prepares the intelli- gence annex to the operation order.
gence portion of the command SOP. A format for
a command SOP is contained in FM 101-5. An 9-36. Tactical Cover and Deception
example of a division SOP is contained in FM Vulnerability
61-100. Entries therein suggest matters which As in the case of all established procedures, care
should be included in the intelligence portion of a must be exercised that SOPs do not become so
command SOP. In order to insure uniformity routine, apparent, and accepted as to be vulnera-
throughout the command, the intelligence portion ble to the insertion of deceptive enemy informa-
of the command SOP should standardize methods tion.

9-17
FM 30-5

APPENDIX A

REFERENCES

A-l. Field Manuals (FM)


1-15 Aviation Company, Battalion, Group and Brigade.
1-100 Army Aviation Utilization.
3-10 Employment of Chemical Agents.
(C) 3-10B Employment of Chemical Agents (U).
3-12 Operational Aspects of Radiological Defense.
5-20 Camouflage.
5-26 Employment of Atomic Demolition Munitions (ADM).
5-30 Engineer Intelligence.
5-36 Route Reconnaissance and Classification.
5-146 Engineer Topographic Units.
6-15 Artillery Meteorology.
6-20 Field Artillery Tactics and Operations.
6-40 Field Artillery Cannon Gunnery.
6-121 Field Artillery Target Acquisition.
8-10 Medical Support, Theater of Operations.
9-15 Explosive Ordnance Disposal Unit Operations.
11-40 Signal Corps Pictorial Operations.
17-30 The Armored Brigade.
17-36 Armored Cavalry Platoon, Troop, and Divisional Armored Cavalry Squad-
ron.
17-37 The Air Cavalry Squadron.
19-1 Military Police Support, Army Divisions and Separate Brigades.
19-4 Military Police Support, Theater of Operations.
19-30 Physical Security.
19-40 Enemy Prisoners of War and Civilian Internees.
20-32 Mine-Countermine Operations.
20-60 Battlefield Illumination.
21-5 Military Training Management.
21-6 Techniques of Military Instruction.
21-26 Map Reading.
21-30 Military Symbols.
21-31 Topographic Symbols.
21-40 Chemical, Biological, Radiological and Nuclear Defense.
21-75 Combat Training of the Individual Soldier and Patrolling.
21-76 Survival, Evasion and Escape.
(E) 21-77A Joint Worldwide Evasion and Escape Manual (U).
24-18 Field Radio Techniques.
27-10 The Law of Land Warfare.
30-9 Military Intelligence Battalion, Field Army.
30-10 Military Geographic Intelligence (Terrain).
(C) 30-10A Specjal Applications of Terrain Intelligence (U).
30-15 Intelligence Interrogation.
30-16 Technical Intelligence.

A-l
FM 30-5

30-17 Counterintelligence Operations.


(C) 30-17A Counterintelligence Special Operations (U).
(S) 30-18 Intelligence Collection Operations.
30-20 Aerial Surveillance-Reconnaissance, Field Army.
30-28 Armed Forces Censorship.
30-31 Stability Operations—Intelligence.
30-35 Military Intelligence Battalion Aerial Reconnaissance Support.
30-102 Handbook on Aggressor.
30-103 Aggressor Order of Battle.
31-3/AFM 105-4 Weather Support for Field Army Tactical Operations.
31-10 Denial Operations and Barriers.
31-11 Doctrine for Amphibious Operations.
31-12 Army Forces in Amphibious Operations (The Army Landing Force).
31-16 Counterguerrilla Operations.
31-18 Long-Range Reconnaissance Ranger Company.
31-20 Special Forces Operational Techniques.
(C) 31-20A Special Forces Operational Techniques (U).
31-21 Special Forces Operations US Army Doctrine.
(S) 31-21A Special Forces Operations US Army Doctrine (U).
31-23 Stability Operations US Army Doctrine.
31-35 Jungle Operations.
31-36 (TEST) Night Operations.
(C) 31-40 Tactical Cover and Deception (U).
31-73 Advisors Handbook for Stability Operations.
31-100 (TEST) Surveillance, Target Acquisition and Night Observation (STANO) Opera-
tions.
(C) 32-5 Signal Security (SIGSEC) (U).
(S) 32-10 United States Army Security Agency in Support of Tactical Operations
(U).
(C) 32-20 Electronic Warfare (U).
33-1 Psychological Operations—US Army Doctrine.
33-5 Psychological Operations—Techniques and Procedures.
41-10 Civil Affairs Operations.
44-1 US Army Air Defense Artillery Employment.
45-20 Civil Censorship.
45-25 Field Press Censorship.
55-8 Transportation Intelligence.
57-1 US Army/US Air Force Doctrine for Airborne Operations.
57-35 Airmobile Operations.
61-100 The Division.
100-5 Operations of Army Forces in the Field.
100-10 Combat Service Support.
100-15 Larger Units Theater Army—Corps.
100-20 Field Service Regulations—Internal Defense and Development (IDAD).
100-26 The Air-Ground Operations System.
101-5 SOFM, Staff Organization and Procedures.
101-10^series SOFM, Organization, Technical and Logistical Data.
101-31-series SOFM, Nuclear Weapons Employment.
101-40 Armed Forces Doctrine for Chemical Warfare and Biological Defense.
105-5 Maneuver Control.

A—2. Technical Manuals (TM)


3-210 Fallout Prediction.
3-215 Military Chemistry and Chemical Agents.
3-216 Technical Aspects of Biological Defense.

A-2
FM 30-5

3-220 Chemical, Biological, and Radiological (GBR) Decontamination.


3-240 Field Behavior of Chemical, Biological, and Radiological Agents.
5-248 Foreign Maps.
5-645 Geology.
30-245 Image Interpretation Handbook.
30-246 Tactical Interpretation of air Photos.

A-3. Army Regulations (AR)


(C) 10-122 United States Army Security Agency (U).
95-1 Army Aviation—General Provisions and Flight, Regulations.
(C) 105-87 Elecrtonic Warfare (U).
310-25 Dictionary of United States Army Terms (Short Title AD).
310-50 Authorized Abbreviations and Brevity Codes.
340-1 Records Management—Programs, Policies and Procedures.
350-30 Code of Conduct.
350-225 Survival, Evasion, and Escape Training.
360-65 Establishment and Conduct of Field Press Censorship in Combat Areas.
380-5 Department of the Army Information Security Program.
380-83 Civil Censorship.
380-200 Armed Forces Censorship.
380-235 Enemy PW and Civilian Internee Communications Censorship.
(C) 381-103 Administration of Counterintelligence and Area Intelligence Personnel (U).
(C) 381-115 Counterintelligence Investigative Agencies.
(C) 381-150 The Army Human Resource Collection System (U).
(C) 530-1 Operations Security (U).
(C) 530-2 Communications Security (U).
(G) 538-3 Electronic Security (U).
(C) 530-4 Control of Compromising Emanations (U).
604-5 Clearance of Personnel for Access to Classified Defense Information and
Material.
604-10 Military Personnel Security Program.
A-4. Department of the Army Pamphlets (DA Pam)
108-1 Index of Army Motion Pictures and Related Audio-Visual Aids.
310-series Military Publications Indexes.
350-15 series Operations—Lessons Learned.

A-5. Miscellaneous Publications


AAP-6 (J) NATO Glossary.
JCS Pub 1 Dictionary of United States Military Terms for Joint Usage.
JCS Pub 2 Unified Action Armed Forces (UNAAF).
JCS Pub 12 Tactical Command and Control Procedures for Joint Operations.
ASubjScd 30-9 Combat Intelligence.
ASubjScd 30-40 Order of Battle Personnel.
TC30-1 Tactical Cover and Deception.
STANAG 2008 and Bombing, Shelling and Mortaring Reports.
SEASTAG 2008
STANAG 2014 and Operations Orders, and Administrative/Logistic Orders.
SEASTAG 2014
STANAG 2020 and Operations Situation Reports.
SEASTAG 2020
STANAG 2022 and Intelligence Reports.
SEASTAG 2022
STANAG 2029 and Method of Describing Ground Locations, Areas and Boundaries.
SEASTAG 2029
A-3
FM 30-5

STANAG 2033 Interrogation of Prisoners of War.


STANAG 2073 NATO Intelligence Subject Code.
STANAG 2077 Enemy Order of Battle Records for Combat Intelligence.
STANAG 2084 and Handling and Reporting of Captured Enemy Documents and Equipment.
SEASTAG 2084
STANAG 2097 Nomenclature for Soviet Bloc Army Weapons and Equipment.
STANAG 2103 and Reporting Nuclear Detonations, Radioactive Fallout and Biological and
SOLOG 123 Chemical Attacks.
STANAG 2112 Radiological Surveys.
STANAG 2118 and Intelligence Estimate.
SEASTAG 2118
STANAG 2134 Offensive Air Support operations.
STANAG 3377 and Air Reconnaissance Intelligence Report Forms.
SEASTAG 3377
FM 30-5

APPENDIX B

THE ANALYSIS OF THE AREA OF OPERATIONS

B—1. General (2) At field army and higher headquarters,


the preparation of intelligence studies of man-
An analysis of the area of operations is a study to
made features of the area of operations is the
determine the effects of the area of operations on
responsibility of the engineer staff officer for
the general courses of action that the enemy and
other than communications facilities.
friendly forces may adopt. It includes considera-
(3) Weather information of both a general
tion of climatic or weather conditions, relief and
and a special nature is provided by the staff
drainage systems, vegetation, surface materials,
weather officer.
manmade features, military aspects of the area,
observation and fire, concealment cover, obstacles, (4) Information and analyses of political,
key terrain, avenues of approach, air avenues of economic, sociological, and psychological aspects
approach, and other effects of the area on combat of the civil community are obtained from the civ-
service support. Ad^'+ional considerations include il-military operations officer.
sociological, political, economic, religious, science
and technology, materiel, transportation, and hy- B-3. Contents of the Analysis
drography factors as they may affect enemy or a. An annotated example of a written analysis
friendly military operations. of the area of operations is contained in FM
101-6.
B-2. Sources of Information b. Additional guidance is provided in subse-
a. Analyses of the area of operations from quent paragraphs, the titles of which correspond
other headquarters and studies prepared by to selected paragraphs and subparagraphs of the
higher headquarters are valuable source materials example.
in the preparation of a current analysis of the
area of operations. The conclusion of analyses B-4. Climatic or Weather Conditions
prepared by higher headquarters are usually not a. The paragraph of the analysis concerning cli-
directly applicable to a subordinate unit. Consid- matic or weather conditions lists the items of
erations that are important to the higher com- weather information that have military signifi-
mander's mission are not necessarily applicable at cance. Throughout the remainder of the analysis,
the subordinate headquarters. the weather information is interpreted as to its
operational effects. For example, winds at low
&. Technical reports, maps and imagery, and
temperatures are interpreted in terms of the wind
reports of ground and aerial reconnaissance are
chill factor and the resulting effects on operations,
valuable as sources of information in the prepara-
such as an attack or defense which must face the
tion of an analysis of the area of operations.
prevailing winds, or the use 'of open or closed
c. Other staff officers assist in the preparation storage facilities.
of the analysis by furnishing specialized informa- b. Light data always are given as they are nec-
tion. essary for the selection of courses of action and
(1) At all echelons of command, the engineer the conduct of military activities.
produces and distributes terrain studies, including (1) The beginning of morning nautical twi-
soil analyses and technical interpretation of ter- light (BfyINT) and the end of evening nautical
rain characteristics of military significance; in- twilight (EENT) are the beginning and end,
cluded are obstacles, routes, avenues of approach, respectively, of enough light for limited visibility.
cover and concealment, and trafficability. The beginning of morning civil twilight (BMCT)

B-l
Fßfl §®=S

ara ths eiid of evening civil twiîigM (EECT) aire economics, transportation, Manpower, etc.) whiclh
the beginning and end, respectively, of adequate influence the choice of a course of action by either
light for large-scale operations. force are included. Lengthy data are presented in
(2) Moon phases and other phenomena such annexes, preferably in tabular form.
as atmospheric conditions and star forilliance in=
fluence night operations. During fizül îEOonîigkt,
conditions of visibility sometimes approach those This paragraph analyzes the facts listed in the
of daylight. Such conditions are anticipated as "General Description off the Area" paragraph and
they influence friendly and enemy courses off determines their influence on the tactical and
action such as attacks, patrolling, and changes in
combat service support factors that are consid-
dispositions at night. ered! in the selection off a course of action by ei-
ther force. In the analysis of these factors, the
effects of and on nuclear fires, chemical and bio-
Drainage and ridge lines are the basic elements in logical agents, and important devices and equip-
studying terrain as they clearly indicate the gen- ment used in implementing courses of action are
eral shape of the ground. A complete study of the integrated as appropriate. The tactical aspects of
relief and drainage includes detailed information observation and fire, cover and concealment, ob-
about slope, configuration, elevation of ground stacles, key terrain features, avenues of approach,
forms, and depth, width, tide data, and conditions and the combat service aspects are discussed in
of banks and bottoms of streams and rivers. the following paragraphs.
These items can be portrayed graphically on maps
by various methods.
fB—ïl ï . ©¡bsOITWafclñ) ©rais] IrDCQ
a. Observation depends on conditions of terrain
which permit a force to locate the enemy either
Vegatation studies are best presented in the form
visually or through the use of surveillance de-
of tinted, or otherwise marked, overlays. Consid-
vices. The highest terrain in an area usually pro-
erations include locations of trees, diameters of
vides the best observation. The increased use of
trunks, density, ground cover or canopy, under-
equipment with line-of-sight characteristics re-
growth, and types of natural and cultivated vege-
quires the availability of suitable terrain features
tation of non-wooded areas.
for sighting purposes. The capability of employ-
ing organic aerial platforms reduces the require-
l=Fo Stacfeg© FCOLB
ment to use such terrain. Dust clouds caused by
These data, if extensive, are best presented in col- nuclear blast reduce electronic observation. Other
ored or marked overlays. In preparing these data, £ t- 4.1...J. I:_:A __ j) -i A;— =—?.. J_

soil maps made by the agricultural services of darkness and tall vegetation (woods and jungle
various countries are particularly valuable. The canopy). The effects of visibility on observation
information contained in soil maps can frequently are analyzed with weather conditions.
be translated into a trafficability map and a map
of areas susceptible to high radiation intensities b. Fire, as used in the analysis of the area of
of induced radioactivity. A trafncability map operations, includes the field of fire of the weapon
based on weather forecasts and colored or marked and characteristics of weapons delivery systems
to indicate degrees of trafficability effectively affected by yveather and terrain. For example,
shows areas suitable for cross-country movement. gusty surface winds affect the use of projectiles.
High, irregular terrain features or the absence of
iML íVteiiñiiAfiKaidl© [FssitoFiis
overhead mass clearance may limit the field of fire
weapons. A field of fire is an area that weapons
Manmade features of potential military signifi- can cover effectively with fire from given posi-
cance include roads, railroads, bridges, tunneïs, tions. Although observation is essential to effec-
mines, towns, industrial areas, and fortifications. tive control of fire, the best observation does not
These features are best represented on a map or always guarantee the best field of fire. An ideal
marked overlays. field of fire for fiat-trajectory weapons is an open
area in which the enemy can be seen and on wliidi
he has no protection from the fire of such weap-
Only those characteristics (e.g., sociology, politicSp ons.

E=g
FM 30-5

B-l 2. Concealment and Cover dense woods, jungles, deserts, mountains, cities,
and certain types of unstable soil. Artificial obsta-
a. Concealment is protection from observation
cles are works of construction and destruction ex-
and may be provided by woods, underbrush, snow-
ecuted to stop or impede military movement. They
drifts, tall grass, cultivated vegetation, darkness,
include minefields, craters, antitank ditches,
smoke, dust, fog, ground haze, rain, or falling trenches, abatis, roadblocks, deliberately flooded
snow. areas, areas contaminated with chemical and bio-
b. Cover is protection from the effects of direct logical agents, extensive rubble, forest fires, tree
and indirect fires and is provided by ditches, quar- blowdown, and areas contaminated with residual
ries, caves, riverbanks, folds in the ground, shell nuclear radiation.
craters, buildings, walls, railroad embankments
b. Obstacles to be fully effective must be cov-
and cuts, sunken roads, and highway fills. Defi-
ered by observation and fire. However, even unde-
laded areas which provide protection against non-
fended obstacles may channelize an attacker into
nuclear weapons do not necessarily protect
concentrations which are easier to detect and are
against effects of nuclear fires. Unless the for-
suitable for nuclear attack. Obstacles perpendicu-
ward slopes of a terrain mass are very steep, blast
lar to a direction of attack favor the defender by
will affect personnel and materiel on the reverse
slowing the enemy, forcing him into concentra-
slope because the blast wave follows the configu-
tions that tend to occur while crossing obstacles,
ration of all but the most rugged terrain. When a
and holding the attacker for a longer time under
nuclear weapon is fired over a deep valley, or the
the effective fires of the defense. Obstacles paral-
valley axis points toward ground zero, the blast
lel to an axis of advance may give the attacker
effects may be channelized and increase damage.
flank protection. However, parallel obstacles may
Irregular terrain provides some cover from ther-
interfere with lateral movement and coordination.
mal radiation of nuclear fires. Few buildings are
sufficiently strong to withstand all effects of blast c. Consideration of obstacles is influenced by
and, if not damaged or destroyed by blast, may be the mission of the command. In the defense the
damaged by thermal radiation. Foxholes, bunkers, intelligence officer identifies as obstacles those fea-
and tunnel type shelters offer the simplest forms tures of the terrain which stop, impede, or divert
of effective cover. military movement into, out of, or within the area
encompassed by the FEBA, lateral boundaries
c. Concealment and cover are desirable for both
and the rear boundary (prescribed or assumed).
the attack and the defense. If troops can move
In the attack he considers the obstacles from the
forward under the concealment of woods, fog, or a
line of departure to the objective (both inclusive),
moonless night, the chances of achieving surprise
bounded laterally by the assigned or assumed op-
are greater. If troops can move protected from
erational zone.
the enemy's fire by ditches, embankments, or
walls, the attack will be more effective. In a de-
fensive situation friendly forces seek to defend in B-l 4. Key Terrain
an area which offers both cover and concealment a. A key terrain feature is any locality or area
but does not provide covered approaches for the whose seizure or control affords a marked advan-
enemy. tage to either opposing force. Key terrain features
are selected to indicate areas and localities whose
d. The mobility of the command is considered in
seizure or control must be considered in formulat-
determining available cover and concealment.
ing and selecting courses of action. The selection
Cover and concealment are desirable during troop
is based on the level of command, type of unit,
movements by any means. Routes which afford
and mission of the command. Key terrain is se-
good cover and concealment reduce the vulnerabil-
lected which if in our control would give us a
ity of a moving force to detection and to destruc-
marked advantage in the accomplishment of our
tion by fire. mission, or which if seized or controlled by the
enemy would hinder materially the accomplish-
B-l 3. Obstacles ment of our mission. For example, a bridge over
a. An obstacle is any natural or artificial ter- an unfordable river may give access to the oppo-
rain feature which stops, impedes, or diverts mili- site shore without requiring an assault crossing.
tary movement. Natural obstacles include rivers, Control of a road or rail center may reduce the
streams, canals, lakes, swamps, cliffs, steep slopes, enemy's ability to resist our advance. A level

B-3
Pßfl g©-g

cleaning is ïcuigh tsrrais Ksay bs the otíy accessi- the enemy can attack before our attack, the cos-
ble landing field for airmobile operations Key ter- trol of this terrain is essential because it affords
rain varies with the level of command. For esam= us a marked advantage. Thus, it is a key terrain
pie, to an army commander a large city may af- feature.
ford! Eisarked advantages as a commuinications
d. In the defense, key terrain is usus
ceatsr. To a division coanmander tike high grouKdl
the assigned sector and within or behind the se-
which dominates the city may be more important
lected defensive area. Some examples of key ter-
and the city itself may be an obstacle. Obstacles
rain are—
are rarely key terrain features. The high ground!
dominating a river rather than the river itself is (1) Terrain which gives good observation
usually the key terrain feature for the lower unit over avenues of approach to and into the defen-
commander. An exception is an obstacle such as a sive position.
built-up area which is assigned as an objective to (2) Terrain which permits the defender to
a force; the obstacle then becomes key terrain to cover an obstacle by fire.
the force ordered to capture it. (3) Important communication centers which
affect command communications and the use of
b. Key terrain, in addition to inñuencmg the reserves.
mission accomplishment, is also highly significant
in applying combat power. Control is not insuredl e. Key terrain also may be forward of the de-
only by seizure and occupation. Seizure and physi- fensive area or in adjacent sectors. For example,
cal occupancy of key terrain features by relatively a terrain feature forward of the edge of the battle
large forces may not be desirable. Destructive area or in an adjacent sector which gives the
fires delivered by long-range means can destroy enemy good observation over defended localities,
forces physically occupying key terrain. The com- communication routes, or enemy avenues of ap-
mander then controls key terrain to avoid de- proach, is key terrain when active measures must
struction of his force while keeping the enemy be taken to reduce the enemy advantage. The de-
from gaining control. Control includes maneuver, fender may move his position forward to include
surveillance, security, and use of fires. Terrain the feature or take action to minimize the enemy
which permits or denies maneuver may be key advantage by the use of fire, chemicals, smoke,
terrain. Tactical use of terrain often is directed at concealment, and cover.
increaping the capability for applying combat
power and at the same time forcing the enemy
into areas which result in reduction of his ability a. An avenue of approach is a route for a force
to apply his combat power. Terrain which permits of a particular size to reach an objective or key
this also mav h« Irfiv ^rrain. The effect of terrain terrain. To be considered an avenue of approach,
on maneuver, application of combat power, and a route must provide some ease of movement and
preservation of force integrity are considerations enough width for dispersion of a force of a suffi-
in selecting key terrain, its control, and tactical cient size to affect significantly the outcome of the
use. operation. The division G2 usually considers ave-
c. Im the offense, key terrain features are nues of approach adequate for at least the type
usually forward of the friendly dispositions and brigade of the particular division. The corps and
are often assigned as objectives. However, terrain higher G2 usually consider avenues of approach
features in adjacent sectors may be key terrain if adequate for at least a division. In determining
their control is necessary for the continuation of the width of dispersion, consideration is given to
the attack or the accomplishment of the mission. the deployment patterns, mobility means, and the
If the mission is to destroy enemy forces, terrain area required for maneuver to prevent presenting
lucrative targets for nuclear fires.
may be selected whose seizure helps insure the
required destruction. Terrain which gives the b. A valley approach gives the advancing force
enemy effective observation along an axis of ad- some cover from enemy direct fire and some con-
vance to be used by the friendly forces may be key cealment from enemy observation. Â valley ap-
terrain if the enemy must be denied its possession proach includes the floor of the valley, the slopes
or control Key terrain may be within frienfily of the ridges, and the military crests. Control of
territory when its control is essential to the the military crests on each side of the valley is
success of an oiïensive operation. For example, if essential. In a valley approach, the best avenue of

B=4
FM 30-5

approach is that which offers the best observa- tree-top level. Low altitude operations over heavy
tion, cross-country trafficability, road net, fields of foliage distort the acoustic wave from aircraft
fire, concealment and cover, and dispersion. In and decrease the distance at which the sound can
evaluating the use of a deep valley approach, the be detected. It also hampers determination of the
possible intensification of nuclear effects and re- direction of the noise source by ground observers.
sulting greater casualities on the valley floor are Desirabyl, air avenues of approach will be in defi-
considered. At times, the best avenue may be weapon locations. Ridge lines are crossed as inf re-
along the slopes of a ridge below the military lade with respect to enemy air defense radar and
crests, rather than along the valley floor. quently as possible to reduce exposure time to
radar detection. Steep defiles or canyons are
c. The use of a ridge approach depends upon the avoided, however, especially when there is an ap-
width and shape of the ridge, the size and deploy- preciable amount of surface wind that can cause
ment of the units involved, and the distance to the momentary loss of aircraft control because of
elevation of adjacent ridges. A ridge approach downdrafts.
usually has the advantage of good observation.
However, there may be little protection from d. Easily recognized terrain features. Naviga-
enemy fire on the ridge. The best avenue of ap- tion at low altitudes is extremely difficult. The
proach in a ridge approach is often slightly below presence of easily recognized terrain features,
the topographical crest, with sufficient force on such as a river or road, can significantly improve
the crest to control it. the pilots' ability to navigate by reference to
ground features. Terrain corridors are usually de-
sirable because they afford ease of navigation and
B—16. Air Avenues of Approach
defilade. Linear features that parallel the direc-
a. An air avenue of approach is a route which tion of flight are the most valuable in assisting
provides a suitable path for a particular number navigation.
of aircraft to reach a landing zone. The aviation
e. Length of flight paths. In the interest of min-
officer or the aviation mission commander assists
imizing the exposure of aircraft en route to the
in evaluating the effect of density altitude, wind,
objective area, the shortest possible flight paths
turbulence, and visibility on selected avenues of
that afford sufficient air space, concealment from
approach. In selecting air avenues of approach the
ground observation, and easily recognized terrain
following factors are considered :
features are usually preferred. However, longer
b. Sufficient air space for rapid movement of flight paths may be selected for purposes of decep-
the aircraft to the landing zones. Fire support tion.
requirements involving artillery and tactical air
support may restrict the availability of air space. B—17. Combat Service Support Aspects
Consideration must be given to gun-target lines o. The analyses of the facts and subconclusions
and to restrictive fire plans that will be in effect developed in the preceding parts of the analysis
during the air movement phase. The size of the are used as a basis for further studies of effects of
airmobile force involved in the operation must combat service support activities on friendly and
also be considered; however, no parameters may enemy units. In this paragraph the effects of the
be given as to width concerning air avenues of characteristics of the area on combat service sup-
approach. Depending on the flight formation, a port that influence the selection of a course of
large number of helicopters may be flown over a action by either force are determined.
relatively narrow air avenue of approach. An- 6. In studying the influence of the area, consid-
other consideration in relation to adequate air eration is given to effects on matters such as
space is the desirability of having multiple flight availability of adequate routes for lines of com-
routes available. Generally, in situations with con- munication, facilities for maintenance and stor-
centrated enemy forces along the line of contact, age, construction resources, public health situa-
multiple flight routes from the pickup zone to the tion, required shelter for administrative facilities,
objective area and return are desirable. availability of labor, maintenance of discipline,
c. Concealment from ground observation. Heav- law and order, and control of refugees.
ily forested and swamp areas provide good routes
because ground troops have little opportunity to B—18. Effects of Characteristics of the Area
see and fire on helicopters passing overhead at This paragraph contains the conclusions reached

B-5
FM 30-5

on the basis of the facts and subconclusions pre- priate, the effects on the enemy's ability to delay,
viously developed. The effects of the characteris- use his reserves, amphibious or airborne forces,
tics of the area of operations on each significant nuclear fires, guerrilla forces, chemical and bio-
course of action of which the enemy is physically logical agents, cover and deception, sensor devices,
capable of adopting and which, if adopted, could or to conduct special operations and support his
adversely affect the accomplishment of our mis-
sion are discussed. Usually, the discussion in- forces administratively. The discussion of the ef-
cludes effects on the enemy's ability to defend and fects on our courses of action ia limited to those
on his ability to attack. It also includes, as appro- required for the accomplishment of the mission.

B-6
FM 30-5

APPENDIX C

AVAILABILITY OF INTELLIGENCE AGENCIES

C-l. Division, Corps, and Field Army and field arm


y are shown in
heures C-l, C-2, and
The agencies usually available at a division, corps, C-3.

Higher
Headquarters

1
1
Adjacent Liaison
Di fisión Officers
Headquarters

1
1
Militory
I 1 1 1
1
USASA Headquarters Military Police Aviation Cavalry
Intelligence Company Battalion Squadron
Company Company
Company

| 1 2
1
Air Defense
1
Engineer Signal Aviation Division Support Attached Units
Artillery
Battalion Battalion Group Co inn and
Battalion

Air Weather
1 "1
1 1
PSYOP 8.
Division
•Service Brigades Civil
Artillery
Detachment Affairs Units

-
1
Subordinate
Field Artillery
Maneuver
Battalions
Battalions

LEGEND: > Assigned or attached.


^m ^m ^ ^ Support available by request.

1 Organic to Infantry and Airborne Division. Aviation company organic to Armored


and Mechanized Division.
2 Organic to Airmobile Division.

Figure C-l. Intelligence collection agencies available to division.

C-l
FM 30-5

Highe
H eadquar ters
1
Adjacent
/ Headquarters

Liaison •
-«- Corps
Officers <

Units of Higher
> HQ in Corps
Area

1 |
Air Defense
1 | |

Separate Armored Cavalry Engineer Air Weather


Divisions Artillery
Brigade Regiment Brigade Service
Group Detachment

1 1 1 i
Military
I |

Special Staff Other Attached Army Aviation Ml Company


Intelligence Signal
Sections Units Units (Aerial
Battalion
Company Surveillance)

1 1
Abn Inf
1 I |
,
1
-«- 1
USASA Corps PSYOP & 1 Field Amy ■
Ranger Military Police
Battalion Artillery Civil ¡Support Command|
Company Units
Affairs Units i Elements I

1
Field Artillery Target
Searchlight
Groups Acquis! tic n Battery
Battalio i

LEGEND: Assigned or attached.


™ ™ ™ ■" " Support available by request. May be employed as a Corps
Support Command with assignment to Corps Headquarters.
1 FASCOM elements may become Corps Support Command (COSCOM)
when assigned to independent corps..

Figure C-2. Intelligence collection agencies available to corps.

C—2. Army Group d. Tactical air force.


The agencies normally available at the army e. Theater task force.
group are : f. Theater army support command (TASCOM),
theater army civil affairs command, (TACAC) if
a. Subordinate forces. established, theater army air defense command
b. Army group special staff. (TAADC), theater army signal command
(TASC), and theater army psychological opera-
c. Adjacent army groups. tions group.
C-2
FM sa

Air Weather Higher


Service Squadron Headquarters

Adjacent
Headquarters

-j
FIELD
ARMY

t\ Tactical Air Force


and/or Navy Air

TASCOM and other units


Liaison of higher hq in the
officers Field Army Area

Military Intelligence
Corps Field Army Battalion Engineer Combat
and Separate Support Army Artillery Air Reconnaissance Brigade
Divisions Command Support

Engineer
Army Support Air Defense Army Security
Topographic
Brigade Artillery Brigade Agency Brigade
Battalion

Corps Support Separate Military Intelligence Other Engineer


Brigade Brigade Battalion Units

Abn Inf
Transportation Aviation Ranger Signal Units
Brigade Units Company

Armored Cavalry PSYOP Special Staff


Medical Brigade
Regiment Units Section

Military Police Civil Affairs


Brigade Brigade

LEGEND Assigned or attached.


Support available by request.

Figure CS. Intelligence collection apénete» available to field army.

C-3
FM 30-5

Military State Department


Theater Theater
Airlift
- T ■ and Other

"T"
Army Navy
Command Government Agencies

Local US
Theater Army
Signal
Command
-+- Theater
Air Force
Military Sea
Transportation
Service
- -H- Consulates,
etc.

Theater Army Allied Line of


Civil Affairs
Command
-+-
Theater Air
Defense
Command
Merchant
Marine -+ - Communication
Agencies

Theater Army Local


Air Defense
Command
-+- Joint UW
Task Force
Commercial
Air Lines -+- Civilian
Authorities

PSYOP
Group
-T-
Army Security Agency
Units
Air Weather
Service
Detachment
.1- Military Police
Units

■i-
Military
Army Group Intelligence
Units
1
1
1
Field Armies -J. . -1

THEATER ARMY
SUPPORT
COMMAND
(TASCOM)

1
TASCOM
Special Staff Subordinate
Sections Commands

1
Military Intelligence
Group, Subordinate
Counterintelligence Units

Figíire C-4. Intelligence colle ction agencies available t 0 Tlleatet• Army Support Command (T/ISCOM).

C~4
FM 30-5

US State Theater
Department Air Force -- T'

Other US Theater Army


Governmental
Agencies
■-H -- + -■ Signal
Command

Theater Army
Theater
Support
Non-US Governmental
Agencies ■-i Air Defense
Command
--♦-- Command
(TASCOM)

Theater Army
Allied
Headquarters "-t- Air Defense
Command

Y--

!■-

A.
THEATER ARMY
CIVIL AFFAIRS
COMMAND
(TACAC)

_L
Subordinate Military
Civil Affairs Intelligence
Units

Local Civil
Authorities

LEGEND Assigned or attached.


Support available by request, if established.

Figure C-B. Intelligence collection agencies available to Theater Army Civil Affaira Command.

C-5
FM 30-5

Theater Air
Theater
Defense
Army
Coinmand

Theater
Theater Auny
Air Force Signal Command

Theater Army
Theater Support
Navy Command
(TASCOM)

Theater Army
Allied
Civil Affairs
HQ
Command

PSYOP Army
Group Groups

Joint UW Field Army


Task Force Air Defense
Units

Military
USáSá
¡nreiiigence
Units
Units 1
1

THEATER ARMY
AIR DEFENSE
COMMAND
(TAADC)

1
Subordinate
Air Defense
Artillery Units

LEGEND Assigned or attached.


■■ " " «■ ■" «i Support available by request, Jf established.

Figure C-6. Intelligence collection agencies available to Theater Army Air Defense Command,

C-6
FM 30-5

g. Theater army, theater navy, and theater air c. Army Security Agency elements.
force. d. Army Special Forces elements.
h. Military intelligence units. e. Military intelligence units.
C-3. Communications Zone /. Agencies organized primarily for production
of strategic intelligence, but which also develop
Agencies available to major army commands lo- combat intelligence and information. Such agen-
cated within the communications zone are shown cies may include interrogation centers, document
in figures C-4, C-5, and C-6. exploitation centers, and materiel exploitation
centers.
C-4. Theater Army
g. Comparable headquarters of other services,
The agencies available at theater army vary with allied forces, and joint commands subordinate to
the organization of the theater and generally in- theater headquarters.
clude :
h. Higher headquarters.
o. Subordinate army commands.
i. Psychological operations units and theater
&. Theater army special staff sections. army civil affairs command.

C-7
FM 30-5

APPENDIX D

FORMAT FOR PERIODIC INTELLIGENCE REPORT (PERINTREP)

(Classification)

Copy No
Unit
Location
Date-time group
Message reference number
PERINTREP NO
Period covered: (date and time to date and time).
References : Maps or charts.
Disposal instructions : (if any).
1. GENERAL ENEMY SITUATION
This paragraph contains a brief summary of enemy operations during the
period. Amplifying details are furnished in the paragraphs that follow
and in appropriate annexes, or both. This paragraph provides a quick brief-
ing on the highlights of the enemy situation and the significance of the
enemy's major activities, to include marked changes in morale, strengths,
dispositions, tactics, combat effectiveness, and equipment. Data that are
lengthy or can conveniently be shown graphically are presented in annexes.
2. ENEMY ACTIVITIES
This paragraph, in conjunction with those following, provides the details
of the situation summarized in paragraph 1. Detailed intelligence provided
in this paragraph covers all operational activities. Information may be
presented graphically by overlays, printed maps, sketch maps, and annexes.
Subparagraphs are omitted when appropriate intelligence is not available
or is adequately covered by other portions of this report.
(Short title identification)
a. Ground. (Primarily includes activities of combat arms, reserves, and
reinforcements; includes enemy defenses, minefields, fortificaitons, bar-
riers, obstacles, and other defensive works.)
b. Air. (Includes Air Force activities, such as bombing, close air sup-
port, and tactical aerial reconnaissance ; air surveillance, and air-supported
operations.)
c. Airborne.
d. Irregular.
e. Nuclear, Biological, or Chemical Operations.
f. Electronic Warfare.
g. Other. (Normally includes other than combat arms; includes appro-

( Classification)
FM 30-5

(Classification)

priate comments not covered in other paragraphs on reserves, reinforce-


ments, new tactics, weapons and equipment, administrative installations,
and combat service support. Also includes appropriate technical intelli-
gence.)
3. ORDER OF BATTLE
Frequently, this paragraph will consist only of references to the enemy
situation map (or overlay) and to the order of battle annex, which is
developed using the format shown below. When desired by the commander,
particularly significant order of battle changes may be summarized in this
paragraph in addition to being discussed in detail in the order of battle
annex. (See Appendix L, Order of Battle Annex to PERINTREP).
a. Composition and Disposition.
b. Strength. (Personnel and major weapons and items of equipment.)
(1) Losses.
(2) Current strength.
(Short title identification)
c. Tactics.
d. Training.
e. Combat Service Support.
f. Combat Effectiveness.
g. Miscellaneous Data.
4. COUNTERINTELLIGENCE
This paragraph, or parts thereof, should be issued as an annex if a limited
distribution is required.
a. General. (A short summary of the counterintelligence situation dur-
ing the period.)
b. Espionage.
c. Sabotage.
d. Subversion.
e. Communications and Noncommunications Security.
f. Miscellaneous.
5. WEATHER
This paragraph gives a summary of the effect of weather on operations
during the period.
6. TERRAIN
Use an annex, special maps, and overlays when possible. Include impact
on future operations, if appropriate.
7. ANALYSIS AND DISCUSSION
This paragraph lists and discusses briefly enemy capabilities and vulner-
abilities. The conclusions present the commander's assessment of the most
probable courses of action available to the enemy in order of probability
of adoption and vulnerabilities that are exploitable by own, higher, or
lower echelons.

(Classification)

D-2
FM 30-5

(Classification)

a. Enemy Capabilities.
b. Enemy Vulnerabilities.
c. Conclusions.
Acknowledge.
Signature
(Short title identification)
Annexes : (Any intelligence document may be distributed as an annex to a
PERINTREP. Although annexes are a means of distributing detailed
intelligence and information, care is exercised to avoid unnecessary bulk
and duplication.)
Distribution :
Authentication :
Note: In joint service operations, the PERINTREP is replaced by the periodic
intelligence summary (PERINTSUM). The correct format for the PERINTSUM is
contained in Chapter V, JCS Publication 12.

(Classification)

D-3
FM 30-5

APPENDIX F

FORMAT AND EXAMPLE QF AN INTELLIGENCE SUMMARY (INTSUM)


(STANAG 2022; SEASTAG 2022)

1. Format of an Intelligence Sum- IMMEDIATE


mary.
Note : Omit items not applicable TO CG 2D CORPS
unless otherwise indicated. INTSUM NUMBER 144 ENDING
1. Issuing unit (always in- 040600 PARA 3 ALFA AGGRES-
cluded). SOR CONTINUED DEFENSE IN
2. Time and date of issue ZONE EXCEPT FOR LOCAL AT-
(always included). TACK AT 0415 VICINITY R376759
3. Summary of enemy activ- WITH ESTIMATED 90 MEN CMM
ity for period. 3 MEDIUM TANKS CMM AND
a. Ground activity. LIGHT ARTILLERY SUPPORT PD
b. Trace of forward ele- ATTACK REPULSED PD PARA 3
ments. DELTA ATTACK PRECEDED AT
Potential targets for 0410 BY VERY HIGH AIR BRUST
nuclear weapons. NUCLEAR WEAPON Cj/Ufl
d. Nuclear activity. GROUND ZERO R374761 CMM
e. CB activity. DELIVERY MEANS UNDETER-
f. Air activity. MINED CMM YIELD ESTIMATED
ë- Other (new tactics, AT 0 PD 5 KT PD PARA 3 FOX-
counterintelligence, TROT ATTACK SUPPORTED BY 2
etc.). JET ATTACK AIRPLANES BOMB-
4. Enemy personnel and ING AND STRAFING VICINITY
equipment losses. R396756 FOR 5 MINUTES START-
a. Personnel (KIA). ING AT 0425 PD PARA 4 ALFA
b. Prisoner of war. CONFIRMED 20 KIA CMM ESTI-
c. Equipment destroyed MATED 5 KIA CMM PA PARA 4
or captured. BRAVO 10 INCLUDING 2 WIA PD
5. New obstacles and bar- PARA 4 CHARLIE 2 MEDIUM
riers. TANKS DESTROYED CMM 1
6. Administrative activities. DAMAGED CMM 1 JET ATTACK
7. New identifications. AIRCRAFT SHOT DOWN PD
a. Units. PARA 6 PRISONER STATES AM-
b. Personalities. MUNITION SUPPLY IN FOR-
8. Enemy movements. WARD UNITS RUNNING LOW
9. Estimates number and PAREN CHARLIE DASH 3 PAREN
types of vehicles. PD PARA 7 ALFA PATROL RE-
10. Weather and terrain con- PORTS BATTERY 152 MM GUN-
ditions. HOWITZERS AT R303292 PD PRI-
11. Brief discussion of capa- SONERS CONFIRM LOCATION 2D
bilities and vulnerabili- BATTALION CMM 17F MECH
ties (always included). REGIMENT VICINITY R375758
Conclusions (always in- PAREN BRAVO DASH 1 PAREN
cluded). PARA 8 AIRBORNE RADAR RE-

F-l
FM 30-ä

Examples of a Division INT- CONNAISSANCE DETECTED 10


SUM (fuîl distribution not in- TRUCKS MOVING SOUTH ON
dicated) FM CG 52D INF DIV ROAD AT R330280 AT 0345 PD
(MECH) PARA 9 PROBABLY ROUTINE
SUPPLY VEHICLES PD PARA 10
SNOW STARTED AT 040545 AND
CONTINUING PD GROUND FROZ-
EN HARD AND SUPPORTS ALL
TYPES OF "VEHICLES PD PARA
11 LOCAL ATTACK REPORTED
PROBABLY WAS TO SEIZE HILL
405 PD ENEMY IS CAPABLE OF
CONTINUING DEFENSE IN
PRESENT POSITION CMM MAK-
ING LOCAL ATTACKS TO IM-
PROVE HIS DEFENSIVE POSI-
TION CMM DELAYING TO
STRONGER POSITION ALONG
LAURIEX RIVER PD PARA 12
CONTINUED DEFENSE IN PRES-
ENT POSITION MOST PROBABLE.
Note: In joint service operations, the format in JCS Publication 12 will be followed.

F-a
FM 30-5

(Classification)

APPENDIX G

FORMAT FOR BOMBING, SHELLING AND MORTARING REPORTS


BOMREP, SHELREP, OR MORTREP (STANAG 2008)
(indicate which)

A. UNIT OF ORIGIN. (Use current call sign, address group or code


name.)
B. POSITION OF OBSERVER. (Grid reference preferred—encode if
this discloses the location of a headquarters or important observation post,
or if sub-paragraph F2, below is used to give information on location.)
C. DIRECTION AND ANGLE OF FALL/DESCENT (Omit for air-
craft). DIRECTION (bearing) of FLASH, SOUND, or GROOVE OF
SHELL (state which) is measured CLOCKWISE from GRID NORTH in
mils, unless otherwise specified. The ANGLE of FALL/DESCENT may be
determined by placing a stick/rod in the fuze tunnel and measuring in mils,
unless otherwise specified, the ANGLE formed by the stick/rod in relation
to the horizontal plane.
D. TIME FROM.
E. TIME TO.
F. AREA BOMBED, SHELLED, ROCKETED, OR MORTARED. May
be sent either as :
1. Grid reference (Clear reference is to be used).
OR
2. Direction measures clockwise from grid north to impact points (De-
grees or mils—state which) and distance in yards or meters (state which)
from observer. This information must be encoded. (When this method is
used, maximum accuracy possible is essential.)
G. NUMBER AND NATURE OF GUNS, MORTARS, ROCKET
LAUNCHERS, AIRCRAFT, OR OTHER METHODS OF DELIVERY.
H. NATURE OF FIRE.- (Adjustment, bombardment, harassing, etc.)
(May be omitted for aircraft.)
I. NUMBER, TYPE AND CALIBER. (State whether measured or
assumed) of SHELLS, ROCKETS (OR MISSILES) BOMBS, ETC.
J. TIME FROM FLASH TO BANG. (Omit for aircraft.)
K. DAMAGE. (Encode if required.)

(Classification)
O-l
FM 30-5

APPENDIX H

REPORT FORMATS FOR REPORTING ENEMY NUCLEAR DETONATIONS, RADIOACTIVE


FALLO UT, AND CHEMICAL AND BIOLOGICAL ATTACKS
(ST AN AG 2103)

Note: The North American Air Defense Command uses NORAD Manual 55-19, Vol. 8, NBC Reporting Procedures
and Techniques.

Section I. GENERAL

H-l. NBC Reports formation source submits NBC reports through


command, intelligence, or field artillery communi-
Reports of enemy or unidentified nuclear, biologi- cations channels, as appropriate, to the designated
cal, and chemical (NBC) attacks and the resulting headquarters tactical operations center by the
chemical, biological, and radiological (CBR) haz- fastest means.
ardous areas are made according to the provisions
of STANAG 2103. Expected chemical and radio- a. Nuclear Attack Report. The information
logical hazardous areas resulting from nuclear source, normally headquarters of field artillery
and chemical attack by friendly forces is also and air defense units (other units may also be
reported. These reports are : designated as collection and reporting agencies.
See appendix D, FM 3-12.) submits—
a. NBC 1. Report used by the observing unit (1) An initial NBC 1 nuclear report to its
to give initial and subsequent data of an enemy next higher headquarters, with a FLASH mes-
chemical, biological, or nuclear attack. sage precedence.
b. NBC 2. Report used for passing evaluated (2) Subsequent NBC 1 nuclear reports to its
data of a chemical, biological, or nuclear attack. next higher headquarters with an IMMEDIATE
c. NBC S. Report used for immediate warn- message precedence, giving followup data.
ing of expected chemical, biological, and radiologi- b. Chemical and Biological Attack Reports. The
cal contamination or hazardous area: information source, normally headquarters of a
d. NBC U. Report used for radiation dose- company or independent platoon, submits—
rate measurements. (1) An initial NBC 1 chemical or biological
report to its next higher headquarters with a
c. NBC 5. Report used to locate the area of FLASH message precedence. The next higher
chemical, biological, and radiological contamina- headquarters forwards the initial NBC 1 chemical
tion or hazard. or biological report through command channels to
the NBC collection center with the same message
H-2. Initial Nuclear, Biological, or Chemical precedence.
Attack (2) Subsequent NBC 1 chemical or biological
The INITIAL enemy use of nuclear, biological, reports to its next higher headquarters with an
or chemical weapons is reported to the theater IMMEDIATE message precedence, giving follow-
commander through the chain of command by the up data. The next higher headquarters forwards
fastest means with the highest message prece- subsequent NBC 1 chemical or biological reports
dence. through command channels to the NBC collection
center with the same message precedence.
H-3. NBC Information Source
The information source may be a unit under at-
H-4. NBC Collection Center
tack or a unit observing an attack. The NBC in- The NBC collection center, normally the CBR ele-

H-l
FM 30-5

ment of the tactical operations center at division, H-5. NBC Control Center
consolidates NBC 1 nuclear, biological, or chemi- The NBC control center, normally the CBR ele-
cal reports of the same attack received from its ment of the tactical operations center at field
various information sources and transmits an army, consolidates and evaluates NBC reports
NBC 1 report to the NBC control center, normally received from subordinate commands and Air
the tactical operations center at field army head- Force, Marine Corps, and civilian installations
and agencies. It directs reconnaissance and survey
quarters. It transmits appropriate NBC 2, 3, and
efforts; transmits evaluated chemical, biological,
5 reports to subordinate, adjacent, and higher and radiological data to subordinate commands
commands. If there is no CBRE, the G3 assumes and adjacent area commands; and submits appro-
these responsibilities. priate reports to higher headquarters, adjacent
commands, and national agencies. If there is no
CBRE, the G3 assumes these responsibilities.

Section II. FORMAT OF REPORTS


(STANAG 2103, Edition No. 3, Abstract)

H—6. Description of Letter Items (1) The letter items as shown below are
a. Purpose. To describe the meaning of the let- used in appropriate NBC reports.
ter items that are used in NBC reports. (2) NATO forces operating in a NATO area
6. Notes. use ZULU time only for these reports.

MEANING
LET- MEANING
TER CHEMICAL OR BIOLOGICAL
NUCLEAR REPORTS
REPORTS
A. Strike serial number (s). Strike serial number (s).
B. Position of observer (UTM or Position of observer (UTM or
place). place).
C. Direction measured clockwise Direction measured clockwise from
from grid or magnetic north grid or magnetic north (state
(state which) of the attack which) of the attack from obser-
from observer (degrees or mils, ver (degrees or mils, state which).
state which).
D. Date/time of detonation (local Date/time attack started (local or
or ZULU time, state which). ZULU time, state which). If local
If local time is used, give the time is used, give the letter of the
letter of the local time zone, if local time zone, if known. See FM
known. See FM 101-10-1 for 101-10-1 for time-zone charts. If
time-zone charts. If the local the local time is used and the
time is used and the time-zone time-zone letter is not known, the
letter is not known, the word word "local" will be transmitted
"local" will be transmitted with with this item.
this item.
E. Illumination time. (Report only Time attack ended (local or ZULU,
when other data are not avail- state which).
able. Report in seconds.)
F. Location of attack (UTM or Area attacked (actual or estimated,
place) (actual or estimated, state which).
state which).
G. Means of delivery, if known. Means of delivery, if known.
H. Type of burst—air, surface, or Type of agent, if known (chemical
unknown (state which—includ- or biological). Type of attack
ing height, if known. (chemical or biological).

H-2
FM 30-5

MEANING
LET- MEANING
TER CHEMICAL OR BIOLOGICAL
NUCLEAR REPORTS REPORTS
I. (This letter item is not used Type and number of munitions or
for nuclear report.) aircraft (state which).
J. Flash-to-bang time (seconds).
K. Crater present or absent and
diameter, if known (meters).
L. Nuclear burst angular cloud
width measured at 5 minutes
after the detonation (degrees
or mils, state which). (Do not
report if data are obtained
more than 5 minutes after the
detonation.)
M. Stabilized cloud-top angle and/
or cloud-bottom angle (state
which) or cloud-top height
and/or cloud-bottom height
(state which) measured at H
-f 10 minutes (degrees, mils,
meters, or feet—state which).
N. Estimated yield (KT).
0. Reference date/time for esti-
mated contours when not H -f-
1 hour.
P. For radar purposes only : Area of expected contamination
P.A. UTM coordinates of (UTM).
points to outline external
contours of radioactive
cloud.
P.B. Effective wind direction
(direction from which
the wind is blowing) in
degrees or mils (state
which).
Q. Location of reading (UTM).
R. Dose rate (rad/hr). The words
"initial," "increasing," "peak,"
or "decreasing" may be added.
S. Date/time of reading (local or Date/time contamination initially
ZULU time, state which). detected (local or ZULU time,
state which).
T. H + 1 date/time (local or Date/time of latest reconnaissance
ZULU time, state which). of contamination in the area
(local or ZULU time, state
which).
U. 1,000 rad/hr contour line co-
ordinates (UTM) (red).
V. 300 rad/hr contour line coor-
dinates (UTM) (green).
W. 100 rad/hr contour line coor-
dinates (UTM) (blue).
X. 20 rad/hr contour line coor- Located area of contamination
dinates (UTM) (black). (UTM) (yellow).

H-3
FM 30-5

Direction measured clockwise


from grid north to the left and
then to the right radial linea
(degrees or mils, state which—
4 digits each).
Effective windspeed (kmph), 3
digits; downwind distance of
zone I (km), 3 digits; cloud
radius (km), 2 digits. (When
effective windspeed is less than
8 kmph, the NBC 3 report will
contain only three significant
digits, that is, the radial dis-
tance of zone I.)

H-7. NBC 1 Reports items D, H, and either B and C or F must always


o. Purpose. Report used by observing unit, giv- be reported ; other items are optional.
ing initial data and subsequent followup data of (3) Users of NBC 1 reports are not confined
an enemy nuclear, biological, or chemical attack. solely to the use of the letter items from para-
6. Notes. graph E-6, FM 21-40 may be added at the users'
(1) NBC 1 report follows the same format as discretion.
the SHELLREPS, MORTREPS, and BOM- (4) For examples of NBC 1 chemical report
BREPS, which are included in STANAG 2008 messages," see paragraph E-8, FM 21-40.
dealing with conventional enemy attacks. (5) For examples of NBC 1 nuclear report
(2) The item "Type of Report," and letter messages, see FM 3-12.

LET- EXAMPLE EXAMPLE EXAMPLE


TER MEANING NUCLEAR CHEMICAL BIOLOGICAL
Precedence*
Date/time (local or ZULU time,
state which)
Security Classification
From
To
Type of Report NBC 1 NBC1 NBC 1
(NUCLEAR) (CHEMICAL) (BIOLOGICAL)
A. Strike serial number (if known—as A. 04 A. 02
assigned by the CBRE at the oper-
ations center responsible for the
area in which the strike occurs).
B. Position of observer (UTM) or LB 196400 B. MARVILLE
place).
C. Direction measured clockwise from C. Grid 060 degrees
or magnetic north (state which) of
the attack from observer (degrees or
mils, state which).
FM 30-5

LET- EXAMPLE EXAMPLE EXAMPLE


TER MEANING NUCLEAR CHEMICAL BIOLOGICAL
D. Date/time of detonation or date/ D. 201405 ZULU D. 201405 (local) D. 201405 HOTEL
time attack started (local or ZULU
time, state which).
E. Illumination time (seconds) or time E. 201412 (local)
attack ended (local or ZULU, state
which).
F. Location of attack (UTM or place) F. LB 25305 F. LB 2030
or area attacked (actual or esti- estimated actual
mated, state which).
G. Means of delivery, if known G. Artillery G. Aircraft, 100
meters
H. Type of burst—air, surface, or un- H. Surface H. Airburst, nerve H. Aerial spray
known (state which)—including
height, if known; type of agent, if
known (chemical or biological) ; or
type of attack (chemical or
biological).
I. Type and number of munitions or
aircraft (state which).
J. Flash-to-bang time (seconds) J. 60
K. Crater present or absent and di-
ameter if known (meters).
L. Nuclear burst angular cloud width L. 280 mils
measured at 5 minutes after the
detonation (degrees or mils, state
which). (Do not report if data are
obtained more than 5 minutes after
the detonation.)
M. Stablized cloud-top angle and/or
cloud-bottom angle (state which) or
cloud-top height and/or cloud-
bottom height (state which) mea-
sured at H+10 minutes (degrees,
mils, meters, or feet—state which).
S. Date/time of reading or date/time S. 201500 (local)
contamination initially detected
(chemical or biological). State
whether local or ZULU time.
X. Located area of contamination X. LB 208303
(UTM). LB 208308
Note. When the contaminated area is LB 203303
a complete circle, the first coordinate LB 203308
will be repeated as a last coordinate.

H-5
KMiL [lK(2iiñf¡i(pCoo ®í? OönofeB giiñiEl italbsQiôjtaGûTiî KîitC 1] (b) If a persistent chemical agent was used
in the attack and the contaminated area is located,
Chemical Eepoirts
the company submits another subsequent NBC 1
Company A, 2d Batallion of the 1st Brigade, is report, giving followup data and using the same
under artillery chemical attack. The call sign of strike serial number as was used in the initial
the 2d Battalion is REDDOG and o£ the 1st Bri- NBC 1 report, as follows :
gade is VICTOR. Examples of initial and subse- IMMEDIATE
quent NBC 1 chemical reports from the company 201438 HOTEL
through the brigade are given below. The actual FROM ALFA
message format follows the unit SOP. TO REDDOG
a. Actions by Company A. First, the company NBC 1 CHEMICAL
alerts its subordinate units of the company net ALFA 02
with a FLASH precedence brevity code "GAS."' X-RAY LIMA BRAVO 208303, 208308,
203303, 203308
(1) Initial NBC 1 chemical report. The com-
pany alerts the 2d Battalion (S3) with an initial ô. Actions by 2d Battalion. First, the battalion
NBC 1 report, assigning its own strike serial alerts its subordinate, attached, and supporting
number as follows : units on the battalion net with a FLASH preced=
ence brevity code "GAS."
201408 HOTEL (1) initial NBC 1 chemical report. The bat-
FROM ALFA talion submits an initial NBC 1 report to the 1st
TO REDDOG Brigade, based on the Company A NBC 1 report
CHEMICAL received (and repeats pertinent parts of the body
of the message on the battalion net), assigning its
own strike serial number, as follows :
DELTA 201405 HOTEL FLASH
FOXTROT LIMA BRAVO 205305 ESTI- 201411 HOTEL
FROM REDDOG
GOLF ARTILLERY TO VICTOR 3
HOTEL AIR NBC 1 CHEMICAL
FROM EEDDOG 3
The actual message might be transmitted as fol-
FLASH FLASH, REDDOG REDDOG, BRAVO MARVILLE
1 CHEMICAL, FROM ALFA, 201408 DELTA 201405 HOTEL
HOTEL, ALFA 02, BRAVO MARVILLE, FOXTROT LIMA BRAVO 205305 ESTI-
DELTA 201405 HOTEL, FOXTROT LIMA MATED
205305 ESTIMATED, GOLF ARTIL» GOLF ART2LLEEY
LERY, HOTEL AIR, END OF MESSAGE, HOTEL AIR
MORE TO FOLLOW.
(2) Subsequent NBC Î chemical reports. Ta©
(2) Subsequent NEC 1 chemical reports. battalion submits subsequent NBC 1 reports to
(a) When the chemical agent used in the the 1st Brigade, based on the NBC 1 reports re-
chemical attack has been identified, the company ceived from Coîicpany A (and repeats pertinent
submits a subsequent NBC 1 report, using the parts of the body of the message on the battalion
same strike serial number as used in the initial net), using the same strike serial number used in
NBC 1 report and giving its initial NBC 1 report.
Mote: I£ more tlhan one company of the battalion sisb-
IMMEDIATE imits NBC 1 reports for the same chemical attaeis, the
201418 HOTEL battalion consolidates the several NBC 1 reporta received
and submits one NBC 1 report to the 1st Brigaás.
FROM ALFA
TO REDDOG c. AetioTis by the 1st Brigade. Fi^st, t!he brigade
NBC I CHEMICAL alerts its subordinate, attached, and supporfcœg
ALFA 02 units on the brigade net with a FLASH preeed»
ECHO 201412 HOTEL ence brevity code "GAS."
HOTEL NERVE {1} initial NBC 1 chemical report The Itei-

Dfl=ö
FM 30-5

gade transmits the 2d Babtalion initial NBC 1 b. Notes.


report to the division TOC (and repeats pertinent (1) This report is normally based on two or
parts of the body of the message on the brigade more NBC 1 reports. It includes an attack loca-
net), assigning its own strike serial number. tion and, in the case of a nuclear detonation, an
(2) Subsequent NBC 1 chemical reports. The evaluated yield.
brigade transmits the 2d Battalion subsequent (2) When adjacent agencies (for example,
NBC 1 reports to the division TOC (and repeats Navy and Civil Defense organizations) use a dif-
pertinent parts of the body of the message on the ferent radiological fallout prediction system, this
brigade net), using the same strike serial number report may be sent to provide basic data for their
used in its initial NBC 1 report. fallout computations.
Note: If more than one battalion submits NBC 1
reports for the same chemical attack, the brigade con- (3) Letter items A, D, F, H, and N may be
solidates the several NBC 1 reports received and submits repeated as often as necessary to produce a sum-
one NBC 1 report to the division TOC. mary report.
(4) Users of NBC 2 reports are not confined
H-9. NBC 2 Reports solely to the use of the letter items shown in the
a. Purpose. Report used for passing evaluated examples ; other letter items from paragraph E-6,
data of a nuclear, biological, or chemical attack. FM 21-40, may be added at the users' discretion.
LET- EXAMPLE EXAMPLE
TER MEANING NUCLEAR CHEMICAL AND BIOLOGICAL
Precedence
Date/time (local or ZULU time, state
which).
Security Classification
From
To
Type of Report NBC 2 NBC 2
(NUCLEAR) (CHEMICAL)
A. Strike serial number. A. 24 A. 1
D. Date/time of detonation or date/ D. 201405 ZULU D. 200945 (local)
time attack started (loal or ZULU
time, state which).
F. Location of attack (UTM or place) or F. LB 187486 F. LB 126456 actual
area attacked (actual or estimated,
state which).
G. Means of delivery, if known.
H. Type of burst—air, surface, or un- H. Surface H. Nerve
known (state which)—including
height, if known; type of agent, if
known; (chemical or biological); or
type of attack (chemical or biological).
N. Estimated yield (KT). N. 50

H-10. NBC 3 Reports b. Notes.


(1) When adjacent agencies (for example.
a. Purpose. Report used for immediate warning Navy and Civil Defense organizations) use a dif-
of expected chemical, biological, or radiological ferent radiological fallout prediction system, NBC
contamination or hazardous area.

H-7
HM SO-5

2 report may be sent to provide basic data for FM 21-40, may be added at the users' discretion.
their fallout computations. (3) When the effective windspeed is less than
(2) Users of NBC 3 reports are not confined 8 kmph, the NBC 3 nuclear report will consist of
solely to the use of the letter items shown in the the letter items D, F, and Z. A will contain three
examples ; other letter items from paragraph E-6, digits only, that is, the radial distance of zone I.

LET- EXAMPLE EXAMPLE


TER MEANING NUCLEAR CHEMICAL AND BIOLOGICAL
Precedence
Date/time (local or ZULU time, state
which).
Security Classification
From
To
Type of Report NBC 3 NBC 3
(NUCLEAR) (CHEMICAL/BIOLOGICAL)
A. Strike Serial No. A. 24
D. Date time of detonation or date/time D. 201405 ZULU D. 201415 (local)
attack started (local or ZULU time,
state which).
F. Location of attack (UTM or place) or F. LB 187486 actual F. LB 206300 actual
area attacked (actual or estimated,
state which).
P. Area of expected contamination P. LB 208320, LB 210320,
(UTM). LB 206130, LB 204310.
Y. Direction measured clockwise from Y. 0272-0312 degrees
grid north to the left and then to the
right radial lines (degrees or mils,
state which—4 digits each).
Z. Effective windspeed (kmph), 3 digits; Z. 019-025-05
downwind distance of zone I (km), 3
digits; cloud radius (km), 2 digits.
(When effective winc'speed is less than
8 kmph, use three digits only for
radial distance of zone I.

H-11. NBC. NBC 4 Reports (4) For example of an NBC 4 radiation


a. Purpose. Report used for radiation dose-rate dose-rate message, see paragraph E-12, FM
measurements. 21-40.

b. Notes. LET-
TER MEANING EXAMPLE
(1) Letter items Q, R, and S may be repeated
as often as necessary. Precedence
Date/time (local or ZULU
(2) Radiation dose rates are measured in the
time, state which).
open, 1 meter above the ground. Other conditions Security Classification
will be specified in the message. From
(3) Users of NBC 4 reports are not confined To
solely to the use of the letter items shown in the Type of Report NBC 4
examples ; other letter items from paragraph E-6, (NUCLEAR)
FM 21-40, may be added at the users' discretion. Q. Location of reading (UTM). Q. LB 123987

H-8
FM 30-5

LET- chemical, biological, or radiological contamination


TER MEANING EXAMPLE or hazard.
R. Dose rate (rad/hr). (This is R. 1 INITIAL 6. Notes.
NOT normalized to H-f 1 (1) The report is best sent as a trace or over-
hour.) The words "initial," lay if time and distance permit.
"increasing," "peak," or
(2) When the contamination arises from a
"decreasing" may be added.
single enemy or unidentified nuclear burst, the
S. Date/time of reading (local or S. 201735 dose rate always refers to H + 1 hour, and the
ZULU, state which). (local). letter item T is used. When there have been sev-
Q. LB 129965 eral nuclear detonations at different times or on
R. 60 different days and no single H + 1 hour is possi-
S. 201650 ble, the dose rates are reported as at a specified
(local). time, using letter item O. Letter items O and T
Q. LB 146808 are, therefore, alternative and cannot both be
R. 27 IN- used in the same report.
CREAS-
(3) It is not necessary or even desirable to
ING.
report all four of the contours of different dose
S. 201710
(local) rates. Four are given to provide flexibility. (In
the example only two are reported. )
(4) When a contour closes to form a complete
H-12. Example of an NBC 4 Report Message ring, the first coordinate is repeated at the end
Company A, 2d Battalion of the 1st Brigade, is (see example for 300 rad/hr.)
transmitting radiation dose-rate measurements (5) Colors for plotting, and when sending the
described in the example, paragraph E-ll, FM report as a trace, are as follows :
21-40. The call sign of the 2d Battalion is RED- Red for 1,000 rad/hr.
DOG. The local time zone is HOTEL. An example (Green for 300 rad/hr.
of the first NBC 4 radiation dose-rate message is Blue for 100 rad/hr.
given below. Black for 20 rad/hr.
REDDOG 3 REDDOG 3 Yellow for chemical and biological contami-
IMMEDIATE NBC 4 nation or hazardous area.
FROM ALFA (6) Contour lines are to be annotated with
201745 HOTEL the dose rates.
QUEBEC LIMA BRAVO 123987 (7) When requested, decay rates are to be
ROMEO 1 INITIAL transmitted according to letter item R.
SIERRA 201735 HOTEL
(8) Users of NBC 5 are not confined solely to
the use of the letter items shown in the examples ;
H-13. NBC 5 Report other letter items from paragraph E-6, FM
o. Purpose. Report used to locate the area of 21-40, may be added at the users' discretion.

LET- EXAMPLE EXAMPLE


TER MEANING NUCLEAR CHEMICAL AND BIOLOGICAL
Precedence
Date/time (local or ZULU time, state
which).
Security Classification
From
To
Type of Report NBC 5 NBC 5
(NUCLEAR) (CHEMICAL/BIOLOGICAL)

H-9
FM 30-5

LET- EXAMPLE EXAMPLE


TER MEANING NUCLEAR CHEMICAL AND BIOLOGICAL
Strike serial number (s) causing con- A. 24 A. 1
tamination (if known).
Reference date/time for estimated
contours (see note (2) above) when
not H+l hour.
Date/time contamination initially S. 200800 (local)
detected (chemical or bioligical (local
or ZULU time, state which).
H+l date/time or date/time of latest T. 201505 ZULU T. 201045 (local)
reconnaissance of contamination in the
area (chemical or biological). State
whether local or ZULU time.
U. 1,000 rad/hr contour line coordinates.
V. 300 rad/hr contour line coordinates. V. ND 651455
ND 810510
ND 821459
ND 651455
W. 100 rad/hr contour line coordinates. W. ND 604718
ND 991686
ND 114420
ND 595007
20 rad/hr contour line coordinates, or X. CHEMICAL
located area of contamination ND 206991
(chemical or biological). ND 201575
ND 200787
ND 206991

H-10
FM 30-5

APPENDIX I

EXAMPLE OF CLIMATIC SUMMARY

CLIMATIC SUMMARY FOR THE MONTH OF JULY


III CORPS AREA

1—1. General Circulation


Generally air flows from the west and northwest. Occasionally warm, dry continental air from the
Soviet Union causes a relatively intense, dry heat with temperatures of 90° or more.

1-2. Temperatures
Afternoon temperatures generally are in the 70s and morning temperatures are in the 50s. There are
occasional periods of hot, dry spells that last more than a week with temperatures in the 90s.
The highest temperature ever recorded was 101° F.

1-3. Thunderstorms
Thunderstorms occur frequently. They usually develop during the day and reach maximum inten-
sity in the late afternoon and evening.

1-4. Surface Winds


The average wind speed is 5.8 knots. The most predominant direction is northeast, with a mean
speed of 8.4 knots. The strongest mean wind is from the east-northeast 10.0 knots. Calms are fre-
quent occurring 25.2 percent of the time, and usually in the early morning. Calms or near calms
often last the whole day.

Percentage frequency of surface winds by direction for month of July

S SSW sw WSW W WNW NW NNW N NNE NE ENE E ESE SE SSE


2.1 2.0 8.6 1.0 0.7 0.3 0.4 0.0 1.2 2.1 19.5 10.9 12.2 2.7 9.6 1.0

Average surface wind speed by direction for month of July

S SSW SW WSW W WNW NW NNW N NNE NE ENE E ESE SE SSE


5.6 9.4 8.8 7.6 6.8 8.3 3.2 0.0 5.0 6.3 8.4 10.0 7.1 6.6 6.0 4.0

1-5. Cloudiness
Mornings frequently are clear. Clouds develop by noon and cloud cover reaches a maximum in the
late afternoon, decreasing to nil just before sunset.

1-6. Visibility
Normal visibilities are from 7 to 13 kilometers and occasionally farther. Occasional haze may re-
duce visibility to about 3 kilometers.

1-1
FM 30-5

1—7. Précipitation
Thunderstorms are the usual cause of precipitation. Occasionally a southwesterly wind will cause
continued drizzle and low, overcast skies for 1 to 3 days. This is the only time low visibilities oc-
cur.
Years
Jim Jul Aug Annual recorded
Mean precipitation (incies) ^66 ^48 2^6 26.97 40

Meaa number of days with thunderstorm 4 4 3 18 11


Temperature (0 F.)
Absolute max 95 101 97 .■. 10 ,
Absolute min 50 43 43 10
Mean daily max 71 74 73 40
Mean daily min 51 66 53 — 40
Mean number of days with fog 2 2 4 57 11

t-ä
FM 30-5

APPENDIX J

INTELLIGENCE ESTIMATE
(STANAG 2118, SEASTAG 2118)

Section I. THE MISSION


A restatement of the assigned and/or assumed mission of the command.

Section II. THE AREA OF OPERATIONS


J-l. General J-2. Weather
a. Weather and terrain always are included in The estimate usually includes a current weather
the characteristics of the area of operations dis- forecast. When operations cover a long period, or
cussed in paragraph 2 of the intelligence estimate. are programed for a future operation, climatic
Other characteristics are included if they are im- information may replace weather data forecasts.
portant in selecting courses of action by either Light data, in tabular form, include the beginning
force to carry out their mission, assigned or as- or morning nautical and civil twilights, the ending
sumed. Characteristics, other than weather and of evening nautical and civil twilights, moonrise,
terrain, are of greater importance in areas of op- moonset, phase of the moon, and other informa-
erations which have large civilian populations and tion, as required.
to commands with extensive territorial or combat
service support responsibilities. J—3. Terrain
b. The effects of each characteristic on nuclear The existing terrain situation usually is described
weapons and chemical and biological agents are in terms of the tactical aspects of the area : obser-
discussed when either combatant has the capabil- vation and fire, cover and concealment, obstacles,
ity to use them. The discussion includes considera- key terrain features, and avenues of approach.
tion of both the weapons effects and impact on the The discussion of each of these aspects is oriented
delivery means. on its influence on the selection of broad courses
of action by either force. For example, for a
c. The discussion of the effects of each charac- combat service support unit, the discussion of
teristic of the area of operations on possible cover and concealment is oriented on their influ-
enemy courses of action normally includes consid- ence on those courses of action, including installa-
eration of ability to attack and to defend. It also tion locations, required to accomplish the combat
includes, as applicable, consideration of effects on service support mission and on enemy forces
other possible enemy courses of action, such as which can interfere with the accomplishment of
delay, and on the enemy's possible use of particu- the mission. In combat service support unit intel-
lar weapons, methods, techniques, or forces. ligence estimates, discussion of key terrain fea-
tures is omitted unless the enemy has the capabil-
d. The extent of consideration of the effects of ity to seize or control terrain features which will
each characteristic on broad friendly courses of materially affect the accomplishment of the mis-
action is limited by the mission. When the mission sion.
is offensive, the discussion does not include con-
sideration of defensive courses of action. It does, J-4. Other Characteristics
however, include consideration of security. The following additional subparagraphs of the in-

J-l
FM SS^S

tsîîigeTice estimate are considered, as pertment: ¡<r,


items as science, ms
sociology^ politics, economics, psychology, and power, and (They are analyzed
other factors. Other factors may include sucb imdeir tlhe same headings as

3SUü©¡ñl ¥K^m mmm©^


J—S. [D)Dc;°;©83(fö©!ruö ¿MU (ScsüññlIñAGíá] [rOreOS CslKts] ^QDtfùfereQïùîOlnlte
Reference may be made to overlays, eîiemy sitma- c. Committed Forces. Committed forces are
tion maps or previously published documents. those enemy ground units in contact whose area
of employment is not expected to change to
¿Mb. EOJTcIpSGDÍÍDOOíl counter the specific course of action selected by
a. This subparagraph lists the order of data the friendly commander. Committed forces may
used for later determination of the strength the change disposition within their area of employ-
enemy may use to prevent the accomplishment of ment, but no significant delay is involved in theii?
the mission. It lists all the units, including insur- employment. Designation of enemy forces as com-
gent and guerriî!a=type forces, with identifications mitted forces depends primarily upon their dispo-
and subordination as known, that can affect the sition, location at the time of the estimate, and the
accomplishment of the mission. Included are such echelon at which the estimate is being prepared.
supporting units as air, muclear delivery, and elec-
tronic warfare units that also can affect the b. Reinforcements. Reinforcements are
accomplishment of the mission. In determining enemy forces whose area of possible employment
which enemy units can affect the accomplishment against the friendly force depends on the friendly
of the mission, time and space factors are consid- selection of a specific course of action and enemy
ered. capabilities. Reinforcements include ail known
enemy forces which are neither committed against
&. This subparagraph lists other forces, includ- a friendly force nor committed outside the
ing long-range weapons delivery units, that may friendly zone or sector, but which can reasonably
be used in support of the enemy ground elements be considered capable of closing with the friendly
in time to affect the accomplishment of the mis- force in time to affect the accomplishment of the
sion. Enemy units believed to be undeir control of mission.
the opposing comparable command but which aire
committed outside the zone of the friendly unit e. Guidelines for Computing Committeâ tmâ
also are listed by tactical units. Elements of the Reinforcing Enemy Units
opposing enemy force deployed in areas wheire (1) General. The information provided by
time and space factors do not permit their ¿ise in the G2 on enemy committed forces and reinforce-
time to affect the accomplishment of the ixission ments is used by the commander and the ops:?®,»
are indicated specifically. tions officer for planning and conducting tactical
operations. Accurate information is particularfy
important during the commander's analysis of op-
posing courses of action. For example, in planning
a. This subparagraph lists all the opposing
for an attack, an over-estimation of committed
enemy forces which can be logically employed enemy forces and an underestimation of enez
against the command in time to affect the accom- reinforcements could cause the friendly
plishment of the mission. The total forces listed mander to attack with a small reserve. The G2's
cannot exceed, but can equal or be less than, the
error in computing committed and reinforcing
total forces listed in the "composition" subpara-
forces could allow the enemy to counterattack
graph.
with an unexpectedly strong force, inMeting mac-
5. Enemy strength is categorized as comzmittsd ceptable casualties upon the friendly force.
forces, reinforcements, air, nuclear, chemicals and (2) All unecmmittsd eir.smy fc.Tces EíS CO:E»
biological operations. Air, nuclear, chemical, or sidered as reinforcements if they can be eomindt-
biological operations units are omitted, as appro- ted in time to affect the aecoffiplishiaísní; of the
priate, when the enemy lacks such capabilities to mission. If there is doubt as to whether an enescy
interfere with the accomplishment of the mission. unit is committed or reinforcing, it is esnsidorecl

cD. a
FM 30-5

as a reinforcement. This reduces the risk of the •identification and accurate strength computation
friendly command being surprised. at each echelon.
(3) Usually a G2 accounts for committed (8) All ground fire support weapons organic
enemy forces by the size of the enemy unit which to the enemy mechanized battalion or regiment
is opposing the friendly elements. For example, are referred to as "'normal regimental artillery"
against an aggressor organization, as given in FM and are always considered as in support of com-
30-102, a division G2 usually counts committed mitted forces. That is, each committed unit is as-
forces in terms of battalions ; a corps G2 in terms sumed to have available to it, its normal propor-
of regiments; and field army and higher head- tion of the available supporting weapons organic
quarters, in terms of divisions. At headquarters to the regiment. These weapons therefore need
above field army, a statement of the number of not be enumerated. Fire support weapons not or-
armies and army groups is also included. For ex- ganic to the enemy mechanized battalion or regi-
ample, "The committed forces facing this army ment which can be identified as within supporting
group consist of one army group (3 combined range are enumerated as in support of committed
arms armies with a total of 11 mechanized rifle forces. In the event that the forces committed
divisions and 3 tank divisions) . . . ." When the against the brigade or battalion have no known
committed forces, such as guerrillas, do not have TOE : i.e., "volunteer" or irregular type units, all
a known organization, the strength is stated in fire support weapons which can be identified are
total numbers. enumerated.
(4) The brigade S2 considers as committed (9) When enumerating enemy forces, enemy
forces the first and second echelon companies of security elements forward of the combat outpost
enemy mechanized, rifle, tank, or reconnaissance line are normally considered reinforcements of
battalions in contact with the brigade. Although the main defensive position until contact with
the enemy company is the basic sized unit used by these security elements is made. The intelligence
the brigade S2 in accounting for committed officer must correctly identify the enemy's main
forces, he will also account for smaller units defensive positions and must not be deceived by
which have been located as separately employed. security forces. The security forces will normally
become reinforcements for the main defense after
(5) The battalion S2 considers as committed completing their security mission.
forces the first and second echelon platoons of the (10) In addition to determining the enemy's
enemy mechanized rifle, tank, or reconnaissance ground combat unit strength in terms of commit-
companies in contact with the battalion. Although ted forces and reinforcements, the G2/S2 also
the enemy platoon is the basic unit used by the considers the enemy's air and nuclear weapons
battalion S2 in accounting for committed forces, stength. However, as estimates of enemy air, nu-
frequently available intelligence does not enable clear, chemical and biological warfare strength
the individual platoons composing the enemy com- are usually prepared only at field army level and
pany to be located. Therefore, the battalion S2 higher, the G2/S2 simply restates these capabili-
will consider that a located enemy company nor- ties in his estimate.
mally consists of three platoons; a company (11) Reinforcements are stated in convenient
minus consists of two platoons. and meaningful terms. For example, if the oppos-
(6) The designation of enemy units as com- ing division has a mechanized regiment in re-
mitted forces depends primarily on their disposi- serve, this reinforcement is referred to as a
tion and location at the time the estimate is made. "mechanized regiment," rather than "three mech-
Enemy unit identification may facilitate deter- anized battalions." When enemy units, either
mining if a particular unit is the reserve of ele- committed forces or reinforcements are very
ments in contact with the brigade or battalion. much understrength, the estimated remaining
(7) When an enemy unit of the size used in strength is expressed. Two divisions, each at half
accounting for committed forces is in contact with strength, are usually more formidable than a sin-
two adjacent friendly units, the entire enemy unit gle division at full strength because of the added
is considered to be committed by the G2/S2 of flexibility of employment and the additional
both friendly units. For example, if an enemy bat- combat support probably available. A half
talion is in contact with elements of two adjacent strength field artillery battalion is more than half
US divisions, both division G2s consider the en- as effective as a full strength battalion.
tire battalion as committed against their respec- (12) When only two elements of a unit can
tive divisions. This points up the need for correct be located they are counted as they appear. By

J-3
FM 30—5

triangulation it may be possible to determine the nized regiments (43d and 75th) of the Aggressor
approximate location of the third element. Al- 12th Mech Div are preparing field fortifications.
though this unit cannot be counted, the com- (2) Discussion. The four battalions of the 8th
mander should be advised as to its possible loca- and 12th mechanized regiments in contact with
tion. the 20th Inf Div are considered as committed
forces by the 20th Inf Div G2. Regardless of the
specific courses of action selected by the com-
J—9. Illustrative Examples of Committed and
mander of the 20th Inf Div to continue the ad-
Reinforcing Enemy Units
vance, the area of employment of these four bat-
a. Example 1 (Fig J-l). talions in contact will not change appreciably. The
(1) Situation. The 20th Inf Div, an interior second echelon battalions of the 8th and 12th Reg-
division, is advancing to the south. The advance iments are not considered committed since they
of the division has been stopped by elements of are not in contact and can be employed in other
two mechanized regiments (8th and 12th) of the areas. The 96th Regiment would be mentioned in
Aggressor 16th Mech Div. Each of these mecha- the "composition" subparagraph, but only its
nized regiments has two mechanized battalions in second echelon battalion would be listed as a rein-
contact and one mechanized battalion in the forcement by the 20th Division. The other two
second echelon. The third mechanized regiment battalions are committed against the 72d Division
(96th) of this division is in contact with the 72d and are not available as reinforcements against
Inf Div on the flank of the 20th Inf Div. About 25 the 20th Division. The 43d and 75th Regiments of
miles in rear of the 16th Mech Div, and in the the 12th Mech Division are considered as rein-
area of the 20th Inf Div objective, two mecha- forcements because these units are not committed

72
• • • • • •
• • •
x2* •
o o O 20 55
o O o o o ^S o ^^oo ^^o o X
, II,,

Ü' 96 8 ,& 8 Esl«


? -" ?
ÍE 12
J-JL

[SI 96 m
l I.,

m
JLJ-
12

Figure J-£. Sehematio sketch.

<M
FM 30-5

against the friendly force and can be committed their locations and dispositions, it is apparent
in time to affect the mission of the 20th Inf Div. that they are the reserves of the regiments com-
Although the two regiments of the 12th Mech Div mitted against the 20th Inf Div. Depending on the
are digging field fortifications in the vicinity of course of action selected by the commander of the
the division objective, the enemy commander can 20th Inf Div and the enemy plans, all or part of
employ these units against either thé 20th Inf Div these aggressor elements can be employed against
or adjacent divisions. the 20th Inf Div at various times and places, in
time to affect the accomplishment of the division
b. Example 2 (Fig J-2).
mission.
(1) Situation. The 20th Inf Div is attacking
to the east. c. Example 3 (Fig J-3). This example discusses
(2) Discussion. Aggressor committed forces the determination of Aggressor strength opposing
are the 3d Bn, 3d Mech Regt, three battalions of the 1st Brigade, 21st Infantry Division and each
the 5th Mech Regt and the 1st Bn, 7th Mech Regt. of its composite units, the 1st Battalion, 69th In-
The 2d Bn, 3d Mech Regt, the 3d Bn, 7th Mech fantry and the 1st Battalion, 70th Infantry.
Regt, and the 2d Bn, 33d Mech Regt are commit- (1) Situation. 1st Brigade, 21st Inf Div, with
ted against units on the 20th Inf Division flanks. the 1st Bn, 69th Inf and the 1st Bn, 70th Inf
The 1st Bn, 3d Mech Regt and the 2d Bn, 7th forward, is defending positions as indicated on
Mech Regt are not in contact and are second eche- figure J-3. Reports from 21st Inf Div indicate
lon battalions which may be employed against the that Aggressor has an unknown number of air
20th Inf Div. They are considered reinforcements. and nuclear weapons available.
Two aggressor mechanized regiments in the as- (2) S2, 1st Brigade determines Aggressor
sembly area astride the 20th Inf Div north bound- strength as follows :
ary and the aggressor mechanized regiment south (a) Committed Forces : 1st Brigade is op-
of the south boundary are reinforcements. From posed by three mechanized companies, one recon-

2
( Ö 33F

Figure J-2. Schematic situation sketch.

J-5
Ç^^^^^) r

1000 500 0 1000 2000


I I L _J I CONTOUR INTERVAL 50 METERS
SCALES IN METERS
Figure JS. Schematic sketch.
FM 30-5

naissance platoon and one medium tank company (3) S2, 1-69 Inf determines Aggressor
(10 tanks), supported by normal regimental artil- strength now opposing the battalion as follows :
lery, plus two 160-mm mortars, six 122-mm How- (a) Committed Forces : 1-69 Inf is opposed
itzers, six 100-mm AT guns (SP) and all available by two mechanized platoons, one reconnaissance
air and nuclear weapons. platoon and one medium tank platoon, supported
(&) Reinforcements: Aggressor reinforce- by normal regimental artillery, plus two 160-mm
ment available for commitment in the sector of mortars, six 122-mm Howitzers, six 100-mm AT
1st Brigade is unidentified mechanized battalion guns (SP) and all available air and nuclear weap-
located vicinity HILL 250. ons.
(&) Reinforcements: Aggressor reinforce-
(c) Discussion: The three mechanized pla- ments available for commitment in the sector of
toons northwest of HIGHWAY 82 BRIDGE are 1-69 Inf are: Unidentified mechanized battalion
disposed so as to logically constitute one mecha- located vie HILL 250 and unidentified mechanized
nized rifle company in contact with and commit- company and medium tank platoon located vie
ted against the 1st Brigade. The reconnaissance CHIGGER Woods.
platoon southwest of HILL 200 and the mecha-
nized company northeast of HIGHWAY 82 (c) Discussion: One mechanized platoon is
BRIDGE are in contact with and committed in contact with and therefore committed against
against the 1st Brigade and its respective adja- l-ßg Inf. The mechanized platoon north of bound-
cent brigades. All three platoons of the company ary 1-69 Inf—1-70 is counted as committed
northeast of HIGHWAY 82 BRIDGE are consid- against both 1-69 Inf and 1-70 Inf. The medium
ered committed against 1st Brigade since brigades tank platoon in the same vicinity is in contact
account for committed forces in terms of compa- with and therefore committed against both 1-69
nies. The mechanized company immediately south Inf and 1-70 Inf. S2, 1-69 Inf considers all of the
of CHIGGER Woods is located so as to logically recon platoon in contact because this is the size
be the reserve company of an enemy battalion in force the battalion S2 uses for computation of
contact with 1st Brigade and is therefore commit- enemy strength. None of the tanks organic to this
ted. The mechanized companies of the 25th and platoon have been specifically located at this time ;
23d regiments, located to the east and west of the however, they are accounted for as a normal com-
sector of the 1st Brigade are totally committed ponent of the reconnaissance platoon. The mecha-
against adjacent brigades and are therefore nei- nized rifle company and tank platoon located vie
ther committed nor available as reinforcements CHIGGER Woods which are considered as com-
against 1st Brigade, 21st Inf Div. Ten medium mitted by S2, 1st Brigade could logically be em-
tanks are located in the vicinity of the mechanized ployed against 1-69 Inf in time to affect the
rifle companies committed against 1st Brigade accomplishment of the battalion mission and are
and are therefore also committed. S2, 1st Brigade therefore considered as reinforcements. The dis-
would be equally correct to account for these com- cussion above (para c(2) (c)), concerning the bat-
mitted medium tanks as "three medium tank pla- talion vie HILL 250, the "normal regimental artil-
toons" or "ten medium tanks." (The three am- lery" and nonorganic weapons in support of com-
phibious tanks organic to the reconnaissance pla- mitted forces applies also to the determination by
S2, 1-69 Inf.
toon, although not specifically located at this time,
are accounted for as normal components of one (4) S2, 1-70 Inf determines Aggressor
reconnaissance platoon.) The ripsnorter, 85-mm strength now opposing the battalion as follows :
SP gun (ATAP) and 120-mm mortars located (a) Committed Forces : 1-70 Inf is opposed
north of the MUDDY River are part of the "nor- by four mechanized platoons and two medium
mal regimental artillery" in support of committed tank platoons supported by normal regimental ar-
forces. The 160-mm mortars, 100-mm AT (SP) tillery, plus two 160-mm mortars, six 122-mm
and 122-mm Howitzers are organic to the Aggres- Howitzers, six 100-mm AT guns (SP) and all
sor division artillery and are therefore not part of available air and nuclear weapons.
the "normal regimental artillery." However, they (b) Reinforcements: Aggressor reinforce-
are within supporting range and are therefore ments available for commitment in the sector of
enumerated as in support of committed forces. 1-70 Inf are: Unidentified mechanized battalion
The enemy also has an unknown number of air located vie HILL 250 and unidentified mechanized
and nuclear weapons which can be emloyed in company and medium tank platoon located vie
support of committed forces. CHIGGER Woods.

J-7
m ms
(c) DissuBsiovi i B2, ¿-TO Zmf consitíles-s táe employment of ground troops. As with the eisemy
individually located mechanized platoons vie air capability, it is rarely feasible to estimate
boundary 1-S9 Inf—1-70 Inf in the same manner what portion of the available enemy NBC effort
as dees §2, 1-S9 Inf. Two pîatcona of the mecha= may be used against a division or corps within a
mized company moirtheast of Hwy §2 Bridge aire field army or a command in the communications
considered cossumitted agaimst 1-70 Inf. E2, 4-§0 zone. It is also rarely feasible to estimate the
Mech could also consideir two platoons of this number of nuclear weapons the enemy is capable
compamy coHamstted against his battalion. The dis= of using within a period as short as one day. The
cmssioia ((2)(c) and (S)(c) above) concerning re= period selected is a month or other period depend-
inf orcements and supporting fires applies also in ing on the available information and past expsri-
the determination by E2,1-70 Inf.
c. The statement of the enemy capabilities to
«Ml®. ÄSr use chemical and biological agents includes, if
The enemy air capability is based upon numbers known, the amount, type, and delivery means of
of enemy aircraft within operational radius, available chemical and biological agents.
maintenance facilities, expected attrition, the
ground tactical situation, and other factors. The «0=11 2. [S©S©In]fl ©1 (/¡¡(al Í^FQSQIñlff iogmícg©^ ÄGtfOVOtfCGö
supporting tactical air force furnishes intelligence
on the number of sorties, by type, which the This paragraph summarizes recent and current
enemy can be expected to make within the field enemy activities which may serve as indicators to
army or comparable areas. The estimate usually is future enemy actions. Significant enemy failures
not prorated below the field army level. Usually to take actions also are listed. For example, if the
no attempt is made to calculate the number of enemy is apparently defending behind a river ob-
sorties the enemy can or may make against a sub- stacle but has failed to destroy certain bridges,
ordinate command of the field army or communi- the omission is listed as a significant activity. Any
cations zone section. Corps, division, and commu- basis for belief that the enemy has specific knowl-
nications zone command intelligence officers edge of the friendly situation or intentions also is
usually quote the estimate furnished by the higher listed. For example, mention is made of capture
headquarters in stating enemy air capabilities. by the enemy of an operation order or compro-
For example, a corps or division G2 might state, mise of current signal operation instructions of
"SOth Army estimates that the enemy can be ex- cover and deception operations.
pected to attack within the army area with as
many as 150 fighter, 100 attack, and 75 bomber
sorties daily. By massing all aircraft within oper- a. This paragraph lists peculiarities and weak-
ational radius, the enemy can make a maximum of nesses and briefly discusses each, indicating the
250 fighter, 300 attack, and 250 bomber sorties extent to which it is a vulnerability and how the
selection of bread friendly courses of action are
affected. For example, if the enemy has an op *î
flank, the fact is stated in the "operations" part
of the subparagraph and the extent to which the
a. Estimates of NBC enemy capabilities usually open flank constitutes an exploitable vulnerability
are prepared at field army and higher headquar- is discussed briefly. If enemy reserves are small
ters. Units below field army level usually lack the and are poorly positioned to extend the flank, the
means to gather the information to make such vulnerability may be great. If the enemy reserves
estimates. They use the estimates of the higher are large and in position to extend the flank or to
headquarters and modify them with available in- counterattack an enveloping force, the vulnerabil-
formation. ity is probably insignificant. The G2 might state it
as, "The enemy north flank is open. Available re-
b. The determination of enemy nuclear, biologi- serves are adequate to extend this Sank a distance
cal, and chemical operations capabilities is based of only about 3,000 mete.rs. Positions to extend
primarily on estimates of numbers and types of the flank have not been prepared. The esemy is
weapons and amount and types of agents availa- vulnerable to a iSank attack." Conversely, it ssight
ble, knowledge of enemy doctrine, past experience, be stated as, "The enemy north flank is open.
and estimates of enemy capabilities involving the However, available reserves are adequate either

«WD
FM 30-5
to extend this flank beyond our zone, or to coun- maneuver, or unconventional patterns of opera-
terattack an enveloping force. Positions suitable tions.
to block an attempted envelopment have been pre- Faulty organization of the terrain.
pared as shown on the enemy situation map." In Faulty disposition of reserves.
the first case, the enemy's vulnerability to a flank Susceptibility to electronic countermeas-
attack is carried forward to the "Conclusions" ures.
paragraph of the intelligence estimate. In the Inadequate troop training, especially in de-
second case, the open flank apparently is not a fense against nuclear weapons or chemical agents.
vulnerability, and is not carried any further. An- Lack of adequate mobility.
other example, if the guerrilla forces are poorly Inadequate air or artillery support, or nu-
equipped with antitank means of all types, the clear weapon delivery systems.
fact is stated in the "logistics" part of the subpar- Pronounced failure to disperse and dig in.
agraph and the extent to which this is an exploita- Habitual failure to attack certain types of
ble vulnerability is discussed briefly. The intelli- targets.
gence officer might state, "The guerrilla forces in (4) Combat Service Support.
our area are poorly equipped with antitank Shortages or inadequacies of particular
means. They cannot effectively defend against ar- supplies and materiel, including nuclear weapons.
mored vehicles." The inability to defend against Status of equipment, if less than 80 per-
armored vehicles is carried forward to the "Con- cent.
clusions" paragraph as a vulnerability. Large concentrations of supplies.
b. Typical peculiarities and weakness include— Location of vulnerable points and bottle-
(1) Personnel. necks in the logistics system or lines of communi-
Replacement situation (shortages or over- cations.
ages, particularly in specialists). Inability to resupply during action.
Morale less than excellent, or exceptionally Failure to equip troops with protective
high. Disproportionate number of very young or masks or protection clothing.
very old men. (5) Civil-Military Operations.
High rate of sickness.
Percentage of authorized strength, if less Hostile attitude toward the civil populace,
than 80 percent. or of the civil populace toward the enemy.
(2) Intelligence. Inadequacies in the control of civil commu-
Susceptibility to deception or neutraliza- nications, to include movement of civilians.
tion of certain enemy information collecting agen-
cies. (6) Personalities.
Overdependence on one or more categories Peculiarities or weaknesses of the enemy
of information sources. commander, major subordinate commanders, or
Ineffectiveness of enemy intelligence. principal staff officers, as disclosed by or deduced
(3) Operations. from their past performance, education, politics,
Habitual repetition of certain schemes of experience, or other basis.

Section IV. ENEMY CAPABILITIES

J-14. Enumeration available nuclear weapons, artillery and air


This paragraph lists the enemy capabilities. (strength)." Another example, "Conduct harass-
Enemy capabilities are courses of action which ing operations (what) at any time (when) in our
the enemy can adopt and which will influence the area (where) with about 200 guerrillas equipped
accomplishment of the friendly mission, either fa- only with small arms (strength)." For determina-
vorably or unfavorably. A properly stated enemy tion of enemy capabilities see paragraph J-19
capability indicates what the enemy can do, when through J-25.
he can do it, where he can do it, and in what
strength he can do it. For example, "Attack J-l 5. Anal/sis and Discussion
(what) now (when) along our front (where) a. The evidence considered in the analysis and
with five mechanized battalions supported by all discussion of enemy capabilities includes charac-

J-9
PM SSKS

tcris&s of tlh® ai?££ of opsiration s,ná positive or eapIcysEient of the unidestiñed taak division ci
negative evidence of enemy activity, firom the TMOüíIYEH will deprive him of the reserves to
"recent and present signiñc&nt activities" subpair- counterattack a penetration by either of the two
agraph. A major obstacle across part of the friendly divisions to our south. Commitment of
friendly area is evidence that attack eüsewäere is this tank division too early will result in the later
Eücrs likely. Lew eeiüiisgs and low visibility are defeat of the esiercy.'"
evidence that the enemy may not use all his avail-
able aircraft. Opes, flat areas without any appre- c. If there is no evidence of the enemy's possible
ciable cover are evidence that the enemy may not adoption of a particular capability, and the capa-
use gíiemíla or infiltration forces. bility does not represent a major threat to the
accomplishment of the mission, the intelligence
&. In analyzing and discussing each enemy officer does not judge it. For example, -the enemy
capability, or appropriate combinatiom, the imtelli- usually can withdraw beyond our objective. Ordi-
gence officer judges from the enemy point of view narily, such withdrawal is not a threat to the
the advantage or disadvantage in adopting the accomplishment of the mission, if there is no evi-
eapabiïity. In making this ¿ndgmeKt, the G2 also dence that the enemy may withdraw, a statement
considers the enemy doctrine and practices and of conclusions is omitted. The intelligence officer
the ultimate results of adoption or rejection of the merely states,, "There is no indication of with-
particular capability. For example,, "The gnemy

îcstâ®® ^o eOMMiCig)^
<í=í] (§>„ [Knfegfó ®{? (?!rCO ÄPQSl ©ín¡ ©m ÊOOTOGu ©(? sion-s as to the enemy's most probable courses of
action are then presented.
For a defensive mission, conclusions identify the c. In the statement of course of action most
best defense area(s) and the best avenues of ap- likely of adopition by the enemy, several capabili-
proach into the defense sector. For an offensive ties may be combined for brevity and clarity. All
mission, the conclusion describes the beat avenues the enemy capabilities combined in one statement
of approach to the objective(s). must be capable of being implemented at the same
time. For example, the most probable enemy
<D=U y, PmhtsMo COOTOQO ©Q ^\¡l©u¡ course of action may be, "Attack to envelop our
a. The enemy probable courses of action are northern flank reinforced by his corps reserve and
determined by the previous analysis and discus- using all available nuclear weapons, artillery, and
sion of enemy capabilities. Consideration is given air support and conduct harassing operations in
to how the enemy views his own vulnerabilities as our rear areas with guerrillas and infiltrating
indicated by his doctrine, past experiences, and forces."
personality of the enemy commander. Considera- a. Iff more than one enemy course of action is
tion is also given to previous enemy courses of stated, they are listed in the order of their rela-
action selected under similar circumstances. The tive probability of adoption.
aeterimnation is objective and not an unsubstan-
tiated guess at what the enemy wiHl do<.
b. In determining the relative probability of a. An enemy vulnerability is any condition or
adoption of enemy courses of actions, the intelli- circumstance of the enemy situation or the area
gence officer avoids conclusions based on friendly of operations which makes the enemy especially
doctrine and practices. The available evidence liable to damage, deception, or defeat. In this par-
considered includes .the enemy doctrine and prac- agraph, only those enemy weaknesses which may
tices as well as positive or negative enemy activ- be exploited are considered. In studying the
ity. If ©nemy activity is not deñnitive enough to enemy peculiarities and weaknesses to determine
justify selection of the enemy's most probable such vulnerabilities, the characteristics of the
eo"<jii?se of action, the intelligence officer deter- area of operations, all aspects of the enemy situa-
EEineo the most pifobable one based en the charac- tion, and the enemy's doctrine and practices are
teristics of the area of operations, enemy doe- considered. Only actual vulnerabilities are pre-
feinOp practicsSj and previous expsrisness. GoneM- sented. An open northern fiank which the enemy
¿M!©
FM 30-5

cannot, with available forces, extend or refuse, is to oppose armored vehicles." The vulnerability
a vulnerability. If, however, the enemy has re- discussed in a above, could be stated as, "Enemy
serves which can readily extend the flank to an northern flank open to envelopment subject to de-
impassable obstacle or counterattack to pin envel- struction of enemy reserves at . . . ."
oping troops against that obstacle, the open flank
c. In determining the enemy vulnerabilities, the
is mentioned as a possible vulnerability, although
G2 considers the feasibility of their exploitation
the vulnerability may be eliminated by commit-
and makes appropriate recommendations to the
ment of the enemy reserves. However, the com-
G3. All enemy vulnerabilities may not be ex-
mitment of reserves creates another vulnerability.
ploited at the same time. The exploitation of one
b. Each exploitable enemy vulnerability is listed vulnerability may preclude the exploitation of an-
as a brief statement of the effect of the vulnera- other vulnerability. For example, the enemy may
bility rather than a repetition of the peculiarity be vulnerable to both a night penetration and a
or weakness. For example, "Shortage of antitank daytime flank envelopment. The G3 in coordina-
means" is not stated. Instead, the effect of that tion with the G2 recommends to the commander
weakness is given by stating, "Limited capability the priority of vulnerabilities to be exploited.

Section VI. DETERMINATION OF ENEMY CAPABILITIES

J-19. General used. Consequently, the "what" of each of the ene-


a. Commanders base plans and actions upon es- my's capabilities is determined by the characteris-
tics of the area of operations, the order of battle
timates of enemy capabilities and the probability
of their adoption. Enemy capabilities can be esti- of the opposing forces, and time and space fac-
tors. Characteristics of the area of operations,
mated objectively because they are based upon
knowledge of the area of operations, enemy situa- friendly situation, and the means available to the
tion, enemy doctrine, time and space factors and enemy usually indicate that the enemy is physi-
pattern analysis. The enemy may practice cover cally capable of certain actions and physically in-
and deception to indicate actions different from capable of others. For example, the enemy can
those which he actually intends. envelop only when we have an assailable flank. He
can conduct airborne operations only when he has
b. In considering enemy capabilities, actions the necessary troops and aircraft.
which are grossly disadvantageous to the enemy
or unreasonable are not included. For example, J-21. The "When" of an Enemy Capability
the enemy may be physically capable of disengag-
ing troops committed outside our zone in order to a. The time required for the enemy to employ
employ them against us. However, in most cir- his combat power capabilities depends upon the
cumstances the G2 does not consider this to be a disposition of his forces and equipment. Forces
capability because it is unreasonable. deployed near the FEBA may be committed with-
out significant delay. Considerable time may bè
J-20. The "What" of an Enemy Capability required to commit other resources. Complicated
weapons systems such as long-range missiles re-
a. Four general types of tactical courses of quire time to emplace beíore missiles can be
action are usually possible. The enemy can attack, launched.
defend, reinforce, or execute a retrograde move-
ment. These operations are usually divisible into a b. An enemy capability involving displacement
variety of specific courses of action. For examp'e, of forces cannot be put into effect until some time
an attack may be a penetration, an evelopment, a after the force has started to move. Reserves
turning movement, or a pursuit. A defense may be cannot reinforce an attack or defense until they
in one position or in successive positions, either have been moved to appropriate locations such as
static or mobile. A retrograde movement may be attack positions or forward assembly areas. Con-
classified as a withdrawal, retirement, or delaying sequently, time and space factors are computed in
action. determining the "when" of a capability involving
the displacement of forces or equipment. These
b. The specific actions which the enemy can computations are discussed in paragraph J-25.
physically adopt depend upon the availab'e means
and conditions under which those means can be c. References to "when" usually are omitted

J-11
Pfôl ®@=s

from a statement of the enemy air, nuclear, chem- position . . . ," or "Defend the line of the
ical, and biological capabilities and other capabili- River ....*'
ties if "at any time" is intended. References to (3) Delay capabilities may include: "Delay in
"when" usually are omitted from statements of present and successive positions to the line of the
enemy capabilities pertaining to withdrawal and HAN River . . ." or "Delay along the general
delay in successive positions as "at any time" is lines PAULUS-JOANA, PENNYAWILLTHIR.
implied. Such actions can be started at any time.
In withdrawal capabilities, reference may be (4) Partial statement of the enemy's rein-
made to the time of the start of the withdrawal. forcement capability may include : "Reinforce an
For example, "The enemy can withdraw beyond envelopment of our north flank . . . ," or "ReiK=
our objective at any time before our attack." force his defense of the line . . . ."

J=22. YU<s "Wh©m" ©ff êIDî íK©^ CcsupsMDîy J=23o "ülnie "im Wtafl Söroonittin)'"7 ©'S ORí iraeRniy
a. The "where" of an enemy capability depends
upon the weather, terrain, and disposition of his a. The strength the enemy can use in any par-
forces. Under existing and predictable conditions ticular capability depends primarily upon the
of weather, the terrain may provide avenues of composition, disposition, and strength of his
approach into our position from the front, flanks, available forces. Order of battle intelligence fur-
or rear. Conversely, it may prevent the enemy's nishes necessary data.
use of armored, mechanized, or airborne forces in b. Forces which the enemy has committed
certain areas. Cross compartments may provide against friendly units can be employed in almost
the enemy with suitable defense or delaying posi- any capability the enemy chooses to adopt. If six
tions. The existence of suitable objectives, drop or mechanized battalions are committed against a di-
landing zones, indicates where airborne forces vision, the enemy can attack with six mechanized
may be employed. The presence of suitable battalions, supported by all available artillery,
beaches suggests where enemy amphibious forces air, and nuclear weapons. He also can defend in
may land. The locations of adequate assembly his present position with the same six battalions
areas and attack positions indicate where enemy and the same support. In addition to the forces
missile launchers may be located. Accordingly, the committed, the enemy also can use the reserves
intelligence officer determines the "where" of each available at any echelon. If the enemy has six
enemy capability through analysis and integration battalions committed and a regiment in reserve,
of the characteristics of the area of operations he usually can reinforce either his attack or his
with the situations of the opposing forces. If the defense with the reserve regiment. A partial
enemy is physically capable of launching an statement of this capability could be, "Attack now
attack, the G2 asks himself in effect, "Where can to envelop our north flank with six mechanized
he do it?" If the enemy defends, he asks, "Where battalions supported by all available artillery, and
are suitable defense positions and to what places nuclear weapons, air, reinforced by one mecha-
must reinforcements be moved before they can be nized regiment at the following times and
committed?" If the enemy delays in successive po- places . . . ."
sitions, he asks, "Where are the favorable delay- c. The statement of strength is usually confined
ing positions?" to close combat units such as infantry, armoir,
b. Examples. guerrilla, and mechanized (including reconnais-
(1) If the enemy can attack, and the situa- sance) units and their combat support means such
tion and the area of operations indicate that the as artillery, air, nuclear weapons, and chemical
attack may strike anywhere along the friendly agents. The usual unit of enemy strength is the
front, the partially stated enemy capability be- battalion or a larger unit. Guerrilla strength is
comes: "Attack along our front. . . ." In other expressed in total numbers, if more appropriate.
circumstances, enemy capabilities, stated in part, Units smaller than the battalion may be used, if
may include: "Attack to envelop our north flank appropriate. The number and details of artillery,
. . .," or "Attack in the direction BISO'JT- air, and similar units, available to support the
ACHS," or "Land (amphibious or airborne) enemy's operations, are specified in the "strength"1'
forces in the vicinity of . . . ." subparagraph of the ints'ligencs estimate ana a?®
(2) Partial statements of an enemy defense usually not repeated in the statement of a eapaMI=
capability may include: "Defend in his present ity involving support of dcss combat mita

.Ml 2
FM 30-5

d. Reference to "in what strength" usually is against an enemy force. See FM 30-102 for Ag-
omitted in the statement of enemy capabilities for gressor troop movements.
withdrawal and delay in successive positions as it b. To determine the time when the enemy can
is implied that such actions involve all the availa- employ an uncommitted unit, the travel time from
ble forces. the unit location to a logical point where the unit
can be committed is calculated. To the travel time
J-24. Capabilities in Support of Combat Forces is added the closing time (pass time (PST) of a
column). Except when observation of enemy units
a. Some enemy capabilities refer specifically to
is continuous, it is assumed that any unit could
the support of close combat forces rather than to
have started to move immediately after its last
the capabilities of close combat units. Such capa-
reported location. Therefore, to determine the
bilities include air ; nuclear, chemical, and biologi-
earliest time at which the enemy can reinforce, it
cal operations; cover and deception; and elec-
is necessary to add the travel plus closing time to
tronic warfare capabilities.
the time last observed. For example, if an enemy
b. Enemy combat support capabilities such as reinforcement was last observed at 0800 hours
use of electronic warfare and cover and deception and it can deploy to envelop our northern flank in
are stated when enemy implementation of such one hour, it is assumed that the attack can be
activities will significantly affect the accomplish- launched as early as 0900 hours (0800 plus one
ment of the friendly mission. Statements of such hour). In the exceptional case involving piecemeal
capabilities include, when the capability can be commitment of enemy reinforcements, travel time
implemented, the area over which the capability only is considered. Forces which are committed
will be effective, and the enemy resources availa- piecemeal do not close into an assembly area or
ble or the results that can be accomplished. The attack position.
"where" is omitted if it is meant anywhere c. Because observation of reinforcements is
throughout the unit area of operations. For exam- rarely continuous, statements of enemy reinforc-
ple, "Start cover and deception operations at any ing capabilities preferably include both the earli-
time to include imitative and manipulative trans- est time and the time after starting movement
missions and use of special units capable of de- when the reinforcement can be accomplished. For
picting two divisions, either tank or mechanized example, "The enemy can reinforce his attack
rifle," or "Aggressor can, under the proper condi- with the 45th Mech Regt at 0900 hours, or one
tions intercept electromagnetic radiations emanat- hour after starting movement." When the time
ing from our transmitters, and jam our receiv- since the last report is greater than the after
ers." starting movement time, only the after starting
movement time is given. For example, "The
J-25. Reinforcement Capabilities
enemy can reinforce his attack with the 45th
Mech Regt now or one hour after starting move-
a. The time required for an enemy to move ment." When the number of reinforcements is
troops from one place to another and commit large or the enemy is capable of reinforcing in
them is determined by factors derived from anal- several areas, reinforcing capabilities are pre-
ysis of past similar enemy movements. The con- sented in tabular form. For example, the enemy
siderations described below are applicable in can reinforce his attack or his defense with all or
training and as a point of departure for the devel- part of the following units at the places and times
opment of experience factors in operations indicated below :

Unit Place Motor Foot

45th Mech Regt— RJ 638 Now or 1 hr after starting movement... 091205 Jun or 4 hr 5 min after starting
movement.
RJ 888 090930 Jun or 1 hr 30 min after starting 091605 Jun or 8 hr 5 min after starting
movement. movement.
37th Mech Regt- RJ 638 091000 Jun or 2 hr after starting 100740 Jun or 23 hr 40 min after starting
movement. movement.
RJ 888 090920 Jun or 1 hr 20 min after starting 091430 Jun or 6 hr 30 min after starting
movement. movement.

J-13
FM 30-5

d. In selecting a logical point for reinforcement, propriate reinforcements. Compute motor move-
the effects of such characteristics of the area of ment time only for distances greater than 10 kilo-
operations as avenues of approach and logical meters (six miles). If a unit is observed in trucks,
enemy reactions to friendly courses of action are compute only the motor movement time.
considered. For reinforcement of an attack capa- (2) Consider a foot march of more than 20
bility, attack positions are selected for battalions miles as a forced march. Consider a motor move-
and regiments and forward assembly areas for ment of more than 175 miles as a forced march
division and larger units. For units moving to for motorized units and a movement of more than
reinforce a defense, defense or counterattack posi- 140 miles as a forced march for tank and mecha-
tions are selected. For movements by aircraft, log- nized units.
ical landing or drop zones from which the enemy (3) If a column begins to close prior to the
forces can materially affect the accomplishment of beginning of friorning nautical twilight (BMNT),
the mission are selected. closing time is computed at the night rate of
march ; if a column begins to close at or shortly
e. The time required by the enemy to entruck,
after BMNT, use the day rate of march. If a
detruck, issue extra ammunition, make detailed
column begins to close prior to the end of evening
reconnaissance, issue orders, deploy, or move
nautical twilight (EENT), use the day rate of
from an attack position to a line of departure, is
march ; if a column begins to close at or shortly
not considered because all may be completed be-
after EENT, use the night rate of march.
fore starting the operation or simultaneously with
(4) To move an enemy infantry battalion,
the movement.
move and close the entire unit. To move a unit of
/. The guidance below is applicable until experi- regimental or larger size, move and close two-
ence factors against a particular enemy are devel- thirds of the combat elements, that is, two battal-
oped. ions of an infantry regiment, two regiments of an
(1) Compute foot marching time for all ap- infantry division.
J—26. Sample Intelligence Estimate, Division
(Classification)
G2 Section, 52d Division (Mech)
GLENVILLE (NF3277), EASTLAND
230830Z June 19
INTELLIGENCE ESTIMATE NO. 20
Reference: Map, series EASTLAND, sheets DELTA through KILO,
edition 2, 1:50,000
1. MISSION
52d Division conducts mobile defense along DRY CREEK, accepts no
penetration south of HILLS 333 and 421, and prepares to conduct offensive
operations within 12 hours.
2. THE AREA OF OPERATIONS
a. Weather.
(1) Existing situation. Weather for the period 23 June to 28 June will
be rainy and cool, gradually warming and clearing as a high pressure sys-
tem moves through the area of operations from the south. Temperatures,
from 40° to 65°F. Visibility will range from 16 to 25 kilometers, except
during precipitation and in morning fog in low drainage areas. Surface
winds from the south 8 to 10 knots.
(2) Light data.
BM- BC- EE- EE- Moon-Moon- Date BM- BC- EE- EE- Moon- Moon-
Date NT MT CT NT rise set NT MT CT NT rise set
23Jun 0331 0419 2029 2130 1746 0125 27 Jun 0344 0425 2022 2118 2001 0518
25Jun 0339 0422 2025 2124 1907 0214 29 Jun 0349 0428 2018 2112 2022 0820
(Classification)

J-14
FM 30-5

(Classification)

(8) Effects on enemy courses of action :


(a) Precipitation will not hinder cross country movement except in
the low drainage areas of MINERTOWN.
(6) Southerly winds will not affect enemy employment of CBR.
(c) Low visibility during precipitation and morning fog will favor
enemy attack.
(4) Effects on friendly courses of action :
(a) Precipitation will not hinder cross country movement except in
the low drainage areas of MINERTOWN.
(&) Southerly wind direction will not affect friendly use of chemical
or nuclear weapons.
(c) Low visibility during precipitation and morning fog will not
favor friendly defense.
&. Terrain.
(1) Existing situation.
(a) Cover and concealment. Wooded areas around MIDWAY offer
good concealment. Numerous ravines in drainage areas of MINERTOWN
offer limited cover and concealment.
(b) Observation and fire. There are good observation points along
bluffs above GRINGO River. Fields of fire are excellent throughout plains
areas north of MUD CREEK but limited moderately in populated and
vegetated areas near GLENVILLE.
(c) Obstacles.
1. SWIFT River (fordable 1 kilometer east of GLENVILLE).
2. Bluffs above GRINGO River.
3. City of GLENVILLE. Routes around city are passable ; routes
through city impassable.
(d) Key terrain. Hill mass MUKELROY and HILL 333.
(e) Avenues of approach.
1. Available to Aggressor into our sector:
(a) Avenue of approach 1 is from LARGO through gao around
the northeast end of HILL 702, 34 kilometers southwest to MINERTOWN
and south to DRY CREEK.
(b) Avenue of approach 2 is from LARGO southeast through
MIDWAY to river crossing east of GLENVILLE.
2. Avenue of approach available for US movement into Aggres-
sor's area will be generally the same as those listed for Aggressor into our
sector.
(2) Effect on enemy courses of action. Terrain favors the enemy at-
tack using avenue of approach 1.
(3) Effect on friendly courses of action. Terrain favors our defense
of the area around DRY CREEK.
c. Other Characteristics.
(1) Existing situation. Local nationals throughout the area favor
friendly military operations. Large numbers of refugees can be expected to
pass through friendly lines.
(2) Effect on enemy courses of action. The enemy can be expected to
insert infiltrators inte ' refugees.
(3) Effect on fr y courses of action. Refugees can be expected to
provide valuable intel! ce.
(Classification)

J-15
FM 30-5

(Classiñcation)

3. ENEMY SITUATION
a. Disposition. Annex A, Situation Overlay.
6. Composition. Enemy forces opposing 52d Division (Mech) consist of
elements of the 4th Combined Arms Army.
( 1 ) Identified units are :
(a) 10th F Mech Div consisting of:
27th Mech Regt
30th Mech Regt
31st Mech Regt
121st Mdm Tk Regt (unlocated)
(&) 19th Mech Div consisting of :
23d Mech Regt
37th Tk Regt
(2) Unidentified units are : U/I Mech Regt of 19th Mech Div.
c. Strength.
(1) Committed forces. 52d Div (Mech) is opposed immediately by 4
mechanized battalions and 1 tank battalion. These units are supported
by normal divisional and regimental artillery.
(2) Reinforcements. Reinforcements available to the enemy for com-
mitment in our zone are a total of 5 mechanized battalions and 4 tank
battalions from the 27th Mech Regt, 121st Mdm Tk Regt, and the second
echelon battalions of the 30th and 31st Mech Regts and the 37th Tk Regt.
Also, the 23d Mech Regt can reinforce in total within 8 hours from start
of movement.
(3) Air. Aggressor is supported by the 3d Air Army consisting of
unidentified numbers of fighter-bomber aircraft, ground attack aircraft,
and reconnaissance aircraft. Air parity currently exists with either force
capable of obtaining air superiority for limited periods of time. Up to now
Aggressor has used a maximum of 60 fighter-bomber sorties in a 12-hour
period.
(4) Nuclear. No estimate of the enemy's nuclear support for the next
30 days is available. Aggressor currently has 152-mm Gun-Hows with a
nuclear round and TONDRO SSMs which can deliver rounds of 10-50 KT
yield within range of our division.
d. Recent and Present Significant Activities.
(1) Air reconnaissance and photo reports indicate increased Aggres-
sor movement along axis BRAVO to LIMA. Movement indicates reinforce-
ment of forward element of 4th CAA.
(2) Enemy's aerial recon and tactical air flights have increased in
the last 36 hours, particularly along the GOP line.
(3) For the past 36 hours, volume of vehicular traffic has increased
in southerly direction.
(4) Artillery fire from the enemy has become more intensive in the
last 24 hours.
(5) Reliable source reports large tracked, amphibious vehicles moving
into area vicinity HILL 805.
(6) Enemy has begun to employ smoke along the forward slope of
HILL 702.
e. Peculiarities and Weaknesses.
(1) Personnel. Enemy units are presently est'r Med to be at 85% to
(Classification)

J-16
FM 30-5
(Classification)
90% authorized strength. Morale is high, although replacements may not
be highly trained.
(2) Intelligence. Aggressor stresses communications security and sub-
ordinate units of the 4th CAA have recently initiated intensive radio secu-
rity and procedures training.
(3) Operations.
(a) Aggressor is susceptible to mine warfare and antitank
weapons.
(b) Aggressor has trained heavily on attack formations and have
been told offensive action is the only way to victory.
(c) Aggressor is vulnerable to nuclear weapons due to massed
forces and canalization by further advancement.
(4) Logistics. Supplies are adequate for the enemy's conduct of either
the offense or defense. The enemy had previously stockpiled supplies well
forward in division areas.
(5) Personalities. G/D Masonski, CG of the 10th F Mech Div, is an
advocate of penetration type offense on a narrow front with subsequent
widening of the gaps to split enemy forces.
4. ENEMY CAPABILITIES
a. Enumeration:
(1) Attack at any time along avenue of approach 1 with 4 mechanized
battalions and 1 tank battalion supported by normal divisional and regi-
mental artillery.
(2) Attack at any time along avenue of approach 2 with 4 mechanized
battalions and 1 tank battalion supported by normal divisional and regi-
mental artillery.
(3) Defend at any time with forces in contact supported by all avail-
able divisional and regimental artillery.
(4) Reinforce his attack or defense with all or part of the following
units at the places and times indicated :

Unit Place Time


(a) 30th Mech Avenue of immediately
Regt (-) approach 2
(b) 31st Mech Avenue of immediately
Regt (-) approach 1
(c) 37th Tk Regt Avenue of immediately
(-). approach 1
(d) 27th Mech Avenue of 2 hr after
Regt. approach 1 start of
or 2 movement
(e) 23d Mech vie LITTLE 8 hr after
Regt. start of
movement
(/) 121st Mdm Rk Unlocated Unknown
Regt.
(9) U/I Mech Regt vie BRAVO 9 hr after
of 19th Mech start of
Div. movement

(Classification)

J-17
FM 30-5

(Classification)

(5) Delay in successive positions to the east of LITTLE.


(6) Employ chemical agents within our sector at any time.
(7) Employ nuclear weapons of a 0.5-50 KT yield with delivery by
artillery or SSM.
(8) Employ guerrilla forces in our rear area either alone or in con-
junction with the capabilities enumerated below.
(9) The enemy can attack our area with an undetermined number of
fighter, ground attack, and bomb sorties daily. The maximum number of
daily sorties mounted in our area has been 60.
b. Analysis and Discussion.
(1) Attack along avenue of approach 1.
(a) The following indicate adoption of this capability :
1. Uses a good avenue of approach.
2. The enemy is massing mechanized elements, tanks, artillery
and logistic support along this avenue
S. Forward elements disposed on a relatively narrow front.
4. Extensive artillery preparation along approach.
(b) The limited cover presented along this avenue of approach is
a limiting factor but does not preclude adoption of this capability.
(2) Attack along avenue of approach 2.
(a) The following indicate adoption of this capability :
1. The enemy is massing mechanized elements, tanks, artillery
and logistic support along this avenue.
2. Forward elements disposed on a relatively narrow front.
3. Extensive artillery preparation along this avenue.
(&) The following indicate rejection of this capability:
1. This avenue of approach accommodates only one deployed regi-
ment and offers limited cover and concealment.
2. The limited obstacle presented by GLENVILLE.
(3) Defend. The following indicate rejection of this capability :
(a) The enemy is massing his forces along the line of contact.
(5) Enemy has followed known doctrine for attack.
(c) Terrain favors attack.
(4) Reinforce. The following indicates adoption of this capability :
(a) Movement of additional troops toward the front.
(b) New units identified in the combat zone.
(c) Forward logistical buildup.
(5) Delay. There are no indications of the enemy's adoption of this
capability.
(6) Employ chemical agents. There is no indication the enemy will
employ chemical agents other than smoke.
(7) Employ nuclear weapons. There is no indication the enemy will
employ nuclear weapons.
(8) Employ guerrilla forces. The following indicates adoption of this
capability :
(a) Doctrine calls for use of guerrilla force.
(b) Use would enhance enemy advance by creating panic and
confusion.

(Classification)

J-18
FM 30-5
(Classification)

(9) Air attack. Indications are that Aggressor will continue to employ
this capability as referenced in paragraph (9) above.
5. CONCLUSIONS
a. Probable Courses of Action.
(1) Attack with forces in contact supported by air and artillery with
the main attack of one mechanized regiment along avenue of approach 1.
Will reinforce with elements as indicated in para 4a(4).
(2) Conduct secondary attack with forces in contact supported by air
and artillery with one mechanized regiment along avenue of approach 2.
(3) Employ guerrilla or special forces in our rear areas in conjunc-
tion with the above courses of action.
ft. Vulnerabilities.
(1) Aggressor is vulnerable to counterattack since he has been slow
to exploit potential penetrations.
(2) Vulnerable to nuclear attack due to massing of troops and con-
centrated logistics depots.
(3) Mine warfare will be effective against enemy mechanized ele-
ments.
KROOK
BG

OFFICIAL:
/S/ Bagger
BAGGER
GS
Annex: A—Situation Overlay (omitted)
Distribution: A
(Classification)

J-19
FM 30-5

APPENDIX K

ENEMY STRENGTH COMPUTATION


(STANAG 2077)

K-l. General K-3. Initial Compilation of Effective Strength


a. Enemy strength undergoes continuous fluc- a. Prior to and at the onset of hostilities, effec-
tuation through casualties and replacements. This tive strength is compiled from intelligence esti-
fluctuation results in approximated enemy mates based on the initial strength and such cir-
strength figures. Computing the troop strength of cumstances as :
insurgent or guerrilla forces is difficult since these (1) The degree to which the enemy unit is up
units often form, disband, and reform in another to initial strength at the time.
area of operations. However, efforts must be made (2) Whether the enemy maintained large
to estimate accurately the size of the insurgent standing forces before the outbreak of hostilities.
infrastructure, regular, and irregular forces. (3) Whether war was premeditated.
6. Enemy strength is computed in terms of (4) Whether any warning of war was (or
committed forces, reinforcements, air, and nu- would be) received.
clear weapons and CB agents capabilities. Since (5) Whether the enemy was (or would be)
doctrinal differences allow for the holding of spe- committed in other theaters.
cific units in a reserve and reinforcement role, it (6) Movement facilities and lines of commu-
is extremely important to study a country's doc- nication (adequacy of land, sea or air; whether
trine prior to computing strength. Enemy interior or exterior).
strength normally is presented in terms of numer-
ical strength by type of unit. Nuclear weapons b. Basic considerations :
capabilities are expressed in terms of the number (1) A consideration of the previous estimates
of weapons, delivery systems and yields. CB capa- (if any) of effective strength as well as more
bilities are expressed in terms of the type, persis- recent reliable intelligence.
tency, lethality and delivery systems. (2) The incidence of casualties, reinforce-
ments and replacements.
K-2. Explanation of Terms
c. The calculations, which are to be expressed
a. Numerical strength is the expression of a as percentages of the initial strength, are com-
unit or force in terrtls of numbers or personnel, puted as follows. (Where it is apparent that a
weapons, and equipment. percentage does not accurately reflect the fighting
b. Initial strength of an enemy unit or force ability of a unit, it may be necessary to elaborate
comprises the number of personnel, weapons, and on this figure) :
equipment authorized by established and ap- (1) A percentage attrition rate is deducted
proved tables of organization and equipment when experience has enabled this to be established
(TOE). for the circumstances. This rate is based on those
men, weapons and equipment temporarily not
c. Effective strength of an enemy unit or force available to a unit for reasons other than battle
consists of that part, including logistic compo- casualties or losses.)
nents, of its initial strength which is currently (2) Subtractions (or additions)- are made in
capable of combat employment. the light of reliable intelligence. (Any items hav-
d. Strength by type unit is the expression of ing only a temporary significance should have
units or forces in terms of numbers of units by their time-lapse noted on the estimate.)
type, such as infantry, armor, artillery, and air. (3) The following (which should be physi-

K-l
'i?uü £®=4í

caSîy counted where possible, but wbicîi, in nu- K~§. (g®


clear war, is more often based on statistical esti-
mates) is then deducted : a. Based upon the above discussions of numeri-
cal strength computations, a combat readiness
(a) Personml
rating can be established. Â suggested rating sys=
1. Killed. tern is as follows ;
2. Prisoners of was1. C-l—Combat effective—Any unit or fores at
8. Wounded nonefifectives. 80—100% T03S strength in a high state of train-
(6) Weapom and Equipment. ing.
1. Destroyed., C-2—Marginally combat effective—Any
2. Captured. unit or force at 70—80% TOE strength in an
8. Damaged to extent requiring work- acceptable state of training.
shop repair. C-3—Limited combat effective—Any unit or
(4) Personnel reinforcement and replace- force at 50—70% TOE strength in an only par-
ment of weapons and equipment is then added in tially trained sítate.
accordance with the scale estimateds or the scale C—4—Noneffective—Any unit or force below
justified by reliable intelligence, where this is dif- 50 % TOE strength and seriously lacking in train-
ferent. In the absence of other guidance and ing.
where the enemy has secure lines of communica-
tion to the main base, it is to be assumed that : b. The above ratings do not take into account
(a) Personnel reinforcement can be com- unit leadership and morale which are both impor-
pleted within 72 hours. tant factors in determining a unit's combat effec-
tiveness. Generally, however, the higher ratings
(5) Small weapons and light equipment imply good leadership and morale both in peace-
can be replaced within 72 hours: Other weapons time and after initiation of hostilities. The two
and .equipment can be replaced within 6 days. lower ratings may reflect poor leadership and
d. Resultant calculations are expressed as per- morale but may also reflect either a unit buildup
centages of TOE strength where possible ; however or, after repeated engagements in wartime, ob-
numerical expression may be necessary to present vious combat ineffectiveness due to losses.
a better understanding of the combat capability of
a force and provide the commander with a basis e. The above "C" ratings apply most readily to
for comparison. conventional warfare employment. This rating
scheme may be expanded to include nuclear de!iv=
e. The computation of enemy strength requires ery capability :
the utmost caution and alertness for intelligence
that may reveal the enemy's actual strength. This N-l—Possesses strategic and tactical nuclear
is especially true at the onset of hostilities when weapons.
accurate intelligence pertaining to enemy strength N-2—Possesses tactical nuclear weapons.
is lacking or inadequate, and the initial strength N-3—Maintains a nuclear weapons deli very-
figure is only an approximation. capability but is not believed to possess a nuclear
weapons inventory.
3\?_4_ .Unit is nuclear noncapable and is not a
nuclear tSireaiï.
a. Effective stnçngth—TOE strength minus
losses, plus replacements. d. By combining the two rating systems, a total
rating of unit capability can be achieved; i.e.,
b. Percentage of C-l/N-1 or C-1/N-é. This system provides the
analyst with an additional tool in determining
Effective strength X 100
TOE strength = strength in terms of combat readiness and capa-
TOE strength bility by consideration of elective strength, trail-
ing, morale, leadership, and nuclear capability. As
c. In time of peace, strength generally can be automatic data processing systems come into use
computed by annual induction quota times term of as intelligence data handling means, this rating
conscript, plus cadre. system will lamd itself roaciily to comjputerizatioKi.
K-g
FM 30-5

K-6. Computation of Strength by Type of Unit friendly battalions may be located in the same
area. However, because of differences in organiza-
a. Strength by type of unit includes the total
tion, the total friendly strength may exceed that
number of enemy units listed by category and
type. Normally, order of battle analysts account of the enemy force.
for enemy units down to and including two eche- c. Techniques for computing strength by type of
lons below their own level of command. For exam- unit are thoroughly discussed in paragraphs J-6
ple, an analyst at division level would express through J-9. Organic or supporting artillery and
enemy strength in battalion sized units. reconnaissance units are considered and counted
as committed forces unless known otherwise. For
b. Expressing strength in terms of number of example, organic divisional artillery within range
units by type within an enemy force is stressed is considered committed unless it is located out-
because it is a simple, reliable, and a readily un- side the friendly commander's area of influence
derstood method of computing enemy strength. At and not capable of firing support missions. Fre-
the same time, the order of battle analyst cannot quently, artillery units are listed as fire support
ignore individual unit strength computations. units when categorizing enemy strength. Numeri-
This is particularly important in arriving at a cal tabulation of the committed forces and rein-
true picture of the enemy's strength compared to forcements, as well as their individual strengths
friendly forces. The enemy may have eight battal- in personnel and equipment, is maintained on a
ions of infantry in a given area, and only five strength worksheet (fig 7-8).

IC-3
FM 30-5

APPENDIX L

FORMAT AND EXAAAPLE OF ORDER OF BATTLE ANNEX TO PERINTREP


(STANAG 2014)

1. Format of Order of Battle Annex


Notes. 1. Omit items not applicable and renumber remaining para-
graphs.
2. All entries are followed by a comment.
3. Evaluation of source and information, including type of
source, accompanies each entry.

(Classification)

ORDER OF BATTLE
Annex (OB) to PERINTREP NO. Corps,
1. COMPOSITION AND DISPOSITION (see appendix 1, overlay).
An overlay is usually attached to present the graphic display of
enemy units. The initial subparagraphs always consist of identifi-
cation and disposition ; the remaining subparagraphs contain infor-
mation pertaining to organization. Information concerning identifi-
cation and disposition is listed by mentioning the highest echelons
first, followed by subordinate units from left to right, or top to
bottom, as displayed on the overlay. Related items may be com-
bined and presented in a single entry.
STRENGTH. This paragraph contains information pertaining to
enemy personnel, weapons, and equipment losses during the period.
Replacement rates and strength figures of individual units may be
listed.
TACTICS. Only new tactics and deviations from prescribed tactical
doctrine are reported.
TRAINING. New development and recent changes in training pro-
grams or methods of special training undertaken by the enemy
since the initiation of hostilities are reported.
5. LOGISTICS. Enter data concerning those items which will affect
current enemy operations such as supply status, supply systems,
and locations of supply facilities.
COMBAT EFFECTIVENESS. This paragraph includes data on the
combat effectiveness of enemy units, either of the entire force or
of a major tactical unit. Items indicating morale, esprit, quality of
troops and commanders are listed. The ability of the enemy unit to
accomplish its expected mission is expressed.

(Classification)

L-l
FM 30-5

(Classification)

7. MISCELLANEOUS DATA. Personalities, unit history, field post


numbers (FPO), code numbers and names, order of battle changes,
and any other item of order of battle intelligence that cannot be
properly inserted in preceding paragraphs are listed.
Acknowledge.
(SIGNATURE)
Appendixes :
Distribution :
OFFICIAL
(NAME OF G2)

2. Example of Order of Battle Annex


Annex B (OB) to PERINTREP 29, 3 Corps, 201800 August 19

ORDER OF BATTLE
1. COMPOSITION AND DISPOSITION (see appendix 1, Overlay).
a. All PW captured during period are from Aggressor 2d Combined
Arms Army. Unit identification include: (C-l)
17 Mech Div 30 Mech Div 32 Mech Div
283 Mech Regt 141 Mech Regt 132d Mdm Tk Regt
290 Mech Regt 142 Mech Regt
130 Mdm Tk Regt
130 Recon Bn
COMMENT : 32 Mech Div accepted as being organic to 2d CAA. 52
Tk Div previously accepted, completing organization of 2d CAA.
b. Two large missile-type weapons mounted on large amphibious
armored carriers and several smaller vehicles identified in position vie
MP 420513. (B-2)
COMMENT : Probably elements of Free Rocket Regt, 2d CAA, previ-
ously unlocated.
c. Captured Aggressor field order reveals plan to attach 40 TK
Div to 2d CAA effective 22 Aug. (B-l)
COMMENT : PW previously reported 40th Tk Div moving to rein-
force 2d CAA. Aggressor main effort probably planned for this area.
2. STRENGTH.
En losses reported during period :
PW KIA ARTY ARMOR AIR VEH
16 Mech Div 37 302 2 4 1 21
30 Mech Div 16 52 8 1 — 16
32 Mech Div 8 12 — — — 4
Total III US Corps Sector ""61 366 ÎÔ 5 ï 41
COMMENT: The marked increase in personnel losses during the
period have been sustained primarily by Aggressor combat patrols. Air-
craft loss was HI, Observation Helicopter equipped with AERO radar.
Overall strength of 2d CAA is generally not affected.
(Classification)

L-2
FM 30-5

(Classification)
3. TACTICS.
a. PW from 16 Mech Div and 30 Mech Div state they have been
instructed in the event their units are cut oñ to continue fighting as
guerrilla units or in small groups, live off the land, and destroy as much
US Army property as possible before gradually infiltrating back to friendly
lines. (.C-6)
COMMENT : Intensive guerrilla activity in our rear areas can be ex-
pected if elements of these units are cut off.
b. Enemy documents captured 07 Aug included a training pamphlet
for battalion, company and platoon commanders, written by G/D GRIBOY-
EDOV entitled "Tanks Out Front," (appendix 3). It advocates tactics per-
mitting US patrols and advancing forces to pass through Aggressor lines.
A coordinated tank-infantry attack is then made on open flanks and rear
elements with tanks continuing momentum of attack to destroy remaining
US forces. (B-2)
COMMENT: Considering Aggressor doctrine that tanks are the
decisive arm, the above tactic is possible, particularly in view of reports
of probable employment of 40 Tk Div (para 1).
4. TRAINING.
a. Reference paragraph 3b.
b. Indications of Aggressor concern for COMSEC is noted in docu-
ment captured from 2d CAA dated 10 Aug, directing a1! subordinate units
to immediately initiate intensive training in radio security and communi-
cations procedures. (B-2)
■COMMENT: ASA confirms Aggressor lack of radio discipline and
states that security violations increase during reinforcement and relief
operations. Numerous Aggressor security violations have been noted since
17 Aug, further substantiating reinforcement or relief of 2d CAA units.
5. LOGISTICS.
a. PW state Aggressor supply personnel have recently contacted local
merchants, farmers, and fishermen for supplies of most Class I items.
(C-6)
COMMENT : Aggressor either has critical shortage of Class I items
or has a bottleneck in the supply system requiring local procurement of
Class I items.
b. Air and ground reconnaissance patrols have reported Aggressor
stockpiling large quantities of supplies and equipment in rear areas of
frontline divisions. (B-2)
COMMENT: Not normal supply procedures. Significance as yet un-
determined. Would indicate Aggressor may be planning major offensive
soon.
6. COMBAT EFFECTIVENESS.
a. PW from 16 Mech Div and 30 Mech Div state morale is high but
senior officers are disgruntled because their units always receive difficult
missions while the 32 Mech Div and 56 Tk Div have, until recently, been
assigned less hazardous missions. (F-6)

(Classification)

L-3
FM 30-5

(Classification)

COMMENT: Analysis of unit history and recent operations of


Aggressor 2d CAA indicates it has usually been highly successful in
combat. This, and the fact that 2d CAA has always had fine commanders,
would account for high morale in units. This is first indication of dissatis-
faction among officer personnel. Report seems cogent, however, since 32
Mech Div has not been engaged in combat with US Forces in this campaign.
b. PW reports 30 Mech Div to be redesignated 30 "Fusilier" Mech
Div for superior combat record. (F-6)
COMMENT: III US Corps rates combat effectiveness of 30 Mech
Div from excellent to outstanding in comparison to other Aggressor divi-
sions in same sector. 30 Mech Div casualties have been comparatively
small; no deserters have been apprehended and its operations have been
executed with determination.
7. MISCELLANEOUS DATA.
a. Personalities Identified by PW: (C-l)
CG, 40th Tk Div G/D GRIBOYEDOV, Semyon P.
(Ref 3b)
CO, 282 Mech Regt Col CARDUCCI, Gherardo S.
CO, 283 Mech Regt Col UNDSET, Bjornstjerne
(Acting CO)
CO, 130 Mdm Tk Regt Col STEENWYK, Martin J.
CO, 132 Mdm Tk Regt Col Mattez, Mario
COMMENT: Confirms previously obtained information.
b. Unit History: Officer PW stated his unit (32 Mech Div) trained
extensively during 1965 and 1966 in special tactics for assault of river
lines. (F-6)
COMMENT: Special training received by 32 Mech Div should in-
crease its overall effectiveness when employed in river-crossing operations.
No evidence of other units so trained.
c. Field Post Numbers : Captured document reveals Aggressor field
post numbers being used as identification symbols on documents and mes-
sages. First two and last three digits are transposed. Field post number of
46 Mech Div will appear as 75031 instead of 31750. (B-l)
COMMENT : Aggressor has employed this system previously as a
security measure. Expect this system of transposing digits will occur in
different patterns during future operations.
Acknowledge.
LEE
LTG
Appendixes: 1-En Disp Overlay
2-Aggressor Army Org Chart
3-Aggressor Training Pamphlet
Distribution : Same, as PERINTREP 29
OFFICIAL
GRANT
G2
Note: In joint service operations, the Order of Battle Annex to the PERINTREP
will be replaced by the Order of Battle Annex to the PERINTSUM as contained in
Chapter V, JCS Publication 12.
(Classification)
FM 30-5

APPENDIX M

COUNTERINTELLIGENCE ESTIMATE FORMAT

(Classification)

Issuing Section and Headquarters1


Location
Date and Time
COUNTERINTELLIGENCE ESTIMATE NUMBER
Reference(s) : Maps, charts, or other documents.
1. MISSION
State the assigned or assumed unit mission.
2. THE AREA OF OPERATIONS
This paragraph discusses the influence of the area of operations on
enemy intelligence collection, sabotage, and subversive efforts and on
friendly countermeasures, where appropriate.
a. Weather. Discuss the effects of the weather on enemy battlefield
surveillance and reconnaissance capabilities. Light data and weather fore-
casts or climatic information as appropriate should be considered. Conclude
the discussion with a statement as to whether or not the weather favors
enemy collection efforts and the impact of the weather on friendly counter-
measures.
b. Terrain. Consider such factors as observation, concealment and cover,
obstacles, key terrain features, and avenues of approach and conclude the
discussion with effects of these factors on enemy collection efforts and the
impact on friendly countermeasures.
c. Other Factors. List other factors which may be considered, if perti-
nent, in separate subparagraphs : political, economical, sociological, psy-
chological and transportation.
3. ENEMY INTELLIGNCE, SABOTAGE, AND SUBVERSIVE SITUA-
TION
Discuss in this paragraph enemy intelligence, sabotage, and subversive
activities in terms of the current situation and recent and significant activi-
ties. Include in the discussion, where appropriate, known factors regarding
disposition, composition, strengths, efficiency, peculiarities and weaknesses.
Fact sheets may be attached to the counterintelligence estimate as an annex.
This paragraph should also include any significant evidence of enemy
knowledge concerning friendly intelligence and counterintelligence efforts.

(Classification)
'If distributed outside the headquarters, the first line of the heading is the official
designation of the issuing command and the ending modified accordingly.

M-l
FM 30-5

(Classiñcation)
a. Intelligence.
(1) Ground surveillance and reconnaissance.
(a) Visual observation.
(b) Patrols.
(c) Ground radar.
(d) Infrared surveillance.
(e) Unattended ground sensors.
(f) Other.
(2) Aerial surveillance and reconnaissance.
(a) Intrusion flights.
(b) Stand-off flights.
(c) Sensors.
(d) Reconnaissance satellites.
(3) Signal intelligence.
(a) COMINT.
(b) ELINT.
(4) Guerrillas/Insurgents.
(5) Espionage.
(6) Other: Line-crossers, refugees, PW, etc.
b. Sabotage.
(1) Military (key installations, lines of communications, etc.).
(2) Economic.
c. Subversion.
(1) Propaganda.
(2) Terrorism.
(3) Political.
4. ENEMY INTELLIGENCE, SABOTAGE AND SUBVERSIVE CAPA-
BILITIES
a. Enumeration of Enemy Capabilities.
(1) Intelligence.
(2) Sabotage.
(3) Subversion.
b. Analysis and Discussion. Analysis and discussion of enemy capabili-
ties to provide a basis for conclusions as to the relative probability of
adoption of above enumerated enemy intelligence, subversive, and sabotage
capabilities.
5. CONCLUSIONS.
a. Relative probability of adoption of enemy intelligence, subversive and
sabotage capabilities.
b. Effects of enemy capabilities on friendly courses of action.
c. Effectiveness of current friendly countermeasures.
d. Additional friendly countermeasures or emphasis needed.

/B/
G2

(Classiñcation)

M-2
FM 30-«

ANNEX TO COUNTERINTELLIGENCE ESTIMATE

Organization Name
Location
Strength (Actual and Authorized)
Leadership and key Personalities
Liaison, Coordination and Cooperation with Other Intelligence, Subversive
and Sabotage Organizations
Capabilities
Typical Activities
Strengths and Weaknesses
Other Information as Required
FM 30-5

APPENDIX N

EXAMPLE OF A DIVISION INTELLIGENCE ANNEX


(When issued separately from an operation order)
(STANAG 2014)

(Classification)

Copy No 4 of copies
20th Inf Div
ZELLE (4671), BUTTANO
101900 September 19
BQ 13
Annex A (Intelligence) to Operations Order 24
Reference: Map, BUTTANO, Edition 2, 1:50,000 sheets 204 (ZELLE-
PAGT.)
1. SUMMARY OF ENEMY SITUATION
. See INTSUM, this HQ, 101800 September, and Appendix 1, Situation
Overlay.

2. ESSENTIAL ELEMENTS OF INFORMATION


a. Essential Elements of Information.
(1) Will Aggressor reinforce his forces along the FLOOD River
before the time of attack? If so, when, where, and with what forces?
Special attention to the mechanized regiment and the medium tank regi-
ment in vicinity of BURG.
(2) Will Aggressor employ nuclear weapons against us? If so, when,
where, how many, of what yields, and by what delivery means?
b. Other Intelligence Requirements.
(1) Will Aggressor continue to defend in his present position? If so,
how will he organize his forces on the ground, and with what troops ? Spe-
cial attention to locations and activities of reserves, and vulnerability to
nuclear attack.
(2) Will Aggressor attack prior to 110500 September? If so, when
where, and in what strength? Special attention to the axis Hill 536—Hill
524—CR 981.
(3) Will Aggressor use CB agents? If so, what agents, when, how,
and where?
3. INTELLIGENCE ACQUISITION TASKS
a. Orders to attached and subordinate units.
(1) 1st Bde.
(2) 2d Bde.

(Classification)

N-l
FM 30-5
(Classification)
(a) Report as obtained.
1. Status of construction of defensive positions and minefields on
and to the east of the FLOOD River.
2. Location and size of ammunition storage sites and location,
size, and content of engineer equipment parks.
S. Clearing of lanes through obstacles within Aggressor position
in division zone.
4- Number, size, and composition of enemy patrols, and time they
were observed.
5. Activity and size of units blocking our patrolling in forward
areas.
6. The interception of enemy patrols equipped for CB activity.
7. The presence of enemy troops carrying protective masks and/
or wearing protective clothing.
(b) Report as obtained. Negative reports by 110400 September.
1. Activity in medium tank regiment (-) and tank battalion
assembly area in vicinity of BURG.
2. Location and activity of mechanized regiment in vicinity of
BURG.
(3) 3d Bde.
(a) Report as obtained.
1. Activity of mechanized battalion north and east of CR 987.
2. Activity of mechanized battalion on Hill 503.
3. Status of construction of defensive positions and mine-fields on
and to the east of FLOOD River.
4. Location and size of ammunition storage sites and location,
size, and content of engineer equipment parks.
5. Clearing of lanes through obstacles within Aggressor position
in division zone.
6. Number, size, and composition of enemy patrols and time they
were observed or contacted.
7. Activity and size of units blocking our patrolling in forward
areas.
8. The interception of enemy patrols equipped for CB activity.
9. The presence of enemy troops carrying protective masks and/
or wearing protective clothing.
(b) Report as obtained. Negative reports by 110400 September.
1. Activity in medium tank regiment (-) and tank battalion
assembly area in vicinity of BURG.
2. Location and activity of mechanized regiment in vicinity of
BURG.
(4) 1/21 Cav Report as obtained.
(a) Activity of mechanized battalion on Hill 503.
(b) Status of construction of defensive positions and minefields on
and to the east of the FLOOD River.
(c) Location and size of ammunition storage sites and location,
size, and content of engineer equipment parks.
(d) Clearing of lanes through obstacSea with Aggressor position isa
division zone.

(Classification)
FM 30-5

(Classification)
(e) Number, size, and composition of enemy patrols, and time they
were observed.
(f) Activity and size of units blocking our patrolling in forward
areas.
(g) The interception of enemy patrols equipped for CB activity.
(h) The presence of enemy troops carrying protective masks and/
or wearing protective clothing.
(5) DivArty.
(a) Report as obtained.
1. Status of construction of defensive positions and minefields on
and to the east of the FLOOD River.
2. Clearing of lanes through obstacles within Aggressor position
in division zone.
3. Number, size, and composition of enemy patrols, and time they
were observed or contacted.
■4. Activity and size of units blocking our patrolling in forward
areas.
5. The interception of enemy patrols equipped for CB activity.
(b) Report as obtained. Negative reports by 110400 September.
Locations of artillery positions, including number of weapons, caliber, and
state of preparation of position.
(6) 20Avn.
(a) Report as obtained.
1. Activity of mechanized battalion north and east of CR 987.
2. Activity of mechanized battalion on Hill 503.
3. Location, size, and type of unit in vicinity of Hill 536 (north of
BURG).
•4. Status of construction of defensive positions and minefields on
and to the east of the FLOOD River.
5. Location and size of ammunition sites, location, size, and con-
tent of engineer equipment parks.
6. Preparation of emplacements suitable for, and presence of
equipment appropriate to, atomic demolition munitions (ADM).
7. The interception of enemy patrols equipped for CB activity.
(b) Report as obtained. Negative reports by 110400 September.
1. Movement on the following roads :
a. North on Highway 25.
b. West on Highway 2.
c. West on Highway 4.
2. Activity in medium tank regiment (-) and tank battalion as-
sembly arsa in vicinity of BURG.
3. Location and activity of mechanized regiment in vicinity of
BURG.
4. Location of artillery positions, including number of weapons,
caliber, and state of preparation of positions.
(7) 20 Engr. Report as obtained.
(a) Status of construction of defensive positions and minefields on
and to the east of the FLOOD River.
(b) The interception of enemy patrols equipped for CB activity.

(Classification)

N-3
FM 30-5

(Classification)
b. Bequests to higher, adjacent, and cooperating units.
(1 ) 1st Corps is requested to provide :
(a) As obtained.
1. Location, size, and type of unit in vicinity of Hill 536 (north of
BURG).
2. Number, types, direction of movement, and time of movement
of air or surface vehicular traffic within the division zone, with special
attention to Highway 2.
S. Troop concentrations, including types of vehicles, east of High-
way 25 within the divisional area of interest.
4. Evidence of field fortifications and troop concentrations along
the following lines :
a. Hill 503—CR 987.
b. Hill 518—Hill 536—Hill 499.
5. Location and size of ammunition storage sites and locations,
size, and content of engineer equipment parks.
6. Instances of heavily guarded vehicular movement. Special at-
tention to Highway 2 from ZILCH to BURG.
7. Areas under unusual security restrictions in the divisional area
of interest.
8. Presence of special security troop units in any area east of
Highway 25.
9. Any location in the divisional area of interest from which civil-
ians have been evacuated.
10. Launcher sites for guided missiles or rockets within divisional
area of interest.
11. Preparation of emplacements suitable for, and presence of
equipment appropriate to, ADM.
12. The interception of enemy patrols equipped for CB activity.
IS. All CB supply movement and dumping in zone.
14. The presence of enemy troops carrying protective masks and/
or wearing protective clothing.
(b) As obtained ; negative reports by 110400 September.
1. Movement on the following roads :
a. North on Highway 25.
b. West on Highway 2.
c. West on Highway 4.
2. Activity in medium tank regiment (-) and tank battalion as-
sembly area in vicinity of BURG.
3. Location and activity of mechanized regiment in vicinity of
BURG.
4. Location and activity of mechanized regiment southwest of
CR 994.
5. Locations of artillery positions, including number of weapons,
caliber, and state of preparation of positions.
6. Command posts, supply points, and medical facilities east of
Highway 25.
(2) 18 Inf Div is requested to provide :
(a) As obtained.
1. Troop concentrations, including types of vehicles, east of High-

( Classification)
FM 30-5

(Classiñcation)
way 25 within the divisional area of interest.
2. Instances of heavily guarded vehicular movement. Special at-
tention to Highway 2 from ZILCH to BURG.
3. Areas under unusual security restrictions in the divisional area
of interest.
4. Presence of special security troop units in any area east of
Highway 25.
5. Any location in the divisional area of interest from which civil-
ian have been evacuated.
6. Launcher sites for guided missiles or rockets within divisional
area of interest. ^
7. Locations of heavy artillery positions, including number of
weapons, caliber, and state of preparation of positions.
8. Preparation of emplacements suitable for, and presence of
equipment appropriate to, ADM.
9. The interception of enemy patrols equipped for CB activity.
10. All CB supply movement and dumping in zone.
11. The presence of enemy troops carrying protective masks and/
or wearing protective clothing.
(b) As obtained ; negative reports by 110400 September.
1. Movement on the following roads :
a. North on Highway 25.
b. West on Highway 2.
c. West on Highway 4.
2. Location and activity of mechanized regiment southwest of CR
994.
(3) 52 Mech Div is requested to provide as obtained:
(a) Troop concentrations, including types of vehicles, east of High-
way 25 within the divisional area of interest.
(b) Instances of heavily guarded vehicular movement. Special at-
tention to Highway 2 from ZILCH to BURG.
(c) Areas under unusual security restrictions in the divisional area
of interest.
(d) Presence of special security troop units in any area east of
Highway 25.
(e) Any location in the divisional area of interest from which civil-
ians have been evacuated.
(f) Launcher sites for guided missiles or rockets within divisional
area of interest.
(g) Locations of heavy artillery positions, including number of
weapons, caliber, and state of preparation of positions.
(h) Preparation of emplacements suitable for, and presence of
equipment appropriate to, ADM.
(i) The interception of enemy patrols equipped for CB activity.
(j ) All CB supply movement and dumping in zone.
(k) The presence of enemy troops carrying protective masks and/
or wearing protective clothing.
(4) Supporting USASA units provide information derivable from
SIGINT and ESM and will respond to specific tasking as described in
separate instructions.

(Classiñcation)

N-5
FM 30-5

(Classification)
4. MEASURES FOR HANDLING PERSONNEL, DOCUMENTS, AND
MATERIEL See Division SOP.
5. DOCUMENTS AND/OR EQUIPMENT REQUIRED.
a. Maps. SOP distribution of map, BUTTANO, 1:50,00o, ZELLE-PAGT.
b. Photographic. Following aerial photographs will be furnished :
(1) Basic cover of division zone (1:10,000 approximate), six copies of
each brigade and Div Arty; one copy each tank battalion, mechanized in-
fantry battalion, 1/21 Cav, division engineer, aviation battalion or group,
and division signal officer.
(2) Annotated airphotos distributed automatically, as available.
6. COUNTERINTELLIGENCE
a. Appendix 2, Counterintelligence.
b. All units coordinate use of Army aircraft through division tactical
operations center (DTOC) to minimize number of aircraft in air over
division zone prior to attack.
7. REPORTS AND DISTRIBUTION
Effective 110800 September units will submit INTSUM at 0800, 1200,
1600, 2000, 2400, and 0400 hours daily in lieu of times prescribed in divi-
sion SOP.
8. MISCELLANEOUS INSTRUCTIONS
None.
Acknowledge.
POWERS
MG
Appendixes : 1—Situation Overlay
2—Counterintelligence
Distribution : Same as OPORD
OFFICIAL:
/s/AUSTIN
AUSTIN
G2
iVote; In joint service operations where international standardization agreements
do not apply, the Intelligence Annex in JCS Publication 12 will be used.

(Classification)

N-6
FM 30-5

APPENDIX O

EXAMPLE INTELLIGENCE WORKBOOK FOR STABILITY OPERATIONS

1. ENEMY OPERATIONS e. Logistical


a. Units f. Propaganda
(1) Guerrillas g. Subversive
(2) Political (to include infrastructure)
(3) Underground 5. TARGETS AND LOCATION
(4) Others a. Command and Tactical Units
b. Modus Operandi b. Paramilitary
(1) Tactical c. Political Cells
(2) Political d. Propaganda Cells
(3) Propaganda e. Supply Installations and Caches
(4) Logistics f. Line of Communications and Supply
(5) Sabotage, Assassination etc.
6. EFFECTS OF WEATHER AND TERRAIN
.2. CIVILIAN POPULACE
a. Military Operations
a. Hostile
b. Political Activities
b. Friendly
c. Economic Factors
c. Neutral
7. LOGISTIC SUPPORT SYSTEMS
3. THIRD COUNTRY OPERATIONS
a. In-Country
a. Units b. Third Country
bi Personnel
c. Command 8. RECRUITING AND TRAINING
d. Organizations a. Military/Guerrilla
(1) In-Country
e. Logistics (2) Third Country
f. Training Areas and Programs b. Political
g. Other Support Operations (1) In-Country
4. ORGANIZATIONS (2) Third Country
a. Political c. Others
b. Military/Guerrilla (1) In-Country
(2) Third Country
c. Paramilitary
d. Command 9. MISCELLANEOUS

O-l
FM 30-5

APPENDIX P

SAMPLE METHOD OF INTEGRATING INTELLIGENCE WITH OTHER TRAINING

Integration of Intelligence into Other Subjects


Principal subject What to integrate How to integrate

CHARACTER GUIDANCE AND THE Security Stress the moral obligation of all military
CODE OF CONDUCT. personnel to report violations of security.
EMPLOYMENT OF THE ARMED The intelligence chain Present the intelligence structure from the
FORCES. individual Soldier to DA.
RULES OF LAND WARFARE AND Handling of PW and other persona of Correct treatment of enemy PW means
GENEVA CONVENTION. inteligence interest. more information during interrogations.
TROOP INFORMATION Orientation in foreign armies. Aggressor, Use foreign armies as a topic, if possible.
the maneuver enemy. Otherwise, integrate as much informa-
tion during other training as is possible
considering the primary topic scheduled.
CONCEALMENT AND COVER Counterintelligence. Patrolling. Good concealment and camouflage denies
the enemy information about out dispo-
sitions, both troops and supplies. Stress
noise and light discipline and policing of
bivouac areas.
FIELD SANITATION Counterintelligence. Survival Clean bivouac areas mean less information
for the enemy.
FIRST AID Survival. Patrolling Troops on patrol or evading capture must
often treat injuiies without professional
aid or medical supplies.
GUARD DUTY Counterintelligence, Use of Agressor. Use challenge and password in the field as
Security. well as garrison. Maintain bivouac
security guard against infiltration and
guerilla activities. Practice cover and
concealment. Use Agressor to add
realism in demonstrations and practical
exercises.
INDIVIDUAL PROTECTIVE MEAS- Reporting. Necessity for speed in Report nuclear, biological and chemical
URES AGAINST NUCLEAR, BIOT reporting. equipment whenever observed. A person
LOGICAL, AND CHEMICAL detecting nuclear, biological or chemical
ATTACK. • ' attack must report: (allocation; (b)
time of attack; and (c) method of
release (if known).
INSPECTIONS.. Patrolling. All intelligence subjects. Troops, especially NCOs must know the
difference between a formal field insepc-
tion and the inspection of a patrol.
During garrison inspection, question
individuals about meaning of combat
intelligence, observation, counterintelli-
gence, etc.
EVASION AND ESCAPE. Collecting and reporting information. Remember and report information of in-
Camouflage and concealment. Scout- telligence value; practice cover and con-
ing and patrolling. Map and compass cealment techniques during escape and
reading. Survival. evasion training. Apply the principles of
scouting patrolling as insurance for
successful evasion. Weather may be used
as a cover for evaders and escapers but
may complicate the escape effort.

P-l
FM 30-5

Principal «ubjcct What to integrate How to integrate

MAINTENANCE, SUPPLY ECON- Counterintelligence. Security. Do not leave equipment where the enemy
OMY, AND COST CONSIOUSNESS. can pick it up. Discarded equipment is
as important a source of information to
the enemy as any other data. Littered
bivouac areas mean more information
for the enemy. Practice security
measures.
SIGNAL COMMUNICATIONS, Patrolling. Reporting. Security. A patrol acts as the eyes and ears of the
ELEMENTARY. commander. Messages used to report
information must be cleai, concise, and
timely. Be security conscious.
ANTIGUERRILLA AND ANTIINFIL- Counterintelligence. Collection oí infor- Guards and sentries should practice cover
TRATION TRAINING. mation. Handling oí PW. and concealment at all times; discover
the enemy before being discovered; get
the drop on the enemy and attempt to
capture him for interrogation. Report
guenilla activities. Other troops must be
alerted and antiguerrilla operations
conducted.
DEFENSE AGAINST AIR ATTACK. Collecting and reportin g. Counterintelli- Good camouflage ard concealment prevent
gence. detection from both air and ground.
Practice light discipline. Use Agressor to
test cover effectiveness and discipline.
HASTY FORTIFICATIONS. Observation. Counterintelligence. Select a position that affords good observa-
tion, camouflage it well, and practice
light and noise discipline.
INDIVIDUAL DAY TRAINING. Observation. Counterintelligence. Observation must be continuous. Practice
Security. cover and concealment. Use cover at all
times. The chances of avoiding capture
are enhanced by following the simple
rules taught in scouting and patrolling
and use of cover and concealment.
INDIVIDUAL NIGHT TRAINING. Counterintelligence. Map and compass Practice light and noise discipline. Use
reading. Collecting and reporting compass and the stars to determine
information. Evasion and escape. direction. Use night observation and
listening techniques to collect informa-
tion.
MAP AND AERIAL IMAGERY. Reporting information. Patrolling. Learn how to use coordinates in reporting
Counterintelligence. information. Aerial imigery is valuable
both for obtaining and verifying informa-
tion. Use map and aerial imagery to
select patrol routes that afford maximum
cover and concealment.
MARCHES AND BIVOUACS. Maps and aerial imagery. Counterin- Use mips and aerial imagery for planning
telligence. Collecting and reporting routes and salecting bivouac areas.
information. Handling PW and per- Practica cover aid ooncealment, com-
sons of intelligence interest. Security. munications security, noise and light
Handling captured documents. discipline. Leave a clean bivouac area.
Remove all unit signs, etc. Unit intelli-
gence officer should check area. Use
Aggressor to add reilism to problem.
Observe for enemy activity, report
unusual activity. Attempt to capture
Aggressor PW during problem. Search
for documents and properly process
them.

P-2
FM 30-5

Principal subject What to integrate How to integrate

MINES AND BOÓBYTRAPS Collecting and reporting information. Importance of reporting and marking
Patrolling. enemy mines and boobyt-.raps. Patrols
must be proficient in detecting and
skirting or passing through enemy mine-
fields. Knowledge of the patterns used
by friendly and enemy forces and
methods by which mines and boobytrapa
may be disarmed are very important.
SQUAD AND PLATOON TACTICAL Collecting and reporting information. Review observing, listening, reporting of
TRAINING. Counterintelligence. Maps, compass, information and crater analysis reports,
ard aerial imagery. Handling enemy cover and concealment, noise and light
PW and material. Security. Crater discipline. Use challenge and password,
analysis. compass, map and aerial imagery. Use
Aggressor to add realism and to teach
handling of PW and enemy documents.

P-3
FM 30-5

APPENDIX R

AIRCRAFT HOSTILE FIRE REPORT

l. Unit
2. Date fire was received Time of day
3. Type of aircraft Serial mimber
4. Location/coordinates where fire was received
5. Altitude of aircraft (feet above the terrain).
6. Estimate number of rounds fired at aircraft Number of hits
aircraft received . Where on aircraft were hits taken?

7. Type of mission flown (circle one) :


a. Armed visual recon J. Command and control
b. Visual recon k. Armed escort
c. Photo recon 1. Attack/APA
d. IR recon m. Administative
e. SLAB recon n. Maintenance test flight
f. Combat assault o. Training
g. Extraction of troops p. Low level screening
h. Aircraft recovery q. Other (explainbriefly)
i. Log (resupply)
Where in the flight profile of the mission was the fire received?
a. Landing at LZ g. Arriving at secure base of opna
b. Departing LZ h. Inbound on ARA/gun run
c. Landing at PZ i. Breaking off gun run
d. Departing PZ j. Orbiti ng over
e. En route k. Hovering at :
f. Departing secure base of 1. Other (explainbriefly)
opns

9. What airspeed was being flown ?. -knots.


10. What attitude was aircraft?
a. Straight and level flight f. Turning and climbing
b. Straight descending g. Turning in level flight
c. Straight climbing flight h. Turning and descending
d. Steep climb i. Shallow descent
e. Steep descent
11. Type of enemy fire received? (small arms, automatic or both)
12. Was aircraft in formation? YES NO If yes, were other aircraft
in the formation hit? YES NO If yes, what was the position of the
aircraft in relation to yours?

R-l
FM 30-5
13. If hit in formation, what formation was used ?
14. Condition of aircraft :
a. HFL (Hit flyable)
b. HNF (Hit not flyable)
c. SRR (Shot down-recovered-repairable)
d. SRN (Shot down-recovered-not repairable)
e SNR (Shot down-not recovered)
15. Casualties:
a. KIA MedEvac YES NO
b. WIA
16. Was weather a factor in altitude being flown? YES NO
17. Was fire received over what was considered a secure area?
YES NO
18. Remarks : (Returned fire, amt, assessments, etc.)

*-*
m 30-5

APPENDIX S

EQUIVALENT CHILL TEMPERATURE CHART

WINDSPEED
KNOTS MPH TEMPERATURE (0F)

CALM CALM 40 35 30 25 20 15 10 5 0 -5 10 -15 ,. -25 -30 -35 40 45 •50 -55 -60

EQUIVALENT CHILL TEMPERATURE

3- 6 5 35 30 25 20 15 10 5 0 -5 -10 -15 -20 -25 -30 -35 40 45 -50 -55 -65 -70

7-10 10 30 20 15 10 5 0 -10 •15 -20 -25 -35 40 45 -50 60 -65 -70 -75 -80 -90 -95

11-15 15 25 15 10 0 -5 -10 -20 -25 30 40 45 -50 -60 -65 -70 -80 -85 -90 •100 -105 -110

16-19 20 20 10 5 0 -10 -15 -25 -30 -35 45 -50 -60 -65 -75 -80 -85 -95 -100 -110 -115 -120

20-23 25 15 10 0 5 -15 -20 -30 -35 45 -50 •60 -65 -76 -80 -90 -95 -105 -110 ■120 125 -135

24-28 30 10 5 0 -10 -20 25 -30 40 -50 -55 -65 -70 •80 -85 •95 -100 -110 -115 -125 -130 -140

29-32 35 10 5 -5 -10 -20 -30 -35 40 -50 -60 •65 -75 -80 -90 -100 •105 -115 -120 -130 135 -145

33-36 40 10 0 -5 -15 -20 -30 -35 45 -55 -60 -70 -75 •85 -95 -100 -110 -115 -125 130 -140 -150

WINDS ABOVE INCREASING


40 HAVE DANGER GREAT DANGER
LITTLE
LITTLE (Flesh may freeze
DANGER (Flesh may freeze within 30 seconds.)
ADDITIONAL within 1 min.)
EFFECT
INSTRUCTIONS
MEASURE LOCAL TEMPERATURE AND WIND SPEED IF POSSIBLE; IF NOT, ESTIMATE. ENTER TABLE AT CLOSEST 5° F
INTERVAL ALONG THE TOP AND WITH APPROPRIATE WIND SPEED ALONG LEFT SIDE. INTERSECTION GIVES APPROX-
IMATE EQUIVALENT CHILL TEMPERATURE; THAT IS, THE TEMPERATURE THAT WOULD CAUSE THE SAME RATE OF
COOLING UNDER CALM CONDITIONS.
NOTES
WIND 1. THIS TABLE WAS CONSTRUCTED USING MILES PER HOUR (MPH); HOWEVER, A SCALE GIVING THE
EQUIVALENT RANGE IN KNOTS HAS BEEN INCLUDED ON THE CHART TO FACILITATE ITS USE
WITH EITHER UNIT.
2. WIND MAY BE CALM BUT FREEZING DANGER GREAT IF PERSON IS EXPOSED IN MOVING VEHICLE,
UNDER HELICOPTER ROTORS, IN PROPELLOR BLAST, ETC. IT IS THE RATE OF RELATIVE AIR
MOVEMENT THAT COUNTS AND THE COOLING EFFECT IS THE SAME WHETHE R YOU ARE MOVING
THROUGH THE AIR OR IT IS BLOWING PAST YOU.
3. EFFECT OF WIND WILL BE LESS IF PERSON HAS EVEN SLIGHT PROTECTION FOR EXPOSED
PARTS - LIGHT GLOVES ON HANDS, PARKA HOOD SHI ELDING FACE, ETC.

ACTIVITY DANGER IS LESS JF SUBJECT IS ACTIVE. A MAN PRODUCES ABOUT 100 WATTS (341 BTUs) OF
HEAT STANDING ST-U BUT UP TO 1000 WATTS (3413 BTUs) IN VIGOROUS ACTIVITY LIKE
CROSS COUNTRY SC
PROPER USE OF CLOTHING and A nQUATE DIET are both important.
COMMON SENSE THERE IS NO SUBS7 FOR IT. THE TABLE SERVES ONLY AS A GUIDE TO THE COOLING
EFFECT OF THE V> I BARE FLESH WHEN THE PERSON IS FIRST EXPOSED. GENERAL BODY
COOLING AND MA 1ER FACTORS AFFECT THE RISK OF FREEZING INJURY.

S-l
FM 30-5

APPENDIX T

TYPICAL INTELLIGENCE INDICATORS

T-l. General
a. In spite of all precautions taken to deceive, the enemy must inevitably carry out »pecific activities
in preparation for or in conjunction with specific actions. These activities may be detected, evaluated
and interpreted to develop a reasonable estimate of the enemy's probable courses of action. The enemy
however, is aware of this and may attempt to turn this apparent vulnerability into deceptive measures
by allowing friendly intelligence to detect activities intended to indicate a course of action which may
be the opposite of what he intends.
b. The following paragraphs contain some intelligence indicators with an explanation for each. This
list of indicators is by no means complete nor is it intended for dogmatic application in all situations. It
is primarily a sampling of typical indications of typical enemy activities. See FM 30-102 for explanations
of enemy equipment.

ACTIVITY EXPLANATION
Concentration of mass toward either or both Single or double envelopment normally is attempted
flanks. in the offiense. Tanks and mechanized units on
either or both flanks may indicate single or
double envelopment.
Extensive artillery preparation. Offensive built around the striking power and
shock of massed artillery. Preparations to ^
to 1 hour normally precede offensive.
Artillery positions well forward and concentrated. Artillery positions for the attack are well forward,
with direct fire weapons, artillery pieces, and
large numbers of mortars concentrated.
Dispersal of tanks and SP guns to forward units. Tanks accompanying leading waves of assault
mechanized units. SP guns follow tanks closely
by bounds.
Medium air defense guns located in forward areas. Medium air defense guns displaced forward prior
to attack to protect assault forces and to facili-
tate forward displacement during the attack.
Clearing lanes through obstacles within own posi- Lanes are cleared and marked through mined
tion. areas, and ramps and bridges prepared over
ditches and trenches within enemy's own posi-
tion. This is done prior to attack to facilitate
forward movement and grouping, particularly
at night.
Reconnaissance and "estruction of obstacles that Usually on night preceding attack, enemy patrols
are part of friendl defenses. reconnoiter friendly obstacle to determine plan
for clearing lanes. Patrol destroys only such ob-
stacles as will not disclose direction of main
effort.

T-l
FM 30-5

ACTIVITY EXPLANATION
Demonstrations and feints. Local, small-scale attacks or demonstrations in-
volving mechanized units, tanks and artillery
frequently precede a general attack.
Conducting drills and rehearsals in rear areas. Major attacks may be preceded by rehearsals.
This is particularly true of attacks against for-
tified positions or strongly defended river lines.
Establishment and strengthening of counterrecon- Counterreconnaissance screens are used to cover
naissance screen. possible assembly areas, routes of troop move-
ment, or regrouping of forces to be used in the
attack.
Movement of hostile units forward. Prior to launching an attack, troops may be moved
to assembly areas from which they can deploy.
Location of enemy troops in forward assembly Troops are assembled in areas from which they
areas. can launch the attack.
Increased patrolling. Patrolling by mechanized units usually is more
active before an attack.
Increased activity in rear areas. Before an attack, supply and administrative ac-
tivities increase in the rear areas.
Location of supply and evacuation installations Supply and evacuation installations usually are
well forward. located well forward for an attack.
Increased air reconnaissance. Air reconnaissance usually is more active before
an attack.
Systematic air bombardment. Before the attack, the enemy may engage in sys-
tematic "softening up" of friendly position by
bombardment.
T-2. Attack
Attack may be indicated by—
ACTIVITY EXPLANATION
Massing of mechanized elements, tanks, artillery, Areas of secondary importance are often denuded
and logistical support. to mass maximum strength for main effort.
Deployment of combat elements (mechanized, Normal attack formation provides for the second
armor, antitank) in echelon. echelon of the regiment to be located 3-6 kilo-
meters in rear of the first echelon on line ; divi-
sion second echelon 6-8 kilometers in rear of
first echelon; and army second echelon 15-25
kilometers in rear of first echelon.
Forward units disposed on relatively narrow The actual attack zone of a mechanized regiment
fronts. is about 4 kilometers within an assigned front-
age which varies from 5 to 8 kilometers.
T-3. Defense
Defense may be indicated by—
ACTIVITY EXPLANATION
Preparation of battalion and company defense Defense is based on stubborn defense of battalion
areas. defensive areas, and counterattacks by tank
heavy forces.
T-2
FM 30-5

ACTIVITY EXPLANATION
Extensive preparation of field fortifications. The enemy makes extensive use of trenches, pre-
pared positions, and overhead cover in defensive
operations.
Formation of antitank strongpoints. Antitank strongpoints are formed along logical
avenues of approach for armor. These are made
up of mechanized engineer, and antitank gun
units with positions strengthened by mines,
ditches, and other obstacles.
Attachment of additional antitank units to front- In areas where there is a serious armored threat,
line defensive positions. the enemy will concentrate as many as 25 anti-
tank guns for every 1,000 meters of front.
Preparation of alernate artillery positions. In normal defensive operations, three positions
are prepared for each firing battery.
Employment of roving artillery. Roving guns are part of normal defensive opera-
tions.
Large tank units located in assembly areas to the Tank units are held in assembly areas for employ-
rear. ment in counterattack roles.
Preparation and occupation of successive defense In the defense, separate and distinct defense lines
lines. are prepared and occupied.
Presence of demolitions, contaminated areas, ob- Demolitions and minefields and other obstacles
stacles, and minefields. are placed to cover approaches to the position.
Deployment of mechanized units on good defen- Dominating terrain that has good fields of fire
sive positions. and is relatively inaccessible to tanks usually
is selected for a defensive position.
Dumping ammunition and engineer supplies and Enginner tools and equipment may be used to dig
equipment and fortifying buildings. trenches and to erect obstacles.
Entrenching and erecting bands of wire. Digging of trenches and the erection of wire in-
dicate preparations to hold the position.
T—4. Delaying Action
Delaying action may be indicated by—
ACTIVITY EXPLANATION
Withdrawal from defensive position before becom- In delaying action units avoid becoming decisively
ing heavily engaged. engaged.
Successive local counterattacks with limited objec- Counterattacks are employed to assist in disen-
tives. gaging first echelon units rather than to restore
position.
Counterattacks broken off before position is re- Same.
stored.
Maximum firepower positioned forward; firing Long-range fires facilitate the delaying action.
initiated at long ranges.
Frontages up to four times that normally assigned Forces conducting a delaying action are normally
assigned frontages in excess of that normal for
to units on the defensive.
enemy units on the defense.

Use of prepositioned nuclear weapons. Prepositioned nuclear weapons facilitate the de-
laying action.

T-3
FM 30-5

T-5. Withdrawal
Indications for withdrawal are generally the same as those for delaying action with the addition of the
following :
ACTIVITY EXPLANATION
Rearward movement of long-range artillery and In withdrawal, the first units to be withdrawn are
supply echelons. long-range artillery and the supply echelons
which move back under cover of darkness 1 or
2 days before main withdrawals.
Systematic destruction of bridges, communica-
tion facilities and other military assets in Deliberate demolition and scorched earth tactics
enemy-held territory. may be employed in general withdrawals.
T—6. Reinforcement
Reinforcement may be indicated by—
ACTIVITY EXPLANATION
Movement of additional troops toward the front. This action could increase enemy's present
strength.
Increased traffic toward present position. This increased traffic may bring up additional
troops and supplies.
Identification of new units in combat zone.
The presence of new units in addition to units al-
ready present will increase enemy's strength.
Additional command posts and supply and evacu-
ation installations. Presence of additional units would cause an in-
crease in number of these installations.
T—7. Nuclear Weapons
a. Presence of nuclear delivery systems may be indicated—
ACTIVITY EXPLANATION
Heavily guarded movement of supplies, equip- Movement of supplies, equipment, and material of
ment and materiel. nuclear nature requires special security meas-
ures.
Heavily guarded installations. Sites for storage of nuclear supplies and the loca-
tions of delivery units are heavily guarded.
Preparation of very heavy artillery positions. Primary and alternate positions for nuclear deliv-
ery artillery are prepared prior to movement of
the units.
Movement or detection of SP launchers. NERONO and KOLOSSO, free rockets, and
TONDRO, and FULMO, surface-to-surface mis-
siles have tracked SP launchers.
Presence of radars and other electronic equip- Surface-to-surface missile systems employ the
ment. DIREKTO radar for control.
Sudden increase in communication and electronic Enemy nuclear delivery units are heavily equipped
activities. with radios and electronic devices.
Movement of small, heavily guarded convoys, in- Nuclear warheads are moved under heavy security,
cluding closed vans, with a high percentage of usually in closed vans. Escort vehicles are equip-
automatic weapons. ped with machineguns.
Light aircraft circling over moving convoy. Nuclear warhead convoys often use aerial radio
relays to maintain communication.

T-4
FM 30-5

ACTIVITY EXPLANATION
Movement of small groups of heavily armed heli- Nuclear warheads may be moved by helicopters,
copters escorted by tactical fighters. with guards and armed helicopters as escort.
Tactical aircraft may provide air cover.
Movement of pole trailers with rockets or missile Pole trailers are used to resupply missile and
bodies. rocket units.
Presence of heavy and very heavy artillery. 203-mm gun-howitzer, 310-mm gun SP, and 400-
mm mortar SP have nuclear delivery capabili-
ties.
Identification of tall slender objects, such as Ballistic missiles may be camouflaged as towers,
towers, chimneys, or narrow tirées, not previous- chimneys, or narrow trees, such as poplars.
ly in area.
Large, well-guarded complexes including tank- Surface-to-surface missile units require extensive
trucks, radars, electronic equipment, generators, ground handling equipment.
and maintenance tents, located well to the rear.
Heavily guarded closed vans. Nuclear warheads normally are carried in closed
vans that are heavily guarded.
Evacuation or exclusion of civilians from specific Civilians may be evacuated from areas selected
areas suitable for nuclear storage or delivery for nuclear storage or delivery sites.
sites.

6. Use of nuclear weapons may be indicated by—


ACTIVITY EXPLANATION
Location of missile and/or free rocket units with- Missile and free rocket units are located within
in striking range. one-third maximum range from the line of con-
tact on the offense, and one-half on the défense.
Use of missiles and/or free rockets with high ex- Missilies or free rockets may be used to deliver
plosive warheads. high explosive warheads either in a normal sup-
port role or a registration.
Location of very heavy artillery within support- Nuclear delivery artillery is located within one-
ing distance of frontlines. third of its maximum range from the line of con-
tact on the offense, and one-half on the defense.
Registration of very heavy artillery. Registration may be required, using smoke, low
charge, or high explosive projectile, prior to
firing a nuclear projectile.
Special or unusual activity by frontline troops. Frontline troops may construct special positions
usually deep or covered foxholes, prior to enemy
use of nuclear weapons.
Limited withdrawal of frontline units without Frontline units may withdraw for a limited dis-
apparent tactical reason. tance to avoid casualties from close-in nuclear
explosives.
Sudden and energetic digging in enemy areas. Prior to use of nuclear weapons, frontline units
may be ordered to dig deeper foxholes or take
other individual protective measures.
Large concentrations of radios, radars and other Concentration of equipment is necessary to guide
electronic equipmeilt located in the vicinity of and control guided missiles, and must be located
suitable sites for guided missile launching. in close proximity of the launching site.

T-5
FM 30-5

ACTIVITY EXPLANATION
Sudden increase in communications and electronic Increase may be incident to delivery of nuclear
activity. weapons, for example, last minute orders and
warnings, and use of electronic guidance and
control.
Use of smoke cover on frontline troops. Smoke may be used to protect troops against
thermal effects of weapons used in close support.
Disappearance of known enemy agents from spe- Prior to nuclear attack of an area, agents may
cific areas. be ordered to leave the area.
Increased or unusual air activity. Delivery of nuclear weapons by air may require
a temporary degree of local air superiority,
special photo missions, and/or practice flight
pattern runs by the delivery aircraft.

T-6
FM 30^5

APPENDIX U

SAMPLE SURVEILLANCE AND TARGET ACQUISITION ANNEX TO DIVISION


OPERATION ORDER

(CLASSIFICATION)
ANNEX J (Surveillance and Target Acquisition) to OPORD 6-20th Inf
Div
Reference : Map, Series , Editions 1-AMJ, 1:50,000.
Time Zones Used Throughout the Order :
1. SITUATION.
a. Enemy Forces.
(1) Annex A (Intelligence)
(2) Enemy is capable of ...
b. Friendly Forces.
(1) 1st Corps attacks ...
(2) 9th TAF supports ...
(3) Annex B (Fire Support)
c. Attachments and Detachments. Attached effective .
(1) A Btry, 6th Bn (Tgt Aqn), 25th Arty
(2) 2d Pit, A Co (Ranger), 75th Inf
2. MISSION.
Maintain a 24-hour all weather observation of the Division AO. Locate
targets for employment of fire and maneuver elements of the Division.
3. EXECUTION.
a. Each brigade will be responsible for security and observation of its
own area. OP/LP, restrictions on use of white light and other active emit-
ters per Division SOP.
b. Resources.
(1) IstSqdn^SdCav:
(a) Ground:
Metascope
Periscopes, electronic and optical
Binoculars, electronic and optical
Night observation devices, med range
Radar
Infrared viewers
Unattended ground sensors and receiver/monitors
Laser range finder
Battle Area Surveillance System, Phase III (BASS III)
(b) Air:
Night Vision sights, indiv and crew served weapons
Metascopes
(CLASSIFICATION)

U-l
FM 30-5

(CLASSIFICATION)

Binoculars, electronic and optical


Searchlights, infrared and visible light
Night fire control and observation systems employing image inten-
sification and thermal imaging techniques
(2) 120th AvnBn:
Night vision sights (individual and crew served weapons)
Receivers/monitors for unattended ground sensors
Searchlights (infrared and visible light)
Night fire control and observation systems employing image intensi-
fication and thermal imaging techniques
(3) 20th InfDiv Arty:
Radar
Infrared viewers
Night observation devices
Binoculars, electronic and optical
Battery cmdr scope
Laser rangefinder
Night vision sights (individual and crew-served weapons)
(4) 20th MI Co:
Ground sensor terminals for both aerial infrared and radar imagery
(5) IstBn (C/V) (SP), 439th Arty:
Radar
Binoculars, electronic and optical
Night vision sights, individual and crew-served weapons
(6) Nondivisional :
(a) MI specialists from 20th MI Co (Inf Div)
(b) 6th Bn (Tgt Aqn), 25th Arty
(c) 1st Pit, Btry A (Sit), 190th Arty
(d) 2d Pit, Co A (Ranger), 75th Inf
(e) 377th ASA Co (Inf Div)
c. 1st Bde :
(1) Be prepared to survey in Zone A (Annex B (Operations overlay)
to OPORD 6) for special requirement.
(2)
d. 2nd Bde :
(1) Survey routes Quebec and Romeo (Annex B (Operation overlay)
to OPORD 6) for special requirement.
(2)
e. 1st Sqdn Cav :
(1) Screen left and rear flanks of the division on a continuous basis.
(2) Be prepared to release one troop to the 1st Bde for special surveil-
lance mission TBA.
f. 120th AvnBn:
(1) Annex D (Aviation) to OPORD 6.
(2) As directed by supported Bdes.
g. Div Arty :
(1) Annex C (Fire Support) to OPORD 6.
(2) Appendix 3 (Tgt Aqn Plan).
h. 20th MI Co : Div SOP.
i. IstBn (C/V) (SP), 439th Arty:
( 1 ) 24-hr overhead surveillance in division AO.
(CLASSIFICATION)

U-2
FM 30-5

(CLASSIFICATION)

(2) Acquire and engage targets I AW Div SOP.


j. A Btry, 6th Bn (Tgt Aqn), 25th Arty : As directed by CO, 1st Bde.
k. 2d Pit, A Co (Ranger), 75th Inf : As directed by CO, 2d Bde.
1. Res : 3d Bde : OPORD 6.
m. Coordinating Instructions :
(1) Task organization effective 222000 Aug.
(2) EEI : Is the enemy countering thermal imagery systems ?
(3) Use of friendly devices as nav aids : Div SOP.
(4) FDC will approve all use of flares.
n. Present rainy season attenuating signatures for use by thermal im-
agery devices.
o. Surveillance countermeasures : Div SOP.
p. Deception : As directed.
4. SERVICE SUPPORT.
a. Div installations remain at present locations.
b. Annex E (Service Support Overlay), OPORD 6.
5. COMMAND AND SIGNAL.
a. Index 1-3, SOI.
b. Annex H (Communications-Electronics), OPORD 6.
Appendices: 1—Ground Surveillance Plan (omitted)
2—Aerial Surveillance Plan (omitted)
3—Target Acquisition Plan
APPENDIX 3 (Target Acquisition Plan) to ANNEX J (Surveillance and
Target Acquisition) to OPORD 6—20th Inf Div.
Reference : Map, Series , Sheets , Edition .
1:50,000
0-0 Line (300100) = (340060) = (380049) = (420023)

1. ZONES OF RESPONSIBILITY.
a. 1st Bn, 45th Artillery: Observation in 1st Bde zone, south (short) of
0-0 line.
b. 1st Bn, 45th Artillery: Observation in 2d Bde zone, south (short) of
0-0 line.
2. GROUND VISUAL OBSERVATION.
a. Observation Posts.
(1) Division Artillery : 20th Inf Div Arty SOP.
(2) 1st Sqdn, 23d Cav : As directed by sqdn cmdr.
b. Capability Chart: 20th Inf Div Arty NLT 210700 Aug 19
3. RADAR.
a. Special attention to areas indicated on Tab A to Appendix 3 (omitted).
b. Direct support battalions : As directed by CO, Div Arty.
c. Hq Btry, Div Arty : As directed by CO Div Arty.
d. Gnd Surv Sect, 1st and 2d Bde : As directed by battalion commander.

(CLASSIFICATION)

U-3
FM 30-5

(CLASSIFICATION)

4. AIR OBSERVATION.
a. Airfields and heliports.
(1) DivMain (321236).
(2) Hq, Div Arty (269287)
(3) Field Artillery Bns: Select and report by 210700 Aug 19 .
b. Surveillance Schedule.
(1) 120th Avn Bn: Minimum of one aircraft continually in division
zone from BMNT — 15 minutes to EENT -f 30 minutes.
(2) Hq Btry, Div Arty : As directed by CO, Div Arty.
TABS :
A. Overlay, Special Areas of Attention (omitted)
B. Division Artillery Capability Chart

(CLASSIFICATION)

U-4
FM 30-5

(Classification)

Tab B (DIVARTY Capabilily) to APP 3 (Tgt Aqn) to annex J


(Surveillance and Target Acquisition) to OPORD 6

FEBA FEBA

MPQ-4A 2DE57
TPS-25
XB > 1 Ȕ 29
-^ Radar
A Forward Observer
$© Defiladed Area +»

(Classification)

Figure U-l. Divieion artillery capability chart.

U-S
FM 30-5

APPENDIX V

COUNTERINTELLIGENCE PLAN FORMAT

(CLASSIFICATION)

Heading
COUNTERINTELLIGENCE PLAN
Appendix , Counterintelligence Operations to Annex ,
Intelligence to OPLAN .
1. ( ) PURPOSE. To provide planning guidance concerning proce-
dures and responsibilities of commanders for counterintelligence activities
within their area of responsibility.
2. ( ) REFERENCES. List the basic references essential to accom-
plishment of the counterintelligence mission of the command.
3. ( ) MISSION. State the counterintelligence mission.
4. ( ) EXECUTION. Assign tasks to counterintelligence units and/or
staff offices under the command of the headquarters, considering the follow-
ing factors :
a. Provision for flow of counterintelligence information of interest to
higher, adjacent, and subordinate commands.
b. Effect of status of forces agreements on counterintelligence collection.
c. Liaison with counterintelligence elements of other commands, national
organizations, and/or national counterintelligence elements.
d. Personnel security.
e. Security of classified information.
f. Physical security of installations.
5. ( ) MILITARY SECURITY.
6. ( ) CIVIL SECURITY.
7. ( ) PORT, FRONTIER, AND TRAVEL SECURITY.
8. ( ) CENSORSHIP.
9. ( ) SPECIAL OPERATIONS.
10. ( ) ADMINISTRATION AND LOGISTICS.
a. Channels for reporting.
b. Type of report, frequency, priority.

(Classification)

V-l
FM 30-5

GLOSSARY

Agency—An individual or organization which ex- tection resulting from all measures designed to
ploits a source to collect or process information. deny to unauthorized persons information of
Analysis of the area of operations—A study to value which might be derived from the posses-
determine the effects of the area of operations sion and study of telecommunication, or to mis-
on the general courses of action that the enemy lead unauthorized persons in their interpreta-
and friendly forces may adopt. tions of the results of such study.
Area of influence—That portion of the assigned Communications-electronics operating instruc-
area of operations in which the commander is tions (CEOI)—A series of orders issued for
capable of directly affecting the course of technical control and coordination of the com-
combat by the employment of his own available munications-electronics activities of a com-
combat power. mand.
Area of interest—That area from which informa- Communications-electronics standing instructions
tion and intelligence are required to permit (CESI)—A series of instructions explaining
planning for the extension of the area of influ- the use of items included in the communica-
ence or for the displacement of potential targets tions-electronics operating instructions.
into the area of influence.
Concealment—The protection from observation
Area of operations—That portion of the area of only. See also cover.
conflict necessary for military operations, ei-
ther offensive or defensive, pursuant to an as- Coordinates register—A recording of enemy
signed mission, and for the administration inci- events by grid square designed to provide bri-
dent to such military operations. gade and lower echelons a workable counterpart
to the extensive intelligence files and workbooks
Avenue of approach—A route for a force of a maintained at higher echelons.
particular size to reach an objective.
Civil security—Counterintelligence operations Counterintelligence (CI)—That aspect of military
concerned with local civilian elements, refugees, intelligence devoted to offensive actions to de-
displaced persons, and indigenous employees of stroy or neutralize the effectiveness of adverse
US Forces. foreign intelligence activities and to defensive
actions to protect information against espio-
Cold war—A state of international tension
nage, individuals against subversion, and instal-
wherein political, economic, technological, so- lations against sabotage.
ciological, psychological, paramilitary, and mili-
tary measures short of overt armed conflict in- Counterintelligence estimate—An evaluation of
volving regular military forces are employed to the enemy's intelligence, sabotage, and subver-
achieve national objectives. sive capabilities to determine the relative prob-
Collection—The process of gathering information ability of enemy adoption of these capabilities.
from all available sources and agencies. Counterintelligence plan—A systematic listing of
Collection plan—A logical plan for determining in- all intelligence countermeasures to be carried
dications from intelligence requirements and out by a command, indicating the units/agen-
translating them into orders and requests for cies responsible for the execution of each task.
specific information. Cover—Shelter or protection, either natural or
Combat intelligence—That knowledge of the artificial. See also concealment.
enemy, weather and geographical features re- Coverage Map—A plotting of the extent and cov-
quired by a commander in the planning and erage of collection sources and agencies which
conduct of combat operations. provide information coverage to portions of the
Communications security (COMSEC)—The pro- battlefield.

Glostary-I
Cica SGM3

Direction—The phase in the intelligence cycle Immediate zone—The area bounded hi


which includes detairmination of imtelligemce re- tance at which a commander must have imme-
quirements, preparation of a collection plan,, is- diate knowledge of an enemy presence in o^de?
suance of orders and requests to infoïmation to act effectively when the enemy reaches th®
collection agencies, and a continuous cheek oa area of influence.
the productivity of collection agencies. Indication—information in various degiress of
Dissemination—The timely conveyance of infor- evaluation, all of which bears OIE the intentioia
mation and/or in an appropriate fomi and hy of a potential enemy to adopt or reject a course
any suitable means to those who need it.
Electronic counter-measures (E1CM)—Th.&t divi- Information—Unevaluated data of every descifi^
sion of electronic warfare involving actions tion which, when processed, may produce intel-
taken to prevent or reduce an enemy's effeetiv® ligence.
use of the electromagnetic spectrum. Insurgency—A condition, resulting from a revolt
Electronic counter-countermeasums (ECCM)— or insurrection against a constituted govern-
That division of electronic warfare involving ment which falls short of civil war.
actions taken to insure friendly effective use of Intelligence—The product resulting from the
the electromagnetic spectrum despite the ene- collection, evaluation, and interpretation of in-
my's use of electronic warfare. formation.
Electronic security (ELSEC)—The protection re- Intelligence annex—A supporting document of an
sulting from all measures designed to deny operation plan or order which provides detailed
unauthorized persons information of value information on the enemy situation, assignment
which might be derived from their interception of intelligence tasks, and intelligence adminis-
and study of friendly noncommunications elec- trative procedures.
tromagnetic radiations. Intelligence cycle—The steps by which informa-
Electronic warfare (EW)—Military use of elec- tion is assembled, converted into intelligence,
tronics involving actions taken to prevent or and made available to users consisting of the
reduce an enemy's effective use of radiated elec- phases of direction, collection, processing, and
tromagnetic energy, and actions taken to insure dissemination.
our own effective use of radiated electromag- Intelligence estimate—An appraisal of the ele-
netic energy.
ments of intelligence relating to a specific situa-
Electronic warfare support measures (ESM)— tion or condition with a view to determining the
That division of electronic warfare involving courses of action open to the enemy or potential
actions taken to search for, intercept, locate, enemy and the probable order of their adoption.
record, and analyze radiated electromagnetic Intelligence interrogation—Systematic effort to
energy for the purpose of exploiting such radia- produce information by direct questioning of a
tions in support of military operations. person under the control of the questioner.
Essential elements of information (EEI)—The Intelligence journal—A chronological log of intel-
critical items of information regarding the ligence activities covering a stated period,
enemy and the environment required! to make usually 24 hours.
timely decisions.
Intelligence officer—The principal staff officer as-
Evaluation—The step in the processing phase of signed to advise and assist the commander in
the intelligence cycle in which an item of infor-
carrying out his intelligence and counterintel-
mation is appraised in terms of credibility, reli- ligence responsibilities.
ability, pertinency, and accuracy.
Intelligence report (INTREP)—A specific report
General war—Armed conflict between major pow- of information, usually on a single item, made
ers in which the total resources of the belliger- at any level of command in tactical operations
ents are employed, and the national survival of and disseminated as rapidly as possible in keep-
a major belligerent is in jeopardy. ing with the timeliness of the information.
Imagery interpretation (H)— The process of loca- Intelligence requirement—Any subject, general or
tion, recognition, identification and description specific, upon which there is a need for the
of objects, activities and terrain represented on collection of information or the p^oduzetiom of
intelligence.
©0(300(3^=2
FM 30-5

Intelligence summary (INTSUM)—A brief sum- information about the activities or resources of
mary of intelligence covering a period ■of time an enemy or potential enemy.
designated by the commander, ysually 6 hours. Recording—The reduction of information to writ-
Intelligence workbook—A systematic arrange- ing or some other form of graphical representa-
ment by subject heading which aids in the sort- tion aiid the arranging of this information into
ing, evaluation, and interpretation of informa- groups of related items.
tion and in the preparation of intelligence re- Signals intelligence (SIGINT)—A generic term
ports. which includes both communications intelli-
Interpretation—The act of determining the sig- gence and electronic intelligence.
nificance of information in relation to the cur- Signal security (SIGSEC)—A generic term which
rent body of knowledge through analysis, inte- includes both communications security and elec-
gration, and deduction. tronic security.
Key terrain—Any locality or area, the seizure or Situation report (SITREP)—The principle means
retention of which affords a marked advantage .used to report to higher authority information
to either combatant. of the tactical situation and such administra-
Limited war—Armed conflict short of general tive information as may affect the tactical situ-
war, exclusive of incidents, involving the overt ation.
engagement of the military forces of two or Situation map—A temporary graphic display of
more nations. the current dispositions and major activities of
the enemy.
Military crest—A fixed line on the forward slope
of a hill or ridge from which maximum obser- Source—A person, thing, or activity from which
vation covering the slope down to the base of information is originally obtained.
the hill or ridge can be obtained. Special weapons security—Counterintelligence op-
Obstacle—Any obstruction that stops, delays or erations concerned with the security of special
diverts movement. weapons systems, ancillary equipment, and sup-
porting documents.
Operations security (OPSEC)—Actions taken to
deny the enemy information concerning Spot report—One time reports used by all eche-
planned, on-going, and completed operations. lons to transmit intelligence or information of
immediate value.
Order of battle (OB)—The identification,
strength, command structure, and disposition of Standing operating procedure (SOP)—A set of
the personnel, units, and equipment of any mili- instructions covering those features of opera-
tary force. tions which lend themselves to a definite or
standardized procedure without loss of effec-
Other intelligence requirements (OIR)—Items of
tiveness.
information of secondary importance to essen-
tial elements of information regarding the Strategic intelligence—Intelligence which is re-
enemy and environment which may affect the quired for the formation of policy and military
accomplishment of the mission. plans at national and international levels.
Pattern analysis—Technique of analyzing and Supplementary intelligence report (SUPIN-
correlating a series of enemy events over a pe- TREP)—A NATO standardized report form
riod of time and predicting future enemy used for comprehensive reviews of one or more
trends, activities, and courses of action. specific intelligence targets.
Periodic intelligence report (PERINTREP)—An Surveillance—All weather, day and night, system-
intelligence summary covering a longer period atic obsevation of the battle area for intelli-
of time than the intelligence summary. gence purposes.
Personnel security—Counterintelligence opera- Tactical operations center (TOC)—A physical
tions concerned with security clearances and se- groupment of those elements of a coordinating
curity education. and special staff concerned with curremt tactical
Processing—The phase of the intelligence cycle in operations and the tactical support thereof.
which information becomes intelligence through Target acquisition—The detection, identification,
recording, evaluation, and interpretation. and location of a target in sufficient detail for
Reconnaissance—A mission undertaken to obtain the effective employment of weapons.

Glossary-3
FM 30-5

Technical intelligence—Intelligence concerning Weekly intelligence summary—An intelligence


technological developments, performance, and summary usually prepared at field army ant'
operational capabilities of foreign materiel. higher headquarters which serves to highlight
Topographic crest—The highest point of a hill or trends that are useful in planning future opera-
ridge, tiona.

Olowory 4
FM 30-5

INDEX

Paragraph Page Paragraph Pace

Accuracy of information: Airborne infantry ranger company 2-14d; 2-S


3-156; 3-24
Discussion 5-13 5-11 9-28 9-12
Evaluation rating system __. 5-14 5-12 Airborne operations 9-10 9-4
Aerial imagery: Airmobile operations 9-11 9-5
Infrared 6-40c 6-14 Air reconnaissance (See reconnais-
Mosaics 6-42 6-16 sance.)
Photographic coverage Air weather service 2-14c(l); 2-7
(fig 3-2) 6-41 6-15 2-14d; 2-8
Sidelooking airborne radar 2-14e(8); 2-10
(SLAR) 6-40d 6-15 3-206; 3-12
Source of information 3-33 3-18 3-36 3-19
Types 6-40 6-14
Amphibious operations 9-12 9-5
Aerial surveillance : Analysis of information (See also
Collection agencies 3-54(2(5) 3-28 interpretation) 5-16 5-13
G2 reconnaissance and sur- Area of influence (fig 2-3) 2-186 2-11
veillance branch 2-14c(2); 2-8 Area of interest (fig 2-3) :
2-14e(3) 2-10
3-26 General 2-18c; 2-11;
General 3-54d
3-57a(2) 3-33
Missions 3-54d(l) 3-26
3-29 Information needs within app Q Q-l
Operations 3-54<f(6)
Permanent record imagery 3-54d(3) 3-28 Area of operations :
Planning 3-4d 3-3 Analysis :
Radar and infrared 3-54d(4) 3-28
9-12 Form of presentation 6-25 6-8
Stability operations 9-28
2-8; Frequency of preparation 6-24 6-8
Units 2-14d;
3-52; 3-24; General 2-14c(l); 2-7;
6-23 6-8
3-54d(5) 3-28
3-26 Intelligence officer 2-106 2-3
Visual — 3-54d(2)
3-3 Preparation guidance app B B-l
Aerial surveillance plan 3-4d
General 2-106 2-3
Agencies :
Army Security Agency units (See
Aerial surveillance 3-54d 3-26 US Army Security Agency.)
Aerial reconnaissance and sur-
veillance units 3-52 3-24 Artillery officer :
Airborne infantry ranger As information agency 3-49o 3-23
patrols 3-51 3-24 Coordination in intelligence
Air reconnaissance 3-550 3-31 planning 3-26 3-1
Availability 4-7, app C 4-4, C-l Automatic data processing system
Civil affairs units 3-41 3-21 (ADPS) 5-3d; 6-2;
Collection plan 4-7 4-4 5-46 5-4
Counterintelligence 8-1 8-1 Aviation officer :
Engineer topographic units — 3-48 3-23
3-20; As information agency 3-490 3-24
General 3-37;
4-5o; Coordination in intelligence
4-2;
4-7 4-4 planning 3-26 3-1
Military intelligence personnel 3-43 3-22 Biological and chemical attacks 3-18A; 3-11;
Military police units 3-40 3-21 3-32, 3-17,
PSYOP units 3-á2 3-21 app H H-1
Selection of collection agencies 3-38 3-20
Special army intelligence col- Biological agents 2-24; 2-16;
lection agencies 3-46 3-22 3-32 3-17
Special security detachments - 3-45 3-22
Censorship 3-26(2); 3-1;
Stay-behind units 3-50 3-24
8-46(6) 8-3
Technical intelligence units 3-47 3-22
Troops 3-39 3-21 Chemical and biological operations 2-24; 2-16;
US Army Security Agency 3-32; 3-17;
units 3-44 3-22 9-14 9-6

Index-l
FM 30-5
Ptntrmph Pac* PaMfnpb FM»
Chemical agents 2-24; 2-16; Counterintelligence :
3-82 8-17 Agencies 8-Sd 8-.
Chemical officer: Branches of G2 section 2-14c¡ 2-7;
As information agency 3-4Ô&; 8-28; 2-14e(4) 2-10
6-66 5-4 Censorship 8-46(6) 8-3
Coordination in intelligence Civil security 8-46(4) 8-8
planning 8-26 8-1 Defensive 8-2a 8-1
Civil security 8-46(4) 8-8 In cold -war 2-2Sa 2-16
Civilians : Estimate 8-14, 8-8,
app M M-l
As information source 3-27 8-16
General 2-6; 8-1 2-2; 8-1
Influence on intelligence oper-
Measures 8-2 8-1
ations 2-27 2-17
In iiuciear warfare 2-23d 2-16
Collection of information (See also Offensive 8-26 8-1
intelligence/information collec- Officer 8-3e,8-76 8-1,8-5
tion requirements.)
Operations:
Collection plan : Army group 8-9 8-6
Available agencies 4-7 4-4 Brigade and battalion 8-5 8-3
Contents 4-5, ¿-2 Corps 8-7 8-5
app E E-l Coverage map 4-3e 4-2
Format (flg 4-1) 4-4 4-2 Division 8-6 8—4
General 4-3 4-1 Field army 8-8 8-6
Intelligence cycle 2-20 2-15 General 8-4 8-2
Intelligence estimate 6-30c 6-10 Special operations 8-46(5) 8-3
Orders and requests 4-6 4-2 Theater army 8-10—8-12 8-7—8-8
Place and time of reporting _ 4-8 4-4 Worksheet (See fig 8-1) 8-15 8-8
Remarks 4-9 4-6 Operations security
SOP items 4-10 4-5 (OPSEC) 8-1,8-46 8-1,8-2
General 4-1 4-1 Personnel security 8-46(1) 8-2
Order of battle 7-12 7-4 Physical security 8-46(2) 8-3
Stability operations 9-25 9-11 Planning 3-3d, 3-2,
Supervising 4-2; 4-11; 4-1:4-5; 8-13— 8-8—
4-12 4-5 8-16, 8-9,
Collection plan (See collection app V V-l
of information.) Responsibilities 8-3 8-1
Combat intelligence: Special Weapons Security ___ 8-46(3) 8-3
In stability operations 9-29 9-14
Discussion 2-3 2-1 Cover and deception:
Relationship to strategic Coordination in intelligence
intelligence , 2-5 2-1 planning 3-26(19; 3-2
Stability operations 9-28 9-12 3-3d(l)
Combat surveillance:
In deduction process 6-18 6-13
Aerial surveillance 3-52; 3-24; Enemy capabilities 3-18 3-10
3-64d 3-26 Enemy vulnerabilities 3-166(9); 3-8;
General 3-53; 3-24; 3-176(6) 3-9
3-54o 3-25 False indications 3-22d 3-15
Ground surveillance 3-54c 3-26 General 8-16; 9-20 8-9; 9-9
Requirements : Intelligence officer responsi-
Corps 3-546(2) 3-26 bilities 2-9/ 2-3
Division 3-546(3) 3-25 Coverage map 4-3e 4-2
Field army 3-546(1) 3-26
Surveillance and target ac- Deduction (See also interpreta-
quisition plan 3-4, app U 3-3, U-l tion.) 6-18 5-13
Dissemination:
Communications-electronics officer :
Criteria 6-2 6-1
As information agency 3-49/ 3-23 General 6-1 6-1
Coordination in intelligence In intelligence cycle 2-20 2-15
planning 3-26 3-1
Electronic warfare 9-19o(3); 9-9 Means :
Analysis of the area of
9-196(3)
operations 6-23—6-26, 6-8,
Company intelligence: app B B-l
General 9_1_9_6 9-1—9-3 Bombing, shelling, and
Planning 3-9 3-6 mortaring reports 6-12, 6-3,
Coordinates register 6-9 5-7 app G G-l

!nd«x-2
FM 30-5

Psracnph Pase Paragraph Pasa


Climatic studies and sum- Indications of courses of ac-
maries 6-17c; 6-18, 6-7, tion 3-21 3-14
app I 1-1 Influence on intelligence op-
Current weather reports 6-16 6-7 erations 2-25 2-15
General 6-3 6-1 Intelligence estimate 3-16c(B) 3-9
Spot reports 6-4 6-2 Materiel 3-30 3-17
Imagery interpretation re- Requirements 3-16; 3-17 3-7; 3-9
ports 6-10 6-3 Signal communications
Intelligence annex 3-5; 6-34, 3-4; 6-11, Situation map 5-6 5-4
app N N-l Strength computation AppK K-l
Intelligence estimate 6-26— 6-9— Vulnerabilities 3-19, app J 3-12, J-l
6-32, 6-10, Engineer officer:
app J J-l
As information agency 3-49e; 3-23;
Intelligence reports
5-66 5-4
(INTREP) 6-5 6-2
Coordination in intelligence
Intelligence summary
planning 3-26 3-1
(INTSUM) 6-7, app F 6-2, F-l
Responsibilities 2-14e(7); 2-10;
Maps 6-36—6-39 6-11—
6-366 6-11
6-13
Nuclear burst and biologi- Essential elements of information
cal and chemical attack (EEI):
reports 6-13, 6-4, Analysis 3-23 3-15
app H H-l In collection plan 4-5 4-2
Operations plans and orders. 6-33 6-11 Dissemination 3-14 3-6
Order of battle books and Format and content of state-
handbooks 6-22 6-7 ments 3-13: 4-5a 3-6; 4-2
Periodic intelligence report General 2-14c(l); 2-8;
(PERINTREP) -__ 6-8, app D 6-2, D-l 2-17; 2-11;
PW intelligence interroga- 3-10; 3-11 3-5
tion and translation re- Intelligence estimate 6-276; 6-9;
ports 6-11 6-3 6-30 6-10
Radiological contamina- In planning 3-3d 3-2
tion estimates and re- Pertaining to enemy capa-
ports 6-14, app H 6-4, H-l bilities and vulnerabilities __ 3-18; 8-10;
Supplementary 3-19 3-12
intelligence report Responsibilities of
(SUPINTREP) 6-6 6-2 intelligence officer 2-10d; 2-4;
Technical intelligence bul- 2-12(1 2-5
letins and summaries 6-19 6-7 Estimates:
Weather forecasts and Counterintelligence 8-14, 8-8,
summaries 6-15; 6-17 6-7 app M M-l
Weekly intelligence sum- Intelligence 2-106; 2-3;
mary .__ 1 6-9 6-3 3-3d; 3-2;
Order of battle 7-26; 7-27 7-17 6-26— 6-8—
Orders and requests 4-6o 4-2
6-32, 6-10,
Documents, as source of infor- app J J-l
mation , 3-29, 3-17, Evaluation :
app D D-l Accuracy 5-13 5-11
Duds, shell and missile frag- General 5-10 5-11
ments '. 3-32, 3-17, Pertinence 5-11 5-11
app G G-l Rating system 6-14 5-12
Electronic warfare: Reliability 5-12 5-11
Coordination in planning 3-26(16) 3-2 Evasion and escape 8-3; 9-136 8-1; 9-6
General 9-18; 9-19 9-8
Requirements pertaining to Fragmentary ordeys-
enemy capabilities ._ 3-18; 3-11 dissemination 3-14e; 3-6;
3-15; 3-7;
EW/Cryptologie staff officer 3-26, 8-1, 4-66 4-4
3-54d(5) (d), 3-28
9-146 9-6 Geographic intelligence 6-20 6-7
Enemy: Ground surveillance:
Activity as source 3-25 3-15 Operations 3-54e(l) 3-25
Capabilities 3-18, app J 3-11, J-l Plan 3-4d 3-2

lndex-3
FM 30-5
Paragraph Pase Paragraph Pase
Radars 3-33 3-18 Relationship to higher, lower,
Source of information 3-33 3-18 and adjacent units 2-11 2-4
Tasks 3-54c(2) 3-26 Relationship to other staffs __ 2-10 2-3
Guerrilla warfare 3-51; 3-24; Responsibilities 2-9; 2-8;
9-13a 9-6 3-576(2) 3-33
Human intelligence (HUMINT) __ 2-23a(3) 2-16 Staff section chief 2-12 2-5
Intelligence operations :
Imagery interpretation reports 6-10 6-3
Area of influence (fig 2-3) — 2-186 2-11
Immediate zone 2-lSd 2-12
Area of interest (fig 2-3) 2-18c 2-12
Indications : Basic principles 2-19 2-13
Definition 3-22 3-14 General 2-17 2-11
Determination 3-23, app J 3-15, J-l Immediate zone 2-18d 2-12
General 3-21; 3-14; Influence of the operational
4-3; 4-5a. 4-1; 4-2 environment:
Orders and requests 4-6a 4-2
Typical indicators App T T-l Area of operation 2-26 2-17
Information needs by echelon App Q Q-l Civil population 2-27 2-17
Integration of information (See Enemy forces 2-25 2-17
also interpretation.) 5-17 5-13 Friendly forces 2-28 2-17
Intelligence annex 2-14c(l); 2-7; General 2-21 2-15
3-3d(7); 3-3; Mission 2-22 2-15
3-5; 3-4; Nature of conflict 2-23 2-16
3-14c; 3-6; Use of chemical and bio-
4-66; 4-4; logical agenta 2-24 2-16
6-34, 6-11, Influence of weather and
app N N-l geographical environment :
Intelligence cycle (fig 2-4) 2-20 2-15 Terrain 2-30 2-20
Intelligence estimate: Weather 2-29 2-18
Form and scope 6-30, 6-10, Intelligence report (INTREP) 2-14c(l); 2-7;
app J J-l 6-5 6-2
General 2-10b; 2-2; Intelligence section :
6-26, app J 6-8, J-l Brigade and battalion 2-146 2-6
Planning 3-3d(4) 3-2 Corps 2-14d 2-8
Preparation 2-14c(l); 2-7; Division 2-14c 2-7
6-32 6-10 Field army 2-14e 2-10
Purpose 6-27 6-9 General 2-14a 2-6
Responsibility 2-10b; 2-3; Relationship with attached
6-28 6-9 USASA units 2-16 2-11
Sample AppJ J-l Relationship with MI units __ 2-15 2-10
Intelligence/information Intelligence staff organization:
collection : Brigade and battalion 2-146 2-6
Agencies 3-37— 3-20— Corps 2-14d 2-8
3-52; 4-7 3-24; 4-4 Division 2-14c 2-7
Indications 3-21— 3-14— Field army 2-14e 2-10
3-23, 3-15, General 2-14a 2-6
appT; T-l; Relationship with military
4-1—4-9 4-1—4-5 intelligence units 2-15 2-10
Intelligence cycle 2-20 2-15 Relationship with attached
Introduction 4-1 4-1 USASA units 2-16 2-11
Planning and execution 4-3—4-10 4-1—4-5 Intelligence summary (INTSUM) . 5-76; 6-7, 5-7; 6-2,
Requirements 3-10— 3-5— app F F-l
3-20; 4-3 3-12; 4-1 Intelligence workbook (fig 5-3) 5-7, app O 5-7, O-l
Sources of information 3-24— 3-15— Interpretation (See Processing).
3-36 3-19 Intrusion devices (See unattended
Supervision 4-2; 4-1; ground sensors.)
4-10; 4-11 4-5
Intelligence files 5-8 5-7 Joint airborne operations 9-10 9-4
Intelligence officer: Journal (fig 5-2) 2-14c(4); 2-8;
Electronic warfare responsi- 5-5 5-4
bilities 9-19 9-8
Functions on intelligence op- Maps:
erations 2-13 2-5 Classification 6-37 6-11
General 2-7 2-2 Distribution 6-39 6-13

Index—4
FM 30-4
Pvmgnph Page Paragraph Pag«
Requirements 6-38 6-12 Processing 7-18— 7-4—
Scales 6-37 6-11 7-26 7-18
Staff responsibilities 2-14e(7); 2-10; Recording OB data 7-15 7-6
3-26(9); 3-2; References 7-14 7-6
6-36 6-11 Situation map (fig 7-4) 7-18 7-10
Source of information 3-35 3-19 Strength worksheet (fig 7-8) _ 7-23 7-13
Medical officer (surgeon) : Topical file 7-24 7-13
As information agency 3-49<i 3-23 Unit workbook (fig 7-1 and
i- Coordination in intelligence 7-2) ,. 7-16 7-5
planning 3-26 3-1 Workbook-OB (fig 7-8) :__ 7-17 7-10
Military intelligence company, Orders and requests:
divisional (fig 2-2) 2-14c(B) 2-8 Collection plan 4-3 4-1
Military security 2-19/ 2-13 Dissemination 4-66 4-4
Mine-countermine operations : Formulation 2-14c; 2-7;
8-22«; 8-14;
Coordinates register 5-96(1) 6-10
8-576(5); 8-83;
General 9-17 9-7 3-67«; 8-83;
Situation map 5-66; 5-4; 4-6a 4-2
5-6e(5) 5-6 Stating 3-13 8-6
Nature of conflict: Other intelligence requirements
(OIR) :
Cold war 2-23a 2-15
General war 2-23c 2-16 Cancellation or modification __ 3-15 3-7
Limited war 2-236 2-16 In collection plan 4-8 4-1
Nuclear weapons and burst re- Dissemination 3-14 8-6
ports 2-23<2; 2-16; General 3-10; 3-5;
6-13; 6-14, 6-4; 3-12 8-6
app H H-l Stating intelligence require-
ments 3-18 8-6
Operational environment 6-21— 6-7—
6-28 6T9 Pattern analysis ; 5-2/ 6-1
Periodic intelligence report
Operations officer (G3/S3) :
(PERINTREP) 5-76; 6-6 5-7; 6-2
Coordination with Periodic intelligence summary
intelligence officer 2-9d; 2-9/; 2-3; (PERINTSUM) 6-7 6-2
■". 2-1°/: 2-4; Personnel security 8-46(1) 8-2
2-12c; 2-5; Physical security 8-46(2) 8-8
2-136; 2-6; Planning-intelligence :
2-14o(l); 2-6; Aerial surveillance plan 8-4(2 3-3
2-146; 2-6; Coordination 3-2 8-1
3-26; 3-1; Corps 3-7 3-5
3-47o(4) 3-22 Counterintelligence plan 3-8(2(1); 3-2;
Map requirements 6-386(3) 6-18 8-16 8-9
Situation map' 5-6d 6-4 Counterintelligence planning _ 8-13— 8-8—
Training 9-31 9-15 8-16 8-9
Operations plans and orders 3-3d; 3-5; 3-2; 3-4; Division 3-8 8-5
6-33 6-11 Field army 3-6 3-4
Operations security (OPSEC) 2-90:8-1, 2-3:8-1, General 3-1 3-1
8-46, 8-2; Ground surveillance plan 3-4(2 8-3
9-22 9-10 Intelligence annex 3-5 8-4
Order of battle: Intelligence cycle 2-20 2-15
Annex to PERINTREP 7-176; 7-10; Intelligence officer 2-9(2 2-3
7-27, 7-17, Lower unit planning 3-9 3-5
app L L-l Order of battle 7-11; 7-12 7-4
Books and handbooks 6-22 6-7 Phases 3-8 3-2
Card (fig 7-5) 7-19 7-10 Surveillance and target ac-
Dissemination 7-26; 7-27 7-17 quisition plan 3-4 8-3
Elements of OB intelligence __ 7-^3— 7-2— Processing of information:
7-10 7-4 Corps 6-3
Evaluation and interpretation. 7-25 7-13 Field army 5-3
General 7-1 7-1 Flow of processing (fig 5-1) _ 6-2
Installation file (fig 7-6) 7-21 7-13 General _: 6-1
Organization file (fig 7-7) —_ 7-22 7-13 Intelligence cycle 2-20
Personality file 7-20 7-13 Order of battle 7-13—
Planning the collection efort _ 7-11; 7-12 7-4 7-25 7-13

lnd«x-5
FM 30-5
Paragraph Pase Paragraph Page
Pattern analysis 5-2/ 5-1 Nuclear burst 6-13, 6-4,
Phases: app H H-l
Evaluation 5-10— 5-11, Periodic intelligence report
5-14 5-12 (PERINTREP) 6-8 6-2
Interpretation 5-15—5-18 5-13 PW intelligence interroga-
Recording 5-4—5-9 5-4—5-7 tion and translation 6-11 6-3
Procedures 5-2 5-1 Radiological contamination 6-14 6-4
Signals intelligence 6-21 6-7
Provost marshal: Supplementary intelligence
As information agency 3-49e 3-23 report (SUPINTREP) 6-6 6-2
Coordination in intelligence Weather summaries 6-17 6-1
planning 3-2ft 3-1 Requirements :
Psychological operations 2-27; 2-17;
9-15; 9-28 9-7;9-12 For attack 3-16 3-7
Cancellation or modification 3-15 3-7
Radiological contamination : Collection plan 4-3^-10 4-2—4-5
For defense 3-17 3-9
Estimates and reports 1 6-14, 6-4,
Dissemination 3-14 3-6
app H H-l
Pertaining to enemy capa-
Fallout prediction 6-146 6-4
bilities 3-18 3-10
Rear area operations 9-16 9-7
Pertaining to enemy vulner-
Reconnaissance : abilities 3-19 3-12
Aerial : Essential elements of infor-
mation 3-11 3-5
Army aviation 3-52; 3-24; General 3-10; 4-3 3-5; 4-1
S-SSfl-(1) 3-31 Other intelligence require-
G2 reconnaissance and ments 3-12 3-6
surveillance branch 2-14c(2) 2-8 Stating requirements 3-13 3-6
Other services 3-550(2) 3-31 Terrain 3-20c 3-13
Counterreconnaissance 3-55d 3-30 Weather (fig 3-1) 3-206 3-12
General 3-53; 3-24;
3-55a 3-29
Ground reconnaissance 3-55e 3-30 Shelling, bombing, and mortar-
Planning and coordinating 3-556 3-29 ing reports 6-12, 6-3,
Principles of conducting re- app G G-l
connaissance 3-55c 3-29 Signals intelligence reports 6-21 6-7
Reconnaissance in force 3-55/ 3-30 Situation map, enemy 2-14c(l); 2-7;
5-6; 7-18 5-4; 7-10
Recording : Situation report (SITREP) 6-35 6-11
Coordinates register (fig 5-4
and 5-5) 5-9 6-7 Sources :
General 5-4 5-4 Civilian 3-27 3-16
Intelligence files 5-8 5-7 Documents, captured 3-29 3-17
Intelligence workbook Duds, fragments, craters,
(fig 5-3) 5-7 5-7 contaminated areas 3-32 3-18
Journal (fig 5-2) 5-5 5-4 Enemy activity 3-25 3-15
Situation maps 5-6 5-4 General 3-24 3-15
Recovered military personnel— Ground surveillance radar 3-33d 3-18
as source of information 3-28 3-16 Imagery and ground surveil-
Reliability (See also Evaluation.) _ 5-12 5-11 lance radar reports , 3-33 3-18
Individual Soldier 2-28a(3) 2-18
Reports : Maps 3-35; 3-19;
Aircraft hostile fire 6-126, 6-3, 6-36— 6-11—
app R R-l 6-39 6-13
Biological or chemical attack _ 6-13, 6-4, Materiel, enemy 3-30 3-17
app H H-l Night vision devices 3-33e 3-18
Bombing, shelling, or mor- Prisoners of war 3-26 3-16
taring 6-12, 6-3, Recovered military personnel _ 3-28 3-16
app G G-l Electromagnetic emissions,
Current weather 6-15; 6-16 6-7 enemy 3-31 3-17
Imagery interpretation 6-10 6-3 Thermal imaging devices 3-33/ 3-19
Intelligence report Weather forecasts, studies,
(INTREP) 6-5 6-2 and reports 3-36 3-19
Intelligence summary Unattended sensors (intru-
(INTSUM) 6-7 6-2 sion detectors) 3-34 3-19

lndex-6
FM 30-5
Paragraph Pase Paragraph Patee
Special environmental conditions : G2/G3 coordination 2-10/; 2-4;
Extremes in terrain 9-9 9-4 2-14o(2) 2-6
Extremes in weather 9-8 9-4 Formulation of EEI and
OIR 3-10 3-5
Special forces: Flow of information within
Employment in guerrilla (fig 5-1) 5-2e 5-1
warfare 9-13o 9-5 Target acquisition:
As information agencies 3-516 3-24 Direct target acquisition 3-56c 3-32
Special weapons security 8-46(3) 8-3 General 2-186(2); 2-11;
Spot reports 6-4 6-2 3-56o 3-31
Stability operations: Planning 3-4 3-3
Surveillance and target ac-
Civilian sources of informa-
quisition plan 3-4 3-3
tion ^ 2-27; 2-17;
Target intelligence 3-566 3-32
3-27c 3-16 Technical intelligence :
Cold war 2-23a(2) 2-15 Bulletins and summaries --. 6-19 6-7
Combat intelligence 9-28 9-13 Functions at field army 2-14e(2) 2-10
Combined operations 2-286(2) 2-19 Units 2-14d 2-8
Counterintelligence Terrain :
operations 9-29 9-14 Avenues of approach
Dissemination of intelligence _ 6-2d 6-1 (fig 2-5 and 2-6)
General 9-24 9-11 2-30/; 2-22;
3-166(14); 3-7;
Insurgent intelligence collec-
tion 9-27 9-12 3-176(10) 3-10
Concealment and cover 2-30c; 2-21;
Intelligence activities 9-26 9-12
3-166(11) 3-8
Intelligence collection 9-25; 9-11;
Extremes 9-9 9-4
9-28 9-12 General 2-30a 2-20
Intelligence officer functions _ 2-lOfl'; 2-4; Information requirements 3-20c 3-13
2-lld; 2-12d 2-5 Key terrain 2-30«; 2-22;
Map requirements 6-41c 6-16
3-166(13); 3-8;
Order of battle 7-16; 7-lc 7-1 3-176(9) 3-10
Standing operating procedures: Observation and fire 2-306; 2-20;
Collection requirements 3-lld; 3-6;
3-176(7) 3-10
4-10 4-5 Obstacles 2-30d; 2-21;
Command SOP 6-36; 6-1; 3-166(12); 3-8;
9-35 9-17
3-176(8) 3-10
Intelligence section SOP 9-34 9-16 Relationship to weather 2-31 2-23
Strategic intelligence : Training:
Components 2-5a 2-1 Conduct of intelligence
Field army 2-14e(2); 2-10; training 9-31, 9-15,
3-6a 3-4
appP P-l
General 2-4 2-1 General 9-30 9-15
Interrelationship with com- Intelligence training and
bat intelligence 2-5 2-1 maneuvers 9-33 9-16
Subversion 2-23a(2); 2-16; Responsibilities 9-31 9-15
3-13c 9-6
Specialized intelligence
Surgeon-medical officer: instructional methods 9-32 9-15
^ As information agency 3-49ci 3-23
Coordination in intelligence
planning 3-26 3-1 Unattended sensors
Surveillance (See combat surveil- (intrusion detectors) 3-34 3-19
Unconventional warfare 9-13 9-5
lance.)
US Army Security Agency . 2-14; 2-6;
Surveillance and target acquisi-
tion plan 3-4; 3-3; 2-16; 2-11;
3-330, 3-19, 3-44; 3-22;
app U Ur-1 3-51d; 3-24;
3-64i£(5) 3-28

Tactical air reconnaissance Weather :


(See reconnaissance.) Climate studies 6-18 6-7
Tactical cover and deception Effects of weather conditions _ 2-29 2-18
(See cover and deception.) Equivalent chill temperature
Tactical intelligence 2-3 2-1 chart App S S-l
Tactical operations center Extremes 9-8 9-4
(TOC): Forecasts (fig 6-1) 6-15 6-4

lnd«x-7
FM 30-5

Faracntph Pare Paraffraph Par*


General requirements 3-20 3-12 Source of information 3-36; 3-19,
Information requirements 3-49; 3-24
(fig 3-1) 3-206 3-12 Summaries &-17 6-7
Modification 2-29^ 2-20 Types of weather conditions _ 2-29o 2-18
Relationship to terrain 2-31 2-22 Worksheet-counter intelligence
Reports 6-16 6-7 measures (fig 8-1) 8-15 8-8

lndex-8
FM 30-5

By Order of the Secretary of the Army :

CREIGHTON W. ABRAMS
General, United States Army
Official : Chief of Staff
VERNE L. BOWERS
Major General, United States Army
The Adjutant General
Distribution :
Active Army, ARNG, USAR: To be distributed in accordance with DA Form 12-11B requirements
for Combat Intelligence (qty rqr block no. 273).
ft U. S. GOVERNMENT PRIKTINC OFFICE : 1977 O - 241-38Z/S606B
FM 30-5

APPENDIX E

EXAMPLE OF A PARTIALLY COMPLETED COLLECTION PLAN


UNIT 20th M D.v
PERIOD COVERED From 131535 Jul To, Capturt of high ground at 1055-1357

Istat lili iiVitiía^ít* íttzPfti i***

ill (2) (3) 51 soi


Eisenííol eiem*nts of tndicotiom (onolyits of it»ms in Basil for specific otétni or requett* Plocr ond time ot which inforreaísori
■"K
Rer^Orki and natei for f^ture gci
so i oris
informotíon ond othe? L
i* to be reporte^
roqujred inftMigenc«
*.
'í^¿ a.
c o
SS ^^
*1
Vi o. 3

Kt
a L^vaï.kjr arid str+T>¿íhs oí ■ IJ Report Ux-aiion. stron*îtîï, and a<'îïviïii^
it L'^^ops on JANÏN.VCELÎSA Rid¿* Ä ®® ® ■lj A:i oUamed Nt^aiive r*-^^:.
hiídís siartiné 131800 J^h,
K-V !>, J ■V— í^n îo 'í ï ^»í-
, >
*S .í: ait ■ -■> Rosera es
■3i Aríiíier>
i**;
-ir ► Fv t i -■ ^
il* i L j ^ * \ f * £
r^

Í
i
■_

f4j Othefs. stroniïpoints vïctrtîiv Hill 403 í 16513 ana ® ® ® 2- S^rr:" as . 1 =

Hill 2S2 ; I2Í3Í>,

^trong^ínts, and ioc-


u;>ns and iu EivUies
'3) Report locution and ^trengíh of occupied
sErongpoints vicinity Plateau BELLE- ® Ô® ® (3) Same as í 1}
+
RIVE.

i4'i Repon Un an OH and strengilï of or^cupied


strongpoiriis '. ictnü.v BRAZOS ftoods ® ® \S

v5". SíiiTie as ■ 1
f5> Repor: location and streng-r: of o^csipied
strong point s on PETROV ^oods Rï^ge
® Ô® ® sS
vicinity 2050.

(6) Report location and strength of occupied


strongpoims on PETROV Woods RUige A S® ® (6) Same as (1) U positive, notify Ist Cofp^
arid make rr^jFinnin efforí tu ^eï df-^iils íor
viciniU 1849.

(71 Report i or au on and strength of troops jn


LARUNA River Valley we ¡nit > LEGS
® ® ® i*¡\ San^- as í i 1! p^iî;;*- r^tiiï --! U.l D,.^ i:>': î^i rn':;i.s -f-

■ ít-4 i )

i Si Report location and strength of troops


victnitv Hill 326 ¿1153).
® -Sí Sarr^e as ¡ i - -ï • - •
h— .
-. î ' •
. ■ ' .. r --

f9) Report location of all artiliery and mortar


positions in zone to include those un-
Ô Ä® ®® ®® (9) As obtained. Check corps iind lirmy PKRiNTRP.'F'ï '■- \/

occupied and number of pieces

t? Pressure of dí'r.ohíions, gassed ar^as, .101 Repor: îoeaïion and extent ui de^oh- i luí A* obtained se;
radiologie ai ana fciüiogicaí contamina- ïior.s. gassed areas, radiologie a i and
lion, obätairles, and ínin^fieiás. biological coniar^ination± obstacles, a.-sd
TTunefields to front, flanks, and iorward
of present position

c. Entrenching and erecting bands of wir*'. (11) Report host He entrenching and erection
of bands of wire aiong present line of
®A Ä® ® (U) As obtained Ciihceî at 14'.M:H). ^/

contact.

(12) Report hostile entrenching and bands of


wire on JAN1NA-CEL1NA Rid*v.
® i 12} A-s obtained s/

û Duîïipmif arrimaniiion and effRineer supplies


afld equipment, íortifying buüdings.
(13) Report evidences oí fortification of
Duiîdmgs m zone. parEJcuiart> WACO
Ä ®
ÎÏ451Ï and ST GEORGE (1554).

e. Location of command posts and supply


and evacuation installations.
(14) Report location of command posts and
supply and evacuation installations in Ä® ®® ®® (14) As obtained. t
OTHF.R ÏNTFLMCENCL division zone north of road LA PALOMA-
MJ)l |RHMEM>, ÄACO special attention to vicinity CR
135S.

S® Ass.in ;o ïst Bd»-- 21 ilde L J

®®
. - » -, a
2 Aîïi i^e i^n^r^s ai a. Mo^erc^nt of hostile units Torward, A-C î»

îâuih ¿.nor So 140430


(15) Report volume and type cf traffic across
TAKASAN Canal and on roads Leading
® í 15) Same as i I).
through LAV ï^ r^-arri^d _/
J'j¿y> 1Í so. when, south from CELÍNA, JANÍNA, CR Ï356,
Vrft^re, an^ m what and CR 1255.
^Uength^1 Special at-
tention to the axis
I,EON il647>-OSTRO
b. Local i on of en^my troops in forward as*
senibly areas.
(16) Report location of troops, types, and
numbers, vicinity If>5D.
®® ® (16) As obtained. Cancel at 140430. ^

■2046): Hill 406


ï Î849>- HUÍ 4ÏB Cancel ut 1404 30 >,/
IS4S'.
(IT) Report location of troops, types, and
numbers, vicinity 1851.
® í Î7) As obtained

c. Clcanng of lanes through obstacles with-


in own position.
(16) Report clearing of lanes through obsta-
cles wtihirî Aggressor position \n zone.
®® ® ® ii8) As obtained. C^n=el as Ï40430. +

â. Increased patroUing. (19) Report the number, size, composition,


routes, and time observed of enemy pa-
®ÄÄ ® (19) As obtained. %/

trols in zone.
Cancel at 140430 ^Z
e, Establishment and strengthening of coun'
tetrecormsussance screen.
í20) Report activity and size of units biock-
ing our patrolling along line cf contact.
®A A (20) As obtained.

Í. Eitensive artillerv preparations. (21) Report any marked charige in artillery i;21) As obtained.
fire to include time, location, direction
of fire, number of rounds, rate and cal-
iber received in zone or area.

g. Incr^sed aerial reconnaissance. (22) Report amount and type of air activity (23) As obtained. SOP- +
in zone or area,

h. Forces in contact being replaced ot rein- (23) Report new identifications. SOP 4-
forced by ní-* units.

FOOTNOTES: ® COLLECTION AGENCIES LEVIED REQUIREMENT \/NEGATiVE REPORTS RECEiVED


X AVAILABLE COLLECTION AGENCIES + POSITIVE REPORTS RECEIVED
£-1
3000017349
APPENDIX Q FM
TYPICAL INFORMATION NEEDS IN AREA OF INFLUENCE
OF VARIOUS UNITS
CATEGORY
OF SU8CATEGORY OF INFORMATION GENERAL SPOT
TIMELINESS LOCATION
INFOfiMATiON LOCATÍON
! Acs titniy in mßtu-f -.

PERSONNEL
COMPANY RJFLEMEN, MORTAR OBSERVERS, ARTILLERY OBSERVERS, SQUADS, PLATOON
IMMEDIATE Î0 h0
BATTALION ARTILLERY OBSERVERS, PLATOONS SO
IMMEDIATE so
BRIGADE ARTILLERY OBSERVERS, COMPANIES
IMMEDIATE 100, SCO 50
DIVISION BATTALIONS
IMMEDIATE 200 100
CORPS REGIMENTS
ÍMMEDUTE 5ÛG 100
FIELD ARMY DÎVïSIONS
IMMEDIATE SOU HA


VEHICLES
COMPANY GROUND, AERUL
IMMEDIATE 10 ^0
BATTALION GROUND, AERIAL
IMMEDIATE 100 sa
BRIGADE GROUND, AERIAL
IMMEDIATE 100 so
DIVISION GROUND, AERIAL
IMMEDIATE so
CORPS GROUND. AERIAL
IMMEDIATE SOG ^oo
FÍELD ARMY GROUND. AERUL
IMMEDIATE S00 100
—^JTJTJl rsji ■ L-_

WEAPONS
COMPANY DIRECT FIRE. D3RECT FIRE SUPPORT, INDIRECT FIRE, AERIAL IMMEDIATE ÏQ, SO, 200 50
BATTALION DIRECT FIRE, DIRECT FIRE SUPPORT, INDIRECT FIRE, AERIAL IMMEDIATE 100, 200 50
BRIGADE DIRECT FIRE, DIRECT FIRE SUPPORT. INDIRECT FIRE, ANTIAIRCRAFT, AERUL IMMEDIATE 100, 200 50
DIVISION COMPANY-SIZE DfRECT FIRE SUPPORT. COMPANY^SIZE INDIRECT FIRE (NON NUCLEAR), NUCLEAR ARTILLERY, ANTIAIRCRAFT 200, 100
IMMEDIATE 100
CORPS BATTALION-SIZE DIRECT FERE SUPPORT, BATTALION-SIZE INDIRECT FIRE, NUCLEAR ARTILLARY, ANTIAIRCRAFT IMMEDIATE, 3 HOURS SOG, tÛQ ¡QG
FIELD ARMY REGIMENT-SÏZE DIRECT FIRE SUPPORT, NUCLEAR ARTILLERY, ANTIAIRCRAFT IMMEDIATE. 3 HOURS 500, 100 ÎÛ0
F*^—■ ■ ^IT.\-i n ■ r.v.v.-j ^■-■-■-■-■- ■_

STRUCTURES
COMPANY ALL IMMEDIATE 25 50
BATTALION ALL IMMEDIATE 100 50
BRIGADE ALL IMMEDUTE i 00 50
DIVISION FIELD DEFENSES, BRIDGES, AIR LANDING FACILITIES, SUPPLY FACILITIES, LINES OF COMMUNICATION, ADM 30 MÍNUTES ¿50 TOO
CORPS FIELD DEFENSES, BRIDGES, AIR LANDING FACILITIES, SUPPLY DEPOTS, LINES OF COMMUNICATION, BUILDINGS, NUCLEAR WEAPONS STORAGE, ADM 1 HOUR 200 100
FIELD ARMY FIELD DEFENSES, BRIDGES, AIR LANDING FACILITÎES, SUPPLY DEPOTS, LJNES OF COMMUNICATION, BUJLDJNGS, NUCLEAR WEAPONS STORAGE, ADM 7 HOURS S 00 100
r —,-, "— ■.T.TTT.T.T r.n u

TERRAIN AND
WEATHER
COMPANY WEATHER FORECASTS IMMEDIATE, EACH S2 HOURS 25 25
BATTALION WEATHER FORECASTS IMMEDIATE, EACH \2 HOURS 25 25
BRIGADE WEATHER FORECASTS IMMEDIATE, EACH 24 HOURS 50 25
DiViSiON RELIEF AND DRAINAGE, VEGETATION, SURFACE MATERIALS, MAN MADE FEATURES, HYDROGRAPHY, WEATHER FORECASTS 30 MINUTES, EACH 24 HOURS 50 50
CORPS TOPOGRAPHY, VEGETATION SURFACE MATERIALS, RÏVERS & STREAMS, LAKES & PONDS, SWAMPS, MINES & QUARRIES, URSAS AREAS, WEATHER FORECASTS 1 HOUR. EACH 6 Ä. 48 HOURS 100 | 50
FIELD ARMY TOPOGRAPHY, VEGETATION, SURFACE MATERIALS, RIVERS & STREAMS, LAKES fi. PONDS, SWAMPS, MINES i QUARRIES, URBAN AREAS, WEATHER FORECASTS 2 HOURS, EACH 6 i 4B HOUR^ 500 : m
--■■- -- -

ELECTROMAGNETIC
RADIATIONS
COMPANY GROUND SURVEILLANCE RADARS, COUNTERWEAPQNS RADARS rMMEDUTE f0, 100 50
BATTALION GROUND SURVEILLANCE RADARS, COUNTERWEAPQNS RADARS IMMEDIATE 10, IOC 50
BRIGADE GROUND SURVEILLANCE RADARS. COUNTÉRWEAPONS RADARS IMMEDIATE 100, 500 50
DIVäSiON GROUND SURVEILLANCE RADARS, COUNTERWEAPQNS RADARS. ANTIAIRCRAFT RADARS, RADIOS 30 MINUTES 10Û( 200, 500 Î00
CORPS GROUND SURVEILLANCE RADARS, COUNTÉRWEAPONS RADARS, ANTURCRAFT RADARS( RADIOS t HOUR 500, 100 100
FIELD ARMY ANTIAIRCRAFT RADARS. RADIOS 3 HOURS, 2 HOURS 100, 500 100

NUCLEAR
EXPLOSIONS
COMPANY FRIENDLY, ENEMY PRIOR, IMMEDIATE sao NA
BATTALION FRIENDLY, ENEMY, ADM PRIOR, IMMEDIATE 100 NA
BRIGADE FRIENDLY, ENEMY PRIOR, IMMEDIATE IGÛ NA
DIVISION FRIENDLY, ENEMY PRIOR, IMMEDIATE 100, 200 NA
CORPS FRIENDLY, ENEMY PRIOR, IMMEDIATE 300 NA
FIELD ARMY FRIENDLY, ENEMY PRIOR. IMMEDIATE 500 NA

CONTAMINATED
AREAS
COMPANY AREA OF OPERATIONS, AREA OF INTEREST IMMEDIATE 100 NA
BATTALION AREA OF OPERATIONS, AREA OF INTEREST IMMEDIATE 100 NA
BRIGADE AREA OF OPERATIONS, AREA OF INTEREST IMMEDIATE 200, 500 NA
DIVISION AREA OF OPERATÍONS, AREA OF INTEREST IMMEDIATE, I HOUR 200, 500 NA
CORPS AREA OF OPERATIONS, AREA OF INTEREST IMMEDIATE, I HOUR 300, 500 NA
FIELD ARMY AREA OF OPERATIONS, AREA IMMEDIATE, 1 HOUR 500 NA
OF INTEREST

Q-ï
(í,

/
DEPARTMENT OF THE ARMY POSTAGE AND FEES PAID
US ARMY AG PUBLICATIONS CENTER DEPARTMENT OF THE ARMY
DOD 314
2800 EASTERN BOULEVARD
BALTIMORE MARYLAND 21220
SPECIAL FOURTH CLASS BOOK
OFFICIAL BUSINESS
PENALTY FOR PRIVATE USE »300 RATE

You might also like