Joint and National Intelligence Support to Military Operations

Total Page:16

File Type:pdf, Size:1020Kb

Joint and National Intelligence Support to Military Operations Joint Publication 2-01 T OF EN TH W E I S E ' L L M H D T E F T E N A R D R A M P Y E • D • U A N C I I T R E E D M S A T F AT E S O Joint and National Intelligence Support to Military Operations 5 July 2017 PREFACE 1. Scope This publication provides doctrine for joint and national intelligence products, services, assessments, and support to joint military operations. 2. Purpose This publication has been prepared under the direction of the Chairman of the Joint Chiefs of Staff (CJCS). It sets forth joint doctrine to govern the activities and performance of the Armed Forces of the United States in joint operations, and it provides considerations for military interaction with governmental and nongovernmental agencies, multinational forces, and other interorganizational partners. It provides military guidance for the exercise of authority by combatant commanders and other joint force commanders (JFCs), and prescribes joint doctrine for operations and training. It provides military guidance for use by the Armed Forces in preparing and executing their plans and orders. It is not the intent of this publication to restrict the authority of the JFC from organizing the force and executing the mission in a manner the JFC deems most appropriate to ensure unity of effort in the accomplishment of objectives. 3. Application a. Joint doctrine established in this publication applies to the Joint Staff, commanders of combatant commands, subunified commands, joint task forces, subordinate components of these commands, the Services, and combat support agencies. b. The guidance in this publication is authoritative; as such, this doctrine will be followed except when, in the judgment of the commander, exceptional circumstances dictate otherwise. If conflicts arise between the contents of this publication and the contents of Service publications, this publication will take precedence unless the CJCS, normally in coordination with the other members of the Joint Chiefs of Staff, has provided more current and specific guidance. Commanders of forces operating as part of a multinational (alliance or coalition) military command should follow multinational doctrine and procedures ratified by the United States. For doctrine and procedures not ratified by the US, commanders should evaluate and follow the multinational command’s doctrine and procedures, where applicable and consistent with US law, regulations, and doctrine. i Preface 4. Contribution The following staff, in conjunction with the Joint Doctrine Development Community, made a valuable contribution to the revision of this Joint Publication: Lead Agent and Joint Staff Doctrine Sponsor LtCol Glen Weaver, Joint Staff J-2; Joint Analysis Division Action Officer Mr. Mark Brown, Joint Staff J-7, Joint Doctrine Analysis Division; and Joint Doctrine Action Officer LTC Gregory Browder, Joint Staff J-7, Joint Doctrine Division. For the Chairman of the Joint Chiefs of Staff: KEVIN D. SCOTT Vice Admiral, USN Director, Joint Force Development ii JP 2-01 SUMMARY OF CHANGES REVISION OF JOINT PUBLICATION 2-01 DATED 05 JANUARY 2012 • Clarifies the difference within a joint intelligence operations center (JIOC) between a red team and a red cell. • Adds appendices: “Target Intelligence,” “Global Intelligence, Surveillance, and Reconnaissance Management,” and “Joint Exploitation Support to Intelligence.” • Describes information operations intelligence integration as a military capability that supports information operations. • Clarifies identity intelligence, identity intelligence production, and associated identity activities. • Restructures Chapter III, Section B, “Collection,” and clarifies collection management, collection requirements management, and collection operations management functions. • Clarifies the role of joint intelligence planners to coordinate the planning and direction portion of the joint intelligence process. • Describes intelligence support to cyberspace operations and cyberspace intelligence, surveillance, and reconnaissance considerations. • Clarifies the roles and responsibilities of the JIOC with increased emphasis on the intelligence mission management function. • Emphasizes the role of the J-2 to ensure the integration of intelligence resource management within the operations cycle of the joint force. • Defines the Defense Intelligence Agency’s roles and responsibilities as the defense intelligence collection manager. • Describes each of the Service intelligence organizations and their capabilities. • Clarifies the difference between an intelligence, surveillance, and reconnaissance activity and an intelligence collection capability or asset. • Expands the discussion of counterintelligence activities to include protecting information and information systems and combatting transnational organized crime. iii Summary of Changes • Describes weapons technical intelligence as a subcategory of technical intelligence. iv JP 2-01 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY ............................................................................................... ix CHAPTER I THE ROLE OF INTELLIGENCE IN MILITARY OPERATIONS Introduction ................................................................................................................ I-1 Intelligence Challenges .............................................................................................. I-2 Intelligence Support to Military Operations .............................................................. I-3 CHAPTER II JOINT AND NATIONAL INTELLIGENCE ORGANIZATIONS, RESPONSIBILITIES, AND PROCEDURES Introduction ...............................................................................................................II-1 Section A. Joint Intelligence Overview ...................................................................................................................II-1 Joint Staff, Directorate for Intelligence ....................................................................II-1 Combatant Command Intelligence Organizations and Responsibilities ..................II-1 Subordinate Joint Force Intelligence Organizations and Responsibilities ...............II-7 Section B. National Intelligence Overview .................................................................................................................II-11 Department of Defense Intelligence and Combat Support Agency Organizations and Responsibilities .........................................................................II-12 National Intelligence Community Organizations and Responsibilities ..................II-21 Joint and National Intelligence Support Forums ....................................................II-24 Intelligence and the Department of Defense Information Network .......................II-27 Intelligence Communications Architecture Planning .............................................II-32 Section C. Interagency, Intergovernmental, and Multinational Intelligence Sharing Overview .................................................................................................................II-34 Multinational Intelligence Collaboration ................................................................II-36 International Intelligence Sharing ...........................................................................II-38 Interorganizational Intelligence Collaboration .......................................................II-39 CHAPTER III INTELLIGENCE OPERATIONS Introduction ............................................................................................................. III-1 The Intelligence Process ......................................................................................... III-1 v Table of Contents Section A. Planning and Direction Overview ................................................................................................................. III-4 Intelligence Planning .............................................................................................. III-4 Intelligence Requirements and Information Requirements Planning ..................... III-8 Resource Allocation .............................................................................................. III-10 Requesting National Intelligence .......................................................................... III-10 Section B. Collection Overview ............................................................................................................... III-13 Collection Management ........................................................................................ III-14 Collection Requirements Management ................................................................. III-18 Collection Operations Management ..................................................................... III-20 Types of Collection Operations ............................................................................ III-35 Collection Agencies and Sources ......................................................................... III-36 Section C. Processing and Exploitation Overview ............................................................................................................... III-38 Human Intelligence ............................................................................................... III-39 Geospatial Intelligence ......................................................................................... III-41 Signals Intelligence ..............................................................................................
Recommended publications
  • MILITARY INTELLIGENCE PB 34-09-2 Volume 35 Number 2 April - June 2009
    MIPB April - June 2009 PB 34-O9-2 Operations in OEF Afghanistan FROM THE EDITOR In this issue, three articles offer perspectives on operations in Afghanistan. Captain Nenchek dis- cusses the philosophy of the evolving insurgent “syndicates,” who are working together to resist the changes and ideas the Coalition Forces bring to Afghanistan. Captain Beall relates his experiences in employing Human Intelligence Collection Teams at the company level in both Iraq and Afghanistan. Lieutenant Colonel Lawson provides a look into the balancing act U.S. Army chaplains as non-com- batants in Afghanistan are involved in with regards to Information Operations. Colonel Reyes discusses his experiences as the MNF-I C2 CIOC Chief, detailing the problems and solutions to streamlining the intelligence effort. First Lieutenant Winwood relates her experiences in integrating intelligence support into psychological operations. From a doctrinal standpoint, Lieutenant Colonels McDonough and Conway review the evolution of priority intelligence requirements from a combined operations/intelligence view. Mr. Jack Kem dis- cusses the constructs of assessment during operations–measures of effectiveness and measures of per- formance, common discussion threads in several articles in this issue. George Van Otten sheds light on a little known issue on our southern border, that of the illegal im- migration and smuggling activities which use the Tohono O’odham Reservation as a corridor and offers some solutions for combined agency involvement and training to stem the flow. Included in this issue is nomination information for the CSM Doug Russell Award as well as a biogra- phy of the 2009 winner. Our website is at https://icon.army.mil/ If your unit or agency would like to receive MIPB at no cost, please email [email protected] and include a physical address and quantity desired or call the Editor at 520.5358.0956/DSN 879.0956.
    [Show full text]
  • ATP 3-90.15. Site Exploitation
    ATP 3-90.15 SITE EXPLOITATION July 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. This publication supersedes ATTP 3-90.15, 8 July 2010. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp *ATP 3-90.15 Army Techniques Publication Headquarters No. 3-90.15 Department of the Army Washington, DC, 28 July 2015 Site Exploitation Contents Page PREFACE...............................................................................................................v INTRODUCTION ..................................................................................................vii Chapter 1 SITE EXPLOITATION ........................................................................................ 1-1 Introduction to Site Exploitation .......................................................................... 1-1 Considerations for Effective Site Exploitation..................................................... 1-6 Site Exploitation in the Operational Environment ............................................... 1-7 Chapter 2 SITE EXPLOITATION PLANNING .................................................................... 2-1 Planning Concepts in Site Exploitation ............................................................... 2-1 Information Collection ........................................................................................
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]
  • Usarmy-Soldiersurveillance.Pdf
    FOR OFFICIAL USE ONLY FM 2-91.6 SOLDIER SURVEILLANCE AND RECONNAISSANCE: FUNDAMENTALS OF TACTICAL INFORMATION COLLECTION October 2007 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913ZMAR04. This determination was made on 30 March 2004. Contractor and other requests must be referred to ATTN: ATZS-CDI-D, U.S. Army Intelligence Center, Fort Huachuca, AZ 85613-7017, or via email at [email protected]. DESTRUCTION NOTICE––Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army FOR OFFICIAL USE ONLY This publication is available at Army Knowledge Online <www.us.army.mil> and the General Dennis J. Reimer Training and Doctrine Digital Library at <www.train.army.mil>. FOR OFFICIAL USE ONLY *FM 2-91.6 Field Manual Headquarters No. 2-91.6 Department of the Army Washington, DC, 10 October 2007 Soldier Surveillance and Reconnaissance: Fundamentals of Tactical Information Collection Contents Page PREFACE..............................................................................................................iii Chapter 1 INTRODUCTION ....................................................................................................1 Soldier Surveillance and Reconnaissance.............................................................1 Every Soldier is a Sensor .......................................................................................2
    [Show full text]
  • IMPROVING the LAW ENFORCEMENT-INTELLIGENCE COMMUNITY RELATIONSHIP Ndic PRESS Improving the Law Enforcement-Intelligence Community Relationship
    IMPROVING THE LAW ENFORCEMENT-INTELLIGENCE COMMUNITY RELATIONSHIP ndic PRESS ndic RELATIONSHIP COMMUNITY ENFORCEMENT-INTELLIGENCE LAW THE IMPROVING Improving the law Enforcement-Intelligence Community Relationship Can’t we all just get along? National Defense Intelligence College national defense intelligence college press PCN 5463 ISBN 978-1-932946-18-5 e Research nc e n g ii l ll ee tt nn I I c c June 2007 i i g g Washington, DC Washington, e e cial policy or position of the Department of t NDIC PRESS t a a Defense of the U.S. Government r r t t S S r o f r e t n e C r o f r e t n e C ect the offi National Defense Intelligence College The views expressed in this book are those of the authors and Can’t We All Just Get Along? All Just Get We Can’t do not refl Improving the Law Enforcement- Improving Intelligence Community Relationship The National Defense Intelligence College supports and encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational consumers. Can’t We All Just Get Along: Improving the Law Enforcement-Intelligence Community Relationship The FBI vs. CIA turf battles of the Cold War are the stuff of Washington legend. Things are much better now. They were getting better anyway, and then 9/11 accelerated the process. But…there is room for improvement. The fi rst essays here lay out some of the intelligence techniques that have proven effective in either Law Enforcement (LE) or the Intelligence Community (IC) and that might be useful to exchange and apply.
    [Show full text]
  • Human Intelligence Collector Operations, FM 2-22.3
    *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION 1-1 Intelligence Battlefield Operating System 1-1 Intelligence Process 1-1 Human Intelligence 1-4 HUMINT Source 1-4 HUMINT Collection and Related Activities 1-7 Traits of a HUMINT Collector 1-1 0 Required Areas of Knowledge 1-12 Capabilities and Limitations 1-13 Chapter 2 HUMAN INTELLIGENCE STRUCTURE 2-1 Organization and Structure 2-1 HUMINT Control Organizations 2-2 HUMINT Analysis and Production Organizations 2-6 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and reyulations. 'This publication supersedeJyM 34-52, 28 September 1992, and ST 2-22.7, Tactical Human Intelligence and Counterintelligence Operations, April 2002. PENTAGON LmRARY \" "j MrtlTARY OOCUMENTI WASHINGTON, DC 20310 6 September 2006 FM 2-22.3 FM 2-22.3 ------------­ Chapter 3 HUMINT IN SUPPORT OF ARMY OPERATIONS 3-1 Offensive Operations ...............................•............................................................ 3-1 Defensive Operations 3-2 Stability and Reconstruction Operations 3-3 Civil Support Operations 3-7 Military Operations in Urban Environment.. 3-8 HUMINT Collection Environments 3-8 EAC HUMINT 3-9 Joint, Combined, and DOD HUMINT Organizations 3-10 Chapter 4 HUMINT OPERATIONS PLANNING AND MANAGEMENT .4-1 HUMINT and the Operations Process .4-1 HUMINT Command and Control .4-3 Technical Control.
    [Show full text]
  • United States Special Operations Command
    United States Special Operations Command Fiscal Year (FY) 2009 Budget Estimates February 2008 Procurement, Defense-Wide FEBRUARY 2008 UNITED STATES SPECIAL OPERATIONS COMMAND PROCUREMENT DOCUMENTATION FOR THE FISCAL YEAR (FY) 2009 BUDGET ESTIMATE Table of Contents Table of Contents....................................................................................................................................................................................................................................... Organizations ..................................................................................................................................................................................................................................... …… Acronyms........................................................................................................................................................................................................................................... …… Procurement Program, Exhibit P-1 ............................................................................................................................................................................................................ Procurement Program, Exhibit P-1R ......................................................................................................................................................................................................... Procurement Line Item Documentation Aviation Procurement Lines Rotary Wing Upgrades
    [Show full text]
  • Military Intelligence Professional Bulletin, April-June 2010
    FROM THE EDITOR This issue features two articles by Colonel Franz, Chief, Information Dominance Center (IDC), ISAF and Lieutenants Colonel Pendall and Steffen on how the International Security Assistance Command has implemented an information–sharing architecture to create a comprehensive common operating picture across the Afghan theater. The IDC is the most decisive information and knowledge management effort ever executed in Afghanistan with a focus on governance and development, key aspects that most impact the daily lives of Afghans. Colonel Cox presents the case for a new intelligence discipline, Document Exploitation or DOMEX. He presents the historical context and follows through to today’s operations with comments and recommen- dations. Major Harris and Captain Bronson describe lessons learned and observations from the deploy- ment of the first active duty Maneuver Enhancement Brigade to Afghanistan with the mission to manage terrain and C2 operations. Major Assadourian discusses a holistic approach to developing security met- rics. First Lieutenant Hancock explores the emerging field of Memetics and implications for memetic op- erations in the military environment. Claudia Baisini and James Nyce make a case for the inclusion of Experiential Learning techniques in traditional military training to meet the challenges of fighting in non- traditional operating environments. Chief Warrant Officer Two Negron discusses the capabilities of the Tactical Exploitation System-Forward for use in a Communications Intelligence function. Vee Herrington, USAICoE’s Chief of the U.S. Army’s MI Library at Fort Huachuca, describes an ongoing experiment to in- corporate eReaders into training. Readers will also find articles on the 2010 MI Hall of Fame inductees and the 2010 recipient of the LTG Weinstein Award within the issue.
    [Show full text]
  • Defending Air Bases in an Age of Insurgency
    AIR UNIVERSITY Defending Air Bases in an Age of Insurgency Shannon W. Caudill Colonel, USAF Air University Press Air Force Research Institute Maxwell Air Force Base, Alabama Project Editor Library of Congress Cataloging-in-Publication Data Dr. Ernest Allan Rockwell Caudill, Shannon W. Copy Editor Sandi Davis Defending air bases in an age of insurgency / Shannon W. Caudill, Colonel, USAF. Cover Art pages cm Daniel Armstrong Includes bibliographical references and index. Book Design and Illustrations ISBN 978-1-58566-241-8 L. Susan Fair 1. Air bases—Security measures—United States. 2. United States. Air Force—Security measures. Composition and Prepress Production 3. Irregular warfare—United States. I. Title. Vivian D. O’Neal UG634.49.C48 2014 Print Preparation and Distribution 358.4'14—dc23 Diane Clark 2014012026 Published by Air University Press in May 2014 AIR FORCE RESEARCH INSTITUTE AIR UNIVERSITY PRESS Director and Publisher Allen G. Peck Disclaimer Editor in Chief Opinions, conclusions, and recommendations expressed Oreste M. Johnson or implied within are solely those of the authors and do not necessarily represent the official policy or position of Managing Editor the organizations with which they are associated or the Demorah Hayes views of the Air Force Research Institute, Air University, Design and Production Manager United States Air Force, Department of Defense, or any Cheryl King other US government agency. This publication is cleared for public release and unlimited distribution. Air University Press 155 N. Twining St., Bldg. 693 Maxwell AFB, AL 36112-6026 [email protected] http://aupress.au.af.mil/ http://afri.au.af.mil/ AFRI Air Force Research Institute ii This book is dedicated to all Airmen and their joint comrades who have served in harm’s way to defend air bases.
    [Show full text]
  • DOMEX: the Birth of a New Intelligence Discipline by Colonel Joseph M
    DOMEX: The Birth of a New Intelligence Discipline by Colonel Joseph M. Cox The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of the Army, Department of Defense, or the U.S. Government. Introduction Prior to 9/11, Document and Media Exploitation and what steps can be taken to enhance operations, (DOMEX) capabilities were neither well defined and then offer recommendations on how the IC and nor sufficiently developed or understood to ad- the Department of Defense (DOD) can better orga- equately support combat operations. Despite les- nize, train, man, and equip itself to meet DOMEX sons learned from previous conflicts, U.S. forces challenges in the future. entered the War of Terror without mechanisms Historical Context to properly collect, process, and disseminate in- The U.S. military and other branches of our govern- telligence derived from DOMEX. In the past 18 ment relied on what was originally titled Document months, the volume of captured digital information Exploitation (DOCEX) for as long as we have prac- from law enforcement, intelligence, and civil court ticed the art of intelligence. Discovering the enemy’s cases has exploded. Recent investigations of Umar intentions through examination and exploitation Farouk Abdulmutallab, the alleged terrorist who of captured documents was nothing new. In war- attempted to detonate plastic explosives on board fare, exploitation of adversary documents normally a commercial airliner, and U.S. Army Major Nidal begins at the point of capture and progressively Malik Hasan, the man accused of killing Soldiers becomes more detailed and sophisticated as the at Fort Hood, rely extensively on close examination document moves through a process of triage, trans- of personal computer data by federal law enforce- lation, and promulgation.2 ment agencies.
    [Show full text]
  • JDN 2-16, Identity Activities
    Joint Doctrine Note 2-16 Identity Activities 03 August 2016 Unclassified PREFACE 1. Scope The purpose of this joint doctrine note (JDN) is to provide guidance to plan, execute, and assess identity activities. 2. Purpose A JDN is a publication that is intended to facilitate information sharing on problems and potential solutions as a supporting effort of formal joint doctrine development and revision. It provides a short term bridging solution to potential doctrine gaps. This JDN specifically addresses how identity capabilities may be coordinated and integrated to generate effects across all phases of an operation or campaign. It supplements current joint doctrine and provides context for identity activities across the range of military operations. This document was developed using current joint doctrine, extant procedures, and existing policy guidance. This JDN does not necessarily describe a position of consensus across the joint force, but it does socialize identity activities-related information and procedures in a non- authoritative document that commanders and staffs can use, as appropriate. 3. Application The guidance in this JDN is not authoritative. If conflicts arise between the contents of this JDN and the contents of a JP, the JP will take precedence for the activities of joint forces, unless the Chairman of the Joint Chiefs of Staff provides more current and specific guidance. This JDN will, at a minimum, inform the development and revision of other JPs. KEVIN D. SCOTT Vice Admiral, USN Director, Joint Force Development i Preface Intentionally Blank ii JDN X-XX TABLE OF CONTENTS EXECUTIVE SUMMARY .............................................................................................. vii CHAPTER I OVERVIEW • Introduction ................................................................................................................. I-1 • The Purpose of Identity Activities .............................................................................
    [Show full text]
  • Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms
    Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms 8 November 2010 (As Amended Through 15 February 2016) As Amended Through 15 February 2016 PREFACE 1. Scope The Joint Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms, sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components. 2. Purpose This publication supplements standard English-language dictionaries and standardizes military and associated terminology to improve communication and mutual understanding within DOD, with other federal agencies, and among the United States and its allies. 3. Application This publication applies to the Office of the Secretary of Defense, the Services, the Joint Staff, combatant commands, DOD agencies, and all other DOD components. It is the primary terminology source when preparing correspondence, to include policy, strategy, doctrine, and planning documents. Criteria for inclusion of terminology in JP 1-02 is enumerated in Department of Defense Instruction 5025.12, Standardization of Military and Associated Terminology, and Chairman of the Joint Chiefs of Staff Instruction (CJCSI) 5705.01, Standardization of Military and Associated Terminology. 4. Publication Format This edition of JP 1-02 has been published in two basic parts: a. Terms and definitions. These are annotated with the source publication. b. Abbreviations and acronyms. The source publication establishes the authoritative context for proper understanding and management of the associated term. 5. JP 1-02 Online Availability and Update Schedule JP 1-02 is accessible online as a searchable database and in PDF format at the following Internet address: http://www.dtic.mil/doctrine/dod_dictionary and at the following NIPRNET i Preface As Amended Through 15 February 2016 address: https://jdeis.js.mil/jdeis/.
    [Show full text]