1.jp2 0
1.jp2 0
1.jp2 0
Joint Intelligence
22 October 2013
This revised edition of JP 2-0, Joint Intelligence, reflects the current guidance for
conducting joint and multinational intelligence activities across the range of military
operations. This vital keystone publication forms the core of joint intelligence doctrine and
lays the foundation for our forces’ ability to fully integrate operations, plans, and intelligence
into a cohesive team. The overarching constructs and principles contained in this publication
provide a common perspective from which to plan and execute joint intelligence operations
in cooperation with our multinational partners, other US Government agencies, and
intergovernmental and nongovernmental organizations.
As our Nation continues into the 21st century, joint intelligence organizations and
capabilities will continue to evolve as our forces transform to meet emerging challenges.
The guidance in this publication will enable current and future leaders of the Armed Forces
of the United States to organize, train, and execute worldwide missions to counter the threats
posed by adaptive adversaries.
I encourage all leaders to study and understand the doctrinal concepts and principles
contained in this publication and to teach these to your subordinates. Only then will we be
able to fully exploit the remarkable military potential inherent in our joint teams. To that
end, I request you ensure the widest possible distribution of this keystone joint publication. I
further request that you actively promote the use of all joint publications at every
opportunity.
MARTIN E. DEMPSEY
General, U.S. Army
PREFACE
1. Scope
2. Purpose
This publication has been prepared under the direction of the Chairman of the Joint
Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance
of the Armed Forces of the United States in joint operations and provides the doctrinal basis
for US military coordination with other US Government departments and agencies during
operations and for US military involvement in multinational operations. It provides military
guidance for the exercise of authority by combatant commanders and other joint force
commanders (JFCs) and prescribes joint doctrine for operations, education, and training. It
provides military guidance for use by the Armed Forces in preparing their appropriate plans.
It is not the intent of this publication to restrict the authority of the JFC from organizing the
force and executing the mission in a manner the JFC deems most appropriate to ensure unity
of effort in the accomplishment of the overall objective.
3. Application
a. Joint doctrine established in this publication applies to the joint staff, commanders of
combatant commands, subunified commands, joint task forces, subordinate components of
these commands, the Services, and combat support agencies.
i
Preface
Intentionally Blank
ii JP 2-0
SUMMARY OF CHANGES
REVISION OF JOINT PUBLICATION 2-0
DATED 22 JUNE 2007
• Explained the joint intelligence process and rewrote the section to better
develop its characteristics.
• Added the term “sociocultural analysis (SCA).” The phrase “other relevant
actors” was included in the SCA explanation to cover not only direct
adversaries, but any person or group that may aid the adversary.
• Added the definition “collection strategy” and modified the terms “collection
plan” and “collection requirement.”
• Changed the term “indication and warning” to “warning” and modified the
definition of “warning.”
• Clarified the distinction between the term “red cell” and “red team.”
iii
Summary of Changes
Intentionally Blank
iv JP 2-0
TABLE OF CONTENTS
EXECUTIVE SUMMARY ............................................................................................... ix
CHAPTER I
THE NATURE OF INTELLIGENCE
CHAPTER II
PRINCIPLES OF JOINT INTELLIGENCE
Introduction ................................................................................................................II-1
Perspective .................................................................................................................II-1
Synchronization—Synchronize Intelligence with Plans and Operations ..................II-2
Integrity—Remain Intellectually Hones ....................................................................II-3
Unity of Effort—Cooperate to Achieve a Common Objective .................................II-4
Prioritization—Prioritize Requirements Based on Commander’s Guidance.............II-6
Excellence—Strive to Achieve the Highest Standards of Quality.............................II-6
Prediction—Accept the Risk of Predicting Adversary Intentions .............................II-9
Agility—Remain Flexible and Adapt to Changing Situations ................................II-10
Collaboration—Leverage Expertise of Diverse Analytic Resources.......................II-11
Fusion—Exploit All Sources of Information and Intelligence ................................II-12
CHAPTER III
INTELLIGENCE ORGANIZATIONS AND RESPONSIBILITIES
CHAPTER IV
INTELLIGENCE SUPPORT TO PLANNING, EXECUTING, AND ASSESSING
JOINT OPERATIONS
v
Table of Contents
CHAPTER V
JOINT, INTERAGENCY, AND MULTINATIONAL INTELLIGENCE SHARING
AND COOPERATION
APPENDIX
GLOSSARY
FIGURE
vi JP 2-0
Table of Contents
vii
Table of Contents
Intentionally Blank
viii JP 2-0
EXECUTIVE SUMMARY
COMMANDER’S OVERVIEW
Information on its own may The management and integration of intelligence into
be of utility to the military operations are inherent responsibilities of
commander, but when command. Information is of greatest value when it
related to other information contributes to the commander’s decision-making process
about the operational by providing reasoned insight into future conditions or
environment and situations. Intelligence provides the commander a variety
considered in the light of of assessments and estimates that facilitate understanding
past experience, it gives rise the operational environment (OE). Intelligence includes
to a new understanding of the organizations, capabilities, and processes involved in
the information, which may the collection, processing, exploitation, analysis, and
be termed “intelligence.” dissemination of information or finished intelligence.
Intelligence products provide users with the information
that has been collected and analyzed based on their
requirements.
The Joint Intelligence The joint intelligence process provides the basis for
Process common intelligence terminology and procedures. It
ix
Executive Summary
Intelligence and the Levels Strategic Intelligence consist of the national strategic
of War intelligence produced for the President, the National
Security Council, Congress, Secretary of Defense
(SecDef), senior military leaders, combatant commanders
...three levels of war: (CCDRs), and other US Government departments and
strategic, operational, and agencies, and theater strategic intelligence that supports
tactical...All levels of war joint operations across the range of military operations,
have corresponding levels assesses the current situation, and estimates future
of intelligence operations. capabilities and intentions of adversaries that could affect
the national security and US or allied interests.
Operational intelligence is primarily used by CCDRs
and subordinate joint force commanders (JFCs) and their
component commanders. Tactical intelligence is used by
commanders, planners, and operators for planning and
conducting battles, engagements, and special missions.
x JP 2-0
Executive Summary
Prediction—(Accept the JFCs require and expect timely intelligence estimates that
Risk of Predicting accurately identify adversary intentions, support offensive
Adversary Intentions) and/or defensive operations, and predict adversary future
courses of action (COAs) in sufficient detail as to be
actionable.
Agility—(Remain Flexible Agility is the ability to quickly shift focus and bring to
and Adapt to Changing bear the skill sets necessary to address the new problem at
Situations) hand while simultaneously continuing critical preexisting
work. Intelligence structures, methodologies, databases,
products, and personnel should be sufficiently agile and
flexible to meet changing operational situations, needs,
priorities, and opportunities.
xi
Executive Summary
Defense Intelligence and There are a variety of Department of Defense (DOD) and
the Intelligence Community national intelligence organizations capable of providing
support to joint operations. During most joint operations,
JFCs will require federated support from the intelligence
community (IC) to develop a full understanding of the
OE. The Director of National Intelligence (DNI) has
overall responsibility for intelligence support to the
President and the day-to-day management of the IC.
The intelligence community Under Secretary of Defense for Intelligence (USD[I])
consists of the 17 member exercises SecDef’s authority, direction, and control over
organizations (Defense the DOD agencies and DOD field activities that are
Intelligence Agency, defense intelligence, counterintelligence (CI), security,
National Security Agency, exercise, planning, policy, and strategic oversight over all
National Geospatial DOD intelligence, CI, and security policy, plans, and
Intelligence Agency, programs. The Director of the Defense Intelligence
National Reconnaissance Agency (DIA) advises SecDef and Deputy Secretary of
Office, Army Intelligence, Defense, Chairman of the Joint Chiefs of Staff (CJCS),
Navy Intelligence, Air CCDRs, and USD(I) on all matters concerning military
Force Intelligence, Marine and military-related intelligence and is the principal DOD
Corps Intelligence, Central intelligence representative in the national foreign
Intelligence Agency, intelligence process. Director DIA is the Defense
Department of State, Collection Manager; Commander, Joint Functional
Department of Energy, Component Command for Intelligence, Surveillance, and
Federal Bureau of Reconnaissance (JFCC-ISR); Program Manager for the
Investigation, Department Joint Reserve Intelligence Program; Defense CI Manager;
of the Treasury, Coast and Defense Human Intelligence Manager. The Joint
Guard Intelligence, Staff Directorate for Intelligence, J-2, provides
Department of Homeland continuous intelligence support to the CJCS, Joint Staff,
Security, the Drug National Military Command Center, and combatant
Enforcement commands (CCMDs) in the areas of targeting, global
Administration, and the warning intelligence, and current intelligence. The J-2
Office of Director of also has the responsibility for coordinating the
National Intelligence). intelligence planning (IP) activities of the Services and
intelligence combat support agencies (CSAs) in support
of CCDRs. The Service Chiefs, their intelligence and CI
chiefs, and staffs provide intelligence and CI support for
departmental missions related to military systems,
equipment, and training.
Defense and Joint In addition to the J-2 staffs at every joint level of
Intelligence Organizations command, the key organizations in the defense
intelligence architecture are the CCMD joint intelligence
operations centers (JIOCs), the joint task force (JTF) joint
intelligence support elements (JISEs), JFCC-ISR, and the
xii JP 2-0
Executive Summary
Command and Staff Commanders have key roles and responsibilities in the
Intelligence Responsibilities planning and conduct of intelligence operations. JFCs
organize their joint force staff and assign responsibilities
as necessary to ensure unity of effort and mission
accomplishment. Commanders’ intelligence
responsibilities include: understand intelligence doctrine,
capabilities, and limitations; provide planning guidance;
define the area of interest (AOI); and specify intelligence
priorities. The J-2 assists the JFC in developing strategy,
planning operations and campaigns, and tasking
intelligence assets, for effective joint and multinational
xiii
Executive Summary
Joint Operation Planning During the joint operation planning process, CCMD J-2s
lead development of annex B (Intelligence). Annex B is
the intelligence annex to a plan or order that provides
detailed information on the adversary situation,
establishes priorities, assigns intelligence tasks, identifies
required intelligence products, requests support from
higher echelons, describes the concept of intelligence
operations, and specifies intelligence procedures. The
joint force J-2 products normally include but are not
limited to the following: a description of the operational
area; an evaluation of the adversary; identification of
adversary centers of gravity; prioritized adversary COAs;
event templates; named AOIs and target AOIs; a decision
support template; wargame support; and an intelligence
synchronization matrix.
The Intelligence Planning IP activities are generally organized along two lines of
Process effort (LOEs): providing intelligence support to joint
operation planning and planning intelligence operations.
IP activities along the providing intelligence support to
joint operation planning LOE include the production of
intelligence assessments and estimates of adversary
intentions, capabilities, and COAs. Specific outputs of
this LOE are the DIA-produced dynamic threat
assessment, or theater intelligence assessment, and the
development of tailored products from the CCMD’s
JIPOE process that culminate in the production and
maintenance of the intelligence estimate. IP activities
along the planning intelligence operations LOE include
identifying information gaps, prioritizing intelligence
requirements, developing federated production and
integrated collection plans, and assessing intelligence
capabilities for the purpose of identifying shortfalls and
mitigation strategies. Specific outputs of this LOE are the
CCMD J-2 staff estimate, which identifies available
xiv JP 2-0
Executive Summary
Intelligence Support to Plan Commanders continuously assess the OE and the progress
Assessment and Decision of their campaigns, and then compare them to their initial
Making vision and intent. The joint force J-2, through the CCMD
JIOC, assesses adversary capabilities, vulnerabilities, and
intentions and monitors the OE. The J-2 helps the
commander and staff decide what aspects of the OE to
measure and how to measure them to determine progress
toward accomplishing a task, creating an effect, or
achieving an objective. Intelligence personnel use the
JIPOE process to provide JFCs and their staffs with a
detailed understanding of the adversary and other relevant
aspects of the OE.
xv
Executive Summary
Principles for Multinational In most multinational operations, the JFC will be required
Intelligence Sharing to share intelligence with foreign military forces and to
coordinate receiving intelligence from those forces. The
principles for multinational intelligence sharing are: align
with national disclosure policy; maintain unity of effort;
make adjustments to resolve significant differences in
intelligence doctrine and procedures; plan early and plan
concurrently; share necessary information; and conduct
complementary operations.
CONCLUSION
xvi JP 2-0
CHAPTER I
THE NATURE OF INTELLIGENCE
“By ‘intelligence’ we mean every sort of information about the enemy and his
country—the basis, in short, of our own plans and operations.”
1. Introduction
The management of and integration of intelligence into military operations are inherent
responsibilities of command. These responsibilities are performed at every echelon of
command and across the range of military operations. Technology enables joint force and
component commanders and their staffs to access in near-real-time, very large amounts of
information relating to aspects of the operational environment (OE)—the composite of the
conditions, circumstances, and influences that affect the employment of capabilities and bear
on the decisions of the commander. Information covering a wide range of issues relating to
friendly, neutral, and adversary forces and the civilian populace will be available throughout
the joint force. There will also be a large volume of information concerning weather, terrain,
cultural influences, and other aspects of the OE. This mass of information can be distilled
into intelligence to support a predictive estimate of the situation, as well as adversary
capabilities and intentions. It is this estimative nature of intelligence that distinguishes it
from the mass of other information available to the commander.
I-1
Chapter I
c. Intelligence is not an exact science; intelligence analysts will have some uncertainty
as they assess the OE, as should the commander and staff as they plan and execute
operations. Intelligence, as the synthesis of quantitative analysis and qualitative judgment is
subject to competing interpretation. It is therefore important that intelligence analysts
communicate the degree of confidence they have in their analytic conclusions. Such
communication of analytic confidence helps intelligence consumers in deciding how much
weight to place on intelligence assessments when making a decision. One methodology
intelligence personnel may use to assign a confidence level to their analytic conclusions or
intelligence assessments is discussed in Appendix A, “Intelligence Confidence Levels in
Analytic Judgments.”
I-2 JP 2-0
The Nature of Intelligence
For further information, see Joint Publication (JP) 2-01.3, Joint Intelligence Preparation of
the Operational Environment.
a. Inform the Commander. Intelligence directly supports the joint force commander
(JFC) in planning, executing, and assessing the impact of those operations. The J-2 analyzes
the adversary and other relevant aspects of the OE, and produces assessments on a
continuing basis to support the commander in creating and/or exploiting opportunities to
accomplish friendly force objectives. For example, to maintain the initiative, the JFC will
seek to understand and potentially influence the adversary’s decision-making process (e.g.,
the JFC will seek new and accurate intelligence that will enable friendly forces to take
effective action faster than the adversary). The J-2 should assess the characteristics of the
adversary’s decision-making process and identify weaknesses that may be exploited. The
J-2 should disseminate intelligence in a timely manner to the JFC, staff, and components.
I-3
Chapter I
c. Identify, Define, and Nominate Objectives. All aspects of military planning are
dependent on the determination of clearly defined, achievable, and measurable objectives.
When identifying and nominating objectives, the J-2 should understand the command’s
responsibilities; the JFC’s mission and intent; means available, including host nation and
multinational forces, interagency partners, nongovernmental organizations (NGOs), and
intergovernmental organizations (IGOs); the adversary; weather; and characteristics of the
operational area. Intelligence should increase the commander’s understanding of the threat
and adversary’s probable intentions, end states, objectives, most likely and most dangerous
COAs, strengths, and critical capabilities. This allows the J-2 to recommend objectives,
requirements, and centers of gravity (COGs). Once these objectives are approved by the
commander, the J-2 must continuously review them with respect to the adversary and the
changing situation to determine whether they remain relevant to the commander’s intent.
d. Support the Planning and Execution of Operations. Commanders and staffs at all
levels require intelligence to plan, direct, conduct, and assess operations. This intelligence is
crucial to commanders, staffs, and components in identifying and selecting specific
objectives and targets, associating them with desired effects, and determining the means to
accomplish the JFC’s overall mission. The J-2 supports the execution of the plan with the
strategic, operational, and tactical intelligence needed to sustain the operation.
I-4 JP 2-0
The Nature of Intelligence
The joint intelligence process is encompassed within the 2.0 series of tasks in Chairman of
the Joint Chiefs of Staff Manual (CJCSM) 3500.04, Universal Joint Task Manual, which
provides a common language and reference system to communicate mission requirements.
I-5
Chapter I
Evaluation
Dissemination Planning
and and
Integration Direction
Analysis Mission
and Collection
Production
Processing
and
Exploitation
and Feedback
Through this effort, intelligence planners determine the personnel, equipment, and
intelligence architecture essential for support to joint operations. When a particular crisis
unfolds, commanders and their staffs develop an operation order (OPORD). Intelligence
input to the OPORD includes an adjusted and updated threat scenario and an intelligence
annex that tailors intelligence support to the nature and scope of operations to be conducted.
Assessments conducted by intelligence personnel provide operation planners feedback for
future planning for subsequent operations.
Intelligence support to joint operation planning is discussed in greater detail in Chapter IV,
“Intelligence Support to Planning, Executing, and Assessing Joint Operations.”
I-6 JP 2-0
The Nature of Intelligence
KEY TERM:
(PIRs). However, the J-2 has overall staff responsibility for consolidating intelligence
requirement nominations from the staff and for making the overall recommendation to the
commander regarding their approval and their relative order of priority. Intelligence
requirements designated as PIRs receive increased levels of intelligence support and priority
in the allocation of intelligence resources while those not designated as PIR are satisfied as
time and resources allow. Ultimately, the commander designates PIRs, which together with
friendly force information requirements (FFIRs), constitute the commander’s critical
information requirements (CCIRs). Based on identified intelligence requirements (to include
PIRs), the staff develops a series of more specific questions known as information
requirements—those items of information that must be collected and processed to develop
the intelligence required by the commander. A subset of information requirements that are
related to and would answer a PIR are known as essential elements of information
(EEIs)—the most critical information requirements regarding the adversary and the OE
needed by the commander to assist in reaching a decision. The development of information
requirements (to include EEIs) leads to the generation of requests for information (RFIs). If
the required information is already available, a production requirement may be initiated, and
if the required information is not available, a collection requirement is initiated. Figure I-4
illustrates this process.
(a) The JFC uses PIRs as a tool to designate intelligence that is critical to
decision making, and to focus the intelligence system and the allocation of available
intelligence capabilities. PIR nominations consider the mission, commander’s intent,
operational objectives, and the time frame of expected operations. The JFC develops PIRs
that support critical decisions over the course of an operation, and for complex phased
operations, develops separate PIRs for each phase. As an operation ensues, the commander
updates PIRs to address new requirements or concerns, and as the situation changes, either
eliminates some or develops others. A JFC’s total number of PIRs for any phase of an
operation should reflect a reasonable balance between mission critical requirements and
finite intelligence support capability. Because of this, PIRs should be ranked and
disseminated in priority of importance. Other valid intelligence requirements are submitted,
but receive lower levels of intelligence support.
(b) Using PIRs as the basis, the intelligence staff develops the command’s
EEIs. To satisfy information requirements (to include EEIs), intelligence staffs should
identify the specific indicators that could fill a gap in the command’s knowledge and
understanding of adversary activities and other relevant aspects of the OE.
I-7
Chapter I
CCIRs
FFIRs
PIRs
Intelligence Requirements "An intelligence requirement
stated as a priority for
“Any subject, general or intelligence support, that the
specific, upon which there is a commander and staff need to
need for the collection of understand the adversary or
information, or the production operational environment."
of intelligence.”
EEIs
Information Requirements "The most critical information
requirements regarding the
“In intelligence usage, those adversary and the
items of information regarding environment needed by the
the adversary and other commander by a particular
relevant aspects of the time to relate with other
operational environment that available information and
need to be collected and intelligence in order to reach
processed in order to meet the a logical decision."
intelligence requirements of a
commander.”
Collection Production
Requirements Either/Or Requirements
Legend
CCIR commander’s critical information requirement requirements flow
EEI essential element of information response flow
FFIR friendly force information requirement
PIR priority intelligence requirement
I-8 JP 2-0
The Nature of Intelligence
For example, if the PIR is “Will the enemy attack within the next 72
hours?”, the EEIs will be questions such as “Where is the XX Armored
Division?” “Has the artillery subordinate to the XX Corps deployed
forward?” “Are aircraft being loaded with air-to-ground munitions at the
forward airfields?” and “Where are the major surface combatants?”
A PIR for a non-state actor may be, “What is the level of local support for
the adversary network?” The corresponding EEIs could be, “What
resources does the local population provide the adversary?” “What
coercive tactics does the adversary use to control the population?” “What
is the nature of the relationship of the local power brokers to the
adversary network?”
(e) PIRs assist the J-2 in determining and prioritizing the type and level of
intelligence resources required to support the joint force. Intelligence staffs use intelligence
requirements as a basis for: formulating statements of intelligence interest to the intelligence
community (IC); justifying tasking of national collection resources through the Defense
Intelligence Agency (DIA); and justifying requests for intelligence capabilities.
KEY TERM:
Specific Information Requirement. A basic question that must be
answered to satisfy a collection request.
I-9
Chapter I
during planning and entered into the appropriate RFI management system during execution.
On the other hand, if an RFI leads to the initiation of a collection requirement, requestors of
intelligence collection support should provide specific information requirements (SIRs) to
allow the formulation of collection requirements and the allocation collection capabilities to
satisfy them. If the requestor does not provide SIRs, the collection manager should consult
with the requestor to determine the indicators of activity against which to focus collection
capabilities so that appropriate SIRs can be developed.
(g) To the extent possible, identify PIRs, EEIs, associated analytic tasks, and
SIRs in advance for each operational phase to provide the basis for synchronizing the
reception and integration of required intelligence capabilities. Collection capability
shortfalls identified during planning may form the basis for requests for forces (RFFs) and
requests for support from national intelligence resources. This information ensures that the
employment of defense intelligence capabilities is prioritized on supporting commanders in
achieving their operational objectives.
I-10 JP 2-0
The Nature of Intelligence
(a) The IP component of the Adaptive Planning and Execution (APEX) system
establishes collection planning procedures to be applied during joint operation planning.
Conceptually, collection planning performed during joint operation planning precedes
collection management performed during execution.
KEY TERM:
Intelligence, Surveillance, and Reconnaissance. An activity that
synchronizes and integrates the planning and operation of sensors,
assets, and processing, exploitation, and dissemination systems in direct
support of current and future operations. This is an integrated
intelligence and operations function.
I-11
Chapter I
consideration to be made during joint operation planning. J-2 staffs must consider
intelligence requirements when prioritizing information dissemination in terms of the
product, foreign disclosure requirements, the available communications paths, and the time
sensitivity of the product. Dissemination priorities must be updated throughout the course of
the operation. Communications and intelligence systems architecture planning must ensure
survivability, protection (or assurance), and interoperability of both information architectures
and the information contained therein for all combinations of government and commercial
configurations.
I-12 JP 2-0
The Nature of Intelligence
For further information on targeting, target development, target lists, and federated
targeting, see JP 3-60, Joint Targeting, JP 3-09, Joint Fire Support, Chairman of the Joint
Chiefs of Staff Instruction (CJCSI) 3370.01, Target Development Standards, and CJCSM
3314.01A, Intelligence Planning.
I-13
Chapter I
requirements are sent to internal intelligence organizations for tasking, or are submitted for
validation and tasking requests to external organizations or agencies. Activities then
transition from CRM to COM.
(d) To minimize the effects of enemy deception, and provide the JFC the most
accurate intelligence possible, analysis of information from a variety of collection sources is
required so information from one source can be verified or confirmed by others. Multiple
collection sources enable collection managers to cross-cue between different sources (e.g.,
using signals intelligence [SIGINT] direction finding to focus collection by geospatial
intelligence [GEOINT] systems). A challenge inherent to using a multidiscipline collection
is the need to avoid an ad hoc approach and to establish procedures beforehand that support
tipping, hand-off, cross-cueing, or retasking of one asset in support of another. Collection
systems also need redundancy so that the loss or failure of one collection capability can be
compensated for by alternate capabilities. However, careful consideration must be given to
having multiple collection sources performing redundant collection, as collection
requirements will usually exceed collection, processing, and exploitation capacity. This
supports the collection management principle of using a multidiscipline approach.
I-14 JP 2-0
The Nature of Intelligence
coordination with (ICW) CCMD intelligence planners must ensure that the collection plan is
synchronized with the operation plan (OPLAN) so that collection efforts are focused
correctly at critical times. Additionally, reconnaissance and surveillance operations
should be integrated with other forms of intelligence collection operations and coordinated
with CI activities.
See JP 2-01, Joint and National Intelligence Support to Military Operations, for more
discussion on intelligence requirements and collection.
I-15
Chapter I
during joint operation planning based on anticipated single-source analytic throughput and it
ensures appropriate intelligence systems architecture is in place to route raw data to
predetermined exploitation nodes.
(2) Different types of data require different degrees of processing before they can
be intelligible to the recipient. In the area of SIGINT, processing and exploitation are
increasingly automated and are being quickly performed by the collection systems.
Similarly, captured enemy documents may only require translating before they can be used
by analysts. On the other hand, the technical exploitation of an item of enemy equipment
may require months of intensive effort before its full capabilities can be determined.
(a) JIPOE is the continuous process through which J-2 manages the analysis
and development of products that help the commander and staff understand the complex and
interconnected OE—the composite of the conditions, circumstances, and influences that
affect the employment of capabilities that bear on the decisions of the commander. The J-2
manages the JIPOE process with input from intelligence planners and other staff directorates
or elements, such as medical and engineering, see Figure I-5.
(b) Analysts use the JIPOE process to analyze, correlate, and fuse information
pertaining to all relevant aspects of the OE (e.g., political, military, economic, social,
information, and infrastructure [PMESII] systems). The process is also used to analyze
adversary capabilities, identify potential adversary COAs, and assess the most likely and
I-16 JP 2-0
The Nature of Intelligence
Step 1
Define the operational
environment.
Step 2
Describe the impact
of the operational
environment.
Step 3
Evaluate the
adversary and other
relevant actors.
Step 4
Determine adversary
and other relevant
actor courses of
action.
most dangerous adversary COAs. The process can be applied to the full range of military
operations and to each level of war.
(c) Throughout the JIPOE process, at every echelon and production category,
one of the most important, but least understood, aspects of analysis is SCA. SCA is the
study, evaluation, and interpretation of information about adversaries and relevant actors
through the lens of group-level decision making to discern catalysts of behavior and the
context that shapes behavior. SCA informs the commander’s understanding of adversaries
and other relevant actors by analyzing societies, populations, and other groups of people,
including their activities, relationships, and perspectives across time and space at varying
scales of analysis. SCA includes the graphic representation of social and cultural
information for a given area presented spatially (on a map) and temporally. SCA also
I-17
Chapter I
includes the systematic mapping of human factors affecting a leader’s or key actor’s
decision-making influences. SCA considers: relationships and activities of the population;
social network analysis (looking at the interpersonal, professional, and social networks tied
to an individual); as well as small and large group dynamics.
The JIPOE process is described in detail in JP 2-01.3, Joint Intelligence Preparation of the
Operational Environment.
(2) Intelligence products are generally placed in one of eight production categories:
warning, current, general military, target, scientific and technical (S&T), CI, identity
intelligence (I2), and estimative intelligence (see Figure I-6). The categories are
distinguished from each other primarily by the purpose for which the intelligence was
produced. The categories can and do overlap, and the same intelligence and information can
be used in each of the categories.
Warning intelligence
Current intelligence
General military intelligence
Target intelligence
Scientific and technical intelligence
Counterintelligence
Estimative intelligence
Identity intelligence
I-18 JP 2-0
The Nature of Intelligence
information into concise, objective reporting on the current situation in a particular area. The
term “current” is relative to the time sensitivities of the decision maker and the context of the
type of operation being supported. For example, in some contexts intelligence may be
considered “current,” whereas other circumstances may require intelligence in near real time.
See JP 2-01, Joint and National Intelligence Support to Military Operations, for more
detailed discussion of GMI. See JP 4-02, Health Service Support, for more information on
medical intelligence (MEDINT).
See JP 3-60, Joint Targeting, and CJCSI 3370.01, Target Development Standards, for further
information.
I-19
Chapter I
(h) I2. I2 results from the fusion of identity attributes (biologic, biographic,
behavioral, and reputational information related to individuals) and other information and
intelligence associated with those attributes collected across all intelligence disciplines. I2
utilizes enabling intelligence activities, like biometrics-enabled intelligence (BEI), forensics-
enabled intelligence (FEI), and document and media exploitation (DOMEX), to discover the
existence of unknown potential threat actors by connecting individuals to other persons,
places, events, or materials, analyzing patterns of life, and characterizing their level of
potential threats to US interests.
(1) The Global Command and Control System and the DOD Distributed Common
Ground/Surface Systems portray an integrated common operational picture (COP), built on a
foundation of geospatial information, that displays the disposition of friendly, neutral, and
adversary forces throughout the OE. Command and control, initiative, flexibility, and
decision making are enhanced by an accurate and timely COP.
I-20 JP 2-0
The Nature of Intelligence
maximum use of automation, and minimizes the flow of RFI messages and intelligence
reports. The integrated broadcast service and the tactical related applications are examples
of over-the-air updates that provide time-sensitive intelligence to tactical commanders.
(4) Intelligence organizations should initiate and maintain close contact with users,
ensure users are receiving their products promptly, and confirm those products fulfill
requirements. The follow-up is a key part of the feedback process detailed in Figure I-3.
(6) Rather than being the end of a process, the integration of intelligence is a
continuous dialogue between the user and the producer. How intelligence is used is
ultimately up to the user. The role of the producer is to provide the user with the best
intelligence possible.
(1) Information gathered during evaluation and feedback may inform broader
assessments of the intelligence staff function. Assessments provide leaders with the
information to make decisions about reprioritization of intelligence requirements, shifts in
I-21
Chapter I
(3) The establishment of formal assessment methods and procedures for the
intelligence staff provides decision makers with actionable data backed by analytical rigor.
Assessors must collect, evaluate, and understand the significance of data regarding both the
conduct of intelligence tasks (intelligence MOPs) and the effectiveness of intelligence
(intelligence MOEs) in satisfying the requirements of the commander and staff. Data
resulting from assessments will support the identification and resolution of procedural issues
and contribute to advocacy in resolving gaps and shortfalls.
(4) Sharing. Identify issues and lessons learned and report them. CJCSI 3150.25,
Joint Lessons Learned Program (JLLP), provides basic guidance and direction on
establishing internal lessons learned programs and how to enter issues into a resolution
process.
(5) Advocating Resolution. The goal of the evaluation and feedback step is that
issues are identified and addressed within the joint intelligence process. Following the
procedures of the JLLP facilitates issue tracking until resolved.
(6) CCMDs, Services, and combat support agencies (CSAs) are responsible to
provide specific guidance to enable collection and distribution of observations of joint
operations with assigned forces or personnel. It is essential that intelligence organizations
I-22 JP 2-0
The Nature of Intelligence
outside the joint force fully participate in the JLLP process to ensure that the benefits of
lessons learned are disseminated as widely as possible.
a. Levels of War. JP 3-0, Joint Operations, discusses three levels of war: strategic,
operational, and tactical. Figure I-7 shows how intelligence operations support each level of
war. The levels clarify links between strategic objectives, effects, and tactical actions and
enable commanders to visualize a logical flow of operations, resource allocation, and tasks.
Often, the accuracy of strategic, operational, or tactical labels can only be determined during
post-mission analysis or historical studies.
(1) All levels of war have corresponding levels of intelligence operations. The
construct of strategic, operational, and tactical levels of intelligence helps commanders and
their J-2s visualize the flow of intelligence from one level to another. This construct
facilitates the allocation of required collection, analytical, and dissemination resources and
permits the assignment of appropriate intelligence tasks to national, theater, component, and
supporting intelligence elements.
(2) Intelligence operations support commanders at all levels, both horizontally and
vertically. Strategic intelligence operations provide continuity and depth of coverage even
while the joint force is deploying. During campaign planning, strategic and operational
intelligence operations focus on providing to the JFC information required to identify the
adversary’s COGs, COAs, vulnerabilities, and high-value targets (HVTs). During execution,
operational intelligence operations provide the JFC with relevant, timely, and accurate
intelligence relating to the accomplishment of campaign or major operation objectives.
(4) Operational and tactical intelligence operations provide the JFC the information
required to identify adversary critical vulnerabilities, COGs, and critical nodes for the
optimum application of all available resources, thereby allowing the JFC to most effectively
employ the joint force. Figure I-7 depicts the levels of intelligence.
b. Strategic Intelligence
(1) National strategic intelligence is produced for the President, the National
Security Council, Congress, SecDef, senior military leaders, CCDRs, and other US
Government departments and agencies. It is used to develop national strategy and policy,
monitor the international and global situation, prepare military plans, determine major
weapon systems and force structure requirements, and conduct strategic operations.
Strategic intelligence operations also produce the intelligence required by CCDRs to prepare
strategic estimates, strategies, and plans to accomplish missions assigned by higher
authorities. In addition to this focus primarily on the military instrument of national power,
I-23
Chapter I
Levels of Intelligence
Strategic
Senior Military and Civilian Leaders
Combatant Commanders
Assist in developing national strategy and policy.
Monitor the international or global situation.
Assist in developing military plans.
Assist in determining major weapon systems and force structure requirements.
Support the conduct of strategic operations.
Operational
Combatant and Subordinate Joint Force Commanders
and Component Commanders
Focus on military capabilities and intentions of enemies and adversaries.
Analyze the operational environment.
Identify adversary centers of gravity and critical vulnerabilities.
Monitor events in the joint force commander’s area of interest.
Support the planning and conduct of joint campaigns.
Tactical
Commanders
Support planning and the execution of battles, engagements, and other joint
force activities.
Provide commanders with information on imminent threats to their forces and
changes in the operational environment.
Provide commanders with obstacle intelligence.
strategic intelligence also allows for national leadership to determine potential options using
the nonmilitary instruments of national power (diplomatic, informational, and economic)
based on estimated opposing force or adversary reaction to US actions.
(2) Theater strategic intelligence supports joint operations across the range of
military operations, assesses the current situation, and estimates future capabilities and
intentions of adversaries that could affect the national security and US or allied interests.
Theater strategic intelligence includes determining when, where, and in what strength the
adversary will stage and conduct theater level campaigns and strategic unified operations.
c. Operational Intelligence
(1) Operational intelligence is primarily used by CCDRs and subordinate JFCs and
their component commanders. Operational intelligence focuses on answering the
commander’s PIRs, assessing the effectiveness of operations, maintaining situational
awareness of adversary military disposition, capabilities, and intentions, and other relevant
aspects of the OE. Operational intelligence helps commanders keep abreast of events within
I-24 JP 2-0
The Nature of Intelligence
their area of interest (AOI) and helps them determine when, where, and in what strength the
adversary might stage and conduct campaigns and major operations.
(2) Operational intelligence also includes monitoring terrorist incidents and natural
or man-made disasters and catastrophes. During counterinsurgency and counterterrorism
operations, operational intelligence is increasingly concerned with stability operations and
has a greater focus on PMESII factors. It also assists commanders in assessing and
evaluating actions and possible implications associated with noncombat operations such as
foreign humanitarian assistance.
d. Tactical Intelligence
(2) Tactical intelligence addresses the threat across the range of military operations.
Tactical intelligence operations identify and assess the adversary’s capabilities, intentions,
and vulnerabilities, as well as describe the physical environment. Tactical intelligence seeks
to identify when, where, and in what strength the adversary will conduct tactical level
operations. During counterinsurgency and counterterrorism operations, tactical intelligence
is increasingly focused on identifying threats to stability operations. Together with CI,
tactical intelligence will provide the commander with information on the imminent threats to
the force from terrorists, saboteurs, insurgents and their networks, and foreign intelligence
collection. The physical identification of the adversary and their operational networks allow
for enhanced situational awareness, targeting, and watchlisting to track, hinder, or prevent
insurgent movements within the region, nation, or international levels.
JP 3-0, Joint Operations, divides the range of military operations into three major
types: military engagement, security cooperation, and deterrence; crisis response and
limited contingency operations; and major operations and campaigns. While intelligence
operations continue throughout the range of military operations, peacetime intelligence
operations provide national and military leadership the information needed to accomplish
missions, realize national goals and objectives, and implement the national security
strategy. During peacetime, intelligence helps commanders identify instability, project
future adversary capabilities, make acquisition decisions, protect technological advances,
define weapons systems and ISR systems requirements, shape organizations, and design
training to ready the joint force and PNs. Intelligence assets monitor foreign states,
volatile regions, and transnational issues to identify threats to US interests in time for
I-25
Chapter I
I-26 JP 2-0
The Nature of Intelligence
identifying the best means to accomplish the joint force mission. For example, intelligence
provides the JFC and component commanders with information on the relevant physical,
informational, and cognitive dimensions of the information environment and their impact on
military operations; estimates of what the enemy’s information capabilities are; when, where,
and how the joint force can exploit its information superiority; and the threat the enemy
poses to friendly information and information systems.
(1) Intelligence that enables the JFC to focus and leverage combat power and to
determine acceptable risk is key to allowing the JFC to achieve powerful, dynamic
concentrations when and where the enemy is vulnerable, and permits the JFC to exploit the
maximum range of joint fires. Intelligence provides key elements to targeting by providing
identification of HVTs, collection to develop these targets, weapons and platform delivery
recommendations, collateral damage estimates, and BDA of the extent of damage to, or
effect on, the targets.
Intelligence constitutes one of six basic groups of joint functions (related capabilities
and activities grouped together to help JFCs integrate, synchronize, and direct joint
operations). Other joint functions include command and control, fires, movement and
maneuver, protection, and sustainment. Some functions, such as command and control
and intelligence, apply to all operations. Others, such as fires, apply as required by the
JFC’s mission.
I-27
Chapter I
operate throughout the OE based on a detailed analysis of the impact of weather, geography,
and other relevant considerations. Most important, visualization requires understanding the
adversary’s objectives, identifying how they might fulfill them, and their readiness to
achieve them. Together, all these factors make a critical contribution to the JFC’s capability
to achieve information superiority. However, intelligence must also enable the JFC to know
the potential and probable future state of events well in advance of the adversary. Based on
this intelligence, the JFC may anticipate adversary actions and plan detailed
countermeasures.
c. Red Teams and Red Cells. Command red teams are organizational elements
comprised of trained, educated, and practiced experts that provide the JFC an
independent capability to conduct critical reviews and analysis, explore plans and
operations, and analyze adversary capabilities from an alternative perspective. Red
teams assist joint operation planning by validating assumptions about the adversary, as
well as participating in the wargaming of friendly and adversary COAs. In contrast, J-2
red cells perform threat emulation.
(1) A simple example of the process of action and reaction is the situation in which
an intelligence officer, having detected certain adversary actions and correctly determined
the adversary’s intent, forecasts that the adversary is preparing to attack. The commander
reacts by having friendly forces take appropriate defensive measures. However, the
adversary commander detecting these actions decides attacking is no longer a desirable
COA, and cancels the attack. In this example, adversary actions produced a friendly reaction
resulting in changes to the adversary’s intent. This situation is known as the paradox of
warning and is depicted in Figure I-8.
(2) Accurate estimates should inform the JFC of the full range of actions open to
the adversary and estimate the relative order of probability of their adoption. The confidence
placed on the analytic judgments contained in estimative intelligence products helps
commanders assess the risks associated in selecting friendly options.
I-28 JP 2-0
The Nature of Intelligence
Friendly intelligence
determines adversary
intention.
Friendly
Friendly
intelligence intelligence
detects provides
indications. warning.
Adversary
intelligence
Adversary detects
intelligence indications.
provides
warning.
Adversary intelligence
determines friendly intention.
I-29
Chapter I
Intentionally Blank
I-30 JP 2-0
CHAPTER II
PRINCIPLES OF JOINT INTELLIGENCE
“Tell me what you know…tell me what you don’t know…tell me what you
think—always distinguish which is which.”
General Colin Powell, US Army
Guidance to Joint Staff J-2 on 13 November 1992
Chairman of the Joint Chiefs of Staff, 1989-1993
1. Introduction
This chapter combines intelligence theory and operating experience into fundamental
principles that are intended to contribute to effective and successful joint intelligence
operations. The following principles for conducting joint intelligence activities are
appropriate at all levels of war across the range of military operations (see Figure II-1).
2. Perspective
Intelligence analysts should strive to understand all relevant aspects of the OE. This
understanding should include not only the adversary’s disposition, but also the sociocultural
nuances of individuals and groups in the OE. The JFC should require the J-2 to assess all
proposed actions from the following perspective: “How will the adversary likely perceive
this action, and what are the adversary’s probable responses?” Carrying out these
intelligence responsibilities calls for sound judgment as well as expertise.
a. The ability to think like the adversary is predicated on a detailed understanding of the
adversary’s goals, motivations, objectives, strategy, intentions, capabilities, methods of
II-1
Chapter II
operation, vulnerabilities, and sense of value and loss. The J-2 should understand the
adversary’s culture and pertinent actors in the OE. The ability of intelligence analysts to
think and react like the adversary and understand sociocultural factors is of particular value
during the wargaming of various COAs and the determination of enemy HVTs. Properly
trained personnel formed in structured or ad hoc red teams portray the adversary and their
most probable or dangerous actions during the war game.
“Great advantage is drawn from knowledge of your adversary, and when you
know the measure of his intelligence and character you can use it to play on his
weaknesses.”
King Frederick the Great of Prussia,
Instructions for His Generals, 1747
a. The most common error in attempting to synchronize intelligence with operations and
plans is the failure to build sufficient lead time for intelligence production and operational
decision making. To avoid late intelligence, the JFC, J-3, and the plans directorate of a joint
staff (J-5) in collaboration with the J-2, should establish a suspense or specify a timeframe
during which each intelligence requirement must be answered in order to support decision
making and operation planning. Likewise, the J-2 must provide sufficient lead time for the
collection, processing, analysis, and dissemination of the requisite intelligence to meet the
II-2 JP 2-0
Principles of Joint Intelligence
a. Intelligence analysts should take active measures to recognize and avoid cognitive
biases which affect their analysis. Cognitive bias results when intelligence analysts see the
world through lenses colored by their own perceptions and paradigms. Intelligence is
filtered through these paradigms and perceptions, and analysts are tempted to fit information
into pre-existing beliefs and discard information that does not fit.
c. The same integrity and analytic process must extend to reporting what is not known.
Intelligence professionals must avoid the temptation to make assessments appear more
definitive than may be warranted by the facts. Intellectual integrity requires the intelligence
II-3
Chapter II
professional to distinguish for the commander those conclusions that are solidly grounded in
fact and those that are extrapolations or extensions of the fact. The commander cannot be
left with uncertainty regarding what is fact, what is opinion, and what is unknown.
The Secretary of War made good on his promise, for although Colonel
Wagner was promoted years later to brigadier general, the notice of his
appointment reached him on his death bed. Furthermore, Alger
influenced McKinley to reauthorize a summer invasion of Cuba.
Fortunately United States forces won a quick victory, but as Wagner
predicted, the effects of disease soon devastated the force. The ravages
of yellow fever, typhoid, malaria and dysentery accounted for more than
85 percent of total casualties and were so severe that by August 1898 less
than one quarter of the invasion force remained fit for service.
II-4 JP 2-0
Principles of Joint Intelligence
production. Unity of effort requires intelligence operations, functions, and systems that are
coordinated, synchronized, integrated, and interoperable. Intelligence organizations (joint,
national, and multinational) operating in a JFC’s operational area must have a clear
understanding and common acceptance of the command’s desired effects, objectives, and
end state. This is particularly important when employing distributed, reachback, and
federated capabilities, many of which are not forward deployed in a JFC’s operational area.
a. Organic and attached intelligence assets operating in the JFC’s operational area, as
well as national and theater intelligence resources supporting that force should be integrated
into an interoperable architecture so that appropriate elements have access to required
intelligence. This approach allows the JFC and J-2 to orchestrate pertinent intelligence
activities to meet the joint force’s intelligence requirements. The seamless provision of joint
intelligence support to operational forces as they deploy from one theater to another is
particularly important. To effectively plan and execute unit missions, deploying intelligence
personnel must know the supported commander’s concept of intelligence operations,
intelligence architecture, estimate of the situation, map standards, and other specific
requirements. This timely information should be provided to deploying forces in a
standardized electronic format by intelligence producers. This focuses the ICs effort on
satisfying operational requirements.
The allocation of high demand, intelligence, reconnaissance, and surveillance resources, such
as the RQ-4A Global Hawk, should be based on prioritized requirements.
II-5
Chapter II
Unity of effort should maximize the intelligence support provided to the JFC, while
simultaneously facilitating information sharing among other appropriate commanders, staffs,
and partners or coordinating with the multinational force.
b. An agreed upon prioritization framework provides the basis for optimizing the
allocation of limited national intelligence resources among CCMDs, and for CCMD collection
and PED resources for a subordinate force. The Global Force Management (GFM) process
determines the allocation of collection and associated PED resources across the CCMDs based
upon the prioritization provided by SecDef. The allocation of national intelligence resources is
based upon the National Intelligence Priorities Framework established by the Director of
National Intelligence (DNI) and should be consistent with DIAP established priorities and
CCMD PIRs. Without clear prioritization and understanding of risk at all levels, competition
for ISR resources not only reduces what intelligence could provide, it also inhibits full
cooperation among organizations that see themselves as competitors rather than teammates.
c. Military personnel requirements not associated with allocated PED force packages, as
well as the collection resources aligned with them, are submitted through RFFs. GFM
principles are applied to filling these requirements and result in coordination among force
providers and the Joint Staff, and approval by SecDef.
Producers of intelligence should constantly strive to achieve the highest possible level of
excellence in their products. The quality of intelligence products is paramount to the
intelligence professional’s ability to attain and maintain credibility with intelligence
consumers. The attributes of intelligence product quality (shown in Figure II-2) are
objectives for intelligence activities supporting joint operations and standards against which
the quality of intelligence products should be continuously evaluated. To achieve the highest
standards of excellence, intelligence products must be:
II-6 JP 2-0
Principles of Joint Intelligence
Anticipatory Complete
Timely Relevant
Accurate Objective
Usable Available
b. Timely. Intelligence must be available when the commander requires it. Timely
intelligence enables the commander to anticipate events in the operational area. In turn, this
enables the commander to time operations for maximum effectiveness and to avoid being
surprised. Usually, the need to balance timeliness and completeness should favor timeliness,
and if incomplete should be stated in the product, and followed up later. Recognizing and
balancing the subtle differences relative to timeliness and completeness is one of the critical
art forms for good intelligence.
II-7
Chapter II
and understandable; oral presentations should be direct; and approved joint terms should be
used to effectively convey intelligence.
II-8 JP 2-0
Principles of Joint Intelligence
2004: “The Intelligence Community has long struggled with the need for
analysts to overcome analytic biases, that is, to resist the tendency to see
what they would expect to see in the intelligence reporting. In the case of
Iraq’s weapons of mass destruction capabilities, the Committee found
that intelligence analysts, in many cases, based their analysis more on
their expectations than on an objective evaluation of the information in
the intelligence reporting.”
Although intelligence should identify and assess the full range of adversary capabilities,
it is most useful when it focuses on the future and adversary intent. JFCs require and expect
timely intelligence estimates that accurately identify adversary intentions, support offensive
and/or defensive operations, and predict adversary future COAs in sufficient detail as to be
actionable. When justified by the available evidence, intelligence should forecast future
adversary actions and intentions. If there is inadequate information upon which to base
forecasts, the intelligence staff must ensure that the commander is aware of this shortcoming
and that the future contains much uncertainty.
a. The intelligence professional must base predictions on solid analysis using proven
tools and methodologies. In conventional analysis, the analyst examines, assesses, and
II-9
Chapter II
compares bits and pieces of raw information, and synthesizes findings into an intelligence
product that usually reflects enemy capabilities and vulnerabilities. However, predictive
analysis goes beyond the identification of capabilities by forecasting enemy intentions and
future COAs. As discussed earlier, JIPOE provides an excellent methodology for assessing
adversary intentions and predicting the relative probability of enemy COAs.
b. Predictive analysis is both difficult and risky (i.e., it challenges the intellectual
resources of the analyst while at the same time entailing considerable risk that the events
predicted may not come to pass). This type of difficulty and risk apply less to the assessment
of adversary capabilities. Predictive analysis is riskier than capabilities analysis because it
deals more extensively with dynamic adversary characteristics, a greater range of unknown
factors, and possibly enemy deception plans. Therefore, the chances of analytic failure are
greater. As a consequence, there may be a tendency among overly cautious intelligence
personnel to avoid predictive analysis. However, JFCs need to know enemy intentions as
well as enemy capabilities. The analyst who successfully performs predictive analysis and
accurately assesses enemy intentions in advance of events performs an invaluable service to
the commander and staff.
Agility is the ability to quickly shift focus and bring to bear the skill sets necessary to
address the new problem at hand while simultaneously continuing critical preexisting
work. Intelligence structures, methodologies, databases, products, and personnel should be
sufficiently agile and flexible to meet changing operational situations, needs, priorities, and
opportunities. Whether due to military contingencies or diplomatic and/or political
challenges, sudden changes in the OE and requirements of intelligence consumers allow
little reaction and recovery time. Therefore, the key to successful agility is preparation and
organization for all contingencies well in advance. Maintaining responsiveness under such
circumstances requires considerable vigilance and foresight. Intelligence professionals
must anticipate not only the future decisions of adversaries, but of intelligence
consumers as well.
II-10 JP 2-0
Principles of Joint Intelligence
modularized automated data handling and communications systems that are capable of
responding to changing circumstances, facilitating survivability and reliability, and
enabling the seamless delivery of intelligence products to consumers regardless of the
conditions in the OE. The processes that facilitate these aspects of agility require prior
planning and long lead times.
II-11
Chapter II
a. Fusion relies on collection and analysis efforts that optimize the strengths and
minimize the weaknesses of different intelligence disciplines. Information is sought from
the widest possible range of sources to avoid any bias that can result from relying on a
single source of information and to improve the accuracy and completeness of intelligence.
The collection of information from multiple sources is essential to countering the
adversary’s operations security (OPSEC) and deception operations. The operations of all
collection sources must be synchronized and coordinated to allow cross-cueing and tipping
among collectors. JFCs should develop methods to improve their own and staff’s
knowledge of the OE. This requires improving the integration of civil information into the
planning and operational processes, then sharing that information with external partners to
enhance relationships and operational effectiveness.
II-12 JP 2-0
CHAPTER III
INTELLIGENCE ORGANIZATIONS AND RESPONSIBILITIES
(1) The DNI has overall responsibility for intelligence support to the President
and the day-to-day management of the IC. Specifically, the DNI establishes objectives and
priorities for the IC and manages and directs the tasking of national intelligence collection,
analysis, production, and dissemination. The DNI also develops and determines the annual
budget for the National Intelligence Program (NIP) and monitors the implementation and
execution of the NIP by the heads of IC member organizations. The DNI implements
policies and procedures to ensure all-source intelligence includes competitive analysis and
that alternative views are brought to the attention of policy makers. Additionally, the
Office of the Director of National Intelligence (ODNI) exercises control over the National
Intelligence Council, National CI Executive, National Counterterrorism Center, and
National Counterproliferation Center, and has authority to establish additional national
intelligence centers when deemed necessary to address other intelligence priorities, such as
regional issues.
(2) The Under Secretary of Defense for Intelligence (USD[I]) is the principal
staff assistant and advisor to SecDef on all intelligence, CI, and security, and other
intelligence-related matters. The USD(I) exercises SecDef’s authority, direction, and
control over the DOD agencies and DOD field activities that are defense intelligence, CI,
security, exercise, planning, policy, and strategic oversight over all DOD intelligence, CI,
and security policy, plans, and programs. On behalf of SecDef, the USD(I) coordinates
with the Chairman of the Joint Chiefs of Staff (CJCS) to ensure that defense intelligence,
CI, and security components within the operating forces (Services and CCMDs) are
III-1
Chapter III
resourced to support DOD missions and are responsive to DNI requirements. The USD(I)
also provides oversight and guidance for the annual budget for the Military Intelligence
Program (MIP) and monitors the implementation and execution of the MIP by the Services
and the heads of the CSAs.
(3) The Director of the DIA advises SecDef and Deputy Secretary of Defense,
CJCS, CCDRs, and USD(I) on all matters concerning military and military-related
intelligence and is the principal DOD intelligence representative in the national foreign
intelligence process. The Director of DIA also serves in several additional capacities. The
Director coordinates intelligence support to meet CCMD requirements and reports to
SecDef through the Joint Chiefs of Staff (JCS). As Defense Collection Manager, the
Director DIA, serves as the conduit for collection coordination with the joint intelligence
operations centers (JIOCs), interagency partners, and ODNI. SecDef-appointed Director,
DIA to be the Commander, Joint Functional Component Command for Intelligence,
Surveillance, and Reconnaissance (JFCC-ISR). As the Program Manager for the Joint
Reserve Intelligence Program (JRIP), the Director, DIA supports activities to leverage joint
reserve intelligence centers (JRICs) and Reserve Component capabilities in response to
intelligence requirements. Finally, the Director serves as the Defense CI Manager and the
Defense HUMINT Manager and is responsible for coordinating all DOD CI and HUMINT
resources and requirements.
(4) The CJCS provides direction to the Joint Staff Director for Intelligence, J-2,
to ensure that adequate, timely, and reliable intelligence and CI support is available to the
JCS and the CCMDs.
(5) The Joint Staff Directorate for Intelligence, J-2, is a unique organization, in
that it is both a major component of DIA (a CSA) and a fully integrated element of the
Joint Staff. The J-2 provides continuous intelligence support to the CJCS, Joint Staff,
National Military Command Center (NMCC), and CCMDs in the areas of targeting, global
warning intelligence, and current intelligence. The J-2 also has the responsibility for
coordinating the IP activities of the Services and intelligence CSAs in support of CCDRs.
The Joint Staff J-2, ICW other IC elements, provides strategic warning, threat assessments,
and intelligence-related advice to the CJCS. It also exercises staff supervision of the
intelligence alert center supporting the NMCC and keeps the CJCS apprised of foreign
situations that are relevant to current and potential national security policy, objectives, and
strategy. During crises, the intelligence support to the NMCC expands as necessary by
utilizing DIA assets to form a working group, intelligence task force, or, in the case of a
major crisis, an expanded intelligence task force. The Joint Staff J-2 is also responsible for
representing and advocating CCMD views and intelligence requirements to the Joint Staff
and Office of the Secretary of Defense (OSD). The Joint Staff J-2 is also responsible for
coordinating with the CCMDs to staff intelligence-related CJCS orders (e.g., alert orders,
planning orders, warning orders) and coordinate RFFs in response to a CCMD request for
intelligence capabilities. To staff actions, the joint staff utilizes the Joint Staff Action
Process to obtain official CCMD, Service, and intelligence CSA coordination regarding
defense intelligence, CI, and security matters affecting the operating forces.
III-2 JP 2-0
Intelligence Organizations and Responsibilities
(6) The Service Chiefs, their intelligence and CI chiefs, and staffs provide
intelligence and CI support for departmental missions related to military systems, equipment,
and training. They also support national intelligence activities in support of DOD entities,
including CCMDs, subordinate joint commands, and Service components of those
commands. Service intelligence staffs and organizations produce a broad array of products
and services (such as weapons systems-specific targeting materials) as well as technical
expertise in specialized areas such as military information support operations and foreign
weapons systems. At both the component and unit level, Service intelligence personnel are
involved in the operation of ISR assets and provide tailored intelligence support for weapons
system employment.
b. The IC. The IC consists of the 17 member organizations (DIA, National Security
Agency [NSA], National Geospatial-Intelligence Agency [NGA], National Reconnaissance
Office [NRO], Army Intelligence, Navy Intelligence, Air Force Intelligence, Marine Corps
Intelligence, Central Intelligence Agency [CIA], Department of State [DOS], Department of
Energy [DOE], Federal Bureau of Investigation [FBI], Department of the Treasury, Coast
Guard Intelligence, Department of Homeland Security [DHS], the Drug Enforcement
Administration, and the Office of DNI). The national intelligence leadership structure is
depicted in Figure III-1. Both DOD and non-DOD members of the IC routinely provide
support to JFCs while continuing to support national decision makers.
(1) Military Members of the IC. The military members of the IC consist of the
four defense agencies and the four Service intelligence organizations discussed below.
SecDef and USD(I) supervise the DOD portion of the IC and are assisted in their intelligence
management responsibilities by the ISR Integration Council and the Military Intelligence
Board (MIB). The ISR Integration Council assists the USD(I) with respect to matters
relating to the integration of ISR capabilities and the coordination of related developmental
activities of DOD components and CCMDs. The MIB serves as the senior “board of
governors” for the DOD portion of the IC and works to develop cooperation and consensus
on CSA, Service, and CCMD intelligence issues.
(a) DIA. DIA has oversight of the DIAP and is the DOD focal point for
MASINT, HUMINT, and CI, and is the senior CMA for DOD within the IC, representing all
Service and CCMD requirements for national collection. Additionally, DIA analysts provide
support in areas such as: all-source military analysis, human factors analysis,
counterterrorism, counterproliferation of weapons of mass destruction (WMD), counterdrug
operations, information-related capabilities (IRCs), personnel recovery, peacekeeping, and
multinational support, noncombatant evacuation operations, warning intelligence, targeting,
BDA, current intelligence, systems analysis of the adversary, collection management,
intelligence architecture and systems support, intelligence support to operation planning,
defense critical infrastructure protection, and DOMEX, BEI, and FEI.
III-3
Chapter III
President
CIA DIA
DOS NGA
DOE NSA
US Treasury USCG
Legend
CIA Central Intelligence Agency NGA National Geospatial-Intelligence Agency
DEA Drug Enforcement Administration NRO National Reconnaissance Office
DHS Department of Homeland Security NSA National Security Agency
DIA Defense Intelligence Agency PD/DNI Principal Deputy/Director of National Intelligence
DNI Director of National Intelligence USAF United States Air Force
DOE Department of Energy USCG United States Coast Guard
DOJ Department of Justice USMC United States Marine Corps
DOS Department of State
FBI Federal Bureau of Investigation
NCPC National Counterproliferation Center command authority
NCTC National Counterterrorism Center coordination
(c) NGA. NGA provides timely, relevant, and accurate GEOINT support to
include imagery intelligence (IMINT), geospatial information, national imagery collection
management, commercial imagery, imagery-derived MASINT, and some meteorological and
oceanographic data and information. Per Executive Order 12333, United States Intelligence
Activities, the Director NGA is designated as the functional manager for GEOINT. See JP
2-03, Geospatial Intelligence in Joint Operations, for information regarding the Director’s
roles and responsibilities as the functional manager for GEOINT and the National System
for GEOINT.
III-4 JP 2-0
Intelligence Organizations and Responsibilities
(d) NRO. NRO is responsible for integrating unique and innovative space-
based reconnaissance technologies, and the engineering, development, acquisition, and
operation of space reconnaissance systems and related intelligence activities.
(e) US Army Intelligence. The Army Deputy Chief of Staff for Intelligence is
responsible for policy formulation, planning, programming, budgeting, management,
evaluation, and oversight of intelligence activities for the Department of the Army. The
Army Intelligence Staff Section exercises staff supervision over the US Army Intelligence
and Security Command.
(f) US Naval Intelligence. The Director of Naval Intelligence leads the Navy
intelligence enterprise and is dual-hatted as the Deputy Chief of Naval Operations for
Information Dominance. The Commander, Office of Naval Intelligence reports to the
Director of Naval Intelligence and leads the Service intelligence center that focuses on
providing intelligence products and services to inform Navy decision makers.
(g) US Air Force Intelligence. The Air Force Deputy Chief of Staff for ISR
is responsible for intelligence policy, planning, programming, evaluation, and resource
allocation and exercises staff supervision over the US Air Force ISR Agency. Through its
National Air and Space Intelligence Center, the Air Force ISR Agency provides intelligence
support to strategic-and operational-level commanders in the areas of GEOINT, MASINT,
SIGINT, HUMINT, OSINT, and technical intelligence (TECHINT), as well as integrated all-
source intelligence estimates. In addition to the Air Force ISR Agency, the Air Force enables
the use of multiple assets from multiple geographic commands; collecting data across all
areas of responsibility (AORs) that may satisfy strategic, operational, and tactical
requirements; which may be used by national, joint, or Service specific personnel. The Air
Force’s globally integrated ISR enables the integration of this collected information to
deliver intelligence to the right command at the right time. Lastly, the Air Force Office of
Special Investigations is the main focal point for Air Force CI activities.
(a) CIA. CIA’s primary areas of expertise are in HUMINT collection, all-
source analysis, and the production of political, economic, and biographic intelligence. Per
III-5
Chapter III
Executive Order12333, United States Intelligence Activities, the Director CIA is designated
as the functional manager for HUMINT.
(b) DOS. The DOS Bureau of Intelligence and Research performs intelligence
analysis and production on a wide range of political and economic topics essential to foreign
policy determination and execution.
(d) FBI. The FBI has primary responsibility for CI and counterterrorism
operations conducted in the United States. The FBI shares law enforcement and CI
information with appropriate DOD entities and CCMDs. The FBI’s Terrorist Explosive
Device Analytical Center serves as the lead interagency organization to receive, analyze, and
exploit terrorist improvised explosive devices of interest to the US.
(f) United States Coast Guard (USCG). The USCG operates as both a
military Service and a law enforcement organization and provides general maritime
intelligence support to commanders from the strategic to tactical level in the areas of
HUMINT, SIGINT, GEOINT, MASINT, OSINT, and CI. The USCG’s Intelligence
Coordination Center, co-located with the Office of Naval Intelligence, provides all-source,
tailored, and integrated intelligence.
(g) DHS. The Office of Intelligence and Analysis is a member of the national
IC and ensures that information related to homeland security threats is collected, analyzed,
and disseminated to the full range of the homeland security customers in the DHS, state,
local, and tribal levels, in the private sector and in the IC.
JP 2-01, Joint and National Intelligence Support to Military Operations, provides additional
information regarding the support that national agencies such as DIA, CIA, NSA, NRO, and
NGA, as well as the intelligence and operational organizations of the Services and functional
CCMDs can provide to joint forces.
In addition to the J-2 staffs at every joint level of command, the key organizations in the
defense intelligence architecture are the CCMD JIOCs, the JTF joint intelligence support
elements (JISEs), JFCC-ISR, and the JRICs. At the JTF level, a JISE is normally
established; however a JIOC may be established at the direction of the JFC based on the
scope, duration, and mission of the unit or JTF. For the remainder of this document
III-6 JP 2-0
Intelligence Organizations and Responsibilities
“JISE” will be used as the standard term to describe the intelligence organization at the
JTF level. Working together, these organizations play the primary role in managing and
controlling the various types of intelligence functions and operations that comprise the
intelligence process described in Chapter I, “The Nature of Intelligence.” These
organizations are linked by formal relationships that facilitate RFI management, optimize
complementary intelligence functions by echelon, and promote the timely flow of critical
intelligence up, down, and laterally. In addition to the support provided by joint intelligence
staffs and organizations, JFCs receive valuable support from the Service intelligence
organizations and from the intelligence staffs and organizations belonging to the joint force
components. JFCs should consider the intelligence capabilities of these elements during the
planning and execution of all joint operations. Intelligence units and organizations assigned
to the joint force will receive at least one intelligence support mission (shown in Figure III-2)
from the JFC. Intelligence staffs and forces organic to a component command will remain
the assets of that component commander. If the JFC wants the organic intelligence assets of
a component to support other components, the JFC will usually assign an intelligence
support mission to that component commander.
Support relationships are further explained in JP 1, Doctrine for the Armed Forces of the
United States.
a. The National Joint Operations and Intelligence Center (NJOIC). The NJOIC is
an integrated Joint Staff J-2/J-3/Plans Directorate element that monitors the global situation
on a continual basis and provides the CJCS and SecDef a DOD planning and crisis response
capability. The intelligence component of the NJOIC maintains an alert center that consists
of the Deputy Director for Intelligence, regional desks corresponding to each geographic
CCMD, and representatives from each Service intelligence staff element, the intelligence
CSAs, and the CIA. The alert center is a continuously manned, all-source, multidiscipline
intelligence center providing defense intelligence situational awareness, early warning, and
crisis management intelligence support to the President of the United States, SecDef, JCS,
CCMDs, deployed forces, Services, and other intelligence consumers during peace, crisis,
and war. It provides planning, management, and infrastructure for intelligence working
groups and intelligence task forces that provide direct intelligence support during major
conflicts. To provide intelligence analytical depth, DIA maintains a 24/7 direct support
element at the NJOIC, tailored to the current global situation and operating tempo. The
NJOIC coordinates the intelligence response to immediate crises and contingencies.
b. CCMD JIOC. The CCMD JIOCs are the primary intelligence organizations
providing support to joint forces. The JIOC integrates the capabilities of DNI, Service, CSA,
and CCMD intelligence assets to coordinate IP, collection management, analysis, and
support. The JIOC construct seamlessly combines intelligence functions, disciplines, and
operations into a single organization, ensures the availability of information sources from
CCMD, subordinate, and US intelligence resources, and fully synchronizes intelligence with
operation planning, execution, and assessment. Although a particular JIOC cannot be
expected to completely satisfy every RFI, it can coordinate support from other intelligence
organizations. Each CCMD organizes, trains, and directs its JIOC in accordance with the
needs and guidance of the CCDR. The JIOC construct is intended to facilitate the agile
III-7
Chapter III
Close
An intelligence element with a close support mission will provide intelligence
support on targets and objectives sufficiently near the supported force as to
require detailed integration and coordination with the fire, movement, or other
actions of the supported unit.
Mutual
Intelligence elements receive a mutual support mission when their assigned tasks,
their position relative to each other, and their capabilities allow them to coordinate
their activities in order to assist each other to respond to the intelligence
requirements of the joint force as tasked by the J-2.
c. JTF JISEs. At the discretion of a subordinate JFC, a JTF JISE may be established
during the initial phases of an operation to augment the subordinate joint force J-2 element.
Under the direction of the joint force J-2, a JTF JISE normally manages the intelligence
collection, production, analysis, and dissemination for a joint force.
See JP 2-01, Joint and National Intelligence Support to Military Operations, and JP 3-33,
Joint Task Force Headquarters, for detailed discussion of JIOC and JISE structures, roles,
and responsibilities.
III-8 JP 2-0
Intelligence Organizations and Responsibilities
and evaluating unfulfilled needs, CCMDs should submit an RFF to the Joint Staff
specifically stating manning and/or capability shortfalls. The RFF should
specifically identify the skills required from each CSA. Special capabilities can also be
requested to close gaps.
3. Intelligence Federation
During crises, joint forces may also garner support from the IC through intelligence
federation. Intelligence federation enables CCMDs to form support relationships with other
theater JIOCs, Service intelligence centers, JRICs, or other DOD intelligence organizations
to assist with the accomplishment of the joint force’s mission. These support relationships,
called federated partnerships, are preplanned agreements (formalized in OPLANs, national
intelligence support plans (NISPs), or memorandums of agreement) intended to provide a
rapid, flexible, surge capability enabling personnel from throughout the IC to assist the
CCMD while remaining at their normal duty stations. Federated support can be provided in
specific functional areas directly related to the crisis, or by assuming temporary
responsibility for noncrisis-related areas within the GCCs’ AORs, thereby freeing the
supported command’s organic assets to refocus on crisis support.
III-9
Chapter III
of effort and mission accomplishment. Additionally, commanders (as well as other users)
should continuously provide feedback on the effectiveness of intelligence in supporting
operations. Figure III-3 depicts commanders’ intelligence responsibilities.
(2) Provide Planning Guidance. Commanders focus the planning process through
the commander’s intent, planning guidance, and initial CCIRs. The commander’s guidance
provides the basis for the formulation of PIRs, the concept of intelligence operations, and
coherent target development and target nominations.
(3) Define the AOI. Commanders should define their AOI based on mission
analysis, their concept of operations (CONOPS), and a preliminary analysis of relevant
aspects of the OE (prepared as part of the JIPOE process). Commanders should also give
clear guidance on the visualization tools and products that support understanding of the OE.
III-10 JP 2-0
Intelligence Organizations and Responsibilities
operations occurs in the JIOC and begins with commanders involving their intelligence
planners in the earliest stages of the joint operation planning process (JOPP).
(7) Demand High Quality, Predictive Intelligence. Commanders must expect their
intelligence personnel to provide predictive intelligence that meets the attributes of intelligence
excellence. JFCs must also understand the challenges and limitations that confront intelligence
personnel in assessing the dynamic OE to include adversary intentions and future COAs thus
predictive intelligence is based on incomplete and changing information.
b. Joint Force J-2 Responsibilities. The J-2 assists the JFC in developing strategy,
planning operations and campaigns, and tasking intelligence assets, for effective joint and
multinational operations. Additionally, the J-2 is responsible for determining the
requirements and direction needed to ensure unity of the intelligence effort and to support the
commander’s objectives. The CCMD J-2 provides higher echelons and subordinate
commands with a single, coordinated intelligence picture by fusing national and theater
intelligence into all-source estimates and assessments. The CCMD J-2’s responsibility also
includes applying national intelligence capabilities, optimizing the utilization of joint force
intelligence assets, and identifying and integrating additional intelligence resources. The
scope of needs, resources, and procedures will depend on the mission, nature, and
composition of the force. To plan, coordinate, and execute required intelligence operations,
joint force J-2s have the following major responsibilities (see Figure III-4).
(1) Provide Threat Assessments and Warning. The J-2 is responsible for
analyzing all relevant aspects of the OE, determining adversary capabilities, and estimating
adversary intentions. The J-2 provides the resulting threat assessments and warning to the
joint force and its components in a manner consistent with the intelligence principle of
excellence (i.e., the product must be anticipatory, timely, accurate, usable, complete,
relevant, objective, and available).
(2) Participate in all Decision Making and Planning. Using JIPOE as a basis,
the J-2 participates in the JFC’s decision-making and planning processes from the time that
operations are first contemplated or directed until the completion of the operation. The JFC
and the J-2 must conduct a continuous dialogue concerning the adversary’s relative
strengths, weaknesses, and ability to prevent the joint force from accomplishing its mission.
(3) Synchronize Intelligence With Operations and Plans. The J-2 intelligence
planners should lead J-2 participation in the pertinent groups to ensure that intelligence
activities are synchronized to support the commander’s decision-making process and to meet
the planners’ requirements. This is particularly important in the field of target intelligence,
which provides a functional link between intelligence and operations. The commanders’
desired effects provide the basis for target development, nomination, and prioritization, while
assessment will inform any changes in the commander’s objective and strategy.
III-11
Chapter III
For further information regarding the concept of intelligence operations, see JP 3-33,
Joint Task Force Headquarters, and JP 2-01, Joint and National Intelligence Support to
Military Operations.
(5) Develop Detailed Intelligence Annexes. The JFC’s PIRs and the results of
wargaming serve as the basis for the intelligence annex of each directed OPLAN and concept
plan. The annex will list the JFC’s PIRs and the supporting information requirements. It
will identify the intelligence forces available for the operation, resolve shortfalls, and assign
or recommend tasks (as appropriate) that will best support the joint force’s requirements.
This annex should allocate available joint force and supporting intelligence assets among the
elements of the joint force in accordance with the commander’s intent, main effort, and
CONOPS. The J-2 must ensure that component intelligence requirements critical to success
of key component operations receive appropriate intelligence support. The annex also
addresses how any shortfalls between assigned or attached capabilities and requirements will
be met by national and supporting capabilities.
(6) Integrate National and Theater Intelligence Support. The J-2 should
plan for integrating national and theater intelligence elements and products into the joint
force’s intelligence structure. National and theater intelligence organizations will make
III-12 JP 2-0
Intelligence Organizations and Responsibilities
operations feasible that could not be accomplished without their access, capability,
capacity, or expertise.
Joint and national intelligence support is discussed in greater detail in JP 2-01, Joint and
National Intelligence Support to Military Operations.
(7) Exploit Combat Reporting from Operational Forces. Forward and engaged
combat forces have a responsibility to report information that can be integrated with
intelligence obtained from reconnaissance and surveillance assets. In many situations, even
negative reporting from operational forces may be valuable (e.g., a lack of contact with
adversary forces may be just as significant as positive contact). Likewise, special operations
forces (SOF) provide the JFC with a unique manned and unmanned deep look capability,
especially useful in areas where other sensors are not available, or cannot provide situational
awareness. Based on operational requirements, the J-2 must identify the PIRs and associated
reporting criteria to properly focus SOF assets.
(9) Ensure Accessibility of Intelligence. The J-2 must ensure that intelligence is
readily accessible throughout the joint force while still adhering to security standards (e.g.,
security clearance and need-to-know requirements). All efforts must be made to ensure that
the personnel and organizations that need access to required intelligence will have it in a
timely manner. When operating in a multinational environment, personnel trained in foreign
disclosure regulations should be assigned to the joint force to facilitate the efficient flow of
intelligence to authorized multinational members.
III-13
Chapter III
Intentionally Blank
III-14 JP 2-0
CHAPTER IV
INTELLIGENCE SUPPORT TO PLANNING, EXECUTING, AND ASSESSING
JOINT OPERATIONS
“What is called ‘foreknowledge’ cannot be elicited from spirits, nor from gods,
nor by analogy with past events, nor from calculations. It must be obtained
from men who know the enemy situation.”
Chinese General and Tactician Sun Tzu, The Art of War, 400-320 BC
The planning of joint operations is accomplished through the APEX system. The
intelligence component of APEX is the IP process and it is conducted by the organizations
within the DOD component of the IC. IP procedures are fully integrated and synchronized
with joint operation planning and apply to deliberate and crisis action planning. The IP
process is a methodology for coordinating and integrating available defense intelligence
capabilities to meet CCDR intelligence requirements. It ensures that prioritized intelligence
support is aligned with CCDR objectives for each phase of an operation. The DOD portion
of the IC develops products that are used by the joint force J-2 to provide the JFC and staff
with situational understanding of the OE.
b. NISP. The NISP is a supporting plan to a CCMD plan that details how the
intelligence capabilities of CSAs, Services, and other DOD Intelligence Enterprise
organizations will be employed to meet the CCDR’s stated intelligence requirements. It
facilitates the integration of theater and national intelligence capabilities and synchronizes
intelligence operations. The NISP contains annexes from applicable defense intelligence
agencies/organizations that detail their concept for function support.
For additional information on IP, refer to CJCSM 3314.01, Intelligence Planning, and JP
2-01, Joint and National Intelligence Support to Military Operations.
IV-1
Chapter IV
For additional information on JOPP, refer to JP 5-0, Joint Operation Planning, and JP 2-01,
Joint and National Intelligence Support to Military Operations.
Joint and national intelligence activities help identify and monitor threats to national
security that inform the development of policy and the DOD’s overall planning efforts.
Through joint operation planning, intelligence priorities are further refined to focus the
employment of limited DOD intelligence resources. Thus, IP activities are generally
organized along two lines of effort (LOEs): providing intelligence support to joint operation
planning and planning intelligence operations as illustrated in Figure IV-2.
IV-2 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
Situational Awareness
Operational Planning
Activities
Execution
Operation Plan
Products
Execute Order
Warning Planning Alert Operation
Order Order Order Order
Deployment Order
Legend
IPR in-progress review IPR F IPR final plan approval
IPR A IPR mission analysis review IPR R IPR plan assessment review
IPR C IPR concept development review
IV-3
Chapter IV
Refine,
Products
Produ
Prod
adapt,
terminate,
uc
cts
ts
execute
ents
ent s
nts
Requirem
uirem
me
i re
Req
qu
Re
Legend
IPR A strategic guidance in process review IPR F plan approval in process review
IPR C concept development in process review IPR R plan assessment in process review
(2) At the CCMD level and below, intelligence planners orchestrate the command’s
continuous JIPOE effort for analysts to provide a baseline assessment of the OE, adversary
capabilities, COGs, vulnerabilities and estimated adversary COAs. The analytical cell of the
CCMD JIOC evaluates relevant databases and intelligence holdings to identify gaps relevant
to the planning effort under consideration. This includes the status of targeting information.
The J-2 may form a JIPOE coordination cell to draw relevant information from other staff
elements, IC representatives, and PNs as appropriate, as well as request tailored products
from the defense IC. The JIPOE process culminates with the production of an intelligence
IV-4 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
For more information on JIPOE, refer to JP 2-01.3, Joint Intelligence Preparation of the
Operational Environment.
(3) As core members of the joint planning group (JPG), intelligence planners
contribute to the overall plan design and nominate operations objectives, desired effects and
other mission success criteria. In nominating mission success criteria, intelligence planners
also advocate for the adoption of measurable and achievable objectives while considering
how intelligence capabilities might be employed to assess them.
(1) Intelligence planners assemble an IPT or similar community of interest with all-
source analysts and collection strategists as its core members (Figure IV-3). Intelligence
systems architects, single source analysts and representatives from CSAs, Service
components, and the joint reconnaissance center (JRC) may also collaborate with the IPT.
(2) The IPT develops an IP timeline that is synchronized with the command’s
planning timeline. This ensures tailored JIPOE products, the initial intelligence estimate and
the initial J-2 staff estimate are developed to meet the JPG’s requirements.
(3) To generate the J-2 staff estimate, the IPT, ICW representatives from Service
component and subordinate JFCs, identifies and analyzes all intelligence capabilities under
combatant command (command authority) available to support the execution of the plan.
For contingency plans, this may include all assigned and apportioned forces. For ongoing
operations and campaign plans this may include all assigned and allocated forces.
Conducting this analysis for ongoing operations, campaigns, and crisis action planning, may
inform requests for additional forces.
(4) The IPT evaluates current theater collection and production postures to identify
available assets that may need to be redirected to support the planning effort or the execution
of the plan under consideration. In collaboration with the CCMD’s collection managers,
joint force counterintelligence and human intelligence staff element (J-2X), the JRC, and
representatives from JFCC-ISR, the IPT conducts a preliminary assessment of available
collection assets and capabilities. In collaboration with the CCMD production manager, and
representatives from the JIOC’s analytical cell, the IPT performs an initial assessment of
available analytic capabilities.
(5) Based on the list of all available intelligence capabilities, the IPT drafts and
submits the initial J-2 staff estimate to the JPG to support the command’s overall force
structure analysis. In addition to listing all available intelligence capabilities, the initial J-2’s
staff estimate identifies all factors that may affect the employment of these capabilities.
Factors such as logistical supportability, basing rights, communications and intelligence
systems architecture, linguist availability, and legal restrictions should be considered.
Certain employment limitations can be mitigated during COA development ICW the JPG.
Other limitations however, may require mitigation through friendly actions outside the
IV-5
Chapter IV
Intelligence
Planner
PIR Annex B
Development Development
Intelligence Joint
System ISR Reconnaissance
Architects EEI Synchronization Cell
Development Core and Integration
Members Collection
Operations
Indicates Manager
Collection Plan
Development Development
All-source SIR Collection
Analyst Development Strategist
Collection
Requirements
ManagerService
Component
Representative
Service
CSA
Representative Component
Ad Hoc Members Representative
Service
CSA Component
Representative Service
Representative
CSA
Component
Representative
Representative
Legend
CSA combat support agency ISR intelligence, surveillance, and reconnaissance
EEI essential element of information SIR specific information requirement
(6) Considering all of the identified intelligence gaps relevant to the planning effort
and recognizing the uncertainties in analytical conclusions, intelligence planners in
collaboration with the JPG, may nominate additional planning assumptions and initial PIRs
IV-6 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
for validation during the current planning cycle. Upon approval by the J-2 and the CCDR,
initial PIRs are then passed to the IPT or appropriate mission managers for action. If left
unanswered prior to plan development, initial PIRs, may be included as part of the final
CCIRs to be monitored during plan assessment to inform RATE decisions.
(b) Red cell personnel to play the role of an uncooperative adversary and red
team personnel to challenge planning assumptions and provide alternative viewpoints.
(2) Based on potential adversary reactions evaluated during COA analysis and
wargaming, the intelligence planner and the collection strategist determine how the various
collection disciplines could be employed to monitor relevant indicators.
(3) The intelligence planner revises the J-2 staff estimate capturing additional
factors, unique to each of the proposed friendly COAs, which may limit the employment of
intelligence capabilities. Once identified, the intelligence planner ensures these factors are
considered during COA comparison.
IV-7
Chapter IV
(4) The intelligence planner consolidates final PIR nominations from across the
staff and drafts PIRs as required to support CCDR decisions. During COA approval, the
intelligence planner recommends PIRs through the J-2 for CCDR approval. PIR
nominations not approved by the CCDR are processed at a lower priority and satisfied when
intelligence resources become available.
(5) Following COA approval, the intelligence planner in collaboration with the IPT
develops EEIs and associated indicators required to satisfy the PIR. To maximize support to
the commander’s operational objectives, the IPT integrates and reconciles these requirements
with MOEs and their associated indicators.
(7) The J-2 staff estimate process culminates with the collection and production
capability assessments performed against anticipated requirements entered on the collection
and production requirements matrices.
(8) The CCMD J-2 will determine whether a NISP is required and will request IP
support from the Joint Staff J-2 to initiate NISP development, based on the CCMD J-2 staff
estimate, and in accordance with CJCSI 3110.02, Intelligence Planning Objectives,
Guidance, and Tasks. The Joint Staff J-2 is responsible for publishing a message
announcing the NISP effort and requesting points of contact from the relevant communities
of interest. Development of the NISP is based on the supported CCMD’s PIRs, EEIs,
concept of intelligence operations, production and collection requirements matrices, and the
J-2’s staff estimate of available capabilities to satisfy its requirements. Collaboration
between the CCMD, Joint Staff J-2, CSAs, and Service intelligence centers is encouraged
and can occur at any time during the planning process. However, the NISP process begins in
earnest when the CCMD J-2 judges that the supported plan is sufficiently developed and that
requirements matrices are ready for submission to the Joint Staff J-2.
(1) The JIOC’s analytical cell completes the intelligence estimate. Selected
portions of the intelligence estimate are used to complete the enemy situation paragraphs
throughout the plan.
Refer to CJCSM 3130.03, Adaptive Planning and Execution (APEX) Planning Formats and
Guidance, for a complete intelligence estimate format.
(2) The CCMD J-2 may also provide analytical support and input to other portions
of the plan to include annex H, (Meteorological and Oceanographic Operations, and other
annexes as required.
IV-8 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
(1) Intelligence planners develop the base annex B (Intelligence) which outlines the
intelligence mission, concept of intelligence operations, PIRs, and guidance for how
collection, processing and exploitation, analysis and production, dissemination and
integration, and evaluation and feedback will be performed during execution. The annex B
(Intelligence) also specifies tasks to subordinate intelligence organizations and requirements
for external support.
(4) To ensure the collection plan is fully integrated and synchronized with the
contemplated operation, intelligence planners and collection strategists contribute to other
portions of the plan such as appendix 9 (Reconnaissance) to annex C (Operations); annex S
(Special Technical Operations); and other annexes as required.
(5) If the contingency plan will be supported by a NISP, the Joint Staff J-2 and
CCMD J-2 will collaborate to lead the NISP development, production, completion, staffing,
and approval process.
For additional information on NISP development, IP support to campaign plans and crisis
action planning, refer to CJCSM 3314.01, Intelligence Planning.
Continuous and timely assessments are essential to measure progress of the joint force
toward mission accomplishment (see Figure IV-4). Commanders continuously assess the OE
and the progress of their campaigns, and then compare them to their initial vision and intent.
Commanders and their staffs determine relevant assessment actions and measures during
planning. They consider assessment measures as early as mission analysis, and include
assessment measures and related guidance in commander and staff estimates. They use
assessment considerations to help guide operational design in order to improve the sequence
and type of actions along lines of operation. During execution, they continually monitor
progress toward accomplishing tasks, creating effects, and achieving objectives. Assessment
requirements, and the collection and analytic resources required to perform them are built
into plans and monitored. Plans for intelligence collection and analytic support to execution
and continuous plan assessment are based on the supported CCMD’s anticipated
requirements reflected in appendix 1 (Priority Intelligence Requirements) to annex B
(Intelligence) of the order. During execution, preplanned collection and production
requirements may change in response to dynamic changes to the CCDR’s PIRs.
IV-9
Chapter IV
a. Assessment actions and measures help commanders adjust operations and align
future operations strategic and operational-level assessment efforts concentrate on broader
tasks, effects, objectives, and progress toward the end state, while tactical-level assessment
focuses on task accomplishment. Even in operations that do not include combat, assessment
of progress is just as important and can be more complex than traditional combat assessment.
Normally, the joint force J-2 assists the J-3 or J-5 in coordinating assessment activities.
b. The joint force J-2, through the CCMD JIOC, assesses adversary capabilities,
vulnerabilities, and intentions, and monitors the OE. The J-2 helps the commander and staff
decide what aspects of the OE to measure and how to measure them to determine progress
toward accomplishing a task, creating an effect, or achieving an objective. Intelligence
personnel use the JIPOE process to provide JFCs and their staffs with a detailed
understanding of the adversary and other relevant aspects of the OE.
d. The assessment process is continuous and linked to the CCIR process by the
commander’s need for timely information and recommendations to make decisions during all
phases of the operation or campaign as shown in Figure IV-4. Intelligence support to plan
assessment applies during shape as well as execution phases. By supporting assessments of
the impacts of shaping activities, the J-2 supports decisions to refine or adapt the campaign
plan or to refine, adapt, or terminate contingency plans. During execution, the J-2 continues
to provide support to assessments to inform fragmentary order development reflecting
decisions to refine, adapt, or terminate ongoing military operations. Intelligence assessments
of the current situation provide the means for intelligence analysts to draw conclusions of a
potential future situation and estimate the next series of adversary COAs. In so doing,
analysts revise and maintain a running intelligence estimate to facilitate continuous planning
across multiple timeframes during the conduct of operations.
a. The assessment process uses MOPs to evaluate task performance at all levels of war,
and MOEs to determine progress of operations toward achieving objectives. MOPs are used
to measure task accomplishment, and answer the question “was the action taken, were the
tasks completed to standard?” to produce the desired effect. MOEs are used at the strategic,
operational, and tactical-level intelligence staffs to assess changes in adversary behavior,
capabilities, or the OE. MOEs help answer questions like: “are we doing the right things, are
our actions producing the desired effects, or are alternative actions required?” Well-devised
measures can help the commanders and staffs understand the causal relationship between
specific tasks and desired effects.
b. Both MOPs and MOEs can be quantitative or qualitative in nature, but meaningful
quantitative measures are preferred because they are less susceptible to subjective
IV-10 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
Commander's
Critical
Information Effective
Requirements Decisions
Assessment
Friendly Force Information Operational reporting to
Requirement address all instruments
of national power
Legend
PMESII political, military, economic, social, information, and infrastructure
interpretation. Through these measures, the J-2 and the J-3 assist the commander in
determining if military operations are producing desired or undesired effects, when
objectives have been achieved and when unforeseen opportunities can be exploited or require
a change in planned operations to respond to unforeseen adversary actions.
d. Indicators are developed through the JIPOE process and detected through
intelligence disciplines and friendly unit reports (e.g., mission reports or situation reports).
Friendly unit reports are used in most aspects of combat assessment, since they typically
offer specific, quantitative data, or a direct observation of an event to determine
accomplishment of tactical tasks.
For more information on the relationships between the CCIR process, and the assessment
process, and continuous planning during execution, refer to JP 5-0, Joint Operation
Planning.
IV-11
Chapter IV
Continuous
intelligence
JIPOE Step 4 assessments (current
state)
Legend
J-3 operations directorate of a joint staff JIPOE joint intelligence preparation of the
J-5 plans directorate of a joint staff operational environment
IV-12 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
Levels Guidance
Assessed using measures of
National End state and effectiveness
strategic objectives (Are we doing the right things?)
Reattack or
Future Targeting
characterizes the assessment with strengths, weaknesses, and how decisions are made.
Analysts should evaluate biometric, biographic, forensic, and DOMEX data in concert with
the JIPOE. The JIPOE analyst must also have a detailed understanding of how each aspect
of the OE links to the others and how various permutations of such links and nodes may
combine to form COGs. For example, Figure IV-7 shows strategic and operational COGs,
each consisting of a set of nodes and links. The operational COG resides in the military
system, while the strategic COG focuses in the political system but overlaps with the
operational COG.
b. JIPOE analysts should assess the importance and vulnerabilities of all operationally
relevant nodes and all primary and alternative links to those nodes. This is accomplished by
combining an analysis of the constraints imposed by the OE with an evaluation of the
adversary’s preferred method or means of conducting a specific type of operation or activity
(e.g., attack, defense, proliferation, WMD production, financing terrorist cells). The
resulting product may take the form of a situation template or model that identifies all the
nodes and links associated with individual COAs or options available to the adversary within
a specific category of activity. The situation templates may be combined, modeled, and
compared to identify key nodes and primary and alternate links among nodes. The
consolidated template (event template) provides the means for determining specific events in
time and space that if detected would indicate changes in adversary behavior, systems, or the
IV-13
Chapter IV
Informational
Infrastructure
Social
Military
Operational
COG
Economic
Strategic
COG Political
Legend
COG center of gravity Decisive Point COG Node Node Link
The JIPOE process and its relationship to assessment is described in greater detail in JP
2-01.3, Joint Intelligence Preparation of the Operational Environment.
IV-14 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
Program
Minister of 1256 Military
National Systems
Defense
Research
in Uranium Research in Information
Enrichment Research
Processing in Ballistic Systems
Plutonium Missiles
Research Infrastructure
Reactor Commercial Systems
Centrifuge Processing
Facility Facility Reactor
Research in
Consolidated
Reprocessing Event Template
Program (showing potential
Research in National 1256 links indicating
Enrichment Nuclear Power Bank of Z intent to develop
Corporation
nuclear weapons)
Legend
existing links potential links
IV-15
Chapter IV
IV-16 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
(b) BDA phase III produces a target system assessment for the theater of
operations. SMEs compile the functional damage assessments of the individual targets
within a system and apply it to the current system analysis or enemy order of battle.
Although different weapons are involved, the process described above applies to BDA of
targets attacked with nonlethal fires as well. SIGINT will often be the most capable
collection asset of determining the actual functional damage to the target in these cases.
b. MEA. MEA is an assessment of the military force applied in terms of the weapon
system and munitions effectiveness to determine and recommend any required changes to the
methodology, tactics, weapon systems, munitions, fusing, and/or delivery parameters to
increase force effectiveness. MEA is conducted concurrently and interactively with BDA
assessments. MEA is primarily the responsibility of component operations, with inputs and
coordination from the IC. MEA targeting personnel seek to identify, through a systematic
trend analysis, any deficiencies in weapon system and munitions performance or combat
tactics by answering the question, “Did the systems (i.e., bomb or jamming) employed
perform as expected?” Using a variety of intelligence and operations inputs, to include phase
II functional damage assessments, operators prepare a report assessing munitions
performance and tactical applications. The report details weapon performance against
specified target types. This information could have a crucial impact on future operations and
the quality of future BDA. MEA can continue years after the conflict using archived data
and information collected by on-site inspections of targets struck during the conflict.
11. General
IV-17
Chapter IV
to mitigate combat-related battle injuries and disease and nonbattle injuries during
deployment, employment, and redeployment; and intelligence analyses of threats to air, land,
and sea lines of communications are critical to sustainment operations. Immediate, precise,
and persistent intelligence support to force employment is a particularly important
prerequisite for military success throughout all phases of a joint operation regardless of how
the battle evolves, see Figure IV-9. Intelligence staffs must be familiar with specific phasing
arrangements of each command OPLAN because the phasing may differ for specific types of
operations. During execution, intelligence must stay at least one step ahead of operations
and not only support the current phase of the operation, but also simultaneously lay the
informational groundwork required for subsequent phases. Execution of joint operations
requires optimizing the use of limited intelligence assets and maximizing the efficiency of
intelligence production resources and is the ultimate test of the efficacy of intelligence
support planning.
JFCs are able to take actions before committing forces to assist in determining the shape
and character of potential future operations. In many cases, these actions enhance bonds
between future multinational partners, increase regional understanding, ensure timely access,
strengthen future multinational operations, and prevent crises. Intelligence activities
Phasing Model
Phase Action
Prepare
0
Prevent
Shape
(Phase 0) I Crisis defined
Establish security
IV
Restore services
Transfer to civil
Global Theater V authorities
Shaping Shaping Redeploy
IV-18 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
conducted within the context of deliberate planning during the shape phase develop the
basics for intelligence operations in subsequent operational phases. Intelligence activities
should also be conducted to support phase 0 operations, including those supporting theater
campaign plans.
c. Information operations intelligence integration (IOII) activities are critical during the
shape phase and rely heavily on accurate intelligence. Analysis and assessment of the
adversary’s leadership capabilities and decision-making process should be performed early
to identify effective deterrent messages and actions. Units tasked with identifying host
nation audiences should assess messaging potential during all phases of operations,
especially influence efforts during phase 0. Additionally, units should identify potential
audiences in subsequent phases while still in phase 0 to facilitate IO coordinating efforts.
Early identification of potential audiences allows greater responsiveness of IRCs.
Before the initiation of hostilities, the JFC must gain a clear understanding of the
national and military strategic objectives; desired and undesired effects; actions likely to
create those effects; COGs and decisive points; and required joint, multinational, and
nonmilitary capabilities matched to available forces. The joint force J-2 assists the JFC in
visualizing and integrating relevant considerations regarding the OE into a plan that will lead
to achievement of the objectives and accomplishment of the mission. It is therefore
imperative that the JIPOE effort (initiated during the shape phase) provide the JFC with an
understanding of the OE at the outset of the deter phase.
IV-19
Chapter IV
a. IOII is also critical during the deter phase. The adversary structure and leadership
decision-making process should be continuously monitored and assessed to determine what
influence activities may serve as effective deterrents. The receptivity of foreign target
audiences to specific messages and actions should also be continuously assessed to support
overall influence efforts.
b. During the deter phase, the ongoing JIPOE effort is accelerated to focus on
monitoring the current situation while simultaneously assessing adversary capabilities to
affect subsequent phases of the operation. JIPOE analysts support early warning by looking
for specific indications of imminent adversary activity that may require an immediate
response or an acceleration of friendly decision-making processes. JIPOE efforts also
concentrate on confirming adversary COGs and support the continuous refinement of
estimates of adversary capabilities, dispositions, intentions, and probable COAs within the
context of the current situation. At the same time however, JIPOE analysts must look ahead
and prepare threat assessments to support future operations planned for the seizing the
initiative, dominance, and stabilization phases.
c. During the deter phase, COA development is dependent on detailed TSAs to identify
the functional components in the OE that may be affected to support the commander’s
objectives.
d. GEOINT support is critical during the deter phase. It is essential that any maps,
charts, imagery products, and support data to include datum coordinate systems, target
material used in a joint operation be coordinated with joint force components, the Joint Staff,
OSD, NGA, and PNs. The joint force J-2 works with the JFC staff and component command
staffs to identify requirements for updated GEOINT products and submits these requirements
through the NGA liaison team.
IV-20 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
g. Intelligence support to CMO during the deter phase can amplify operations to isolate
the adversary. An analysis and assessment of the civil dimension of potential allies or
supporters of the adversary may determine what civil engagement actions may serve as
effective points of influence. Additionally, analysis of the civil dimension of friendly
countries, especially in countries where US forces will require access for subsequent phases,
will suggest appropriate civil engagement targets for CMO that may reduce enemy freedom
of action while enhancing that of the US operational commander.
14. Intelligence Support During the Seize the Initiative Phase (Phase II)
As operations commence, the JFC needs to exploit friendly asymmetric advantages and
capabilities to shock, demoralize, and disrupt the enemy. The JFC seeks decisive advantage
through the use of all available elements of combat power to seize and maintain the
initiative, deny the enemy the opportunity to achieve its objectives, and generate in the
enemy a mindset of inevitable failure. Additionally, the JFC coordinates with the
appropriate interagency representatives through a joint interagency task force, joint
interagency coordination group (JIACG), or individually to facilitate coherent use of all
instruments of national power in achieving national strategic objectives. JFCs and their J-2s
should be on continuous guard against any enemy capability which may impede friendly
force deployment from bases, to ports of embarkation, to lodgment areas.
a. The JFC’s target intelligence element is more active during this phase compared to
previous phases in gathering target nominations, vetting targets, capabilities analysis and
target list management all result in a completed joint integrated prioritized target list. During
this phase, targeteers monitor ongoing operations recommend changes to the plan, conduct
assessment, and provide input for further strategy and planning efforts.
b. IOII and OPSEC are particularly important during this phase. CI supports force
protection during deployment from home bases to lodgment areas. I2 supports the
identification of key adversary personnel, persons of interest, and their support and
facilitation networks. HUMINT, SIGINT, and OSINT sources may detect indications of
enemy demoralization and provide insight into the military information support operations
success or failure, and potential for exploitation of psychological vulnerabilities. Both the
CCMD red team and red cells add value to friendly deception planning efforts. The red team
analyzes the proposed plan from the adversary’s perspective, and red cells provide insight
into the possible times and locations of the adversary’s intelligence collection plan. This
insight assists deception planners in determining the best times and locations to plant
deceptive information designed to mislead adversary intelligence analysts.
IV-21
Chapter IV
for CI and force protection. An integrated collection strategy that fully optimizes the use of
all available US, PN, and host-nation collection capabilities assets is essential to persistent
surveillance. Furthermore, the CCMD JIOC facilitates collection management through ISR
visualization—the continuous real-time monitoring of the status, location, and reporting of
intelligence platforms and sensors. ISR visualization provides real-time cross cueing and
provides a basis for re-tasking and time-sensitive decision making.
Persistent surveillance and ISR visualization are discussed in greater detail in JP 2-01, Joint
and National Intelligence Support to Military Operations.
b. Intelligence must not only support operations during the dominate phase, but also
anticipate and address the information requirements for the subsequent stabilize phase. For
example, intelligence must be prepared to assist the JFC in determining how to fill the power
vacuum after the conclusion of sustained combat operations. In order to set the groundwork
for stability, security, transition, and reconstruction operations, the JFC will require detailed
intelligence regarding the status of key infrastructure, enemy government organizations and
personnel, and anticipated humanitarian needs.
IV-22 JP 2-0
Intelligence Support to Planning, Executing, and Assessing Joint Operations
The use of long endurance, unmanned aircraft systems, such as the MQ-1 Predator, greatly
facilitates real-time, persistent surveillance.
increase their focus on supporting the efforts of host nation authorities, US Government
departments and agencies, IGOs, and/or NGOs.
a. During the stabilize phase, intelligence collection and analysis should transition from
supporting combat operations to focus on actual or potential threats to the joint force (e.g.,
insurgent groups, criminal elements, terrorist cells). Particular attention should be paid to
identifying and assessing the leaders of groups posing potential threats to civil authority and
reconstruction efforts. Intelligence should also identify critical infrastructure and analyze its
vulnerability to disruption by elements hostile to stabilization efforts. Critical infrastructure
vulnerability analysis may require coordination and assistance from other organizations.
b. CI support to force protection is critical during the stabilization phase. Host nation
authorities, other organizations, IGOs, and NGOs working closely with US forces may pass
information (knowingly or unknowingly) to hostile elements that enables them to interfere
with stability operations. Likewise, members of the local populace may have access to US
bases in order to provide essential services and friendly forces may recruit former regime
officials to participate in stabilization efforts. CI elements help screen and vet foreign
personnel and investigate instances of compromised sensitive information.
c. Assessment assists the stabilize phase by assessing the relative effectiveness of IRCs
and other operations supporting civil authorities and reconstruction efforts. Additionally,
DIA’s human factors assessments of foreign leadership’s susceptibility to influence can
assist commanders in determining the best COAs to achieve stability.
IV-23
Chapter IV
a. In some situations, intelligence support may remain in place after termination of the
joint operation in order to support the civil authority and/or to continue to monitor the
situation. As in the deterrence phase, intelligence resources may serve as a valuable tool for
demonstrating US resolve and commitment to the host nation. To facilitate this critical role
in establishing friendly relations with the new civil authority, intelligence sharing agreements
should be promulgated as soon as practicable.
b. Before the operation is terminated, it is important that all intelligence lessons learned
are recorded in appropriate databases and are captured in joint doctrine. Likewise, the joint
force J-2 should ensure that all JIPOE products, intelligence assessments, collection plans,
and J-2X source registries are appropriately archived. This material may prove valuable to
operation planning in the event US forces are directed to redeploy to the area.
IV-24 JP 2-0
CHAPTER V
JOINT, INTERAGENCY, AND MULTINATIONAL INTELLIGENCE SHARING
AND COOPERATION
“One of the most gratifying features of recent work in intelligence, and one that
is quite unique in its long history, has been the growing cooperation established
between the American intelligence services and their counterparts throughout
the Free World which make common cause with us as we face a common
peril.”
V-1
Chapter V
“It’s not a technical issue any more. It’s really more about culture and the ‘need
to share’ rather than the ‘need to know.”
In most multinational operations, the JFC will be required to share intelligence with
foreign military forces and to coordinate receiving intelligence from those forces.
Intelligence efforts must be complementary and take into consideration the intelligence
system’s strengths, limitations, and each nation’s unique and valuable capabilities. In some
multinational operations or campaigns, JFCs will be able to use existing international
standardization agreements (e.g., North Atlantic Treaty Organization [NATO]) as a basis for
establishing rules and policies for conducting joint intelligence operations. Since each
multinational operation will be unique, such agreements may have to be modified or
amended based on the situation. A JFC participating in a multinational force develops the
information sharing policy and procedures for that particular operation based on CCDR
guidance and national policy as contained in the National Policy and Procedures for the
Disclosure of Classified Military Information to Foreign Governments and International
Organizations (short title: National Disclosure Policy [NDP]-1). NDP-1 provides policy
and procedures in the form of specific disclosure criteria and limitations, definition of terms,
release arrangements, and other guidance. The following general principles (see Figure V-1)
provide a starting point for creating the necessary policy and procedures:
a. Align with NDP. CCMDs and the JFC’s foreign disclosure officers (FDOs) require
authority before they share classified military information or national intelligence with a
foreign entity. Classified military information, as defined in National Security Decision
Memorandum 119, Disclosure of Classified US Military Information to Foreign Governments
and International Organizations, is that set of information which is under the control or
jurisdiction of the DOD, its departments or agencies, or is of primary interest to them.
b. Maintain Unity of Effort. Intelligence personnel of each nation need to view the
threat from multinational as well as national perspectives. A threat to one element of the
multinational force by the common adversary must be considered a threat to all multinational
force elements. Success in intelligence sharing requires establishing a trusted partnership
with foreign counterparts to counter a common threat and maintain a unity of effort.
V-2 JP 2-0
Joint, Interagency, and Multinational Intelligence Sharing and Cooperation
d. Plan Early and Plan Concurrently. JFCs determine what intelligence may be
shared with the forces of other nations early in the planning process. NATO and the United
States-Republic of Korea Combined Forces Command have developed and exercised
intelligence policies and procedures that provide examples of how multinational planning
can be done in advance.
e. Share Necessary Information. The joint force should share relevant intelligence
about the situation and adversary with its multinational partners consistent with respective
NDP and JFC guidance. However, information about intelligence sources and methods
should not be shared among allies and PNs until approved by the appropriate national-level
agency.
(1) In order to share critical intelligence information with allies and PNs efficiently,
US intelligence information should be written for release at the most appropriate
classification level and given the fewest possible dissemination restrictions within foreign
disclosure guidelines. When information relating to a particular source cannot be shared, the
intelligence derived from that source may still be provided to other PNs, so long as the
information itself does not compromise the source. The J-2 must establish procedures for
separating intelligence from sources and methods. Intelligence production agencies often
use a “tear line” in classified reports to separate compartmented information from
intelligence that can be widely disseminated (the J-2 and component intelligence staff
officers keep information above the tear line and disseminate the intelligence below).
Having intelligence production agencies use such tear lines will greatly facilitate intelligence
sharing.
(2) The joint force J-2 must obtain the necessary foreign disclosure authorization
from DIA as soon as possible. J-2 personnel must be knowledgeable of the specific foreign
disclosure policy, procedures, and regulations for the operation. The efficient flow of
intelligence will be enhanced by the assignment of personnel training in foreign disclosure.
V-3
Chapter V
b. Build Mutual Trust and Respect for Colleagues. As analysts work intelligence
problems, they count on one another to share all relevant data from within their particular
field of expertise. For example, imagery analysts should expect SIGINT analysts to provide
all relevant information for a particular intelligence problem that they are working and vice
versa. Trust and respect is facilitated by proactively communicating information to
colleagues and counterparts and by ensuring they are recognized by their organizations for
their expertise and contributions.
V-4 JP 2-0
Joint, Interagency, and Multinational Intelligence Sharing and Cooperation
c. Share a Common Vision. A shared common vision should include the goal of
providing the most comprehensive, accurate product possible to the customer. Individuals
who develop or follow a personal agenda at the expense of other collaborators will, over
time, be excluded from the collaborating group. Sharing a common goal among
collaborators is facilitated by taking the initiative to alert others when new information
becomes available, working together instead of competing, and providing tip-offs of possible
collection opportunities. By synchronizing efforts, the strengths of each organization can be
maximized for the benefit of all collaborators.
V-5
Chapter V
provided in a form that is readily understood and directly usable by the recipient without
providing the user irrelevant data.
“Push” and “pull” control principles are discussed in detail in JP 2-01, Joint and National
Intelligence Support to Military Operations.
(3) The intelligence sharing architecture must accommodate the widest possible
range of missions and operational scenarios. It must respond to the JFC’s requirements for
information at any time and any place and support multinational operations with no loss in
timeliness. The intelligence operational architecture must incorporate the capabilities of
the national and Service intelligence organizations, and provide to the JTF and its
components the capability to access national and Service capabilities when necessary.
(5) The intelligence sharing architecture must be developed so that users can train
and exercise with intelligence capabilities in peacetime. Intelligence systems, policies,
procedures, connectivity, security, and fusion requirements must be part of joint training
exercises and incorporated into simulations. During exercises, capabilities must function
exactly as in a real operation, so that the users train in a realistic, seamless environment.
The architecture must be configured so that real world databases are preserved and cannot
be accidentally or maliciously altered during an exercise.
V-6 JP 2-0
Joint, Interagency, and Multinational Intelligence Sharing and Cooperation
(6) The intelligence architecture should provide for integration with existing and
projected secure teleconferencing and other collaborative communication capabilities.
Secure teleconferencing will permit groups of dispersed users to collaborate during the
planning and execution of intelligence operations and to coordinate with operational users.
Dispersed users include, but are not limited to, JFCs and their subordinate commanders,
and theater JIOCs, JISEs, the multinational intelligence centers and/or appropriate
multinational partners, the Joint Staff, Services, CSAs, US Government departments and
agencies, and national decision makers.
(1) Survivability. The system design specified in the technical architecture must
be as survivable as the command structure it supports. Assets that are vulnerable to
damage or destruction must have alternative means of providing required data with
minimal risk.
(4) Compatibility. The architecture must use common data formats when
reengineering existing systems or applications and developing new systems. As a mid-
term objective, all components’ intelligence systems must be capable of exchanging data,
information and intelligence products to allow all-source analysis and fusion. This
capability to share data and information must extend to applications, databases, and
communications protocols to ensure that intelligence information is compatible with work
stations, file servers, and communications links. Both anticipated and unanticipated
authorized users must have access to the discoverable, understandable information required
to adapt to situations more quickly than the enemy.
V-7
Chapter V
a. Organizational Structures
V-8 JP 2-0
Joint, Interagency, and Multinational Intelligence Sharing and Cooperation
Communications
Communications
Communications
Combatant
National
National
National
Command
JWICS JIOC
JDISS
SIPRNET CJTF
NIC
Multinational
LAN Multinational
JISE Intelligence NIC
(e.g., BICES,
CENTRIXS)
Center
NIC
Communications
Communications
Communications
National
National
National
CFLCC CFACC CFMCC
Intelligence Element Intelligence Element Intelligence Element
Legend
BICES Battlefield Information Collection and JDISS joint deployable intelligence support
Exploitation System system
CENTRIXS Combined Enterprise Regional JIOC joint intelligence operations center
Information Exchange System JISE joint intelligence support element
CFACC combined force air component command JWICS Joint Worldwide Intelligence
CFLCC combined force land component Communications System
command LAN local area network
CFMCC combined force maritime component NIC national intelligence cell
command SIPRNET SECRET Internet Protocol Router Network
CJTF combined joint task force
V-9
Chapter V
(a) The CCMD JIOC is the theater focal point to plan, synchronize, coordinate,
and integrate the full range of intelligence operations in the GCCs’ AOR. The JIOC works
with the DNI representative to the CCMD and liaison personnel from DOD and non-DOD
national intelligence organizations to ensure all relevant intelligence and information is fully
shared in the most timely manner possible.
(b) The JIACG facilitates the application of the instruments of national power
in a coherent manner and provides a means to integrate interagency perspective into military
planning and execution. The JIACG, consisting of various representatives from US
Government departments and agencies, serves as a multifunctional advisory element that can
facilitate information sharing, operational-level planning and coordination, and political-
military synthesis across the interagency community for the CCDR and staff. A typical
JIACG may connect to the various US embassies and their country teams as well as to
national-level planners. Its primary role is to bridge the gap between civilian agency and
military campaign planning efforts for regional engagement and potential regional crises.
Specific objectives of the JIACG are to:
(1) The DODIN allows data collected by any means to be communicated directly to
a user or to a processing site or platform by the most efficient path, then passed on or
through to the user as appropriate. A critical aspect of the information network is its ability
to make all intelligence accessible by way of standardized file servers to standards-compliant
workstations.
(2) The DOD Intelligence Information System enterprise is the global set of
resources (people, facilities, hardware, software, and processes) that provide information
technology and information management services to the DOD military IC through a tightly
integrated, interconnected, and geographically distributed regional service center
V-10 JP 2-0
Joint, Interagency, and Multinational Intelligence Sharing and Cooperation
architecture. The enterprise capabilities are centrally managed and decentrally executed
under the authority and direction of the DIA Chief Information Officer.
V-11
Chapter V
(1) The procedures and methodology for intelligence and information sharing should
be conceived and exercised as part of multinational and interagency planning before operations
begin. Special attention should be paid to intelligence classification and levels of access of
multinational personnel. To this end, the J-2 should consider adding extra FDO billets to
facilitate information sharing. The effectiveness of the procedures and methodology should be
monitored and, when necessary, adapted during operations to meet changing circumstances.
V-12 JP 2-0
Joint, Interagency, and Multinational Intelligence Sharing and Cooperation
V-13
Chapter V
Intentionally Blank
V-14 JP 2-0
APPENDIX A
INTELLIGENCE CONFIDENCE LEVELS IN ANALYTIC JUDGMENTS
A-1
Appendix A
Phrases such as “we judge” or “we assess” are used to call attention to a product’s key assessment.
Supporting assessments may use likelihood terms or expressions to distinguish them from
assumptions or reporting. Below are guidelines for likeliness terms and the confidence levels with
which they correspond.
A-2 JP 2-0
APPENDIX B
INTELLIGENCE DISCIPLINES
Intelligence disciplines are well-defined areas that involve specific categories, collections,
and analysis with emphasis on technical or human resources capabilities (see Figure B-1).
1. Geospatial Intelligence
b. IMINT is the technical, geographic, and intelligence information derived through the
interpretation or analysis of imagery and collateral materials. It includes exploitation of
imagery data derived from electro-optical (EO), radar, infrared (IR), multi-spectral, and laser
sensors. These sensors produce images of objects optically, electronically, or digitally on
film, electronic display devices, or other media. A wide variety of platforms and sensors
support IMINT operations. IMINT is a product that is the result of processing and exploiting
raw imagery (information) and creating an analyzed product (intelligence). An image alone
is only information in the form of pixels, digits, or other forms of graphic representation and
the data behind that portrayal. Imagery source categories include commercial remote
sensing, EO, ground photo, hyperspectral imagery (HSI), IR, lidar multispectral imagery
(MSI), panchromatic, polarmetric, and synthetic aperture radar.
(1) EO sensors provide digital imagery data in the IR, visible, and/or ultraviolet
regions of the electromagnetic spectrum. Panchromatic EO sensors detect a broad segment
of the visible spectrum, while other EO sensors focus on IR energy or detect multiple narrow
bands across the EO spectrum. EO sensors generally provide a high level of detail or
B-1
Appendix B
B-2 JP 2-0
Intelligence Disciplines
resolution as compared to radar or other sensors, but cannot successfully through bad
weather. Panchromatic sensors provide the highest level of resolution, but cannot image at
night. EO offers many advantages over non-digital (i.e., film-based) systems including
improved timeliness, greater dissemination options, imagery enhancement, and additional
exploitation methods.
(2) Radar imaging sensors provide all weather imaging capabilities and the
primary night capability. Radar imagery is formed from reflected energy in the radio
frequency portion of the electromagnetic spectrum. Some radar sensors provide moving
target indicator capability to detect and locate moving targets such as armor and other
vehicles.
(3) Lidar sensors are similar to radar, transmitting laser pulses to a target and
recording the time required for the pulses to return to the sensor receiver. Lidar can be used
to measure shoreline and beach volume changes, conduct flood risk analysis, identify
waterflow issues, and augment transportation mapping applications. Lidar supports large
scale production of high-resolution digital elevation products displaying accurate, highly
detailed three-dimensional models of structures and terrain invaluable for operational
planning and mission rehearsal.
B-3
Appendix B
2. Human Intelligence
For more information on interrogation, see Field Manual 2-22.3, Human Intelligence
Collection Operations, which is the source for procedures on the conduct of intelligence
interrogations. For guidance on debriefing and questioning, see Department of Defense
Directive (DODD) 3115.09, DOD Intelligence Interrogations, Detainee Debriefings, and
Tactical Questioning.
b. Source Operations. Designated and trained personnel in a unit with the “source
operations” mission may develop information through the direct and indirect questioning of
overt or clandestine sources. These personnel operate under the authority and direction of a
designated defense HUMINT executor.
For more information see DODD 5200.37, Management and Execution of Defense Human
B-4 JP 2-0
Intelligence Disciplines
Intelligence (HUMINT), and DOD 5240.1-R, Procedures Governing the Activities of DOD
Intelligence Components that Affect United States Persons.
For more information, see Defense HUMINT Enterprise Manual 3300.001, DIA HUMINT
Manual, Volume I, Collection Requirements, and Defense HUMINT Enterprise Manual
3301.002, DIA HUMINT Manual, Volume II: Collection Operations.
(2) Developed sources that are met over a period of time and provide information
based on operational requirements.
(1) Friendly forces personnel, who typically include high-risk mission personnel
such as combat patrols, aircraft pilots and crew, long range surveillance teams, and SOF, but
can include any personnel with information that can be used for intelligence analysis
concerning the adversary or other relevant aspects of the OE. Combat intelligence, if
reported immediately during an operational mission, can be used to redirect tactical assets to
attack enemy forces on a time sensitive basis.
(3) Returnees, including returned prisoners of war, defectors, freed hostages, and
personnel reported as missing in action.
(4) Volunteers, who freely offer information of value to US forces on their own
initiative.
3. Signals Intelligence
B-5
Appendix B
c. FISINT involves the technical analysis of data intercepted from foreign equipment
and control systems such as telemetry, electronic interrogators, tracking/fusing/arming/firing
command systems, and video data links.
B-6 JP 2-0
Intelligence Disciplines
5. Open-Source Intelligence
OSINT is intelligence based on open source information that any member of the public
can lawfully obtain by request, purchase, or observation. Examples of open sources include
unofficial and draft documents, published and unpublished reference material, research, or
‘cloud’ databases, and web-based networking platforms or repositories. OSINT complements
the other intelligence disciplines and can be used to fill gaps and provide accuracy and
fidelity in classified information databases. OSINT is susceptible to manipulation and
deception, and thus requires tradecraft and review during processing.
a. OSINT supports warnings, tips, and cues other intelligence disciplines, and provides
the context for understanding classified information. It can also reduce large target sets,
quickly filling information gaps, allowing the more efficient use of low-density technical and
HUMINT assets. OSINT can be employed in a number of ways, including gauging
population sentiment, discerning trends in foreign media, supporting sociocultural research
and humanitarian assistance efforts, tracking scientific and technological developments, and
enhancing foreign partnerships. OSINT products and sharing arrangements must be
approved by JFC’s FDO and conform to standing guidance. To facilitate OSINT sharing and
review, the DIA’s Open Source Collection Acquisition Requirements Management System is
used to register collection requirements for IC action.
d. Intelink Sensitive But Unclassified (SBU). Intelink SBU network, formerly known
as open source information system, is a government-wide private network connecting
members of the IC, DOD, DHS, law enforcement, and other information producers and
B-7
Appendix B
e. Open-Source Acquisition. The act of gaining possession of, or access to, open-
source information synonymous with “open-source collection.” The preferred term is
acquisition because by definition, open sources are collected and disseminated by others.
Open-source exploiters acquire previously collected and publicly available information
second-hand. When traditional collection efforts fail, use of alternative collection is possible
with OSINT. Fee for service OSINT collection, while sometimes costly, assists in filling
gaps and meeting time requirements.
6. Technical Intelligence
b. The DIA provides enhanced S&TI to CCDRs and their subordinates through the
technical operational intelligence (TOPINT) program. TOPINT uses a closed loop system
that integrates all Service and DIA S&T centers in a common effort. The TOPINT program
provides timely collection, analysis, and dissemination of theater specific S&TI to CCDRs
and their subordinates for planning, training, and executing joint operations.
c. Joint Captured Materiel Exploitation Center (JCMEC), managed by the DIA Joint
Foreign Materiel Program Office, is the primary DOD contingency TECHINT capability.
Activities of a JCMEC include recovery of foreign materiel and captured enemy equipment,
and encompasses CCMD and national requirements. Subsequent exploitation of this
materiel provides critical information on adversary strengths and weaknesses that may
B-8 JP 2-0
Intelligence Disciplines
influence operational planning and force protection. The identification, recovery, in-theater
analysis, and evacuation of this materiel is done by the JCMEC.
7. Counterintelligence
8. Applications
b. DOMEX. Captured documents and media, when processed and exploited, may
provide valuable information such as adversary plans, intentions, locations, capabilities, and
status. The category of “captured documents and media” includes all media capable of
storing fixed information to include computer storage material. DOMEX may be conducted
by any intelligence personnel with appropriate technical exploitation and language support.
c. BEI. Applied BEI supports the identification of individuals and their disposition at
the point of encounter. Additionally, BEI and corresponding I2 products support the
persistent identification and targeting of adversaries, which enables a range of military and
civilian functions. While identity attributes (biographic, biologic, behavioral, and
reputational) can be collected through intelligence disciplines, BEI provides additional layers
of understanding and characterization of individuals and networks.
d. FEI. FEI results from the collection, processing, analysis, and interpretation of
forensic material and data, as well as associated contextual data. This informs a decision
maker’s information needs with individualized information concerning events, ideology, and
persons of interest.
B-9
Appendix B
Intentionally Blank
B-10 JP 2-0
APPENDIX C
REFERENCES
1. General
f. National Policy and Procedures for the Disclosure of Classified Military Information
to Foreign Governments and International Organizations (short title National Disclosure
Policy-1).
2. Department of Defense
c. DODD 5100.01, Functions of the Department of Defense and its Major Components.
C-1
Appendix C
a. CJCS Message DTG 031640Z April 06, Joint Intelligence Operations Center (JIOC)
Execute Order, Mod 3 DTG 040001Z October 11.
f. CJCSM 3130.03, Adaptive Planning and Execution Planning Formats and Guidance.
C-2 JP 2-0
References
C-3
Appendix C
Intentionally Blank
C-4 JP 2-0
APPENDIX D
ADMINISTRATIVE INSTRUCTIONS
1. User Comments
Users in the field are highly encouraged to submit comments on this publication to: Joint
Staff J-7, Deputy Director, Joint Education and Doctrine, ATTN: Joint Doctrine Analysis
Division, 116 Lake View Parkway, Suffolk, VA 23435-2697. These comments should
address content (accuracy, usefulness, consistency, and organization), writing, and
appearance.
2. Authorship
The lead agent and Joint Staff doctrine sponsor for this publication is the Director for
Intelligence (J-2).
3. Supersession
4. Change Recommendations
c. When a Joint Staff directorate submits a proposal to the CJCS that would change
source document information reflected in this publication, that directorate will include a
proposed change to this publication as an enclosure to its proposal. The Services and other
organizations are requested to notify the Joint Staff J-7 when changes to source documents
reflected in this publication are initiated.
5. Distribution of Publications
D-1
Appendix D
a. Joint Staff J-7 will not print copies of JPs for distribution. Electronic versions are
available on JDEIS at https://jdeis.js.mil (NIPRNET) and http://jdeis.js.smil.mil (SIPRNET),
and on the JEL at http://www.dtic.mil/doctrine (NIPRNET).
b. Only approved JPs are releasable outside the combatant commands, Services, and
Joint Staff. Release of any classified JP to foreign governments or foreign nationals must be
requested through the local embassy (Defense Attaché Office) to DIA, Defense Foreign
Liaison/IE-3, 200 MacDill Blvd., Joint Base Anacostia-Bolling, Washington, DC 20340-
5100.
D-2 JP 2-0
GLOSSARY
PART I—ABBREVIATIONS AND ACRONYMS
GL-1
Glossary
I2 identity intelligence
IAA incident awareness and assessment
IC intelligence community
ICW in coordination with
IGO intergovernmental organization
IMINT imagery intelligence
IO information operations
IOII information operations intelligence integration
IP intelligence planning
IPR in-progress review
IPT intelligence planning team
IR infrared
IRC information-related capability
ISR intelligence, surveillance, and reconnaissance
GL-2 JP 2-0
Glossary
GL-3
Glossary
GL-4 JP 2-0
PART II—TERMS AND DEFINITIONS
acoustic intelligence. Intelligence derived from the collection and processing of acoustic
phenomena. Also called ACINT. (JP 1-02. SOURCE: JP 2-0)
collection plan. A systematic scheme to optimize the employment of all available collection
capabilities and associated processing, exploitation, and dissemination resources to
satisfy specific information requirements. (Approved for incorporation into JP 1-02.)
collection planning. A continuous process that coordinates and integrates the efforts of all
collection units and agencies. (JP 1-02. SOURCE: JP 2-0)
GL-5
Glossary
collection posture. The current status of collection assets and resources to satisfy identified
information requirements. (Approved for inclusion in JP 1-02.)
critical information. Specific facts about friendly intentions, capabilities, and activities
needed by adversaries for them to plan and act effectively so as to guarantee failure or
unacceptable consequences for friendly mission accomplishment. Also called CRITIC.
(Approved for incorporation into JP 1-02.)
critical intelligence. Intelligence that is crucial and requires the immediate attention of the
commander. (Approved for incorporation into JP 1-02.)
GL-6 JP 2-0
Glossary
GL-7
Glossary
identity intelligence. The intelligence resulting from the processing of identity attributes
concerning individuals, groups, networks, or populations of interest. Also called I2.
(Approved for inclusion in JP 1-02.)
GL-8 JP 2-0
Glossary
action open to the enemy or adversary and the order of probability of their adoption.
(JP 1-02. SOURCE: JP 2-0)
intelligence planning. The intelligence component of the Adaptive Planning and Execution
system, which coordinates and integrates all available Defense Intelligence Enterprise
capabilities to meet combatant commander intelligence requirements. Also called IP.
(Approved for inclusion in JP 1-02.)
intelligence requirement. 1. Any subject, general or specific, upon which there is a need
for the collection of information, or the production of intelligence. 2. A requirement for
intelligence to fill a gap in the command’s knowledge or understanding of the
operational environment or threat forces. Also called IR. (Approved for incorporation
into JP 1-02.)
intelligence source. The means or system that can be used to observe and record
information relating to the condition, situation, or activities of a targeted location,
organization, or individual. (Approved for incorporation into JP 1-02.)
joint intelligence. Intelligence produced by elements of more than one Service of the same
nation. (JP 1-02. SOURCE: JP 2-0)
joint intelligence architecture. A dynamic, flexible structure that consists of the Defense
Joint Intelligence Operations Center, combatant command joint intelligence operations
centers, and subordinate joint task force intelligence operations centers or joint
intelligence support elements to provide national, theater, and tactical commanders with
the full range of intelligence required for planning and conducting operations.
(Approved for incorporation into JP 1-02.)
GL-9
Glossary
national intelligence support team. None. (Approved for removal from JP 1-02.)
open-source information. Information that any member of the public could lawfully obtain
by request or observation as well as other unclassified information that has limited
public distribution or access. (Approved for inclusion in JP 1-02.)
processing. A system of operations designed to convert raw data into useful information.
(JP 1-02. SOURCE: JP 2-0)
GL-10 JP 2-0
Glossary
red team. An organizational element comprised of trained and educated members that
provide an independent capability to fully explore alternatives in plans and operations in
the context of the operational environment and from the perspective of adversaries and
others. (JP 1-02. SOURCE: JP 2-0)
request for information. 1. Any specific time-sensitive ad hoc requirement for intelligence
information or products to support an ongoing crisis or operation not necessarily related
to standing requirements or scheduled intelligence production. 2. A term used by the
National Security Agency/Central Security Service to state ad hoc signals intelligence
requirements. Also called RFI. (Approved for incorporation into JP 1-02.)
sociocultural analysis. The analysis of adversaries and other relevant actors that integrates
concepts, knowledge, and understanding of societies, populations, and other groups of
people, including their activities, relationships, and perspectives across time and space
at varying scales. Also called SCA. (Approved for inclusion in JP 1-02.)
technical intelligence. Intelligence derived from the collection, processing, analysis, and
exploitation of data and information pertaining to foreign equipment and materiel for the
GL-11
Glossary
warning intelligence. Those intelligence activities intended to detect and report time-
sensitive intelligence information on foreign developments that forewarn of hostile
actions or intention against United States entities, partners, or interests. (Approved for
inclusion in JP 1-02.)
GL-12 JP 2-0
JOINT DOCTRINE PUBLICATIONS HIERARCHY
JP 1
JOINT
DOCTRINE
JP 1-0 JP
JP 2-0
2-0 JP 3-0 JP 4-0 JP 5-0 JP 6-0
COMMUNICATIONS
PERSONNEL INTELLIGENCE
INTELLIGENCE OPERATIONS LOGISTICS PLANS SYSTEM
All joint publications are organized into a comprehensive hierarchy as shown in the chart above. Joint
Publication (JP) 2-0 is in the Intelligence series of joint doctrine publications. The diagram below
illustrates an overview of the development process:
Initiation
ENHANCED
JOINT JOINT
WARFIGHTING DOCTRINE
CAPABILITY PUBLICATION
Approval Development