SlideShare a Scribd company logo
1 of 16
Lawrence D. Dietz, COL (R), USAR
Adjunct Professor
American Military University
Photo
Source:http://www.history.army.mil/books/A
MH-V2/AMH%20V2/chapter14.htm
Forum Week 5: Intelligence Requirements, Collection &
Research
In this Forum you are to address the build-up of
intelligence collection operations against suspected
Taliban and AQ targets in the area around Gardez and
Khost, Afghanistan.
The object is to allow you to apply the fundamentals you
have been covering in class to actual contemporary
operations in a building-block fashion. Be specific and
detailed in your contributions.
CO-5 Identify essential tasks of the intelligence
section in collating and evaluating information,
to include that on the enemy.
• Echelon of Command
• Available Resources
• Volume of input
• Time
• Categorization and Classification
– Special Forces & The CIA are unique
– SIGINT Classification may preclude distribution;
should it be excluded from the process?
– On the Ground versus Remote
• Role of National Assets
• Effectiveness of ‘reachback’ to higher echelons
Consider the work product you will have to develop.
– Know your audience.
– Blend in to the Battle Update Briefing
– Your customers are under a lot of pressure
– The more carefully you plan for processing, analysis and dissemination
the smoother the intelligence process and the greater the contribution
to the operation.
Photo Source: Disney
• Consider all aspects of deception to include the importance
of deceiving SIGINT Collectors
• How can the Internet aid in a deception plan?
– Remember the role of Facebook the recent exposure of PLA
Hacking
• Can you really deceive in the Google Earth era?
• Adapt section operations based on the skills of your
personnel.
• How can you encourage more intelligence involvement by
line forces?
– Can personally owned equipment (mobile phone cameras) be
employed to collect tactical intelligence?
• Balance necessity with security.
• CIA Article on Testing the Intelligence Cycle through systems
modeling and simulation: https://www.cia.gov/library/center-for-
the-study-of-intelligence/csi-publications/books-and-
monographs/analytic-culture-in-the-u-s-intelligence-
community/chapter_4_systems_model.htm
• CIA Basic Intro (High School) to the intelligence cycle:
https://www.cia.gov/kids-page/6-12th-grade/who-we-are-what-
we-do/the-intelligence-cycle.html
• FBI Version of the Intelligence Cycle:
http://www.fbi.gov/intelligence/di_cycle.htm
• Source of photo for title slide: Canadian View of the Intelligence
Cycle; http://www.journal.dnd.ca/vo8/no1/images/Rivard-fig-2-
eng.jpg
Forum Week 6: Tactical Intelligence Support of
Operations
This Forum is intended to pull together the learnings in
tactical intelligence and apply them to the contemporary
battlefield. You should draw on your readings of the
doctrinal publications, Battling the Elements, Koch, and
the readings in the course materials folder. The case study
of Operation Anaconda is a classic vehicle though which
to apply and emphasize the core lessons in tactical
intelligence.
CO-6 Evaluate considerations and define the
types of tactical intelligence collection and
assess the impact of deception on collection
operations.
• Each type of intelligence has strengths and
weaknesses.
• Consider how to use one source or intelligence type
to confirm intelligence from another source.
• Sometimes unreliable can be the best you can do.
• Echelon of Command
• Available Resources
• Volume of input
• Time
• Categorization and Classification
– Special Forces & The CIA are unique
– SIGINT Classification may preclude distribution;
should it be excluded from the process?
– On the Ground versus Remote
• Role of National Assets
• Effectiveness of ‘reachback’ to higher echelons
• Incorporate what you learned last week
concerning weather and terrain.
• Would the intelligence picture have changed if
Operational Anaconda was on it’s own and did
not have national asset help or CENTCOM
oversight?
• Was weather less of a factor in Operation
anaconda than for any other previous military
campaign in Afghanistan?
• A Time Magazine Guide to Operation Anaconda:
http://www.time.com/time/covers/1101020318/popup/
• Overview article on Operation Anaconda:
http://www.globalsecurity.org/military/ops/oef-
anaconda.htm
• MIT Seminar write-up featuring Sean Naylor:
http://web.mit.edu/ssp/seminars/wed_archives_06spring/na
ylor.htm
• Asian perspective on Operation Anaconda:
http://www.atimes.com/c-asia/DC22Ag01.html
• Source of title slide photo:
http://www.history.army.mil/brochures/Afghanistan/Images/
39.jpg

More Related Content

Similar to Operation anaconda orientation

Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberStanford University
 
How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...
How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...
How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...IntelCollab.com
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarStanford University
 
12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx
12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx
12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docxhyacinthshackley2629
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of SpartaLancope, Inc.
 
Drones as a Disruptive Innovation Technology
Drones as a Disruptive Innovation TechnologyDrones as a Disruptive Innovation Technology
Drones as a Disruptive Innovation TechnologyPushpak Elleedu
 
6864NCJRS.pdf
6864NCJRS.pdf6864NCJRS.pdf
6864NCJRS.pdfRicaLiban
 
Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)Alexa Deaton
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionStanford University
 
Lecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceLecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceStanford University
 
Lecture 4- Technology, Innovation and Great Power Competition
Lecture 4- Technology, Innovation and Great Power CompetitionLecture 4- Technology, Innovation and Great Power Competition
Lecture 4- Technology, Innovation and Great Power CompetitionStanford University
 
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewHacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewGovernment Contract Pricing Summit
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...Mohamed Ben Naseir
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 

Similar to Operation anaconda orientation (20)

Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - CyberLecture 8 - Technology, Innovation and Great Power Competition - Cyber
Lecture 8 - Technology, Innovation and Great Power Competition - Cyber
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...
How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...
How Corporate Culture and Emloyee Engagement Unlock Market Intelligence Poten...
 
Lecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern WarLecture 1-Technology, Innovation and Modern War
Lecture 1-Technology, Innovation and Modern War
 
12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx
12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx
12212 944 PMPSIPage 1 of 19httppsi.praeger.com.ezpro.docx
 
2009 do d osint leadership briefing
2009 do d osint leadership briefing2009 do d osint leadership briefing
2009 do d osint leadership briefing
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 
Drones as a Disruptive Innovation Technology
Drones as a Disruptive Innovation TechnologyDrones as a Disruptive Innovation Technology
Drones as a Disruptive Innovation Technology
 
6864NCJRS.pdf
6864NCJRS.pdf6864NCJRS.pdf
6864NCJRS.pdf
 
Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)Special Operations Summit (Tampa, FL - December 2011)
Special Operations Summit (Tampa, FL - December 2011)
 
Team Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power CompetitionTeam Apollo - 2021 Technology, Innovation & Great Power Competition
Team Apollo - 2021 Technology, Innovation & Great Power Competition
 
Lecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - SpaceLecture 7 - Technology, Innovation and Great Power Competition - Space
Lecture 7 - Technology, Innovation and Great Power Competition - Space
 
2004 06 intelligence analysis seminar
2004 06 intelligence analysis seminar2004 06 intelligence analysis seminar
2004 06 intelligence analysis seminar
 
Lecture 4- Technology, Innovation and Great Power Competition
Lecture 4- Technology, Innovation and Great Power CompetitionLecture 4- Technology, Innovation and Great Power Competition
Lecture 4- Technology, Innovation and Great Power Competition
 
Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewHacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) View
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...National cybersecurity capacity building framework for countries in a transit...
National cybersecurity capacity building framework for countries in a transit...
 
2004 04 intelligence collection seminar
2004 04 intelligence collection seminar2004 04 intelligence collection seminar
2004 04 intelligence collection seminar
 
2004 04 collection seminar
2004 04 collection seminar2004 04 collection seminar
2004 04 collection seminar
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 

Recently uploaded

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 

Operation anaconda orientation

  • 1. Lawrence D. Dietz, COL (R), USAR Adjunct Professor American Military University Photo Source:http://www.history.army.mil/books/A MH-V2/AMH%20V2/chapter14.htm
  • 2. Forum Week 5: Intelligence Requirements, Collection & Research In this Forum you are to address the build-up of intelligence collection operations against suspected Taliban and AQ targets in the area around Gardez and Khost, Afghanistan. The object is to allow you to apply the fundamentals you have been covering in class to actual contemporary operations in a building-block fashion. Be specific and detailed in your contributions.
  • 3.
  • 4. CO-5 Identify essential tasks of the intelligence section in collating and evaluating information, to include that on the enemy.
  • 5.
  • 6. • Echelon of Command • Available Resources • Volume of input • Time • Categorization and Classification – Special Forces & The CIA are unique – SIGINT Classification may preclude distribution; should it be excluded from the process? – On the Ground versus Remote • Role of National Assets • Effectiveness of ‘reachback’ to higher echelons
  • 7. Consider the work product you will have to develop. – Know your audience. – Blend in to the Battle Update Briefing – Your customers are under a lot of pressure – The more carefully you plan for processing, analysis and dissemination the smoother the intelligence process and the greater the contribution to the operation. Photo Source: Disney
  • 8. • Consider all aspects of deception to include the importance of deceiving SIGINT Collectors • How can the Internet aid in a deception plan? – Remember the role of Facebook the recent exposure of PLA Hacking • Can you really deceive in the Google Earth era? • Adapt section operations based on the skills of your personnel. • How can you encourage more intelligence involvement by line forces? – Can personally owned equipment (mobile phone cameras) be employed to collect tactical intelligence? • Balance necessity with security.
  • 9. • CIA Article on Testing the Intelligence Cycle through systems modeling and simulation: https://www.cia.gov/library/center-for- the-study-of-intelligence/csi-publications/books-and- monographs/analytic-culture-in-the-u-s-intelligence- community/chapter_4_systems_model.htm • CIA Basic Intro (High School) to the intelligence cycle: https://www.cia.gov/kids-page/6-12th-grade/who-we-are-what- we-do/the-intelligence-cycle.html • FBI Version of the Intelligence Cycle: http://www.fbi.gov/intelligence/di_cycle.htm • Source of photo for title slide: Canadian View of the Intelligence Cycle; http://www.journal.dnd.ca/vo8/no1/images/Rivard-fig-2- eng.jpg
  • 10. Forum Week 6: Tactical Intelligence Support of Operations This Forum is intended to pull together the learnings in tactical intelligence and apply them to the contemporary battlefield. You should draw on your readings of the doctrinal publications, Battling the Elements, Koch, and the readings in the course materials folder. The case study of Operation Anaconda is a classic vehicle though which to apply and emphasize the core lessons in tactical intelligence.
  • 11. CO-6 Evaluate considerations and define the types of tactical intelligence collection and assess the impact of deception on collection operations.
  • 12. • Each type of intelligence has strengths and weaknesses. • Consider how to use one source or intelligence type to confirm intelligence from another source. • Sometimes unreliable can be the best you can do.
  • 13.
  • 14. • Echelon of Command • Available Resources • Volume of input • Time • Categorization and Classification – Special Forces & The CIA are unique – SIGINT Classification may preclude distribution; should it be excluded from the process? – On the Ground versus Remote • Role of National Assets • Effectiveness of ‘reachback’ to higher echelons
  • 15. • Incorporate what you learned last week concerning weather and terrain. • Would the intelligence picture have changed if Operational Anaconda was on it’s own and did not have national asset help or CENTCOM oversight? • Was weather less of a factor in Operation anaconda than for any other previous military campaign in Afghanistan?
  • 16. • A Time Magazine Guide to Operation Anaconda: http://www.time.com/time/covers/1101020318/popup/ • Overview article on Operation Anaconda: http://www.globalsecurity.org/military/ops/oef- anaconda.htm • MIT Seminar write-up featuring Sean Naylor: http://web.mit.edu/ssp/seminars/wed_archives_06spring/na ylor.htm • Asian perspective on Operation Anaconda: http://www.atimes.com/c-asia/DC22Ag01.html • Source of title slide photo: http://www.history.army.mil/brochures/Afghanistan/Images/ 39.jpg