Usarmy-Soldiersurveillance.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Usarmy-Soldiersurveillance.Pdf FOR OFFICIAL USE ONLY FM 2-91.6 SOLDIER SURVEILLANCE AND RECONNAISSANCE: FUNDAMENTALS OF TACTICAL INFORMATION COLLECTION October 2007 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913ZMAR04. This determination was made on 30 March 2004. Contractor and other requests must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center, Fort Huachuca, AZ 85613-7017, or via email at [email protected]. DESTRUCTION NOTICE––Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army FOR OFFICIAL USE ONLY This publication is available at Army Knowledge Online <www.us.army.mil> and the General Dennis J. Reimer Training and Doctrine Digital Library at <www.train.army.mil>. FOR OFFICIAL USE ONLY *FM 2-91.6 Field Manual Headquarters No. 2-91.6 Department of the Army Washington, DC, 10 October 2007 Soldier Surveillance and Reconnaissance: Fundamentals of Tactical Information Collection Contents Page PREFACE..............................................................................................................iii Chapter 1 INTRODUCTION ....................................................................................................1 Soldier Surveillance and Reconnaissance.............................................................1 Every Soldier is a Sensor .......................................................................................2 The HUMINT Collector ...........................................................................................5 The Need for Situational Awareness......................................................................7 Chapter 2 PLAN AND PREPARE...........................................................................................1 SECTION I – PRE-DEPLOYMENT PLANNING AND PREPARATION................1 Pre-Deployment Planning.......................................................................................1 Pre-Deployment Preparation..................................................................................2 SECTION II – DEPLOYED PLANNING AND PREPARATION.............................4 Deployed Planning .................................................................................................4 Deployed Preparation.............................................................................................5 Rules of Engagement.............................................................................................9 Risk Mitigation ......................................................................................................10 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913ZMAR04. This determination was made on 30 March 2004. Contractor and other requests must be referred to ATTN: ATZS- CDI-D, U.S. Army Intelligence Center, Fort Huachuca, AZ 85613-7017, or via email at ATZS-DCF- [email protected]. DESTRUCTION NOTICE––Destroy by any method that will prevent disclosure of contents or reconstruction of the document. *This publication supersedes ST 2-91.6, dated March 2004, and Tactical Questioning: Soldier’s Handbook, dated November 2003. FOR OFFICIAL USE ONLY i FOR OFFICIAL USE ONLY Chapter 3 EXECUTE .............................................................................................................. 1 Working with Interpreters ....................................................................................... 1 Interacting with the Local Populace ....................................................................... 1 Tactical Site Exploitation........................................................................................ 4 Tactical Questioning and Detainee Handling......................................................... 7 Operational Liaison .............................................................................................. 10 Reporting and Debriefing ..................................................................................... 11 Chapter 4 ASSESS................................................................................................................. 1 Monitoring .............................................................................................................. 1 Evaluating .............................................................................................................. 2 Measures of Performance and Measures of Effectiveness ................................... 2 Feedback ............................................................................................................... 4 Appendix A BLANK FORMATS................................................................................................ 1 Appendix B USE OF INTERPRETERS..................................................................................... 1 Appendix C MISSION RESPONSIBILITIES ............................................................................. 1 Appendix D CIVIL CONSIDERATIONS .................................................................................... 1 Appendix E ARMY BRANCH AND JOINT, INTERAGENCY, AND MULTINATIONAL SUPPORT TO INFORMATION COLLECTION AND INTELLIGENCE DEVELOPMENT.................................................................................................... 1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES.................................................................................. References-1 INDEX ......................................................................................................... Index-1 Figures Figure 2-1. Sample mission checklist ........................................................................................7 Figure 2-2. Patrol briefing format ...............................................................................................9 Figure 3-1. Examples of supporting information ........................................................................9 Figure 3-2. SALUTE report guidelines.....................................................................................13 Figure A-1. DD Form 2745 (Enemy Prisoner of War Capture Tag)...........................................2 Figure A-2. Sample of a field expedient CED tag ......................................................................3 Figure A-3. Sample of a CED log...............................................................................................4 Figure A-4. Sample of a SALUTE Report (Level 1 Report) .......................................................5 Figure A-5. Sample of a Spot Report (Level 1 Report)..............................................................6 Figure A-6. Sample of a Patrol Report format (Level 2 Report) ................................................7 Figure A-7. Sample format for intelligence personnel to use for debriefing (Level 3 Report)....................................................................................................................8 Tables Table 1-1. Potential indicators ...................................................................................................8 Table 4-1. MOP and MOE echelon responsibilities ..................................................................3 ii FOR OFFICIAL USE ONLY 10 October 2007 FOR OFFICIAL USE ONLY Preface This publication establishes the Army’s doctrine in support of the Every Soldier is a Sensor (ES2) initiative. The need for Soldiers to be aware that basic observations are an important part of operations has led to the development of this manual. This manual expands on the information contained in ST 2-91.6 and provides a foundation for developing tactical questioning and reporting and supersedes all other tactical questioning handbooks produced by the United States Army Intelligence Center (USAIC), specifically the Tactical Questioning Soldier’s Handbook and ST 2-91.6. This manual–– • Provides the doctrinal framework for Soldiers and leaders at all echelons and forms the foundation for ES2 curricula within the Army Education System. Its audience is broad, from military Soldiers and leaders to civilians. It is essential that all Soldiers and civilians understand how their daily observations feed into the bigger intelligence process and help create a more favorable environment for US success in a region. • Is a compilation of tools to help all Soldiers collect information through tactical questioning, detainee handling, and document and equipment handling in offensive, defensive, stability operations, and civil support operations. • Is not intended to make the Soldier an expert on intelligence collection. It is not intended to train Soldiers as intelligence collectors nor authorize Soldiers to conduct interrogation and source operations. • Introduces the basics of questioning and reporting and provides some tools for patrols and S-2s. • Applies to the Full Spectrum Operations. Principles outlined are valid under conditions involving use of chemical, biological, radiological, nuclear, and high yield explosives (CBRNE). This manual is a compilation of tools to help all Soldiers collect information through surveillance, reconnaissance, patrolling, interacting with the local populace, tactical site exploitation, tactical questioning
Recommended publications
  • MILITARY INTELLIGENCE PB 34-09-2 Volume 35 Number 2 April - June 2009
    MIPB April - June 2009 PB 34-O9-2 Operations in OEF Afghanistan FROM THE EDITOR In this issue, three articles offer perspectives on operations in Afghanistan. Captain Nenchek dis- cusses the philosophy of the evolving insurgent “syndicates,” who are working together to resist the changes and ideas the Coalition Forces bring to Afghanistan. Captain Beall relates his experiences in employing Human Intelligence Collection Teams at the company level in both Iraq and Afghanistan. Lieutenant Colonel Lawson provides a look into the balancing act U.S. Army chaplains as non-com- batants in Afghanistan are involved in with regards to Information Operations. Colonel Reyes discusses his experiences as the MNF-I C2 CIOC Chief, detailing the problems and solutions to streamlining the intelligence effort. First Lieutenant Winwood relates her experiences in integrating intelligence support into psychological operations. From a doctrinal standpoint, Lieutenant Colonels McDonough and Conway review the evolution of priority intelligence requirements from a combined operations/intelligence view. Mr. Jack Kem dis- cusses the constructs of assessment during operations–measures of effectiveness and measures of per- formance, common discussion threads in several articles in this issue. George Van Otten sheds light on a little known issue on our southern border, that of the illegal im- migration and smuggling activities which use the Tohono O’odham Reservation as a corridor and offers some solutions for combined agency involvement and training to stem the flow. Included in this issue is nomination information for the CSM Doug Russell Award as well as a biogra- phy of the 2009 winner. Our website is at https://icon.army.mil/ If your unit or agency would like to receive MIPB at no cost, please email [email protected] and include a physical address and quantity desired or call the Editor at 520.5358.0956/DSN 879.0956.
    [Show full text]
  • ATP 3-90.15. Site Exploitation
    ATP 3-90.15 SITE EXPLOITATION July 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. This publication supersedes ATTP 3-90.15, 8 July 2010. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp *ATP 3-90.15 Army Techniques Publication Headquarters No. 3-90.15 Department of the Army Washington, DC, 28 July 2015 Site Exploitation Contents Page PREFACE...............................................................................................................v INTRODUCTION ..................................................................................................vii Chapter 1 SITE EXPLOITATION ........................................................................................ 1-1 Introduction to Site Exploitation .......................................................................... 1-1 Considerations for Effective Site Exploitation..................................................... 1-6 Site Exploitation in the Operational Environment ............................................... 1-7 Chapter 2 SITE EXPLOITATION PLANNING .................................................................... 2-1 Planning Concepts in Site Exploitation ............................................................... 2-1 Information Collection ........................................................................................
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]
  • IMPROVING the LAW ENFORCEMENT-INTELLIGENCE COMMUNITY RELATIONSHIP Ndic PRESS Improving the Law Enforcement-Intelligence Community Relationship
    IMPROVING THE LAW ENFORCEMENT-INTELLIGENCE COMMUNITY RELATIONSHIP ndic PRESS ndic RELATIONSHIP COMMUNITY ENFORCEMENT-INTELLIGENCE LAW THE IMPROVING Improving the law Enforcement-Intelligence Community Relationship Can’t we all just get along? National Defense Intelligence College national defense intelligence college press PCN 5463 ISBN 978-1-932946-18-5 e Research nc e n g ii l ll ee tt nn I I c c June 2007 i i g g Washington, DC Washington, e e cial policy or position of the Department of t NDIC PRESS t a a Defense of the U.S. Government r r t t S S r o f r e t n e C r o f r e t n e C ect the offi National Defense Intelligence College The views expressed in this book are those of the authors and Can’t We All Just Get Along? All Just Get We Can’t do not refl Improving the Law Enforcement- Improving Intelligence Community Relationship The National Defense Intelligence College supports and encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational consumers. Can’t We All Just Get Along: Improving the Law Enforcement-Intelligence Community Relationship The FBI vs. CIA turf battles of the Cold War are the stuff of Washington legend. Things are much better now. They were getting better anyway, and then 9/11 accelerated the process. But…there is room for improvement. The fi rst essays here lay out some of the intelligence techniques that have proven effective in either Law Enforcement (LE) or the Intelligence Community (IC) and that might be useful to exchange and apply.
    [Show full text]
  • Human Intelligence Collector Operations, FM 2-22.3
    *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION 1-1 Intelligence Battlefield Operating System 1-1 Intelligence Process 1-1 Human Intelligence 1-4 HUMINT Source 1-4 HUMINT Collection and Related Activities 1-7 Traits of a HUMINT Collector 1-1 0 Required Areas of Knowledge 1-12 Capabilities and Limitations 1-13 Chapter 2 HUMAN INTELLIGENCE STRUCTURE 2-1 Organization and Structure 2-1 HUMINT Control Organizations 2-2 HUMINT Analysis and Production Organizations 2-6 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and reyulations. 'This publication supersedeJyM 34-52, 28 September 1992, and ST 2-22.7, Tactical Human Intelligence and Counterintelligence Operations, April 2002. PENTAGON LmRARY \" "j MrtlTARY OOCUMENTI WASHINGTON, DC 20310 6 September 2006 FM 2-22.3 FM 2-22.3 ------------­ Chapter 3 HUMINT IN SUPPORT OF ARMY OPERATIONS 3-1 Offensive Operations ...............................•............................................................ 3-1 Defensive Operations 3-2 Stability and Reconstruction Operations 3-3 Civil Support Operations 3-7 Military Operations in Urban Environment.. 3-8 HUMINT Collection Environments 3-8 EAC HUMINT 3-9 Joint, Combined, and DOD HUMINT Organizations 3-10 Chapter 4 HUMINT OPERATIONS PLANNING AND MANAGEMENT .4-1 HUMINT and the Operations Process .4-1 HUMINT Command and Control .4-3 Technical Control.
    [Show full text]
  • United States Special Operations Command
    United States Special Operations Command Fiscal Year (FY) 2009 Budget Estimates February 2008 Procurement, Defense-Wide FEBRUARY 2008 UNITED STATES SPECIAL OPERATIONS COMMAND PROCUREMENT DOCUMENTATION FOR THE FISCAL YEAR (FY) 2009 BUDGET ESTIMATE Table of Contents Table of Contents....................................................................................................................................................................................................................................... Organizations ..................................................................................................................................................................................................................................... …… Acronyms........................................................................................................................................................................................................................................... …… Procurement Program, Exhibit P-1 ............................................................................................................................................................................................................ Procurement Program, Exhibit P-1R ......................................................................................................................................................................................................... Procurement Line Item Documentation Aviation Procurement Lines Rotary Wing Upgrades
    [Show full text]
  • Military Intelligence Professional Bulletin, April-June 2010
    FROM THE EDITOR This issue features two articles by Colonel Franz, Chief, Information Dominance Center (IDC), ISAF and Lieutenants Colonel Pendall and Steffen on how the International Security Assistance Command has implemented an information–sharing architecture to create a comprehensive common operating picture across the Afghan theater. The IDC is the most decisive information and knowledge management effort ever executed in Afghanistan with a focus on governance and development, key aspects that most impact the daily lives of Afghans. Colonel Cox presents the case for a new intelligence discipline, Document Exploitation or DOMEX. He presents the historical context and follows through to today’s operations with comments and recommen- dations. Major Harris and Captain Bronson describe lessons learned and observations from the deploy- ment of the first active duty Maneuver Enhancement Brigade to Afghanistan with the mission to manage terrain and C2 operations. Major Assadourian discusses a holistic approach to developing security met- rics. First Lieutenant Hancock explores the emerging field of Memetics and implications for memetic op- erations in the military environment. Claudia Baisini and James Nyce make a case for the inclusion of Experiential Learning techniques in traditional military training to meet the challenges of fighting in non- traditional operating environments. Chief Warrant Officer Two Negron discusses the capabilities of the Tactical Exploitation System-Forward for use in a Communications Intelligence function. Vee Herrington, USAICoE’s Chief of the U.S. Army’s MI Library at Fort Huachuca, describes an ongoing experiment to in- corporate eReaders into training. Readers will also find articles on the 2010 MI Hall of Fame inductees and the 2010 recipient of the LTG Weinstein Award within the issue.
    [Show full text]
  • Defending Air Bases in an Age of Insurgency
    AIR UNIVERSITY Defending Air Bases in an Age of Insurgency Shannon W. Caudill Colonel, USAF Air University Press Air Force Research Institute Maxwell Air Force Base, Alabama Project Editor Library of Congress Cataloging-in-Publication Data Dr. Ernest Allan Rockwell Caudill, Shannon W. Copy Editor Sandi Davis Defending air bases in an age of insurgency / Shannon W. Caudill, Colonel, USAF. Cover Art pages cm Daniel Armstrong Includes bibliographical references and index. Book Design and Illustrations ISBN 978-1-58566-241-8 L. Susan Fair 1. Air bases—Security measures—United States. 2. United States. Air Force—Security measures. Composition and Prepress Production 3. Irregular warfare—United States. I. Title. Vivian D. O’Neal UG634.49.C48 2014 Print Preparation and Distribution 358.4'14—dc23 Diane Clark 2014012026 Published by Air University Press in May 2014 AIR FORCE RESEARCH INSTITUTE AIR UNIVERSITY PRESS Director and Publisher Allen G. Peck Disclaimer Editor in Chief Opinions, conclusions, and recommendations expressed Oreste M. Johnson or implied within are solely those of the authors and do not necessarily represent the official policy or position of Managing Editor the organizations with which they are associated or the Demorah Hayes views of the Air Force Research Institute, Air University, Design and Production Manager United States Air Force, Department of Defense, or any Cheryl King other US government agency. This publication is cleared for public release and unlimited distribution. Air University Press 155 N. Twining St., Bldg. 693 Maxwell AFB, AL 36112-6026 [email protected] http://aupress.au.af.mil/ http://afri.au.af.mil/ AFRI Air Force Research Institute ii This book is dedicated to all Airmen and their joint comrades who have served in harm’s way to defend air bases.
    [Show full text]
  • DOMEX: the Birth of a New Intelligence Discipline by Colonel Joseph M
    DOMEX: The Birth of a New Intelligence Discipline by Colonel Joseph M. Cox The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the Army, Department of Defense, or the U.S. Government. Introduction Prior to 9/11, Document and Media Exploitation and what steps can be taken to enhance operations, (DOMEX) capabilities were neither well defined and then offer recommendations on how the IC and nor sufficiently developed or understood to ad- the Department of Defense (DOD) can better orga- equately support combat operations. Despite les- nize, train, man, and equip itself to meet DOMEX sons learned from previous conflicts, U.S. forces challenges in the future. entered the War of Terror without mechanisms Historical Context to properly collect, process, and disseminate in- The U.S. military and other branches of our govern- telligence derived from DOMEX. In the past 18 ment relied on what was originally titled Document months, the volume of captured digital information Exploitation (DOCEX) for as long as we have prac- from law enforcement, intelligence, and civil court ticed the art of intelligence. Discovering the enemy’s cases has exploded. Recent investigations of Umar intentions through examination and exploitation Farouk Abdulmutallab, the alleged terrorist who of captured documents was nothing new. In war- attempted to detonate plastic explosives on board fare, exploitation of adversary documents normally a commercial airliner, and U.S. Army Major Nidal begins at the point of capture and progressively Malik Hasan, the man accused of killing Soldiers becomes more detailed and sophisticated as the at Fort Hood, rely extensively on close examination document moves through a process of triage, trans- of personal computer data by federal law enforce- lation, and promulgation.2 ment agencies.
    [Show full text]
  • Joint and National Intelligence Support to Military Operations
    Joint Publication 2-01 T OF EN TH W E I S E ' L L M H D T E F T E N A R D R A M P Y E • D • U A N C I I T R E E D M S A T F AT E S O Joint and National Intelligence Support to Military Operations 5 July 2017 PREFACE 1. Scope This publication provides doctrine for joint and national intelligence products, services, assessments, and support to joint military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces, and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs), and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing and executing their plans and orders. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies.
    [Show full text]
  • JDN 2-16, Identity Activities
    Joint Doctrine Note 2-16 Identity Activities 03 August 2016 Unclassified PREFACE 1. Scope The purpose of this joint doctrine note (JDN) is to provide guidance to plan, execute, and assess identity activities. 2. Purpose A JDN is a publication that is intended to facilitate information sharing on problems and potential solutions as a supporting effort of formal joint doctrine development and revision. It provides a short term bridging solution to potential doctrine gaps. This JDN specifically addresses how identity capabilities may be coordinated and integrated to generate effects across all phases of an operation or campaign. It supplements current joint doctrine and provides context for identity activities across the range of military operations. This document was developed using current joint doctrine, extant procedures, and existing policy guidance. This JDN does not necessarily describe a position of consensus across the joint force, but it does socialize identity activities-related information and procedures in a non- authoritative document that commanders and staffs can use, as appropriate. 3. Application The guidance in this JDN is not authoritative. If conflicts arise between the contents of this JDN and the contents of a JP, the JP will take precedence for the activities of joint forces, unless the Chairman of the Joint Chiefs of Staff provides more current and specific guidance. This JDN will, at a minimum, inform the development and revision of other JPs. KEVIN D. SCOTT Vice Admiral, USN Director, Joint Force Development i Preface Intentionally Blank ii JDN X-XX TABLE OF CONTENTS EXECUTIVE SUMMARY .............................................................................................. vii CHAPTER I OVERVIEW • Introduction ................................................................................................................. I-1 • The Purpose of Identity Activities .............................................................................
    [Show full text]
  • Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms
    Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms 8 November 2010 (As Amended Through 15 February 2016) As Amended Through 15 February 2016 PREFACE 1. Scope The Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. 2. Purpose This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies. 3. Application This publication applies to the Office of the Secretary of Defense, the Services, the Joint Staff, combatant commands, DOD agencies, and all other DOD components. It is the primary terminology source when preparing correspondence, to include policy, strategy, doctrine, and planning documents. Criteria for inclusion of terminology in JP 1-02 is enumerated in Department of Defense Instruction 5025.12, Standardization of Military and Associated Terminology, and Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 5705.01, Standardization of Military and Associated Terminology. 4. Publication Format This edition of JP 1-02 has been published in two basic parts: a. Terms and definitions. These are annotated with the source publication. b. Abbreviations and acronyms. The source publication establishes the authoritative context for proper understanding and management of the associated term. 5. JP 1-02 Online Availability and Update Schedule JP 1-02 is accessible online as a searchable database and in PDF format at the following Internet address: http://www.dtic.mil/doctrine/dod_dictionary and at the following NIPRNET i Preface As Amended Through 15 February 2016 address: https://jdeis.js.mil/jdeis/.
    [Show full text]