FM is the Army’s keystone manual for military intelligence (MI) See TC 2- for applying critical thinking to intelligence analysis.). This publication supersedes FM , 15 March i. FOR OFFICIAL Training Circular. No. Headquarters. Department of the Army. It suggests immediately revising FM. and adopting an Army tailored model of intelligence analyst core competencies. Several proposals are made to both.

Author: Malar Shasida
Country: Namibia
Language: English (Spanish)
Genre: Life
Published (Last): 7 November 2004
Pages: 238
PDF File Size: 17.54 Mb
ePub File Size: 12.18 Mb
ISBN: 681-7-12685-744-4
Downloads: 34693
Price: Free* [*Free Regsitration Required]
Uploader: Bramuro

It also includes the information environment and enemy, adversary, friendly, and neutral systems. Department of the Army Information Security Program.

Department of the Army File Type: Library of Congress, Federal Research Division. Department of the Army Personnel Security Program.

Department of the Army Intelligence Information Services. Computer Security Readiness Team. Peace operations include peacekeeping, peace building, peacemaking, peace enforcement, and conflict prevention.

Intelligence personnel must also know how to arrive at logical, well-reasoned, unbiased conclusions based on analysis. What collection may fill those fk

(U//FOUO) U.S. Army Intelligence Analysis Manual

Globalization, technology, population growth, urbanization, and demand for natural resources are creating an environment where the location of the next crisis requiring American intervention is not always predictable.


This includes the military aspects of fn terrain and weather as well as civil considerations. The following actions can help build and maintain collaborative relationships: It differs from conventional operations in two aspects. Are certain critical events necessary for the predicted location of the target to occur?

Intelligence personnel never have all the information necessary to make an intelligence assessment. Irregular warfare includes terrorism, insurgency, and guerilla warfare. What are the temporal distances between key events? Combat is not likely during these operations, but terrorist attacks are always possible and force protection and operations security OPSEC are major concerns.

These groups will employ unconventional and asymmetric methods and means to counter U. Listen to, and acknowledge the feelings, concerns, opinions, and ideas of others. Share information, 2-334, and suggestions.

(U//FOUO) U.S. Army Intelligence Analysis Training Manual

Doctrine for Planning Joint Operations. Information is processed data of every description which may be used when conducting analysis; information generally provides some of the answers to who, what, where, and when questions.

Recommended Changes to Publications and Blank Forms. For example, if the analyst identifies that an HVI visits a particular restaurant, the location can be monitored as an anticipated future location of the 2-333.4 for time-sensitive targeting. Forming a coherent intelligence picture during the decisionmaking process is difficult. Conversely, if events seem to happen more rapidly than expected, is it possible that the analyst has information related to multiple targets?


Department of Defense Dictionary of Associated Terms.

(U//FOUO) U.S. Army Intelligence Analysis Manual | Public Intelligence

Additionally, they will be called on to conduct full spectrum operations as part of an interdependent joint force conducting simultaneous offensive, defensive, and stability operations. Support to situational understanding. Ask for help in identifying and achieving goals. Subject matter expertise alone will not guarantee the development of logical or accurate conclusions. Meteorological and Oceanic Operations.

Examples include multinational training exercises, security assistance, joint combined exchange training, recovery operations, arms control, and vm operations. Pattern of life analysis should be as in-depth as possible. Training, knowledge, and experience are all critical parts of dealing with uncertainty. Radical fundamentalists, transnational terrorists, and guerrilla forces are examples of irregular threat.

Like peacetime military engagement, combat is not likely. See FM for a detailed discussion of military planning and operations.