Jieddo Atn Lexicon

Embed Size (px)

Citation preview

  • 8/13/2019 Jieddo Atn Lexicon

    1/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Attack the Network Lexicon

    May 2011

    UNCLASSIFIED//FOR OFFICIAL USE ONLYThis document is approved for release to ISAF, NATO, GCTF.

  • 8/13/2019 Jieddo Atn Lexicon

    2/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    DISTRIBUTION STATEMENT D. Distribution authorized to theDepartment of Defense and U.S. DoD contractors only (DeputySecretary of Defense Memorandum dated April 2006, Policy onDiscussion of IEDs and IED-Defeat Efforts in Open Sources)(20110524), FOIA Exemption 2 applies. Disclosure and release ofthis document is authorized to ISAF and GCTF coalitions and NATO

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    .

    Organization, J5 Division. Provision of this information does notimply a commitment on the part of the United States government tofurnish, transfer, or export information or equipment referred toherein.

  • 8/13/2019 Jieddo Atn Lexicon

    3/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Attack the Network Lexicon

    INTRODUCTION

    UNCLASSIFIED//FOR OFFICIAL USE ONLY3

  • 8/13/2019 Jieddo Atn Lexicon

    4/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    INTRODUCTIONThis first edition of the Attack the Network (AtN) Lexicon was

    produced by the Joint Improvised Explosive Device DefeatOrganization (JIEDDO). The lexicon contents were developedafter extensive interviews with military units who successfullyemployed AtN principles and practices to reduce the number and

    effectiveness of Improvised Explosive Devices (IEDs) in theCounter-Insurgency (COIN) environment where they encounteredmultiple and sometimes interconnected adversary networks. Thelexicon contents were further developed and refined by subjectmatter experts from over fifty organizations across theDepartments of Defense, Justice, and Homeland Security.

    Attack the Network (AtN) Lexicon

    SCOPEWhile the original requirements and applications that led to

    the creation of this AtN Lexicon involved IED networks in the COINenvironment, the terminology herein is not limited to that particularAtN application. The AtN Lexicon provides terminology commonlyused to attack networks in a more generic sense so that this

    document can be used for AtN in any application domain (IED,drug, criminal, insurgent, etc.)

    APPROACHThis lexicon is intended to be a living document that is updated to

    reflect changes in the state of the art for AtN principles and practices.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    PURPOSE

    This lexicon is intended to provide a common operationalvocabulary across the many organizations and technical/militarydisciplines who must coordinate their efforts to successfully attackthe many different varieties of adversary networks. Adoption andwidespread use of the terms in this lexicon will improveinformation exchange among AtN practitioners at the tactical,operational, and strategic levels. This lexicon will:

    Standardize reporting and improve database contentmanagement

    Enable AtN-related education and training

    Serve as an information resource for staffs preparing toenter an AtN operational environment

    Support the harmonization and development of AtN policyand doctrine

    (printed or electronic) of the most current version of theAttack the Network Lexicon can be submitted to:

    [email protected]

    4

    The field guide will be posted and available to download and

    print from https://jknife.jieddo.dod.mil, under the C-IED

    References tab. It will also be available on BICES at http://knife.act.nato.int/portal under C-IED Information and on the

    Afghan Mission Network on the CENTRIXS-ISAF site http://

    www.jknife.usa.isaf.cmil.mil under C-IED Resources/CIED

    References.

  • 8/13/2019 Jieddo Atn Lexicon

    5/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    CONTENTS

    UNDERSTAND THE MISSION

    UNDERSTAND THE OPERATIONALENVIRONMENT

    10

    18

    GENERAL TERMS 6 ENGAGE THE NETWORKS 78

    89ASSESS

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    UNDERSTAND THE NETWORKS

    ORGANIZE FOR THE FIGHT

    27

    50

    5

  • 8/13/2019 Jieddo Atn Lexicon

    6/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    AtN Lexicon: Construct

    Understand theCommanders Intent

    Understand the Campaign

    Attack

    Area of Interest

    Area of Responsibility

    Analyze the Network

    Understand NetworkConcepts

    Understand the Mission

    Understand the OperationalEnvironment

    Understand the Networks

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    theNetwork

    ID Staff Requirements

    Prepare the Organization

    Monitor

    Influence Neutral Networks

    Support Friendly Networks

    Neutralize Threat Networks

    EvaluateAssess

    Organize for the Fight

    Engage the Networks

    6

  • 8/13/2019 Jieddo Atn Lexicon

    7/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    GENERAL TERMS

    Attack the Network (AtN)This line of operation (LOO) consists oflethal and nonlethal actions andoperations against networks conducted

    continuously and simultaneously atmultiple levels (tactical, operational, andstrategic) that capitalize on, or create,

    key vulnerabilities and disrupt activitiesto eliminate the enemy's ability tofunction in order to enable success of theoperation or campaign.

    Understand the Mission

    AtN Lexicon: GENERAL TERMS

    Understand the OperationalEnvironment (OE)Understanding the operational

    environment is to comprehend thecomposite of the conditions,circumstances, and influences that affectthe employment of capabilities and bear

    on the decisions of the commander.

    Understand the Networks

    Understanding the network or local cellsmeans having an appreciation for thenature of adaptive networked threats,

    Engage the NetworksTo engage the networks is to uselethal and nonlethal means tosupport, influence, or neutralizenetwork members or cells or an entirenetwork.

    AssessTo measure continuously the overalleffectiveness of employing joint forcecapabilities during military operations.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    To place AtN operations in the broader

    operational context in which they areconducted. It has two components:Understanding the Campaign (i.e. thebroader objectives that are trying to beachieved) and Understanding theCommander's Intent (i.e. the immediate

    objectives of current and planned

    operations) AtN operations must bedevised to reinforce and support bothcomponents of the mission.

    , , ,

    and purpose.

    Organize for the Fight

    Organize for the fight is to identify,organize and direct the resources(personnel, tools and equipment) that areneeded to facilitate attack the network

    operations.

    7

  • 8/13/2019 Jieddo Atn Lexicon

    8/99

  • 8/13/2019 Jieddo Atn Lexicon

    9/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    AtN Lexicon: GENERAL TERMS

    RaidsRaids are operations to temporarily seizean area in order to secure information,confuse an adversary, capture personnelor equipment, or to destroy a capability. Itends with a planned withdrawal uponcompletion of the assigned mission.

    Show of ForceA show of forces is an operationdesigned to demonstrate US resolve thatinvolves increased visibility of USdeployed forces in an attempt to defuse

    Protection of Shipping OperationsProtection of shipping is the use ofproportionate force by US warships,military aircraft, and other forces, whennecessary for the protection of US flagvessels and aircraft, US citizens(whether embarked in US or foreign

    vessels), and their property againstunlawful violence. This protection may beextended (consistent with internationallaw) to foreign flag vessels, aircraft, andpersons.

    GENERAL TERMS

    Recovery OperationsRecovery operations are actions taken tosearch for, locate, identify, recover, andreturn isolated personnel, humanremains, sensitive equipment, or itemscritical to national security.

    Homeland DefenseHomeland defense is the protection ofUnited States sovereignty, territory,domestic population, and critical defenseinfrastructure against external threatsand aggression or other threats as

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    ,

    continue, may be detrimental to USinterests or national objectives.

    Enforcement of Sanctions (PeaceEnforcement)Enforcement of sanctions is the

    application of military force, or the threatof its use, normally pursuant tointernational authorization, to compelcompliance with resolutions or sanctionsdesigned to maintain or restore peaceand order.

    .

    Civil SupportCivil support is support by theDepartment of Defense to US civilauthorities for domestic emergencies,and for designated law enforcement and

    other activities. Also known as DefenseSupport to Civil Authorities (DSCA).

    StrikesStrikes are attacks to damage or destroyan objective or a capability.

    9

  • 8/13/2019 Jieddo Atn Lexicon

    10/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    AtN Lexicon: GENERAL TERMS

    Non-combatant EvacuationOperations (NEOS)Non-combatant evacuation operationsare planned actions by the Department

    of State or other appropriate authority, inconjunction with the Department ofDefense, whereby noncombatants are

    evacuated from foreign countries whentheir lives are endangered by war, civilunrest, or natural disaster to safe havensas designated by the Department of

    State.

    Decisive PointsA decisive point is a geographic place,specific key event, critical factor, orfunction that, when acted upon, allows

    a commander to gain a markedadvantage over an adversary orcontributes materially to achieving

    success.

    Shaping OperationA shaping operation is an operation at

    any echelon that creates andpreserves conditions for the success of

    GENERAL TERMS

    Freedom of Navigation OperationsFreedom of navigation operations are

    planned actions to demonstrate US orinternational rights to navigate air or searoutes.

    Peace Operations

    Peace operations are organized actionsthat encompass multiagency and

    multinational crisis response and limitedcontingency operations involving allinstruments of national power to containconflict, redress the peace, and shape

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Lines of operations are logical lines thatconnect actions on nodes and/ordecisive points related in time andpurpose with an objective(s).

    Line of EffortA line of effort is a line that links multiple

    tasks and missions using the logic ofpurposecause and effectto focusefforts toward establishing operational

    and strategic conditions.

    .

    Sustaining OperationA sustaining operation is an operationat any echelon that enables the

    decisive operation or shapingoperations by generating andmaintaining combat power.

    reconciliation and rebuilding and facilitatethe transition to legitimate governance.Peace operations include peacekeeping,peace enforcement, peacemaking,peace building, and conflict preventionefforts.

    10

  • 8/13/2019 Jieddo Atn Lexicon

    11/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understand the Mission

    Understand the OperationalEnvironment

    Six pillars of Attack the Network:

    1

    2

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Assess6

    Understand the Networks3

    Organize for the Fight4

    Engage the Networks5

    11

  • 8/13/2019 Jieddo Atn Lexicon

    12/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    To place AtN operations in the broader operational context in which theyare conducted. It has two components: Understanding the Campaign(i.e. the broader objectives that are trying to be achieved) andUnderstanding the Commander's Intent (i.e. the immediate objectives of

    current and planned operations) AtN operations must be devised toreinforce and support both components of the mission.

    UNDERSTAND THE MISSION1

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understand the MissionUnderstand the

    Campaign

    Understand theCommanders Intent

    12

  • 8/13/2019 Jieddo Atn Lexicon

    13/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Commanders Guidance

    Restated Mission

    Understand the

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Commanders CriticalInformation Requirements

    Friendly Forces

    Information Requirement

    Commanders Intent

    13

  • 8/13/2019 Jieddo Atn Lexicon

    14/99

  • 8/13/2019 Jieddo Atn Lexicon

    15/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understand theCampaign

    Major OperationsTraditional Warfare

    Irregular Warfare

    Counter Insurgency

    Major Operations

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Support to Insurgency

    Combating Terrorism

    15

  • 8/13/2019 Jieddo Atn Lexicon

    16/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Deter

    Shape

    Seize Initiative

    Full Spectrum

    of OperationsDefensive Operations

    Offensive Operations

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Stabilize

    Enable Civil Authority

    Stability Operations

    16

  • 8/13/2019 Jieddo Atn Lexicon

    17/99

  • 8/13/2019 Jieddo Atn Lexicon

    18/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understand the Campaign

    Defensive OperationsDefensive operations are combatoperations conducted to defeat anenemy attack, gain time, economizeforces, and develop conditions favorablefor offensive or stability operations.

    Stability OperationsStability operations encompass variousmilitary missions, tasks, and activitiesconducted outside the United States incoordination with other instruments ofnational power to maintain or reestablish

    Seize InitiativeTo seize the initiative is to executeoffensive operations at the earliestpossible time, forcing the adversary tooffensive culmination and setting the

    conditions for decisive operations.

    DominateTo dominate is to break the enemys willfor organized resistance or, in noncombatsituations, to control the operationalenvironment. Success in this phase

    depends upon overmatching joint force

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    ,essential governmental services,emergency infrastructure reconstruction,and humanitarian relief.

    ShapeTo shape is to conduct kinetic and/or

    nonkinetic actions to manipulate enemyactivities.

    DeterTo deter is to prevent undesirable actionby the adversary by demonstrating the

    capabilities and resolve of the joint force.

    .

    StabilizeTo stabilize is to employ processes bywhich underlying tensions that might leadto resurgence in violence and a

    breakdown in law and order aremanaged and reduced, while efforts aremade to support preconditions forsuccessful long-term development.

    Enable Civil AuthorityTo enable civil authority in an operation

    or campaign is to take those actions thatsupport legitimate civil governance intheater.

    18

  • 8/13/2019 Jieddo Atn Lexicon

    19/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Six pillars of Attack the Network:

    Understand the Mission1

    Understand the OperationalEnvironment

    2

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Assess6

    Understand the Networks3

    Organize for the Fight4

    Engage the Networks5

    19

  • 8/13/2019 Jieddo Atn Lexicon

    20/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understanding the operational environment (OE) is to comprehend the"composite of the conditions, circumstances, and influences that affect theemployment of capabilities and bear on the decisions of the commander.

    UNDERSTAND THE OPERATIONAL

    ENVIRONMENT2

    Operational Variables

    Area of Responsibility

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Mission VariablesUnderstand the

    Operational Environment

    rea o n eres

    Area of Influence

    Area of Operations

    Historical Considerations

    20

  • 8/13/2019 Jieddo Atn Lexicon

    21/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understand the OperationalEnvironment

    Area of ResponsibilityAn area of responsibility is thegeographical area associated with acommand within which a commander hasauthority to plan and conduct operations.

    Area of Interest

    An Area of Interest (AOI) is an areabeyond the area of influence thatcontains forces and/or other factors thatcould jeopardize friendly missionaccomplishment. In combat operations,

    the AOI normally extends into enemy

    Area of OperationsAn area of operations is geographicalspace on the earth that is defined by thejoint force commander for land andmaritime forces. Areas of operation do

    not typically encompass the entireoperational area of the joint force

    commander, but should be large enoughfor component commanders toaccomplish their missions and protecttheir forces.

    Operational Variables

    Historical ConsiderationsHistorical considerations includesthe cultural norms, religious beliefs,and past military and politicalevents of a region as they impact

    the adversary's capabilities andshould be considered in operational

    planning.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    planned friendly operations if thoseobjectives are not currently located withinthe assigned operational area.

    Area of Influence

    An area of influence is a geographic areain which a commander can directlyinfluence operations by maneuver or fires

    capabilities normally under thecommander's command or control. Thearea of influence normally surrounds and

    includes the assigned operational area.

    factors within an operational environmentor situation around which a unit, system,or individual is expected to operate andwhich may affect performance.

    Mission VariablesMission variables are those aspects ofthe operational environment that directly

    affect a mission. They consist of mission,enemy, terrain and weather, troops andsupport available, time available, and

    civil considerations.

    21

  • 8/13/2019 Jieddo Atn Lexicon

    22/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Political

    Network FormationConditions

    Economic

    Military

    Water

    Receptive Audience

    Accommodating

    Environment

    Catalyst of Leadership

    Sewer

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Operational VariablesInfrastructure

    Society

    Information Transportation

    Medical

    Safety

    Academics

    Electricity

    22

  • 8/13/2019 Jieddo Atn Lexicon

    23/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Operational Variables

    Network Formation ConditionsNetwork formation conditions are those

    existing state of affairs in the operationalenvironment that allow a series of directand indirect ties from one actor to acollection of others (a network) todevelop.

    Receptive Audience

    A receptive audience is a body ofpersons each of whom feels that he hassomething to gain by engaging in theactivities of the network.

    Political (operational variable)Political variables are those operationalvariables that describe the distribution ofresponsibility and power at all levels ofgovernance.

    Military (operational variable)

    Military variables are those operationalvariables that include the militarycapabilities of all armed forces in a givenoperational environment.

    Economic (operational variable)

    WaterWater infrastructure refers to a source,means, or process of supplying water(as for a community) usually including

    reservoirs, tunnels, and pipelines.

    Electricity

    Electricity infrastructure consists of thepower stations and conduits necessaryfor delivering electric power to a

    society.

    Academia

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Catalyst of Leadership

    In the context of network formation acatalyst leader is a motivating personthat serves as an initiator for formation ofthe network. This can but does notnecessarily take the form of personalleadership by an individual(s).

    Accommodating EnvironmentThe tangible elements (such asinfrastructure and terrain) and intangibleattributes (such as culture andgovernance) environment that arerequired for any network to form oroperate.

    variables that encompass individual andgroup behaviors related to producing,distributing, and consuming resources.

    Infrastructure

    Infrastructure variables are thoseoperational variables that comprise thebasic facilities, services, and installations

    needed for a societys functioning.

    Sewer

    Sewer infrastructure is an artificialusually subterranean conduit to carry offsewage and sometimes surface water(as from rainfall).

    , ,world of teachers, schools, andeducation.

    23

  • 8/13/2019 Jieddo Atn Lexicon

    24/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Operational Variables

    TransportationThe range of infrastructure (rail, road, air,etc,) that moves people, property, andcommerce within a society. The natureand extent of this infrastructure and theimplications to AtN planning must be

    understood when conducting operations.

    MedicalThe range of professional services thatprovide medical care to a society. Thenature and extent of this infrastructureand the implications to AtN planning must

    Information VariablesInformational variables are thoseoperational variables that wherebyindividuals, organizations, and systemscollect, process, disseminate, or act oninformation.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    operations.

    SafetyThe range of services that protect thepeople in a society from fire and crime orthat respond to disasters. The nature

    and extent of this infrastructure and theimplications to AtN planning must be

    understood when conducting operations.

    SocietalSocietal variables are those operational

    variables that describes societies withinan operational environment. A society isa population whose members are subject

    to the same political authority, occupy acommon territory, have a commonculture, and share a sense of identity.

    24

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    25/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Mission

    Network FormationConditions

    Terrain and Weather

    Enemy

    Receptive Audience

    Accommodating

    Environment

    Catalyst of Leadership

    ASOPE

    Structures

    Areas

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Mission VariablesCivil Considerations

    Troops

    Time Available

    District StabilityFramework

    People

    Events

    Organizations

    Capabilities

    Historical Considerations

    25

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    26/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Mission Variables

    MissionIdentifying the mission before a militaryaction is to determine the task, togetherwith the purpose, that clearly indicatesthe action to be taken and the reasontherefore.

    EnemyAn enemy is a party identified as hostileagainst which the use of force isauthorized.

    Terrain and Weather

    .

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    a military action is to determine thenatural features (such as rivers andmountains) and man-made features(such as cities, airfields, and bridges)that will affect the mission as well as theeffect of the weather on the mission.

    Civil Considerations

    Civil considerations entails reflectingbefore the mission how the manmadeinfrastructure, civilian institutions, andattitudes and activities of the civilian

    leaders, populations, and organizationswithin an area of operations will influencethe conduct of the mission. *The Marine

    Corps does not recognize civilconsiderations as a mission variable. 26

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    27/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Mission Variables

    ASCOPEASCOPE is a memory aid when makingcivil considerations during mission

    analysis: areas, structures, capabilities,organizations, people, events .

    Areas

    Areas in the context of the memory aidASCOPE are localities or physicalterrains that have direct impact on the

    population and its activities. Examplesinclude tribal regions, police districts,political boundaries, religious boundaries,

    CapabilitiesCapabilities are key functions andservices. They include, but are notlimited to, administration, safety,emergency services, food distribution,agricultural systems, public works and

    utilities, health, public transportation,

    electricity, economics, and commerce.Sewage, water, electricity, trash, medical,and security (SWEAT-MS) are theessential services local authorities mustprovide.

    EventsEvents in the context of the memoryaid ASCOPE are routine, cyclical,planned, or spontaneous activitiesthat significantly affect the operatingenvironment.

    District Stability FrameworkThe District Stability Framework(formerly TCAPF) was a practicalframework designed to assistcommanders and their staffs identify

    the causes of instability in an area of

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    , ,polling stations, and government centers.

    Structures

    Structures in the context of the memoryaid ASCOPE are existing importantinfrastructure. Examples includehospitals, bridges, communicationstowers, and power plants.

    Organizations in the context of thememory aid ASCOPE are groups ofindividuals that have associatedthemselves around some purpose orinterest. They can be religious, fraternal,

    criminal, media, patriotic or service, andcommunity watch groups. They includemedia, IGOs, NGOs, merchants,

    squatters, and other groups.

    PeoplePeople in the context of the memory aid

    ASCOPE are all nonmilitary personnel inthe area of interest.

    ,diminish or mitigate them, andevaluate the effectiveness of theactivities in fostering stability.

    27

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    28/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Mission Variables

    District Stability FrameworkA practical framework designed to assistcommanders and their staffs identify thecauses of instability in an area of

    operation, develop activities to diminishor mitigate them, and evaluate theeffectiveness of the activities in fostering

    stability.

    TroopsIdentifying the troops before a military

    action is to determine the number, type,capabilities, and condition of available

    Historical Considerations

    Historical ConsiderationsHistorical considerations include thecultural norms, religious beliefs, and pastmilitary and political events of a region asthey impact the adversary's capabilitiesand should be considered in operational

    planning.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    required for the given mission. Theseforces include resources from joint,interagency, multinational, host-nation,commercial (via contracting), and private

    organizations. It also includes supportprovided by civilians.

    Time Available

    Identifying the time available before amilitary action is to assess the time

    available for planning, preparing, andexecuting the mission. This includes thetime required to assemble, deploy, andmaneuver units to where they can bestmass the effects of combat power.

    Includes time to plan and prepareoperations. 28

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    29/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Six pillars of Attack the Network:

    Understand the OperationalEnvironment

    2

    Understand the Mission1

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Assess6

    Organize for the Fight4

    Engage the Networks5

    n ers an e e wor s

    29

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    30/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Understanding the network or local cells means having an appreciation forthe nature of adaptive networked threats, their structure, characteristics,dynamics, and purpose.

    Understand the Networks3

    Understand the

    Understand NetworkConcepts

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Networks

    na yze t e etwor

    Categorize the Network

    30

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    31/99

    Understand the Networks

    Understand Network ConceptsUnderstanding network concepts is thecomprehension of the generalcharacteristics of networks to includenetwork components, network structures,network dynamics, and related conceptsand terms.

    Analyze the NetworkAnalyze the Network is the application ofanalytical techniques to produceintelligence that describes the friendly,neutral, and threat network goals,

    '

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    , ,

    understand the operational environmentin which they operate.

    Categorize the NetworkCategorize the Network is the recognitionthat any network (particularly in aCounterinsurgency environment where

    the people are the center of gravity) can

    be considered to be friendly, neutral, or athreat .

    31

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    32/99

    SpecializedNetwork

    CulturalNetwork

    FamilyNetwork

    Virtual Network

    ProximityNetwork

    Examples

    UnderstandNetwork Concepts

    Dyad

    Cell

    Node

    Link

    Components

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    RegenerativeSelf Organizing

    Co-Adaptive Emergent

    Non-Hierarchical

    Hierarchical Blended

    32

    Network Structure

    Network Density

    Complex AdaptiveSystem

    Characteristics

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    33/99

    Understand NetworksConcepts

    ComponentsNetwork components are the elementalparts of a network when graphicallymapping a social network.

    Dyad

    A dyad in a social network analysis

    consists of two nodes and a single link.Individuals in a network are called actorsor nodes. (Actor and node are often usedinterchangeably.) The contacts betweennodes are called links. The basic element

    of a social network graph is the dyad.

    Family NetworkA family network is a series of direct andindirect ties among various actors thatbelong to the same family. These can becross-generational.

    Cultural Network

    A cultural network is a series of directand indirect associations among variousactors that belong to the same culture;that is, a shared language, religion,ideology, country of origin and/or senseof identity. Some of these networks may

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Cell

    A cell in social network analysis consistsof a small group of individuals who worktogether for some common purpose.

    NodeA node in social network analysis is anelement of a system that represents a

    person, place, or physical thing.Individuals in a network are called actorsor nodes.

    LinkA link in social network analysisrepresents the contacts between nodes

    or actors.

    proximity based.

    Proximity NetworkA proximity network is a series of directand indirect associations among variousactors due to the geographical ties of its

    members (ex. past bonding incorrectional or other institutions, or living

    within specific regions orneighborhoods). Members may also forma network with proximity to an areastrategic to their criminal interests (ex. aneighborhood or key border entry point).

    There may be a dominant ethnicity withinthe group, but they are primarily together

    for geographical reasons.33

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    34/99

    Understand NetworksConcepts

    Virtual NetworkA virtual network is a series of direct andindirect associations among variousactors that may never physically meet,but work together through the Internet orother means of communication (ex.

    networks involved in online fraud, theft or

    money laundering).

    Specialized NetworkIn a specialized network, individualscome together to undertake activities

    primarily based on the skills, expertise or

    HierarchicalHierarchical networks have a well-

    defined vertical chain of command andresponsibility. Information flows up anddown organizational channels thatcorrespond to these vertical chains, butmay not move horizontally through the

    organization. This is more traditional, andis common of groups that are well

    established with a command and supportstructure. Hierarchical organizationsfeature greater specialization of functionsin their subordinate cells (support,

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    .

    CharacteristicsCharacteristics of a human network arethe discernible physical, operational, andtechnical features of a human network.

    Network StructureThe network structure shows how an

    organization is connected, how itbehaves, and how its connectivity affectsits behavior. Network structure may be avariation of several basic nodal concepts,

    a node being an individual, a cell,another networked organization, or evena hierarchical organization.

    , .

    Non-Hierarchical

    Non-hierarchical networks are anydecentralized decision-making structure.

    BlendedA blended network has a structure that isa combination of hierarchical and non-

    Hierarchical organizations.

    Network DensityA property of a network pertaining to thenumber of nodes connected within thenetwork.

    34

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    35/99

    Understand NetworksConcepts

    Complex Adaptive SystemComplex adaptive systems consist ofmany diverse and autonomouscomponents or parts which areinterrelated, interdependent, and behave

    as a unified whole in learning fromexperience and in adjusting to changesin the environment.

    Co-AdaptiveSymbiotic systems adapt to somethingthat is adapting to it. These systems

    must continually evolve to survive, and

    RegenerativeA regenerative systems is a complex,adaptive system that can rebuild itselfafter attack. Removal of a single node

    has minimal impact on the system as awhole.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    environment and the forces that counter

    it.

    Self Organizing

    Self-organizing systems operate withouta central authority or external elementimposing structure upon it. This isbasically a bottom up developed

    organization.

    Emergent

    Emergent systems displaycharacteristics that are ambiguous, thatcannot be anticipated from the propertiesof its components or parts.

    35

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    36/99

    Describe the Network

    IntelligenceRequirements

    Sources

    Methods

    Network Tools

    Observables

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    na yze e e wor

    Determine NAIs/TAIs

    Signatures

    Event Template

    Event Matrix

    eve op n ca ors

    Signatures

    ISR

    36

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    37/99

    Analyze the Network

    Describe the NetworkAn act of characterizing and representinga network to others in words and picturesas accurately to reality as possible inorder to make estimates of the networkand to take actions against it. This is

    done through various tools andrepeatable approaches.

    Intelligence RequirementsIntelligence requirements (IRs) aredocumented needs for information thatwhen satisfied will fill a gap in the

    '

    Network ToolsNetwork tools are the various collectionand analytical systems that enable anetwork analyst to represent, analyze,

    and make estimates on networks.

    Develop Indicators

    In intelligence usage, to developindicators is to collect information thatreflects the intention or capability of an

    adversary to adopt or reject a course ofaction.

    Determine NAIs/TAIsA Named Area of Interest (NAI) is thegeospatial area or systems node or linkagainst which information that willsatisfy a specific informationrequirement can be collected. A TargetArea of Interest (TAI) is thegeographical area where high-value

    targets can be acquiredand engaged by friendly forces.

    Event TemplateAn event template is a guide for

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    of the operational environment or threat

    forces.

    SourcesA source of intelligence is a person,thing, activity or agency from which

    information is obtained.

    MethodsMethods for describing the network arethe systematic procedures, analyticaltechniques, or modes of inquiry used to

    characterize or represent a network.

    Observables are indicators that can be

    directly or indirectly observed throughcollection.

    SignaturesSignatures are indicators that can beinferred through measurements.

    .depicts the named areas of interest

    where activity, or its lack of activity, willindicate which course of action theadversary has adopted.

    Event MatrixA description of the indicators and

    activity expected to occur in each

    named area of interest. It normallycross-references each named area ofinterest and indicator with the timesthey are expected to occur and thecourses of action they will confirm ordeny. There is no prescribed format.

    37

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    38/99

    IntelligenceRequirements

    Commanders Critical

    Intelligence Requirement

    Friendly ForcesIntelligence Requirement

    Host Nation

    Common Operational

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Priority IntelligenceRequirement

    Intelligence Requirement

    38

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    39/99

    Intelligence Requirements

    Host Nation Intelligence Requirement(HNIR)A Host Nation Intelligence Requirement(HNIR) is an intelligence requirement,stated as a priority for intelligencesupport, that the commander and staff

    need answered to understand the hostnation's government, defense, orintelligence agencies or their respectiveactivities.

    Priority Intelligence Requirements(PIR)

    Commander's Critical InformationRequirement (CCIR)

    See page 13.

    Friendly Force Informationrequirement (FFIR)See page 13.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    are intelligence requirements that are

    stated as a priority for intelligencesupport and that the commander andstaff need to understand the adversary orthe operational environment. They aresubordinate to or lower in priority than

    Essential Elements of Information (EEIs).

    Common Operational PictureA common operational picture (COP) is asingle identical display of relevantinformation shared by more than one

    command. A common operational picturefacilitates collaborative planning andassists all echelons to achieve situational

    awareness.39

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    40/99

    Sources

    DOMEX

    PoliceIntelligence

    CI

    Forensics

    MASINT

    WTI

    SIGNIT

    GeospatialIntelligence

    TECHINT

    HUMINT

    Biometrics

    OperationsReporting

    Examples

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    OSINT

    40

  • 8/13/2019 Jieddo Atn Lexicon

    41/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    42/99

    Sources

    Counterintelligence (CI)Information gathered and activitiesconducted to protect against espionage,other intelligence activities, sabotage, orassassinations conducted by or on behalfof foreign governments or elementsthereof, foreign organizations, or foreign

    persons, or international terroristactivities.

    Operations ReportingOperations reporting is a source ofinformation generated in the prosecution

    Document and Media Exploitation(DOMEX)The Document and Media Exploitation(DOMEX) center is responsible for therapid and accurate extraction,exploitation, and analysis of capturedenemy documents, media, and material

    collected during operations.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    o operat ons.

    BiometricsBiometrics is the process of recognizingan individual based on measurableanatomical, physiological, and behavioralcharacteristics.

    Forensics

    Forensics is the application of multi-disciplinary science capabilities toestablish facts.

    42

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Examples

  • 8/13/2019 Jieddo Atn Lexicon

    43/99

    FinanceInfrastructure

    Disposition

    Information/Intelligence

    Members

    Leaders

    Logistics

    Structure/Organization

    Freedom ofMovement

    Operations PopularSupport

    Motivation

    Communications

    Pattern AnalysisPlot Sheet

    Time-EventCritical Factors

    Network Model

    Pattern Analysis

    Event/TrendPredictiveAnalysis

    Examples

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Association Matrix

    Activities Matrix

    Link Diagram

    IndividualComponent Nodal

    ComponentFunctionalAnalysis

    Analysis

    Centers of Gravity

    Critical

    Vulnerabilities

    CriticalRequirements

    Critical Capabilities

    Link Analysis

    Network/NodalAnalysis

    Social NetworkAnalysis

    43

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    44/99

    Methods

    Critical Factors AnalysisCritical Factors Analysis is themethodical examination of the criticalcapabilities, critical requirements,

    specific activities, observable andmeasureable indicators, and criticalvulnerabilities of an adversary.

    Centers of GravityCenters of gravity are the sources of

    power for an adversary that providemoral or physical strength, freedom ofaction, or will to act.

    LeadersLeaders in a network refer to

    individuals who exhibit thecharacteristics and the specificpersonalities of those with authority inthe network.

    MembersMembers in a network refer to

    individuals who exhibit thecharacteristics and the specificpersonalities of those serving in thenetwork.

    Critical VulnerabilitiesCritical vulnerabilities are aspects of a

    critical requirement that are deficient inan adversary or vulnerable to direct orindirect attack in him, which whenattacked will create decisive or significanteffects.

    Network Model

    Factors representative of a network thatcan be used as a framework to develop amodel of the network.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Critical CapabilitiesCritical capabilities are inherent abilitiesthat enable a CG to function as such.

    Critical Capabilities provide the primarycapacity for achieving specific objectives.

    Critical RequirementsCritical requirements are the essential

    conditions, resources, and means for acritical capability to be fully operational.

    Popular Support

    The degree to which the network hasthe explicit or implicit backing of thepublic .

    Structure/OrganizationThe composition of the networks(hierarchical, cellular, etc.).

    DispositionThe geographic location of networkelements .

    InfrastructureRefers to the physical facilities that a

    network utilizes to conductoperations.

    The series of actions carried out by the

    members of a network that are directedtoward the objectives of the network.

    Freedom of MovementThe conditions for or resources availableto a network that allows its actors tomove when and where it wants to.

    MotivationMotivation in the network is the sourceand the degree to which leaders andmembers of the network are inspired tocontinue in the operations of the network.

    44

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    45/99

    Methods

    LogisticsLogistics is the science of planning,preparing, executing, and assessing themovement and maintenance of forces.

    CommunicationsCommunications refers to the kind and

    quantity of assets that a network uses toexchange information; it also includesthe means by which it exchanges

    information.

    Information/Intelligence

    FinanceFinance refers to the provision of venture

    or financial capital to another individual,company, or organization, with theexpectation that the initial investedprincipal will be returned with interest, ora specified percentage rate of return; orthe provision of funding to anotherindividual, company, or organization; or

    the provision of loans, trade credit, orsimilar financial instruments toindividuals, companies, or organizations;or the provision of any financial service

    Pattern AnalysisThe use of prior actions and activitiesto identify trends in activities orbehaviors. Once identified, these

    patterns can be used to predict futureenemy actions and to plan ISRactivities.

    Pattern Analysis Plot SheetA pattern analysis plot sheets helps

    distinguish patterns in activitiesassociated with particular days,dates, or times when they are

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    e ers o e n e gence sys em a anetwork exercises to include the sourcesit has, the means of collection andanalysis, and the persons engaged in the

    intelligence enterprise.

    , ,fund-raising, financing, payment, or

    investment plans, actions, and activitiesby individuals, companies, ororganizations.

    Event/Trend Predictive AnalysisEvent/trend, and predictive analysis arevarious analytical methods that attempt

    to anticipate enemy behavior based onpast behavior.

    .choose to modify this product to track

    longer or shorter period asappropriate.

    Time-Event ChartThe time event chart is achronological record of an individual'sor a group's activities. It is designed

    to store and display large amounts ofinformation in as little space as

    possible.

    Link AnalysisLink analysis is an analytical methodfor determining the relationships

    between critical personalities andmembers within their network.45

  • 8/13/2019 Jieddo Atn Lexicon

    46/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    47/99

    UDOP/GoogleEarth

    AnalystNotebook

    IdentityInstacheck

    WEBTAS

    RFS Tracker

    Web Threads

    Data Tracker

    ARC

    Global NameRecognition

    CELLPACK

    GIS3D Dashboard

    Examples

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    e wor oo s

    CIDNE

    ELISRD

    Service ToolsOrganizationalRisk Analyzer

    Palantir

    AIS

    GNRE

    AXIS Pro

    DetaineeTracker

    Geo Browser

    47

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    48/99

    Network Tools

    Analyst NotebookAnalyst Notebook is a commercial linkanalysis and visualization tool thatquickly turns large sets of disparate

    information into high-quality andactionable intelligence to prevent crimeand terrorism.

    RFS TrackerRFS Tracker is a database created in-

    house at the JIEDDO COIC to documentand track requests for support from thewarfighter.

    Organizational Risk AnalyzerOrganizational Risk Analyzer (ORA) is adynamic meta-network assessment andanalysis tool developed by CASOS atCarnegie Mellon. It contains hundreds ofsocial network, dynamic network metrics,trail metrics, procedures for grouping

    nodes, identifying local patterns,

    comparing and contrasting networks,groups, and individuals from a dynamicmeta-network perspective. ORA hasbeen used to examine how networkschange through space and time.

    UDOP/Google EarthA JIEDDO/COIC data-mining tool

    that supports the situationalawareness through the delivery ofproducts formatted for geospatialvisualization.

    Identity InstacheckIdentify Instacheck is a COIC tool

    that provides identity resolutionsupport and analysis by massingand fusing sources of contextualdata and results of biometric

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Global Name Recognition

    The Global Name Recognition System isa commercial product used by the COIC

    that constraints the best of breedtechnologies designed to addressspecific needs and demands ofmanaging, searching, analyzing, andcomparing multicultural name and data

    fields.

    Global Name Reference Encyclopedia

    (GNRE)The Global Name ReferenceEncyclopedia (GNRE) is a JIEDDOCOIC tool that includes much of thedetailed information that one needs inorder to perform name analysis work on

    networks.

    Detainee TrackerThe Detainee Tracker is a JIEDDO COICtool that searches for intelligence onreleased detainees in order to discover

    those actor who have reengaged on thebattlefield.

    .

    Data TrackerThe COIC tool is a web-deployable client application thatconverts tracking data in MSExcel format to Google Earth.

    Service Tools

    Service tools are the variouscollection and analytical systemsprocured by a service (Air Force,Navy, Army, or Marine Corps) thatenable a network analyst torepresent, analyze, and makeestimates on networks.

    48

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    49/99

    3D DashboardThe 3D Dashboard is a tool used by theJIEDDO COIC to view, navigate, andmark 3D map models.

    AXIS ProAxis Pro is a JIEDDO COIC tool that

    links entities to original data sources and

    enables advanced queries of datacontained with separate link nodalprojects.

    Combined Information Data Exchange

    Network Tools

    PalantirPalantir is a commercial tool used by theJIEDDO COIC that integrates, visualizes,and analyzes various data, to include

    structured, unstructured, relational,temporal, and geospatial data.

    ELISRDELISRD is an ISR analysis tool used bythe JIEDDO COIC that automatically

    correlates ISR coverage with user drivenpoints of interest or key events in theaterto highlight "exploitation opportunities."

    WebTASWebTAS is a Government Off-The-

    Shelf (GOTS) software toolkitproviding visualization, integrationand analysis of disparate data in aService Oriented Architecture (SOA)compliant platform. Built using non-proprietary software, WebTAS

    provides both Java thick client andweb browser-based access,visualization and analysis capabilities.

    ARC/GIS

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Combined Information Data Exchange

    Network (CIDNE) is the CENTCOM-directed reporting tool within Iraq andAfghanistan. CIDNE serves as theprimary bridge between disparatecommunities who might not otherwise

    share data by providing a standardizedreporting framework across intelligence

    and operations disciplines. This commonframework allows structured operationaland intelligence information to be sharedvertically and horizontally as part offlexible, user-defined workflow processes

    that collect, correlate, aggregate andexpose information.

    Web Threads

    Web Threads is a JIEDDO COIC tool toassist Counter Threat and Force

    Protection analysts corroborate humanintelligence reporting of Terrorist/Forceprotection threats through the fusion ofspace systems-generated data.

    CELLPACKCELLPACK is a program used by the

    JIEDDO COIC to analyze and data minea list of phone numbers in order to returnmultiple results as an HTML page.

    rely on accurate geographic

    information to make decisions. Itfacilitates collaboration and lets youeasily author data, maps, globes, andmodels on the desktop and servethem out for use on a desktop, in abrowser, or in the field, depending onthe needs of your organization.

    49

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    50/99

    Network Tools

    Automated Information System (AIS)Automated Information System is anassembly of computer hardware,software, and/or firmware configured tocollect, create, communicate, compute,disseminate, process, store and/orcontrol data or information.

    Geo BrowserGEO Browser is a tool used by theJIEDDO COIC for situational awarenessand data mining. The tool displays andcorrelates the COIC Multi-INT Core both

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    spat a y an tempora y.

    50

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    51/99

    ISRIdentify Collection

    Requirements

    External

    Internal

    Request forInformation

    ISR Sync Matrix

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    ISR Tasks

    51

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    ISR

  • 8/13/2019 Jieddo Atn Lexicon

    52/99

    ISR

    Provide ISR collectionrecommendationsTo provide ISR collectionrecommendation is to make informed

    suggestions to an authority on the propersequence and combination of ISRcollection assets based upon the missionat hand.

    External ISR collection capabilities

    External ISR collection capabilities arethose intelligence, surveillance anreconnaissance collection assets that are

    Request for Information (RFI)A Request for Information (RFI) is anyspecific, time-sensitive, ad hocrequirement for intelligence informationor products to support an ongoing crisisor operation not necessarily related to

    standing requirements or scheduledintelligence production. An RFI can be

    initiated to respond to operationalrequirements and will be validated inaccordance with the combatantcommands procedures.

    ISR Sync MatrixThe ISR sync matrix is a tool toplan and direct the collection effort.It may consist of a list of availablecollection means, plus brief notesor reminders on current intelligence

    requirements and specificinformation to collect. The S-2

    section initially prepares the ISRsynchronization matrix, which theISR working group completes, andthe S-3 authorizes as part of theISR plan.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    non-organ c o a un an mus erequested.

    Internal ISR collection capabilities

    Internal ISR collection capabilities arethose intelligence, surveillance andreconnaissance collection assets that areorganic or natural to a unit and thereforedo not have to be requested for their

    utilization.

    ISR tasks are the actions of the

    intelligence collection effort. Theseactions synchronize or integrate theplanning and operation of sensors,assets, and processing, exploitation, anddissemination systems in direct support

    of current and future operations.

    52

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    53/99

    Six pillars of Attack the Network:

    Understand the Operational

    Environment2

    Understand the Networks3

    Understand the Mission1

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Assess6

    Engage the Networks5

    Organize for the Fight4

    53

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    54/99

    Organize for the fight is to identify, organize and direct the resources(personnel, tools and equipment) that are needed to facilitate attack thenetwork operations.

    ORGANIZE FOR THE FIGHT4

    Training

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Organize for the Fight

    Identify Staff Requirements

    Prepare the Organization

    Manning

    Organize the Staff

    Integrate Enablers

    54

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Organize for the Fight

  • 8/13/2019 Jieddo Atn Lexicon

    55/99

    Organize for the Fight

    Prepare the Organization (forattacking the network)Preparing the organization is theplanning, training, organization andoutfitting of an organization with thepersonnel and capabilities necessary for

    conducting attack the networkoperations.

    Identify Staff RequirementsTo identify staff requirements is tocharacterize systematically and toquantify the skills and the training in

    ManningManning is the analysis of the skills andtheir quantities in persons that areneeded for conducting a specific AtNoperation or it is the process ofidentifying and providing such manpower

    for an operation.

    Organize the StaffTo organize the staff is to define thestructure, roles, and responsibilities of aunit and its leadership in order to conduct

    attack the network operations.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    staff to conduct attack the network

    operations.

    AtN TrainingAtN Training is the instruction ofpersonnel to enhance their capacity to

    perform specific AtN functions and tasks.It is also the exercise of one or more

    military units conducted to enhance theircombat readiness.

    theater, division, and tactical levels

    because their missions, theircomposition, and the enablers availableto them are different.

    Integrate EnablersTo integrate enablers is to blendefficiently and effectively the necessary

    organic and inorganic experts, tools, andmaterial for attack the networkoperations.

    55

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    56/99

    Training

    Service Requirements

    Skill Set/Professional

    CCDR Requirements

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Military Education Gaps

    Other Non-Military

    56

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Training

  • 8/13/2019 Jieddo Atn Lexicon

    57/99

    Training

    CCDR Requirements (for training)

    CCDR requirements are those skills ormaterials mandated by the CombatantCommand in anticipation of attack thenetwork operations in theater.

    Service Requirements (for training)Service requirements are those skills or

    materials mandated by the service (AirForce, Marine Corps, Army, or Navy) inanticipation of attack the networkoperations in theater.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Education Gaps

    Identifying PME gaps is the deliberateidentification of those skills necessary forconducting attack the network operationsand the inventory of the unit's currentskills against those necessary skills.

    Other Non-Military (training)

    Other non-military training are thoseskills or materials that are not standardor typical for the military, but should beacquired in anticipation of attack the

    network operations in theater (e.g.criminal forensic analysis).

    57

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    58/99

    Organize the Staff

    Threat Working Group

    Prosecution WorkingGroup

    Fusion Cells

    - -

    AtN Lead

    Division/MEF (Fwd)

    Theater

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    arge ng oar(Lethal/Non-Lethal)

    Assessment WorkingGroup

    58

    BCT/RCT

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Organize the Staff

  • 8/13/2019 Jieddo Atn Lexicon

    59/99

    g

    Organize the Theater Staff

    Organize the theater staff is to define thestructure, roles, and responsibilities forthe theater-level staff in order to conductattack the network operations.

    Organize Division StaffOrganizing the staff at the division-level

    is to define the structure, roles, andresponsibilities for the division-level staffin order to conduct attack the networkoperations."

    S-3 or Assistant S-3

    The S-3 or Assistant S-3 is theoperations officer of a battalion orregiment that typically would direct AtNoperations for the unit.

    Fusion Cells

    Theater level fusion centers called the

    Joint Intelligence Operations Center(JIOC), are a DoD and CombatantCommand (CCDR) level organization.The JIOC mission is to seamlesslyintegrate all DoD intelligence functions

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Organizing the staff at the regimental or

    brigade-level is to define the structure,roles, and responsibilities for the tactical-level staff in order to conduct attack thenetwork operations.

    AtN LeadThe Attack the Network Lead is thatindividual whose function is to organizeand supervise the attack the networkactivities within the staff, to include thevarious fusion cells and working groups.

    ,information are available across the DoD,

    and improving the integration ofintelligence with traditional operationsand plans functions to increase thespeed, power and combat effectivenessof DoD operations.

    Threat Working GroupThe threat working group is cross-functional by design and includesmembership from across the staff, liaisonpersonnel, and other partners outside theheadquarters. The threat working group

    identifies, prioritizes, and recommendstargets to the operational arm of the staff.

    59

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Organize the Staff

  • 8/13/2019 Jieddo Atn Lexicon

    60/99

    Prosecution Working Group

    The prosecution group is cross-functionalby design and includes membership fromacross the staff, liaison personnel, andother partners outside the headquarters.This working group identifies, prioritizes,

    and coordinates actions regardingtargets for non-lethal targeting by

    removing him from the battlefield byusing intelligence collection and analysisto build a case that will effectivelyprosecute him in a host nation's criminalsystem.

    Assessment Working GroupThe assessment working group is cross-functional by design and includesmembership from acrossthe staff, liaison personnel, and otherpartners outside the headquarters. The

    assessment working group fusesassessment information to provide a

    comprehensive assessment of theoperation. They consolidate and discussemerging trends, issues, and impactsrelating to events over the various

    planning horizons.

    .

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Targeting Board (Lethal/Non-lethal)

    A targeting board is a temporarygrouping of designated staffrepresentatives withdecision authority to coordinate andsynchronize the targeting process.

    60

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    61/99

    Integrate Enablers

    Reachback Capabilities

    Inte rate Host Nation

    Deployed Capabilities

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Capabilities

    Integrate US/PartnerCapabilities

    61

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Integrate Enablers

  • 8/13/2019 Jieddo Atn Lexicon

    62/99

    Deployed Capabilities

    Deployed capabilities are the personnel,tools, services, and material that areresident in theater versus the personnel,tools, services, and material that areavailable by reach back to the

    continental US for support.

    Reach Back CapabilitiesReach back capabilities are thoseexperts, tools, equipment, services, ormaterial that are provided byorganizations that are not forward

    Integrate US/Partner Capabilities

    The integration of US/Partner capabilitiesis achieved by blending efficiently intoattack the network operations therelevant national assets and services ofthe US and its coalition partners. These

    assets and services span the diplomatic,intelligence, legal, law enforcement,

    informational, military, and economicfunctions of commercial, government,and non-government organizations.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    .

    Integrate Host Nation CapabilitiesTo integrate Host Nation capabilities is toblend efficiently into attack the networkoperations the relevant national assetsand services of the host nation where the

    US and its coalition are operating. Theseassets and services span the diplomatic,intelligence, legal, law enforcement,informational, military, and economicfunctions of commercial, government,and non-government organizations.

    62

    UNCLASSIFIED//FOR OFFICIAL USE ONLYExamples

    Theater C-IEDTask Force

    Theater COIC

  • 8/13/2019 Jieddo Atn Lexicon

    63/99

    DSE

    CTF

    IntelligenceAgencies

    NATO/CCDR C-IED Cell

    USAID

    TheaterForensics DIA DTK Labs

    EmbassyTeam

    IDC ISR TaskForce

    CFSOCC

    Provincial

    CEXCTask Force

    Weapons C-IED Support

    Civil AffairsMilitary Police ORSA EW

    BCT/RCT

    Division or MEF (Fwd)

    Theater

    DeployedCa abilities

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    econs ruc onTeam

    C-IED SE

    n e genceTeams

    emen

    STT CID/LEP JET

    EOD CITP

    HTT

    AWG

    Multifunctional Team

    CombatHunter/USMC

    TacticalExploitation Team

    CAAT-ARoute Clearance

    Patrols

    COIST/CLIC

    Battalion Task Force

    Company Team

    63

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Deployed CapabilitiesInformation Dominance Center

  • 8/13/2019 Jieddo Atn Lexicon

    64/99

    Theater C-IED Task Force

    A Task Force designed and deployed tospecifically address or counter the IEDthreat in a given theater of operation.

    Theater COIC

    The theater COIC has the samemission - albeit with fewer personnel

    and tools - as the national COIC. Itprovides all source analytical productson IEDs in order to conduct counter-IEDoperations.

    Combined Explosives Exploitation

    Cell (CEXC)The Combined Explosives ExploitationCell (CEXC) is a U.S. Navy led taskorganized unit created to meet thetechnical and forensic intelligencerequirements for the combatant

    commander. The CEXC provides expert

    level technical and forensic exploitationand analysis of WTI- related material inorder to determine enemy tactics,identify IED trends and bomb makers,and assist in the development of

    Information Dominance Center(IDC)

    The Information Dominance Center(IDC) supports Army commandsand units worldwide through G-2channels for intelligence-reachoperations. The IDC can provide

    tailored intelligence products to thefield to meet their operational

    requirements on a quick responsebasis. The IDC monitors potentialtrouble spots, preparing to supportcontingency operations with

    intelligence related products. The

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    -

    measures. The CEXC conducts

    investigations of significant events;exploits IED devices, recoveringfrequencies from RC IED devices toupdate EW equipment; tests explosiveresidue; recovers and evaluatesforensic and biometric material;

    identifies IED trends and bomb makersignatures; creates profiles to betterenable offensive operations; andconducts limited component tracking.

    analytical technologies and

    emerging concepts to support Armywarfighters.

    Theater Forensics

    Theater forensics labs includeExpeditionary Forensics Labs(EFLs) and the CombinedExplosives Exploitation Cell(CEXC).

    ISR Task Force

    The ISR Task Force is establishedto maximize and optimize currentlydeployed ISR capabilities,especially those in Iraq and

    Afghanistan. 64

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Deployed Capabilities

  • 8/13/2019 Jieddo Atn Lexicon

    65/99

    DIA DTK Labs

    The DIA DTK Lab is a strategic-levelforensics lab for IEDs and CBRNE.

    CFSOCCCombined Forces Special Operations

    Component Command (CFSOCC) is theforward headquarters for SOCCENT and

    has operational control (OPCON) overSOF units in the CENTCOM AOR.

    Embassy Team

    The embassy team is the group of

    DSE

    The Division C-IED Support Element(DSE) coordinates and integrates C-IEDoperations within the division operationalarea, and integrates C-IED enablers,analysis, and products into the division

    targeting process in order to support thedivision in maintaining freedom of action

    and defeating insurgent networks. TheDivision C-IED Support element iscomprised of a mix of specialized C-IEDpersonnel such as CEXC, CITP,intelligence analysis, operations

    USAID

    US Agency for InternationalDevelopment (USAID) is anindependent federal governmentagency that receives overall foreignpolicy guidance from the Secretary of

    State. Our Work supports long-termand equitable economic growth and

    advances U.S. foreign policyobjectives by supporting economicgrowth, agriculture and trade; globalhealth; and, democracy, conflictprevention and humanitarian

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    ,the United States Mission in country and

    operates under the oversight of theDepartment of States.

    NATO/CCDR C-IED Cell

    The Counter-IED team provided byNATO or the CCRD that provides C-IEDanalysis, C-IED services, and liaison toother C-IED capabilities.

    ,with intelligence and operations staff.

    CTFCounter threat finance is the prevention,inhibition, or interdiction of thegeneration, movement, storage,

    management, control, investment,accounting, distribution, disbursement,and expenditure of funds, assets, and/orvaluable commodities that can be usedto fund, finance, pay for, or facilitatelethal and non-lethal actions and

    activities by illicit adversaries andnetworks.

    .

    Intelligence AgenciesSixteen national-level agenciesspecialize in the collection andanalysis of intelligence are relevant toattack the network operations. Most

    provide some sort of deployed orreach back capability to warfighters intheater. Those agencies include CIA,DIA, NGA, NSA and others.

    65

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Deployed Capabilities

  • 8/13/2019 Jieddo Atn Lexicon

    66/99

    C-IED Support Element

    The C-IED Support Elements are teamsdesigned to assist the maneuver unit inthe planning, coordination and integrationof their immediate C-IED operations, andthey act as a liaison to the C-IED TF. The

    C-IED support elements also coordinatethe units IED infrastructure targeting

    efforts.

    Electronic WarfareElectronic Warfare are those military

    actions involving the use of

    Provincial Reconstruction Team

    A Provincial Reconstruction Team(PRT) helps stabilize theoperational environment in aprovince or locality through itscombined diplomatic, informational,

    military, and economic capabilities.It combines representatives from

    interagency and internationalpartners into a cohesive unitcapable of independentlyconducting operations to stabilizethe environment by enhancing the

    Military Police

    Military police are those law enforcementexperts that are organic to the militarywith skills relevant to AtN, to includeweapons handling, small-unit tactics,special weapons employment, convoy

    escort, riot control, traffic control,prisoner and detainee handling and

    processing, police intelligence, criminalintelligence, criminal handling, stationsmanagement.

    Weapons Intelligence Teams (WIT)

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    control the electromagnetic spectrum or

    to attack the enemy. Electronic warfareconsists of three functions: electronicattack, electronic protection, andelectronic warfare support. Some EW

    actions are successful in disrupting IEDdevices.

    the Host Nation government.

    -IED teams are assigned to the C-IED TF.

    Normally an EOD company, with a directsupport WIT, will be placed in directsupport of each brigade combat team.They will be placed OPCON to the TFs

    C-IED commander.

    ORSAOperational Research/ StatisticalAnalysis is the analytical study ofmilitary problems undertaken to provideresponsible commanders and staff

    agencies with a scientific basis fordecision on action to improve militaryoperations.

    66

  • 8/13/2019 Jieddo Atn Lexicon

    67/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Deployed Capabilities

  • 8/13/2019 Jieddo Atn Lexicon

    68/99

    Joint Expeditionary Team

    A Joint Expeditionary Team (JET)supports all echelons of the joint force,interagency, and multinational partners.Its purpose is to train, advise, observe,analyze, and to collect and disseminate

    tactics, techniques, and procedures(TTPs), lessons learned, and best

    practices to mitigate the IED threat. It willnormally operate in two to three manteams and be placed OPCON to the TFsC-IED commander.

    AWG

    The Asymmetric Warfare Group(AWG) is a Sensitive Activity under theHQDA G-3/5/7 that providesoperational advisory assistance in

    support of Army and joint forcecommanders. The AWG was createdby the Army to enhance the combat

    effectiveness of the operating forceand enable the defeat of asymmetricthreats to include IEDs. The AWGdeploys its forces worldwide to

    observe, assess and analyze

    C-IED/SE

    The C-CIED Site Exploitation teamsrecognize, collect, process,preserve, or analyze information,personnel, and materiel found duringthe conduct of C-IED operations for

    follow-on use by the intelligence orwarfighting functions of the staff.

    Multi-functional TeamMulti-functional teams are createdout of personnel that are organic to

    the Division. The teams combine

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    operating environment and the threat.

    It also assists in the development,dissemination and integration ofmaterial and non material solutionsincluding countermeasures. The AWG

    serves as an agent of changeproviding key observations andperspectives for leaders whenconsidering policy and resourcedecisions.

    , ,perform time-sensitive targeting.

    Counterinsurgency Advisory andAssistance Team Afghanistan(CAAT-A)

    The CAAT-A's mission is to assistcommanders in integrating allaspects of COIN operations. Itspurpose is to assist Commanders,identify trends, and disseminatelessons learned to facilitate ISAForganizational and cultural change.

    68

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Deployed Capabilities

  • 8/13/2019 Jieddo Atn Lexicon

    69/99

    Tactical Exploitation Team

    Tactical Exploitation Teams deploy fromthe C-IED task forces on short-notice to

    provide site exploitation. Site exploitationare those activities that recognize,collect, process, preserve, or analyzeinformation, personnel, and materielfound during the conduct of C-IED

    operations.

    Route Clearance PatrolsRoute clearance patrols detect,investigate, mark, report, and neutralize

    Combat Hunter (USMC)

    Combat Hunter is a ten-day courseprovided by the Marine Corps to create ahunting mindset by integrating enhancedobservation, combat profiling, andcombat tracking skills in order to produce

    a more ethically minded, tacticallycunning, and lethal infantryman that is

    better prepared to succeed across therange of military operations.

    COIST/CLICCompany Intelligence Support Teams

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    obstacles along a defined route to enable

    assured mobility for the maneuvercommander. It is a combined armsoperation that relies on a reconnaissanceof the route to be cleared. The goal ofroute clearance is to detect andneutralize EH and improve and know theroute to be able to conduct future changedetection operations.

    -Cells (CLICs) are a recently developed

    capability to provide analytical products(that have typically been resident at thebattalion level and higher) down to thecompany-level.

    69

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Examples

    National & Service Intel

    Law Enforcement

  • 8/13/2019 Jieddo Atn Lexicon

    70/99

    CCDR

    C-IED Cell

    CALL

    NATO C-IEDCell

    JKnIFE

    CITP AAAPReachback

    Capabilities

    JTCOIC

    JET

    Service KnowledgeManagement Database

    NATO AtN Enablers

    CCDR/Interagency

    NGIC

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Wargaming

    SAT

    Team Phoenix

    CoalitionIntegration

    SOF-TFComprehensiveLook Team

    TBDUNS

    JUONS In-TheaterContract Soln

    ome r csWTI

    Team-L

    CPAT/ORSA

    Red Team

    InteragencyCollaboration

    InformationAssurance

    CFA

    ForeignDisclosure

    70

    Academia

    AWG

    TEDAC

    COIC

    Human Terrain System

    Mission SpecificMaterial

    JCOE/Service COEs

    TPE

    Capability Gap &Solution Analysis

    RFI

    PEO-PMs

  • 8/13/2019 Jieddo Atn Lexicon

    71/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    NGIC

    Reachback Capabilities

    CCDR/I t C biliti

  • 8/13/2019 Jieddo Atn Lexicon

    72/99

    NGIC

    The National Ground IntelligenceCenter, located in Charlottesville,Virginia, is assigned to INSCOM and isunder the operational control (OPCON)of the Army G-2. NGIC is the ServiceNational production center for groundforces intelligence and has DODIPP

    primary production responsibility formost ground force intelligencefunctional codes.

    CITP

    WTI

    Weapons Technical Intelligence is acategory of intelligence derived fromthe technical and forensic collectionand exploitation of IEDs, associatedcomponents, improvised weapons,

    and other weapon systems.

    AAAPThe Anti-Armor Analysis Program(AAAP) is an analytic program runby the National Ground Intelligence

    Center that analyzes and discerns

    CCDR/Interagency Capabilities

    The various skills and services that areinorganic to deployed forces but areprovided by the CombatantCommander or partner agencies of theUSG.

    CCDR C-IED Cell

    The CCDR C-IED cell is the counter-IED team formed and staffed by CCDRthat provides C-IED analysis, C-IEDservices, and liaison to other C-IEDcapabilities.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Program (CITP) is located at the NGIC

    in Charlottesville, Virginia and conductsWTI-related identity analysis, biometricanalysis, and device or componentanalysis to support the targeting of keyindividuals in adversary IED networks.They work closely with the NGICs

    biometrics effort to rapidly matchindividuals to specific IED incidents by

    matching and assessing latent prints,fibers, and other data.

    ,manufacture, procurement and use

    of anti-armor weapons.

    BiometricsBiometrics is the process of

    recognizing an individual based onmeasurable anatomical,physiological, and behavioralcharacteristics.

    JTCOICThe Joint Training Counter-IEDOperations Integration Center(JTCOIC) was officially opened in April2009 to ensure Army and jointorganizations are aware of and able to

    employ rapidly fielded counter-IEDcapabilities. Established as apartnership between JIEDDO and

    TRADOC, the state-of-the-art centercombines the operational focus of theDepartment of Defense's lead counter-

    IED organization with the trainingresources and expertise of the Army'spremier training command.

    72

  • 8/13/2019 Jieddo Atn Lexicon

    73/99

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Reachback Capabilities

    Coalition Integration Wargaming through adversarial emulation

  • 8/13/2019 Jieddo Atn Lexicon

    74/99

    Coalition Integration

    The COIC facilitates coalitionintegration by integrating coalitionmulti-discipline databases into itsnetwork analysis process.

    COIC Pattern Analysis Team(CPAT)

    The COIC Pattern Analysis Team(CPAT) identifies, analyzes, andresolves tactical patterns in support ofJIEDDO/COIC and its partners in theDefense, Intelligence, and National

    Wargaming

    Wargaming from the JIEDDO COICprovides standing, on-demandwargaming capability to enhance C-IED strategy development usingthreat scenarios and modeling and

    simulation resources to assess futureoperations in the context of friendly

    and enemy courses of action (COA),concepts of operations (CONOPS),tactics, techniques, and procedures(TTP), and emerging technologies.

    through adversarial emulation,

    independent analysis, and criticalreview in support of current operations,plans, and capabilities for committed

    units and JIEDDO in order to enhancethe Counter-IED fight.

    Team-L

    Team L is a Comprehensive LookTeam at the JIEDDO COIC thatsupports offensive operations focused

    on attacking networks as part of theoverall Joint Improvised Explosive

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    ,tactical pattern analysis methods toother problems in response torequests for support from authorizedusers worldwide.

    Team Phoenix

    A military organization that integratesintelligence, operations, andtechnology with training to enable

    pre-emptive analysis to attacknetworks.

    The mission of the Red Team at

    JIEDDO's COIC is to provide itsparent organization with a continuousprocess of analysis and counter-analysis that assesses: the likely

    enemy operational and tactical TTPinnovations; countermeasures;wargaming the effectiveness of thosecountermeasures. The Red Team

    also identifies gaps, challengesassumptions and predicts 2nd and3rd order effects. The Red Team

    does that

    ,Counter-IED Operations Integration

    Center (COIC) C-IED supportstructure.

    Interagency CollaborationThe JIEDDO COIC hosts andcollaborates with multiple agencyliaisons to facilitate integration ofintelligence community capabilities in

    support of warfighter operations.

    Special Operations Forces TaskForce (SOF-TF)SOF-TF Provides multi-disciplineintelligence analysis, fusion andintegration to support SOCOM

    Operations. 74

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Reachback Capabilities

    I f ti A Human Terrain System (HTS) Request for Information (RFI)

  • 8/13/2019 Jieddo Atn Lexicon

    75/99

    Information Assurance

    COIC Information assurance supportsintegration of innovative advancedtechnologies and methodologies required

    to better identify threat networks throughgaining interim authority to operate ongovernment communications systems(Source: COIC Support Capabilities

    Document).

    Foreign Disclosure

    Foreign disclosure supports the transferof classified information through

    Human Terrain System (HTS)

    The Human Terrain System (HTS) is aproof of concept program, run by theU.S. Army Training and Doctrine

    Command (TRADOC), and serves thejoint community. The near term focus ofthe HTS program is to improve themilitarys ability to understand the highly

    complex local socio-cultural environmentin areas where they are deployed.

    Mission Specific MaterialItems that are necessary for a mission,

    -

    Request for Information (RFI)

    A Request for Information (RFI) isany specific, time-sensitive, ad hocrequirement for intelligence

    information or products to supportan ongoing crisis or operation notnecessarily related to standingrequirements or scheduled

    intelligence production. An RFI canbe initiated to respond to operationalrequirements and will be validated in

    accordance with the combatantcommands procedures.

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    approve c anne s o an au or zerepresentative of a foreign government or

    international organization.

    Critical Factors Analysis (CFA)Critical Factors Analysis: The CriticalFactors Analysis (CFA) ComprehensiveLook Team (CLT) analyzes Blue, Red,Green, and White critical capabilities

    (CC), critical requirements (CR) anddeduces critical vulnerabilities (CV) for

    exploitation to facilitate US forceinterests against threat networks atstrategic, operational and tactical levels.

    - ,they cannot be accurately identified inadvance.

    Theater Provided Equipment (TPE)

    Theater Provided Equipment (TPE) isequipment that is not organic to the unitnor does the unit have to procure it foritself; the Combatant Commander or theJTF commander provides the equipment

    to the deployed unit.

    75

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Reachback Capabilities

    Peace Enforcement Universal Needs Statement (UNS)Capability Gap & Solution Analysis

  • 8/13/2019 Jieddo Atn Lexicon

    76/99

    Peace Enforcement

    Operations/Peace-Making (PEO-PM)Peace Enforcement Operations(PEOs) are generally coercive innature and rely on the threat of or use

    of force; however, PEOs also rely onthe development of working

    relationships with the local population.The impartiality with which the peaceoperating force treats all parties andthe nature of its objectives separatePEO from COIN and

    -

    Universal Needs Statement (UNS)

    An universal needs statement (UNS)is an official request submitted to aservice's requirements process bywhich a unit makes a request forcurrent and future wartime

    capabilities.

    In-theater Contract SolutionThe provision of basic goods, supportservices, minor construction, andother services that occur throughcontracting officers and from vendors

    Capability Gap & Solution Analysis

    Capability gap & solution analysis is apart of the systematic procurementprocess established by the DOD toidentify a missing or incompletecapabilities and the solutions to

    provide the capability. The FunctionalSolutions Analysis follows the

    Functional Need Analysis thatidentifies the capability requirement indetail.

    Joint Urgent Operational Need

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    .making (PM) is a diplomatic processthat may include mediation,negotiation, or conciliation. PM effortsmay take advantage of seams ininsurgent organizations byestablishing separate agreements

    with individual organizations orgroups that make up an insurgencymovement. Commanders should

    constantly seek opportunities for PMthroughout COIN.

    .

    To Be Determined CapabilitiesCapabilities that will be needed in thefuture, but at the current time areindeterminable.

    AcademiaAcademia is the life, community, orworld of teachers, schools, and

    education.

    A Joint Urgent Operational NeedStatement (JUONS) is an urgentoperational need identified by acombatant commander involved in anongoing named operation. A JUONS

    main purpose is to identify andsubsequently gain Joint Staffvalidation and resourcing of asolution, usually within days or

    weeks, to meet a specific high-prioritycombatant commander need.

    76

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

  • 8/13/2019 Jieddo Atn Lexicon

    77/99

    HN Info and

    HN IntelligenceDiplomatic

    Examples

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Capabilities

    CommunicationInfrastructure

    Enforcement

    Economic/Business

    DevelopmentMilitary

    77

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    Integrate Host NationCapabilities

    Diplomatic Host Nation Information and

  • 8/13/2019 Jieddo Atn Lexicon

    78/99

    Diplomatic

    Actions taken by State Department orsenior US/coalition military leaders toalign, coordinate, and harmonize thediplomatic efforts with those of the hostnation to maintain common purposeand achieve common goals andobjectives.

    Host Nation IntelligenceHost Nation Intelligence is the nationalgovernments traditional informationresources and the integrating of central

    Host Nation Information and

    Communication InfrastructureHost Nation information andcommunications infrastructure which may

    be written, visual, audio, word-of-mouth,etc. and avoiding noticeably foreignmessaging to legitimize localgovernment. Be conscious of tribal,

    ethnic, religious, professional, school,messaging venues/distribution channels

    (etc. mosques, schools, tribal, localmedium).

    UNCLASSIFIED//FOR OFFICIAL USE ONLY

    capabilities.

    Host Nation Legal/Law EnforcementHost Nation Law Enforcementcapabilities are those host nationfaculties that provide for the publicsafety.

    Actions taken by US and coalition military

    leaders to align, coordinate, andsynchronize military planning, operations

    and capabilities with those of the hostnation to achieve agreed upon militarygoals and objectives.

    Economic/Business DevelopmentActions taken by US and coalition

    government agents (like USA