ATP 3-55.4 Techniques for Information Collection During Operations

Total Page:16

File Type:pdf, Size:1020Kb

ATP 3-55.4 Techniques for Information Collection During Operations ATP 3-55.4 Techniques for Information Collection During Operations Among Populations APRIL 2016 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This manual supersedes FM 2-91.6, dated 10 October 2007. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp. *ATP 3-55.4 Army Techniques Publication Headquarters No. 3-55.4 Department of the Army Washington, DC, 5 April 2016 Techniques for Information Collection During Operations Among Populations Contents Page PREFACE.............................................................................................................. iii INTRODUCTION .................................................................................................... v Chapter 1 FUNDAMENTALS .............................................................................................. 1-1 Soldier Surveillance and Reconnaissance ......................................................... 1-1 Interaction with the Population ........................................................................... 1-1 Legal Considerations .......................................................................................... 1-6 Human Intelligence Activities.............................................................................. 1-7 Chapter 2 PLAN AND PREPARE ....................................................................................... 2-1 Pre-Deployment Planning and Preparation ........................................................ 2-1 Deployment Planning and Preparation ............................................................... 2-4 Chapter 3 EXECUTE ........................................................................................................... 3-1 Execution ............................................................................................................ 3-1 Interpreters ......................................................................................................... 3-1 Local Populace ................................................................................................... 3-1 Soldier and Leader Engagement ........................................................................ 3-5 Tactical Site Exploitation .................................................................................... 3-7 Detainee Handling .............................................................................................. 3-8 Tactical Questioning ........................................................................................... 3-9 Reporting and Patrol Debriefing ....................................................................... 3-10 Chapter 4 ASSESS ............................................................................................................. 4-1 Assessment ........................................................................................................ 4-1 Monitoring ........................................................................................................... 4-1 Evaluating ........................................................................................................... 4-2 Recommending or Directing Action .................................................................... 4-3 Providing Feedback ............................................................................................ 4-4 Appendix A BLANK FORMATS ............................................................................................ A-1 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *This manual supersedes FM 2-91.6, dated 10 October 2007. i Contents Appendix B INTERPRETERS ............................................................................................... B-1 Appendix C MISSION RESPONSIBILITIES ......................................................................... C-1 Appendix D CIVIL CONSIDERATIONS ................................................................................ D-1 Appendix E LEVERAGING INFORMATION SOURCES ...................................................... E-1 GLOSSARY ......................................................................................... Glossary-1 REFERENCES .................................................................................. References-1 INDEX ......................................................................................................... Index-1 Figures Figure 1-1. Tactical information flow ...................................................................................... 1-5 Figure 2-1. Sample of a mission checklist ............................................................................. 2-6 Figure 2-2. Patrol briefing topics ............................................................................................ 2-7 Figure A-1. DD Form 2745 (Enemy Prisoner of War [EPW] Capture Tag) ........................... A-2 Figure A-2. Sample of a field expedient captured materials tag ............................................ A-3 Figure A-3. Sample of a captured materials log .................................................................... A-4 Figure A-4. Spot Report [SPOTREP] ..................................................................................... A-5 Figure A-5. Patrol Report [PATROLREP] .............................................................................. A-6 Tables Table 3-1. Questioning references ......................................................................................... 3-3 Table 3-2. Potential indicators ............................................................................................... 3-6 Table 3-3. Captured materiel ................................................................................................. 3-8 ii ATP 3-55.4 5 April 2016 Preface This publication provides time-tested, coherent, and easily understood techniques for Soldiers and Department of the Army (DA) Civilians who collect information while interacting with the public during the conduct of their duties. Many of the techniques described are designed specifically for patrols, checkpoints, roadblocks, cordon and searches, and other missions in which Soldiers interact with the populace. This manual–– Is a compilation of techniques to help all Soldiers collect information while interacting with the population through voluntary questioning, detainee handling, tactical questioning, and document and equipment handling. Introduces the basics of interacting with the population and describes the reporting procedures while providing some tools for patrols and intelligence staffs (S-2s). Provides the doctrinal framework for Soldiers and leaders at all echelons and forms the foundation for Soldier sensor mission curricula within the Army Education System. Its audience is broad, from Soldiers and leaders to civilians. Note. Questioning by law enforcement personnel and questioning as part of interrogation operations is beyond the scope of this publication. For information concerning law enforcement questioning, see FM 3-39. For information concerning interrogation questioning, see FM 2-22.3. Interacting with the population as it relates to civil affairs mission sets is beyond the scope of this publication. For information concerning civil affairs operations, see FM 3-57. The principal audience for ATP 3-55.4 is all Soldiers and DA Civilians in the Army profession. Commanders and staffs of Army headquarters serving as joint task force or multinational headquarters should also refer to applicable joint or multinational doctrine concerning unified land operations and joint or multinational forces. Trainers and educators throughout the Army can also use this publication. Commanders, staffs, and subordinates ensure that their decisions and actions comply with applicable United States, international, and in some cases host-nation laws and regulations. Commanders at all levels ensure that their Soldiers operate in accordance with the law of war and the rules of engagement, see FM 27-10. ATP 3-55.4 uses joint terms where applicable. Selected joint and Army terms and definitions appear in both the glossary and the text. This publication is not the proponent for any terms. For other definitions shown in the text, the term is italicized and the number of the proponent publication follows the definition. ATP 3-55.4 applies to the Active Army, Army National Guard/Army National Guard of the United States and United States Army Reserve unless otherwise stated. The proponent of ATP 3-55.4 is the United States Army Combined Arms Center. The preparing agency is the Combined Arms Doctrine Directorate, United States Army Combined Arms Center. Send comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank Forms) to Commander, United States Army Combined Arms Center and Fort Leavenworth, ATTN: ATZL-MCD (ATP 3-55.4), 300 McPherson Avenue, Fort Leavenworth, KS 66027-2337; by e-mail to usarmy.leavenworth.mccoe.mbx.cadd-org- [email protected]; or submit an electronic DA Form 2028. 5 April 2016 ATP 3-55.4 iii This page intentionally left blank. iv ATP 3-55.4 5 April 2016 Introduction Every Soldier plays a role when it comes to situational awareness through reporting. Soldiers and DA Civilians have the obligation to collect, safeguard, and report information,
Recommended publications
  • Technology Innovation and the Future of Air Force Intelligence Analysis
    C O R P O R A T I O N LANCE MENTHE, DAHLIA ANNE GOLDFELD, ABBIE TINGSTAD, SHERRILL LINGEL, EDWARD GEIST, DONALD BRUNK, AMANDA WICKER, SARAH SOLIMAN, BALYS GINTAUTAS, ANNE STICKELLS, AMADO CORDOVA Technology Innovation and the Future of Air Force Intelligence Analysis Volume 2, Technical Analysis and Supporting Material RR-A341-2_cover.indd All Pages 2/8/21 12:20 PM For more information on this publication, visit www.rand.org/t/RRA341-2 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0633-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover: U.S. Marine Corps photo by Cpl. William Chockey; faraktinov, Adobe Stock. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • National Guard Intelligence Activities
    CCHHIIEEFF NNAATTIIOONNAALL GGUUAARRDD BBUURREEAAUU MMAANNUUAALL NGB-J2 CNGBM 2000.01 DISTRIBUTION: A 26 November 2012 NATIONAL GUARD INTELLIGENCE ACTIVITIES Reference(s): See Enclosure S. 1. Purpose. This manual describes how to implement policies contained in Chief National Guard Bureau (CNGB) Instruction (I) (CNGBI) 2000.01, National Guard (NG) Intelligence Activities (reference a), and establishes procedures for the conduct and oversight of National Guard Bureau (NGB), Joint Forces Headquarters-State (JFHQ-S) and NG Title 32 (T-32) intelligence and intelligence-related activities. Procedures and information contained herein are in accordance with (IAW) references b, c, and d. 2. Superseded/Canceled. None. 3. Applicability. This manual applies to all NGB, T-32NG JFHQ-S, and T-32 NG intelligence units and staff organizations, and T-32 non-intelligence organizations that perform intelligence or intelligence-related activities, as defined in the glossary, hereinafter referred to as the NG intelligence component. This manual does not apply to criminal investigations or authorize any intelligence activity not otherwise authorized by law. NG members serving in a Title 10 (T-10) status must comply with Service Component regulations. 4. Procedures. References b and d give clear guidance for ensuring the legality and propriety of all intelligence and intelligence-related activity. The application of reference d to NG intelligence components is required by NG policy because it gives specific guidance for conducting this activity through 15 procedures. Procedure 1 provides general guidance. Procedures 2 through 4 articulate the exclusive procedures through which Department of Defense (DoD) intelligence components, which includes the NG intelligence component IAW this manual, may collect, process, retain, and disseminate information concerning United States (U.S.) persons.
    [Show full text]
  • Trends and Challenges in Intelligence Education and Training
    International Conference KNOWLEDGE-BASED ORGANIZATION Vol. XXII No 1 2016 TRENDS AND CHALLENGES IN INTELLIGENCE EDUCATION AND TRAINING Iulian MARTIN, Antonio DAN-ŞUTEU National Defense University „Carol I”, Bucharest, Romania [email protected] Abstract: The education and lifelong learning of the intelligence analysts will provide the right ingredients to evolve into incredible and increasingly operational environment characterized by uncertainty and complex challenges. Based on diagnosis of the current ways of education and training in the field of intelligence analysis, there seems to be only a few higher education programs that focuses exclusively on law enforcement intelligence community. Most education and training programs are based on intelligence courses that incorporate multidisciplinary topics and a broad theoretical approach to intelligence issues. An efficient program should not only educate students by enabling them to learn how to perform an intellectual process for having analytical products, but it should also train them by teaching them the structures, techniques, and procedures associated with the intelligence process. Keywords: education, training, intelligence, analysis, process 1. Introduction University in 2002. This was followed by Major events in the wake of the the establishment of the College of new millennium have cast serious doubts Analytical Studies by the Federal Bureau over the ability of the intelligence of Investigation (FBI), as well as of the community to effectively address the National Intelligence University by the challenges posed by an increasingly Office of the Director of National globalized and rapidly changing world. Intelligence (ODNI). The latter was The failure to prevent the 9/11 terrorist designed as a ‘virtual’ institution attacks, as well as to accurately assess Iraq’s responsible for improving coordination Weapons of Mass Destruction program have between the training programs of different highlighted the need for significant intelligence agencies.
    [Show full text]
  • Understanding and Intelligence Support to Joint Operations
    JDP 2-00 JOINT DOCTRINE PUBLICATION 2-00 UNDERSTANDING AND INTELLIGENCE SUPPORT TO JOINT OPERATIONS Joint Doctrine Publication 2-00 (JDP 2-00) (3rd Edition), August 2011 is promulgated as directed by the Chiefs of Staff Assistant Chief of the Defence Staff (Development, Concepts and Doctrine) CONDITIONS OF RELEASE 1. This information is Crown copyright and the intellectual property rights for this publication belong exclusively to the Ministry of Defence (MOD). No material or information contained in this publication should be reproduced, stored in a retrieval system, or transmitted in any form outside MOD establishments except as authorised by both the sponsor and the MOD where appropriate. 2. This information may be subject to privately owned rights. i 3rd Edition, Change 1 JDP 2-00 AUTHORISATION The Development, Concepts and Doctrine Centre (DCDC) is responsible for publishing Joint Doctrine Publications (JDPs) within a hierarchy of similar publications. Readers wishing to quote JDPs as reference material in other work should confirm with the DCDC Doctrine Editor whether the particular publication and amendment state remains authoritative. Comments on factual accuracy or proposals for amendment are welcomed by the Doctrine Editor at: The Development, Concepts and Doctrine Centre Ministry of Defence Shrivenham SWINDON, Wiltshire, SN6 8RF Telephone number: 01793 314216/7 Military Network: 96161 4216/4217 Facsimile number: 01793 314232 Military Network: 96161 4232 E-mail: [email protected] DISTRIBUTION Distribution of JDPs is managed by the Forms and Publications Section, DSDA Operations Centre, C16 Site, Ploughley Road, Arncott, Bicester, OX25 1LP. Requests for issue of this publication, or amendments to its distribution should be referred to the DSDA Operations Centre.
    [Show full text]
  • Combat Intelligence
    u R«Ur 408.3. y^ 11/ Uto FM 3 O -ï> CJ kt*t»r. DEPARTMENT OF THE ARMY FIELD MANUAL COMBAT INTELLIGENCE HEADQUARTERS, DEPARTMENT OF THE ARMY The Pentatron.ÄfGffiy JANUARY 1960 Km 1A518. Patagón Washington, D.C. 20310 FM 30-5 C 1 FIELD MANUAL COMBAT INTELLIGENCE FM 30-5 HEADQUAETERS, DEPARTMENT OF THE ARMY Cil ANGES No. 1 WASHINGTON 25, D.C., « Jime 1961 FM 30-5,6 January 1960, is changed as follows : Delete throughout this manual all references to "Theater Army Replacement and Training Command (TARTC)" and substitute therefor: Theater Army Replacement System (TARS). Substitute throughout this manual TALOG for "TALogComd." 1. Purpose and Scope ******* c. (Superseded) Users of this manual are encouraged to submit recommended changes or comments to improve the manual. Com- ments should be keyed to the specific page, paragraph, and line of the text in which the change is recommended. Reasons should be pro- vided for each comment to insure understanding and complete evalua- tion. Comments should be forwarded direct to the Commandant, U.S. Army Command and General Staff College, Fort Leavenworth, Kans. 9. Counterintelligence Counterintelligence is inseparable from the intelligence operations. For this reason, * * * Counterintelligence activities include— 10. Specialized Categories of Intelligence * * * * * * * /. (Added) Terrain intelligence which is processed information on the military significant natural and manmade characteristics of an area. See FM 30-10. g. (Added) Weather intelligence, which is weather information interpreted in relation to its effects upon personnel, equipment and material, and the area of operations. For example, data concerning temperature and wind is weather information ; when interpreted in terms of wind chill and operational implications of this wind chill, the information becomes weather intelligence.
    [Show full text]
  • ATP 2-33.4 Intelligence Analysis
    ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS ..................................................
    [Show full text]
  • The Article Argues That Intelligence Can Learn a Considerable Amount from Social Science Research Inspired by Constructivist and Critical Approaches
    Unlikely Connections: What Can Intelligence Research Learn by Being Critical? The article argues that intelligence can learn a considerable amount from social science research inspired by constructivist and critical approaches. Rather than being polar opposites, intelligence analysis and critical theory can identify significant areas of dialogue. The article begins by analyzing the relationship between research and of intelligence. It discusses the differences between the two and shows that research is a different kind of process than intelligence production, with which it shares some characteristics, but from which it differs considerably. Further, the article argues that research can support intelligence organizations through capacity building, improving the skills of practitioners and offering support to strategic decision-making. Then, it presents three possible understandings of this relationship and argues in favor of the use of critical approaches for improving the performance of intelligence agencies in two ways: understanding the other and understanding oneself. 1. Introduction – comparing intelligence and research The article explores the conceptual and practical interrelationships between intelligence and research. It argues that intelligence analysis can significantly learn from critical research and that the latter can provide resources for improving the former. In order to clear the path for a discussion of the relationship between critical research and intelligence, the paper first claims that research (in general) and intelligence need to be analytically separated, and that all research can offer significant support to intelligence. The article first defines the concepts of research and intelligence and elaborates their main differences. While both processes involve the examination of sources, the testing of previous knowledge and the identification of patterns and culminate in the production of new knowledge, the article argues that they produce a different kind of knowledge.
    [Show full text]
  • MCWP 2-14 Counterintelligence CI Support to the Combat Service Support Element and Rear Area Operations
    MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations may be sent directly to Commanding General, Marine Corps Combat Development Command, Doctrine Division (C 42), 3300 Russell Road, Suite 318A, Quantico, VA 22134-5021 or by fax to 703-784-2917 (DSN 278-2917) or by E-mail to [email protected]. Recommendations should include the following information: l Location of change Publication number and title Current page number Paragraph number (if applicable) Line number Figure or table number (if applicable) l Nature of change Add, delete Proposed new text, preferably double-spaced and typewritten l Justification and/or source of change Additional copies: A printed copy of this publication may be obtained from Marine Corps Logistics Base, Albany, GA 31704-5001, by following the instructions in MCBul 5600, Marine Corps Doctrinal Publications Status. An electronic copy may be obtained from the Doctrine Division, MCCDC, world wide web home page which is found at the following uni- versal reference locator: http://www.doctrine.usmc.mil. Unless otherwise stated, whenever the masculine gender is used, both men and women are included. DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 5 September 2000 FOREWORD Marine Corps Doctrinal Publication (MCDP) 2, Intelligence, and Marine Corps Warfighting Publication (MCWP) 2-1, Intelligence Operations, provide the doctrine and higher order tactics, techniques, and procedures for intelligence operations. MCWP 2-14, Counterintelligence, complements and expands on this information by detailing doctrine, tactics, techniques, and procedures for the conduct of counterintelligence (CI) operations in support of the Marine air- ground task force (MAGTF).
    [Show full text]
  • The Role of Military Intelligence in Homeland Security Stephen Dycus
    Louisiana Law Review Volume 64 | Number 4 Normalization of National Security Law: A Symposium Summer 2004 The Role of Military Intelligence in Homeland Security Stephen Dycus Repository Citation Stephen Dycus, The Role of Military Intelligence in Homeland Security, 64 La. L. Rev. (2004) Available at: https://digitalcommons.law.lsu.edu/lalrev/vol64/iss4/3 This Article is brought to you for free and open access by the Law Reviews and Journals at LSU Law Digital Commons. It has been accepted for inclusion in Louisiana Law Review by an authorized editor of LSU Law Digital Commons. For more information, please contact [email protected]. The Role of Military Intelligence in Homeland Security Stephen Dycus* I. INTRODUCTION If, God forbid, the American homeland is struck by another major terrorist attack, military forces will very likely be involved in the response. There can be little doubt, for example, that if pneumonic plague bacilli are released in Chicago and infections result,' the entire city will have to be quarantined as soon as the contagion is detected. Nor is there any doubt that troops will be used to enforce the quarantine. Only the Pentagon and National Guard units have the personnel, equipment, and training to do the job. Military forces also may be able to help prevent another attack or at least reduce its impact. On September 11, 2001, for instance, Air Force and Air National Guard jets were sent aloft in an unsuccessful effort to intercept and perhaps shoot down the civilian airliners that had been commandeered by terrorists.2 Whether in the response to a terrorist attack or in its interdiction, military intelligence services will directly support the military's use of force at home, just as they provide information and analysis for other military activities around the world.
    [Show full text]
  • MCWP 2-22 Signals Intelligence ______C-3
    MCWP 2-22 (formerly MCWP 2-15.2) Signals Intelligence U.S. Marine Corps DISTRIBUTION STATEMENT A: approved for public release; distribution is unlimited PCN 14300006300 MCCDC (C 42) 13 Jul 2004 E R R A T U M to MCWP 2-22 SIGNALS INTELLIGENCE 1. Change the publication short title to read “MCWP 2-22” (vice MCWP 2-15.2). PCN 143 000063 80 DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 22 February 1999 FOREWORD Marine Corps Warfighting Publication (MCWP) 2-22, Signals Intelligence, serves as a basic reference for understanding concepts, operations, and proce- dures for the conduct of signals intelligence (SIGINT) operations in support of the Marine air-ground task force. This publication complements and expands on Marine Corps Doctrinal Publication 2, Intelligence, and MCWP 2-1, Intelli- gence Operations, which provide doctrine and higher order tactics, techniques, and procedures for intelligence operations. The primary target audience of this publication is intelligence personnel respon- sible for planning and executing SIGINT operations. Personnel who provide support to SIGINT or who use the results from these operations should also read this publication. MCWP 2-22 describes aspects of SIGINT operations, including doctrinal fun- damentals, equipment, command and control, communications and information systems support, planning, execution, security, and training. Detailed informa- tion on SIGINT operations and tactics, techniques, and procedures is classified and beyond the scope of this publication. MCWP 2-22 supersedes Fleet Marine Force Manual 3-23, (C) Signals Intelli- gence/Electronic Warfare Operations (U), dated 21 September 1990. Reviewed and approved this date.
    [Show full text]
  • NATO Open Source Intelligence Reader
    OPEN SOURCE INTELLIGENCE READER TABLE OF CONTENTS INTRODUCTION • Introduction to the NATO OSINT Reader .........................................................................2 • Open Source Intelligence: The Challenge for NATO ........................................................3 THEORY AND HISTORY OF OSINT • Understanding Open Sources .............................................................................................9 • The Role of Open Sources as the Foundation for Successful All-Source Collection Strategies...........................................................................................................................12 • Review Essay - Open Source Intelligence........................................................................17 • Grey Literature..................................................................................................................24 APPLICATION OF OSINT • Open Source Information .................................................................................................30 • New Risks of Crisis - Fresh Perspectives From Open Source..........................................35 • Secrets For Sale: How Commercial Satellite Imagery Will Change the World...............39 INTERNATIONAL VIEWS OF OSINT • Teaching the Giant to Dance: Contradictions and Opportunities in Open Source Within the Intelligence Community .................................................................................56 • Open Source Intelligence: What is it? Why is it Important to the Military?....................64
    [Show full text]
  • Field Manual, FM 11-30, Signal Corps Technical Intelligence, August 1956 Robert Bolin , Depositor University of Nebraska - Lincoln, [email protected]
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln DOD Military Intelligence U.S. Department of Defense 8-1956 Field Manual, FM 11-30, Signal Corps Technical Intelligence, August 1956 Robert Bolin , depositor University of Nebraska - Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/dodmilintel Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Other Engineering Commons, Peace and Conflict Studies Commons, and the Soviet and Post-Soviet Studies Commons Bolin, Robert , depositor, "Field Manual, FM 11-30, Signal Corps Technical Intelligence, August 1956" (1956). DOD Military Intelligence. 47. http://digitalcommons.unl.edu/dodmilintel/47 This Article is brought to you for free and open access by the U.S. Department of Defense at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in DOD Military Intelligence by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. DEPARTMENT 0 TH U. S. iMHRC' ~"fILE-ROOM · mpi-4JGNAL CORPS '. ~'r& \\~~~TECHNICAL .• \ :J INTELLIGENCE ~WJ\~~( ~-- )\(/ ...----; / / . / ./ L/"' ,. DEPARTMENT OF THE ARMY • AUGUST 1956 *FM 11-30 FIELD MANUAL! DEPART:lIECiT OF THE ARNIY Ko. !I-30 ( "''''ASHINGTON 25, D. C., 13 August 1956 SIGNAL CORPS TECHNICAL INTELLIGENCE Par(1._ graphs Page CHAPTER 1. INTRODcCTIO:N ....................... 1-5 3 2. SIGKAL IXTELLIGE:NCE RE- SPONSIBILITIES ..................... 6-14 6 3. SIGKAL ICiTELLIGEXCE OR­ GANIZATION Section I. Signal Corps Intelligence Agency ____ 15,16 14 II. Signal Intelligence enits.......... __ . ___ 17-22 15 CHAPTER 4. SIGKAL IXTELLIGECiCE OP­ ERATIOKS Section 1. Planning ...... _________ .. ___ .. _______ . __ ........ _. 23-26 21 II. Sources of slgnai iniormation ..
    [Show full text]