Joint Intelligence Preparation of the Operational Environment

Total Page:16

File Type:pdf, Size:1020Kb

Joint Intelligence Preparation of the Operational Environment Joint Publication 2-01.3 T OF EN TH W E I S E' L L M H D T E F T E N A R D R A M P Y E D • • U A N C I I T R E E D M S A T F AT E S O Joint Intelligence Preparation of the Operational Environment 21 May 2014 PREFACE 1. Scope This publication provides doctrine for conducting joint intelligence preparation of the operational environment (OE) across the range of military operations. It describes the process to analyze the adversary and other relevant aspects of the OE in order to identify possible courses of action and to support joint operation planning, execution, and assessment. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations and provides the doctrinal basis for interagency coordination and for US military involvement in multinational operations. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs) and prescribes joint doctrine for operations, education, and training. It provides military guidance for use by the Armed Forces in preparing their appropriate plans. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of the overall objective. 3. Application a. Joint doctrine established in this publication applies to the joint staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational i Preface doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the United States, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. For the Chairman of the Joint Chiefs of Staff: DAVID L. GOLDFEIN, Lt Gen, USAF Director, Joint Staff ii JP 2-01.3 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 2-01.3 DATED 16 JUNE 2009 • Explains the reallocation of responsibility for the coordination and tasking of intelligence production support for current and planned joint operations to the Joint Staff Directorate for Intelligence and the Defense Intelligence Agency due to the disestablishment of the Defense Intelligence Operations Coordination Center. • Describes the roles and contributions of the National Geospatial-Intelligence Agency, National Security Agency/Central Security Service, Defense Threat Reduction Agency, and the Joint Improvised Explosive Device Defeat Organization, to the joint intelligence preparation of the operational environment (JIPOE) process. • Provides a more holistic description of the main focus of the JIPOE. • Establishes separate chapters for discussing each of the four steps in the JIPOE process. • Explains the intelligence implications for the growing recognition of the importance of “other relevant actors” to joint operations, to include a new appendix with an Operation IRAQI FREEDOM case study. • More clearly explains the JIPOE functions of a combatant command joint intelligence operations center. • Identifies additional members for a notional joint force “JIPOE coordination cell.” • Clarifies the roles and responsibilities between a “red cell” and the “combatant command red team” within the JIPOE process. • Expands the discussion of cyberspace considerations. • Provides a new discussion of identity intelligence products and sociocultural analysis contributions to JIPOE. • Describes the capabilities and contributions of weapons technical intelligence to the intelligence directorate of a joint staff planning and JIPOE. • Modifies the joint definitions of “exploitation,” “military geography,” and “named area of interest.” iii Summary of Changes Intentionally Blank iv JP 2-01.3 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY ............................................................................................... xi CHAPTER I AN OVERVIEW OF JOINT INTELLIGENCE PREPARATION OF THE OPERATIONAL ENVIRONMENT · Introduction ................................................................................................................. I-1 · The Operational Environment—A Holistic View ...................................................... I-2 · Differences Between Joint Intelligence Preparation of the Operational Environment and Intelligence Preparation of the Battlespace .................................... I-5 · Joint Intelligence Preparation of the Operational Environment and the Joint Intelligence Process ............................................................................................ I-5 · Organizations, Roles, and Responsibilities ................................................................. I-9 · Interagency and Multinational Considerations ......................................................... I-18 · Relationship to the Levels of Warfare ...................................................................... I-19 · Considerations Across the Range of Military Operations ........................................ I-22 · Overview of the Process for Joint Intelligence Preparation of the Operational Environment .............................................................................................................. I-24 CHAPTER II DEFINE THE OPERATIONAL ENVIRONMENT—STEP 1 · Overview ....................................................................................................................II-1 · Identify the Joint Force’s Operational Area ...............................................................II-2 · Analyze the Mission and Joint Force Commander’s Intent .......................................II-3 · Determine the Significant Characteristics of the Operational Environment .............II-3 · Identify the Limits of the Joint Force’s Area of Interest ...........................................II-5 · Determine the Level of Detail Required and Feasible Within the Time Available ...II-6 · Determine Intelligence and Information Priorities, Gaps, and Shortfalls ..................II-7 · Collect Material and Submit Requests for Information to Support Further Analysis......................................................................................................................II-7 CHAPTER III DESCRIBE THE IMPACT OF THE OPERATIONAL ENVIRONMENT— STEP 2 · Overview .................................................................................................................. III-1 · Develop a Geospatial Perspective of the Operational Environment ........................ III-2 · Develop a Systems Perspective of the Operational Environment ......................... III-33 · Describe the Impact of the Operational Environment on Adversary and Friendly Capabilities .............................................................................................. III-48 v Table of Contents CHAPTER IV EVALUATE THE ADVERSARY AND OTHER RELEVANT ACTORS— STEP 3 · Overview .................................................................................................................. IV-1 · Update or Create Adversary and Other Relevant Actors Models ............................ IV-2 · Determine the Current Adversary and Other Relevant Actor Situations ................. IV-8 · Identify Adversary and Other Relevant Actor Centers of Gravity and Decisive Points ................................................................................................ IV-10 · Identify Adversary and Relevant Actors’ Capabilities and Vulnerabilities ........... IV-14 CHAPTER V DETERMINE ADVERSARY AND OTHER RELEVANT ACTOR COURSES OF ACTION—STEP 4 · Overview ................................................................................................................... V-1 · Identify the Adversary’s and Other Relevant Actors’ Strategy, Likely Objectives, and Desired End State ................................................................ V-2 · Identify the Full Set of Adversary and Other Relevant Actor Courses of Action .... V-2 · Evaluate and Prioritize Each Course of Action ........................................................ V-4 · Develop Each Course of Action in the Amount of Detail that Time Allows ........... V-5 · Identify Initial Collection Requirements .................................................................. V-8 CHAPTER VI SUPPORT TO JOINT OPERATION PLANNING, EXECUTION, AND ASSESSMENT · Introduction .............................................................................................................. VI-1 Section A. Planning · Overview .................................................................................................................. VI-1 · Planning Initiation ...................................................................................................
Recommended publications
  • Software Requirements Specification
    Software Requirements Specification for Connectome Version 3.0 Prepared by: 1. Jon Schuck 2. Kennan Meyer 3. Nate Bender 4. Sheik Hassan 5. Khaled Alhendi 6. Bairavi Venkatesh 7. Kevin Garrone Senior Design Project Advisor: Mr. Jeff Salvage Fall 2016 to Spring 2017 1 Table of Contents Revision History.............................................................................................................................. 4 1. Introduction ............................................................................................................................. 5 1.1. Purpose ............................................................................................................................. 5 1.2. Overview .......................................................................................................................... 5 1.3. Product Scope ................................................................................................................... 6 1.3.1. In Scope .................................................................................................................... 6 1.3.2. Out of Scope ............................................................................................................. 7 1.4. Definitions ........................................................................................................................ 7 2. Overall Description ................................................................................................................. 9 2.1. Hardware Functions
    [Show full text]
  • Guidelines for Tools Development and Operating Environments
    Managing social, behavioral and economic data and metadata Guidelines for Tools Development and Operating Environments Author/Maintainer Pascal Heus, Open Data Foundation Contributors Jack Gager(Metadata Technology), Jannick Jensen (Danish Data Archive), Herve Lhours (UKDA) Version 2010-08-03 Table of Contents Overview....................................................................................................................................................2 Product Development.................................................................................................................................3 Environment.......................................................................................................................................... 3 Collaborative environment.................................................................................................................... 4 Licensing............................................................................................................................................... 5 Products Guide...........................................................................................................................................8 Overview............................................................................................................................................... 8 Web server software.............................................................................................................................. 8 Rich client Platforms...........................................................................................................................10
    [Show full text]
  • Joint Publication 0-2
    Joint Publication 0-2 IQ 0.- x. y a. ACLU-RDI 250 p.1 DODD0A-001597 The enduring theme, "joint warfare is team warfare," is an attitude based on the foundation of joint doctrine that is universally understood and practiced. This team approach ensures the most effective employment of US forces for joint warfare. If we are to continue to improve the structure of US forces for ioint warfare, everyone must be involved. Capstone publications Joint Warfare of the Armed Forces of the United States and this publication, Unified Action Armed Forces (UNAAF), provide the foundation for all the joint publications. Unified Action Armed Forces (UNAAF) provides the basic doctrine and policy governing the unified direction of forces and discusses the functions of the Department of Defense and its major components. This revision represents the evolution in US warfighting guidance since the last edition, serves as the policy document for all command relationships and other authorities directed by law, and clarifies these relationships. This publication also sets forth the concepts, relationships, and processes necessary for unified action of joint, interagency, and multinational operations and specifies fundamental principles and concepts for joint operations. The nature of modem warfare demands that we fight as a team. Unified action resulting from clear command relationships and unity of effort is crucial to making this possible. Commanders must ensure the widest distribution and application of this and other supporting joint publications in order to enable success in joint force employment. HENRY H. SHELTON Chairman of the Joint Chiefs of Staff ACLU-RDI 250 p.2 PREFACE 1.
    [Show full text]
  • Synchronizing Airpower and Firepower in the Deep Battle
    After you have read the research report, please give us your frank opinion on the contents. All comments—large or small, complimentary or caustic—will be gratefully appreciated. Mail them to CADRE/AR, Building 1400, 401 Chennault Circle, Maxwell AFB AL 36112-6428. Synchronizing Airpower and Laughbaum Firepower in the Deep Battle Thank you for your assistance COLLEGE OF AEROSPACE DOCTRINE, RESEARCH, AND EDUCATION AIR UNIVERSITY Synchronizing Airpower and Firepower in the Deep Battle R. KENT LAUGHBAUM Lt Col, USAF CADRE Paper Air University Press Maxwell Air Force Base, Alabama 36112-6610 January 1999 Disclaimer Opinions, conclusions, and recommendations expressed or implied within are solely those of the author, and do not necessarily represent the views of Air University, the United States Air Force, the Department of Defense, or any other US government agency. Cleared for public release: distribution unlimited. ii CADRE Papers CADRE Papers are occasional publications sponsored by the Airpower Research Institute of Air University’s College of Aerospace Doctrine, Research, and Education (CADRE). Dedicated to promoting understanding of air and space power theory and application, these studies are published by the Air University Press and broadly distributed to the US Air Force, the Department of Defense and other governmental organizations, leading scholars, selected institutions of higher learning, public policy institutes, and the media. All military members and civilian employees assigned to Air University are invited to contribute unclassified manuscripts. Manuscripts should deal with air and/or space power history, theory, doctrine or strategy, or with joint or combined service matters bearing on the application of air and/or space power.
    [Show full text]
  • Naval Air Station Whibey Island from MCAS Kaneohe Bay
    COVER INSERTED HERE 1 PLANESIDE Cover Photo The ‘Skinny Dragons” of VP-4 began arriving home to NAS Whidbey Island in early September after a six-month deployment to the U.S. 4th and 6th Fleet areas of responsibility during which they provided support to Operation Inherent Resolve and Operation Martillo. VP-4 is the first of three CPRW-2 squadrons to execute a homeport change to Naval Air Station Whibey Island from MCAS Kaneohe Bay. Photo Credit: Mass Communication Specialist 3rd Class Alexander Cole. PLANESIDE is a quarterly online newsletter published by the Maritime Patrol Association, Inc. Copyright 2012-2016. P.O. Box 147 Orange Park, FL 32067 [email protected] * www.maritimepatrolassociation.org 2 3 PLANESIDE Features:In this Issue Welcome from the President 5 CPRG: Checking on Station 8 In the News: VP-8 Aids in Rescue of Tropical Storm Survivors 13 Community: NAS Whidbey Island Hosts Weeklong COG, Concludes with P-8 Media Day 17 Building 514 Officially On Line 20 Midshipmen Learn from the ‘Tridents,’ ‘Spartans’ and Other Commands 22 No Fox Like a Home Fox 23 ‘Red Lancers’ Employ Harpoon in RIMPAC 2016 25 ‘Pelicans’ Participate in Northern Coast 2016 26 Rear Adm. Cozad Visits NAS Whidbey Island Amid a Sea of Change 27 VP-8 Tops Off Successful Deployment with Jacksonville Homecoming 29 ‘Mad Fox’ Iwo Jima Trip 32 Grey Knights Dominate in Valiant Shield 2016 34 VP-26 Takes On ‘Operation Steel Trident’ 36 RIMPAC Provides Unique Opportunities for Training 37 ‘War Eagles’ Strive for Nothing but Excellence 40 VP-5 Participates
    [Show full text]
  • Toward Integrated Dod Biosurveillance
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Arroyo Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity. Research Report Toward Integrated DoD Biosurveillance Assessment and Opportunities Melinda Moore, Gail Fisher, Clare Stevens Prepared for the United States Army Approved for public release; distribution unlimited The research described in this report was sponsored by the United States Army under Contract No.
    [Show full text]
  • The Quandary of Allied Logistics from D-Day to the Rhine
    THE QUANDARY OF ALLIED LOGISTICS FROM D-DAY TO THE RHINE By Parker Andrew Roberson November, 2018 Director: Dr. Wade G. Dudley Program in American History, Department of History This thesis analyzes the Allied campaign in Europe from the D-Day landings to the crossing of the Rhine to argue that, had American and British forces given the port of Antwerp priority over Operation Market Garden, the war may have ended sooner. This study analyzes the logistical system and the strategic decisions of the Allied forces in order to explore the possibility of a shortened European campaign. Three overall ideas are covered: logistics and the broad-front strategy, the importance of ports to military campaigns, and the consequences of the decisions of the Allied commanders at Antwerp. The analysis of these points will enforce the theory that, had Antwerp been given priority, the war in Europe may have ended sooner. THE QUANDARY OF ALLIED LOGISTICS FROM D-DAY TO THE RHINE A Thesis Presented to the Faculty of the Department of History East Carolina University In Partial Fulfillment of the Requirements for the Degree Master of Arts in History By Parker Andrew Roberson November, 2018 © Parker Roberson, 2018 THE QUANDARY OF ALLIED LOGISTICS FROM D-DAY TO THE RHINE By Parker Andrew Roberson APPROVED BY: DIRECTOR OF THESIS: Dr. Wade G. Dudley, Ph.D. COMMITTEE MEMBER: Dr. Gerald J. Prokopowicz, Ph.D. COMMITTEE MEMBER: Dr. Michael T. Bennett, Ph.D. CHAIR OF THE DEP ARTMENT OF HISTORY: Dr. Christopher Oakley, Ph.D. DEAN OF THE GRADUATE SCHOOL: Dr. Paul J.
    [Show full text]
  • Standard Operating Environment Guideline
    STANDARD This guideline outlines the scope OPERATING and approach to the Computer Desktop Standard Operating ENVIRONMENT Environment (SOE) implemented by GUIDELINE Massey University. This guideline is intended to apply to computers and devices owned by Massey University and supported by Information Technology Services. Standard Operating Environment Guideline Purpose Massey University Information Technology Services (ITS) support a Standard Operating Environment (SOE) for desktop and notebook computers. The SOE is designed to ensure that the large number of desktop and notebook computers provide the necessary functionality to staff and students; can be loaded with a standard software image, maintained, updated, audited and repaired by ITS staff in a manner that improves availability and reliability, with a minimum disruption to staff and students; and at a cost that is appropriate to the University. The delivery of the Standard Operating Environment (SOE) to client computers is achieved through automated deployment and management tools. The expanded use of automation tools across all levels of ITS infrastructure, systems and services is designed to minimise support costs. The maintenance of desktop computers is most efficiently managed and delivered through the deployment of operating systems, software applications, patches and updates via online desktop management applications and tools. As part of its objective to provide cost effective and efficient management of ICT resources, Information Technology Services (ITS) maintains a Standard
    [Show full text]
  • Information Systems
    Information Systems IS100 Introduction to Computer Applications Cr-4 IS130 Desktop Publishing for Business Cr-3 and Concepts This course introduces the principles of desktop publishing in a This course satisfies the IS101 Computers and Society requirement business environment. Professional quality business documents are for students with little or no prior computer experience. It focuses on designed and produced that combine text, graphics, illustrations, and providing a solid foundation in basic computer skills and terminology, photographs in documents such as letterheads, business cards, flyers, and an understanding of how computer technology works. Experience brochures, promotional documents, and newsletters. is provided with a variety of microcomputer software applications, including word processing, electronic spreadsheets, and graphics, file IS200 Spreadsheet Concepts and Cr-3 management, and integrated software. Concepts and terms focus on Applications preparing for a technology oriented society and using the computer as This course expands the knowledge of those already familiar with the a tool for productivity, research and communication. basic elements of electronic spreadsheets. It examines the various uses for a spreadsheet in business. Intermediate and advanced spreadsheet IS101 Computers and Society Cr-3 techniques are examined, including the power of functions, formatting, This course provides knowledge of relevant computer skills and a solid analytical graphics, and macros. Prerequisites: IS101 Computers and foundation in the terminology and concepts of computer technology. Society or IS100 Introduction to Computers and Society. Experience is provided with a variety of microcomputer software applications, including word processing, electronic spreadsheets, IS201 Principles of Computer Security Cr-3 graphics, file management, and integrated software. Concepts and This course provides a comprehensive view of the field of computer terms focus on preparing for a technologically oriented society and network security.
    [Show full text]
  • Dod Instruction 6420.01, March 20, 2009
    Department of Defense INSTRUCTION NUMBER 6420.01 March 20, 2009 Incorporating Change 1, Effective September 2, 2014 USD(I) SUBJECT: National Center for Medical Intelligence (NCMI) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive 6420.1 (Reference (a)) as a DoD Instruction in accordance with the authority in DoD Directive 5143.01 (Reference (b)); b. Re-establishes the Armed Forces Medical Intelligence Center as the NCMI for the conduct of medical intelligence within the Department of Defense, pursuant to Executive Order 12333 (Reference (c)), The National Security Act of 1947 (Reference (d)), and DoD Directive 5240.01 (Reference (e)). 2. APPLICABILITY. This Instruction applies to OSD, the Military Departments (including the Coast Guard at all times, including when it is a Service in the Department of Homeland Security by agreement with that Department), the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities in the Department of Defense (hereafter referred to collectively as the “DoD Components”). The term “Military Departments,” as used herein, refers to the Army, the Navy, the Air Force, the Marine Corps, and, as provided above, the Coast Guard (including Active and Reserve Components). 3. DEFINITIONS. For the purpose of this Instruction, the term “medical intelligence” is defined as the product of collection, evaluation, and all-source analysis of worldwide health threats and issues, including foreign medical capabilities, infectious disease, environmental health risks, developments in biotechnology and biomedical subjects of national and military importance, and support to force protection.
    [Show full text]
  • Overhead Surveillance
    Confrontation or Collaboration? Congress and the Intelligence Community Overhead Surveillance Eric Rosenbach and Aki J. Peritz Overhead Surveillance One of the primary methods the U.S. uses to gather vital national security information is through air- and space-based platforms, collectively known as “overhead surveillance.” This memorandum provides an overview of overhead surveillance systems, the agencies involved in gathering and analyzing overhead surveillance, and the costs and benefits of this form of intelligence collection. What is Overhead Surveillance? “Overhead surveillance” describes a means to gather information about people and places from above the Earth’s surface. These collection systems gather imagery intelligence (IMINT), signals intelligence (SIGINT) and measurement and signature intelligence (MASINT). Today, overhead surveillance includes: • Space-based systems, such as satellites. • Aerial collection platforms that range from large manned aircraft to small unmanned aerial vehicles (UAVs). A Brief History of Overhead Surveillance Intelligence, surveillance and reconnaissance platforms, collectively known as ISR, date back to the 1790s when the French military used observation balloons to oversee battlefields and gain tactical advantage over their adversaries. Almost all WWI and WWII belligerents used aerial surveillance to gain intelligence on enemy lines, fortifications and troop movements. Following WWII, the U.S. further refined airborne and space-based reconnaissance platforms for use against the Soviet Union. Manned reconnaissance missions, however, were risky and could lead to potentially embarrassing outcomes; the 1960 U-2 incident was perhaps the most widely publicized case of the risks associated with this form of airborne surveillance. Since the end of the Cold War, overhead surveillance technology has evolved significantly, greatly expanding the amount of information that the policymaker and the warfighter can use to make critical, time-sensitive decisions.
    [Show full text]
  • National Reconnaissance Office Review and Redaction Guide
    NRO Approved for Release 16 Dec 2010 —Tep-nm.T7ymqtmthitmemf- (u) National Reconnaissance Office Review and Redaction Guide For Automatic Declassification Of 25-Year-Old Information Version 1.0 2008 Edition Approved: Scott F. Large Director DECL ON: 25x1, 20590201 DRV FROM: NRO Classification Guide 6.0, 20 May 2005 NRO Approved for Release 16 Dec 2010 (U) Table of Contents (U) Preface (U) Background 1 (U) General Methodology 2 (U) File Series Exemptions 4 (U) Continued Exemption from Declassification 4 1. (U) Reveal Information that Involves the Application of Intelligence Sources and Methods (25X1) 6 1.1 (U) Document Administration 7 1.2 (U) About the National Reconnaissance Program (NRP) 10 1.2.1 (U) Fact of Satellite Reconnaissance 10 1.2.2 (U) National Reconnaissance Program Information 12 1.2.3 (U) Organizational Relationships 16 1.2.3.1. (U) SAF/SS 16 1.2.3.2. (U) SAF/SP (Program A) 18 1.2.3.3. (U) CIA (Program B) 18 1.2.3.4. (U) Navy (Program C) 19 1.2.3.5. (U) CIA/Air Force (Program D) 19 1.2.3.6. (U) Defense Recon Support Program (DRSP/DSRP) 19 1.3 (U) Satellite Imagery (IMINT) Systems 21 1.3.1 (U) Imagery System Information 21 1.3.2 (U) Non-Operational IMINT Systems 25 1.3.3 (U) Current and Future IMINT Operational Systems 32 1.3.4 (U) Meteorological Forecasting 33 1.3.5 (U) IMINT System Ground Operations 34 1.4 (U) Signals Intelligence (SIGINT) Systems 36 1.4.1 (U) Signals Intelligence System Information 36 1.4.2 (U) Non-Operational SIGINT Systems 38 1.4.3 (U) Current and Future SIGINT Operational Systems 40 1.4.4 (U) SIGINT
    [Show full text]