FM 30-16, Technical Intelligence, 1972 Robert L

Total Page:16

File Type:pdf, Size:1020Kb

FM 30-16, Technical Intelligence, 1972 Robert L University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln DOD Military Intelligence U.S. Department of Defense 8-1972 FM 30-16, Technical Intelligence, 1972 Robert L. Bolin University of Nebraska-Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/dodmilintel Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Other Engineering Commons, Peace and Conflict Studies Commons, and the Soviet and Post-Soviet Studies Commons Bolin, Robert L., "FM 30-16, Technical Intelligence, 1972" (1972). DOD Military Intelligence. 101. http://digitalcommons.unl.edu/dodmilintel/101 This Article is brought to you for free and open access by the U.S. Department of Defense at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in DOD Military Intelligence by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. u. s. Army Reprcs~ntative .fylCEC MCS,. QuMtlc.01 !1~5 _. 1 FM 30-16 FIELD MANUAL TECHNICAL INTELLIGENCE HEADQUARTERS, DEPARTMENT OF THE ARMY AUGUST1972 ALFRED M. GRAV MARINE CORPS RESEARCH CENTER ATTN COLLECTION MANAGEMENT (C40ACL} 2040 BROADWAY ST QUANTICO VA 22134-5107 *FM 30-16 FIELD MANUAL HEADQUARTERS DEPARTMENT OF THE ARMY No. 30-16 l WASHINGTON, D.C., 31 August 1972 TECHNICAL INTELLIGENCE Parairraph Pag" CHAPTER 1. GENERAL Section I. Introduction ---------------~---~----------------------------------------------- 1-1-1-5 1-1,1-2 II. The strategic effort ------------------------------------------~------------------ l-6--1-9 1-2,1-3 CHAPTER 2. ARMY TECHNICAL INTELLIGENCE Section I. Introduction ------------------------------------------------------------------- 2-1-2-3 2-1,2-2 II. Field army organization :for technical intelligence ---------------------------------- 2-4- 2-2-- 2-6 2-5 CHAPTER 3. TECHNICAL INTELLIGENCE FUNCTIONALIZATION Section I. General -------------------------------...:------·--------------------------------- 3-1 3-1 II. Communication-electronics intelligence -------------------------------------------­ 3-2,3-3 3-1, 8-2 III. Weapons and munitions intelligence ---------------------------------------------­ S-4,3-5 3-3 IV. General support and equipment intelligence -----------------------'---------------- 3-6- 3-4, 3-10 3-5 v. Mobility intelligence -----------------------------------------------------------­ 3-11,3-12 8-5 VI. Medical intelligence ------------------------------------------------------------- 3-13- 3-6, 8-15 3-7 CHAPTER 4. TECHNICAL INTELLIGENCE PLANNING ------------------------------------ 4-1-4- 5 4-1, 4-2 5. COLLECTION AND COLLECTION AGENCIES Section I. _Introduction ------------------------------------------------------------------- 5-1,5-2 5-1 II. Collection agencies ------------------------------------------------------------- 5-3- 5-2-- 5-15 5-5 CHAPTER 6. RECOVERY AND EVACUATION OF FOREIGN EQUIPMENT AND DOCUMENTS Section I. Introduction ------------------------------------------------------------------- 6-1,6-2 6-1 II. Recovery and evacuation o:f materiel --------------------------------------------- 6-3- 6-1- 6-9 6-7 III. Recovery and evacuation o:f technical documel.lts ----------------------------------­ 6-10-6-12 6-7 CHAPTER 7. PROCESSING, DISSEMINATION, AND USE Section I. Processing -------------------------------------------------------------------- 7-1-7-5 7-1,7-2 II. Aspects o:f technical intelligence production --------------------------------------- 7-6-7-9 7-2,7-3 III. Technical intelligence reports ---------------------------------------------------- 7-10- 7-4, 7-18 7-5 IV. Dissemination and use ---------------------------------------------------------­ 7-14,7-15 7-6 CHAPTER 8. STABILITY OPERATIONS Section I. Introduction ------------------------------------------------------------------­ 8-1,8-2 8-1 II. Responsibilities ------------------------------------------------------'---------- 8-3-8-5 8-2 III. Procedures ----------------------------------------~--------------------------- 8-6- 8-2- 8-14 8-5 APPENDIX A. REFERENCES ----------------------·--------------------~--------------------------------- A-1 B. MAJOR CATEGORIES OF TECHNICAL INTELLIGENCE ---------------------------------- B-1 C. EXAMPLE OF TECHNICAL INTELLIGENCE PLAN --------------------------------------- C-1 D. HANDLING AND REPORTING OF CAPTURED ENEMY EQUIPMENT AND DOCUMENTS (STANAG 2028) ----------------------------------------------------------- D-1 E. NOMENCLATURE FOR SOVIET BLOC ARMY WEAPONS AND EQUIPMENT (STANAG 2097) ----------------------------------------------'--------------------------- E-1 INDEX ------------------------------------------------------------------------------------------------- Index-1 * This manual supersedes FM 80-16, 28 February 1969. AGO 8118A FM 30-16 CHAPTER 1 GENERAL Section I. INTRODUCTION NATO CENTO SEATO ABOA 1-1. Purpose Title STANAG STANAG SEASTAG SOLOG This manual sets forth doctrine and establishes Handling and RePQrt­ ing of Captured procedures :for the management, planning, and Enemy . Equipment collection of information which, upon evaluation and Documents ---- 2084 2084 2084 94 and production into intelligence, is reported and Nomenclature fo:r So­ disseminated as Army technical intelligence. It viet Bloc Army Weapons and Equip- provides guidance for commanders, staff officers, 2097 2097 and other personnel and units,· and aids in under­ ment -------------- standing the concept and role of technical intelli­ gence in the overall intelUgence requirements of · 1-3. Recommended Chan1es the commander. Users of this manual are encouraged to submit recommendations to improve its clarity ·or accuracy. Comments should be keyed to the spe­ 1-2. Scape cific page, paragraph, and line of the text in which a. The contents of this manual deal primarily the change is recommended. Reasons should be with technical intelligence organizations and the provided for each comment to insure understand­ objectives and functions of technical intelligence ing and complete evaluation. Comments should be operations. The manual outlines procedures and prepared using DA Form 2028 (Recommended establishes broad principles regarding the role of Changes to Publications) and forwarded direct to military intelligence units engaged in technical in­ the Commanding Officer, US Army Combat Devel­ teUigence activities. In addition, it identifies those opments Command Intelligence Agency, Fort Hu­ sources and agencies available to assist in accom­ achuca, Arizona 85613. Originators of proposed plishing the technical intelligence requirements of changes constituting significant modification of the commander. Engineer topographic and terrain approved Army doctrine may send an information · intelligence are discussed in FM 5-30 and FM copy, through command channels, to the Com­ 30-10; consequently, they are not included within manding General, USACDC, Fort Belvoir, Vir­ the scope of this manual. ginia 22060. This action will facilitate review and followup. b. The material presented herein is applicable to general war, limited war, and cold war situa.. tions. Such situations include stability operations, 1-4. Deflnitiens nuclear and nonnuclear warfare enviromnents, a. For definition of terms used see AR 810-25. and employment of chemical agents/munitions b. The relationship of intelligence and technical and nuclear weapons. Protection from chemical intelligence is set forth below: and biological agents and radioactive fallout is (1) Intelligence is the product resulting from also included. the collection, evaluation, analysis, integration, e. This manual is in consonance with the follow­ and interpretation of all information concerning ing international standardization agreements, one or more aspects of foreign countries or areas which are identified by type of agreement and which are immediately or potentially significant number at the beginning of each appropriate · to the development and execution of military chapter and appendix in the manual : plans, policies, operations, and development of FM 30-16 military equipment. Technical intelligence, which 1-5. Scientific and Technieal Intelligence is one aspect of military intelligence, plays a vital Scientific and Technical (S&T) Intelligence role in the tactical and strategic intelligence pic­ a. includes that foreign intelligence relating to basic ture and therefore must be .considered as part of and applied research in natural and applied sci­ an overall integrated intelligence effort. ences, and in applied engineering techniques. Also (2) Technical intelligence is that intelligence included are the scientific and technical character­ concerning for~ign technological developments istics, capabilities, and limitations of all foreign and the performance and operational capabilities military systems, weapons, weapons systems, and of foreign materiel, which now or may eventually other materiel; production methods employed in have a practical application for military purposes. their manufacture; and related technology per­ As with all other intelligence, it is the end product taining to materiel operation, and logistic support. resulting from the collection and processing of technical information. The scope of technical in­ b. Within the Department of the Army, the As­ telligence is broad. It includes all technical aspects sistant Chief of Staff for Intelligence (ACSI) has of foreign equipment, supplies, installations, facil­ general staff responsibility for all matters per­ ities, communications, and captured or abandoned
Recommended publications
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Perspectives and Opportunities in Intelligence for U.S. Leaders
    Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make
    [Show full text]
  • Espionage and Intelligence Gathering Other Books in the Current Controversies Series
    Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.
    [Show full text]
  • WMD Commission Request # 74 (Oct
    COLLECTION Chapter seven collection Summary & Recommendations The collection of information is the foundation for everything that the Intelli- gence Community does. While successful collection cannot ensure a good analytical product, the failure to collect information—as our Iraq study demon- strated—turns analysis into guesswork. And as our review demonstrates, the Intelligence Community’s human and technical intelligence collection agen- cies have collected far too little information on many of the issues we care about most. This chapter sets forth our recommendations for improving the collection capabilities of our Intelligence Community so that it is better equipped to con- front today’s diffuse, elusive, and ever-changing intelligence challenges. These recommendations fall into two categories: those focused on improving the performance of particular collection agencies, and those aimed at integrat- ing the management of collection across the Intelligence Community. Among other suggestions, we recommend that the DNI: ■ Create an “integrated collection enterprise”—that is, a management struc- ture that ensures that the Intelligence Community’s decentralized collec- tion capabilities are developed in a manner that is consistent with long- term strategic intelligence priorities, and are deployed in a coordinated way against today’s intelligence targets; ■ Encourage the development of new and innovative human intelligence col- lection techniques, and empower the CIA to coordinate the full spectrum of human intelligence activities performed in the Intelligence Community; and ■ Establish an Open Source Directorate in the CIA responsible for collecting and storing open source information, and developing or incorporating commercial tools to assist users in data searches—including those in for- eign languages.
    [Show full text]
  • Fm 2-22.3 (Fm 34-52)
    FM 2-22.3 (FM 34-52) HUMAN INTELLIGENCE COLLECTOR OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY September 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and regulations. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE ............................................................................................................... vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION...................................................................................................1-1 Intelligence Battlefield Operating System .............................................................1-1 Intelligence Process..............................................................................................1-1 Human Intelligence ...............................................................................................1-4 HUMINT Source....................................................................................................1-4 HUMINT Collection and
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • REVIEW on PRESENT, PAST and FUTURE of COMPETITIVE TECHNICAL INTELLIGENCE Shweta Rana Assistant Professor,Amity University Haryana [email protected]
    id639728 pdfMachine by Broadgun Software - a great PDF writer! - a great PDF creator! - http://www.pdfmachine.com http://www.broadgun.com International Journal of Latest Research in Science and Technology ISSN (Online):2278-5299 – Volume 7, Issue 2: Page No.34 38 ,March-April 2018 https://www.mnkpublication.com/journal/ijlrst/index.php REVIEW ON PRESENT, PAST AND FUTURE OF COMPETITIVE TECHNICAL INTELLIGENCE Shweta Rana Assistant Professor,Amity University Haryana [email protected] – ’ Abstract Of today s fast paced technological innovations world, Competitive Technological Intelligence has become crucial for most of the business organization. It is one of the most important logical properties for business organization to have an edge in competition. This edge of technical intelligence can be anywhere ranging from products to services, customer acquisition to relationship management, marketing to branding, procurement to selling, product design to R&D and many others. My idea is to understand, how established organization and start-up organizations of academic institutions/e-selling companies are managing their Competitive Technical Intelligence? What is the importance of Technical Intelligence? What is the Past, Present and Future of Competitive Technological Intelligence Keywords: Competitive Technical Intelligence (CTI), Strategic decision making, Business Competitor 1. INTRODUCTION linked to the others by a feedback loop. We are describing — Competitive intelligence (CI)[7] is not a substitute for other them to you which is called as CI cycle bi CI professionals business processes, but rather that it is comprised of a number A. Planning & direction (working with decision makers to of building blocks[2] that hopefully merges the information discover and hone their intelligence needs): CI should only obtained from these processes to create a comprehensive, focus on those business issues that are of critical importance interpretable picture of a company's possible future for a company to know.
    [Show full text]
  • Cyber Espionage
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Cyber Espionage An analysis of threats from Intelligence Gathering with an emphasis on Industrial Espionage in today’s information society DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Wirtschaftsinformatik eingereicht von Oleg Denisov Matrikelnummer 0725490 am Fachbereich Rechtswissenschaften der Technischen Universität Wien Betreuung: Ao. Univ.-Prof. Dr. iur. Markus Haslinger Wien, 20.04.2014 (Unterschrift Verfasser) (Unterschrift Betreuung) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Cyber Espionage An analysis of threats from Intelligence Gathering with an emphasis on Industrial Espionage in today’s information society MASTER’S THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Business Informatics by Oleg Denisov Registration Number 0725490 to the department of law at the Vienna University of Technology Advisor: Ao. Univ.-Prof. Dr. iur. Markus Haslinger Vienna, 20.04.2014 (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Oleg Denisov Geerzkamp 7, 22119 Hamburg Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwende- ten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit - einschließlich Tabellen, Karten und Abbildungen -, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Ent- lehnung kenntlich gemacht habe.
    [Show full text]
  • Techint Multi-Service Tactics, Techniques, and Procedures for Technical Intelligence Operations
    TECHINT MULTI-SERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR TECHNICAL INTELLIGENCE OPERATIONS FM 2-22.401 NTTP 2-01.4 AFTTP(I) 3-2.63 JUNE 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. FOREWORD This publication has been prepared under our direction for use by our respective commands and other commands as appropriate. This publication is available through the ALSA Web site (www.alsa.mil); through the Army at Army Knowledge Online (AKO) (www.us.army.mil) and at the General Dennis J. Reimer Training and Doctrine Digital Library (www.train.army.mil) Web sites; and through the Air Force at the Air Force Publishing Web site (www.e-publishing.af.mil). PREFACE 1. Purpose This publication provides a common set of multi-Service tactics, techniques, and procedures (MTTP) for technical intelligence (TECHINT) operations. It serves as a reference for Service TECHINT planners and operators to build and execute coordinated multi-Service TECHINT operations. It provides guidance to tactical forces on the evacuation of captured materiel that has intelligence value. Additionally, it informs the joint force commanders (JFCs) and their staffs about the missions, requirements, and capabilities of TECHINT forces and essential information to effectively employ and utilize TECHINT capabilities. 2. Scope This publication guides planners through the process of requesting, deploying, and employing the unique, highly specialized, and mission enhancing expertise of multi-Service TECHINT teams. It is designed for planners at all levels and defines methods to ensure TECHINT capabilities are fully integrated and utilized to the maximum extent possible to provide captured enemy equipment identification, assessment, collection, exploitation, and evacuation in support of national technical intelligence requirements.
    [Show full text]
  • History of Technical Intelligence Army General School
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln DOD Military Intelligence U.S. Department of Defense 6-1951 History of Technical Intelligence Army General School Robert Bolin , depositor University of Nebraska - Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/dodmilintel Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Other Engineering Commons, Peace and Conflict Studies Commons, and the Soviet and Post-Soviet Studies Commons Army General School and Bolin, Robert , depositor, "History of Technical Intelligence" (1951). DOD Military Intelligence. 102. http://digitalcommons.unl.edu/dodmilintel/102 This Article is brought to you for free and open access by the U.S. Department of Defense at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in DOD Military Intelligence by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. us 251 .U6 H55 1951 ARMY GENERAL SCHOOL ~ FORT RILEY, KANSAS INSTRUCTOR'S FOLDER OF A UNtT OF INSTRUCTION F 0 R I N ST RU CT 0 R~S - 0 NL Y ~ UNCl.ASSIFIED llY A~ty OF DOD DIJ't. 5200. l R !'T /V,:t~-;<f OH1i .lr.t1Y? 5~- HISTORY OF TECHNICAL INTELLIGENCE I-2906 SUBJECT AND FILE NUMBER SUPERVISORY SECTION: INTELLIGENCE--- x TRAINING ---P & A-- June 1951 DATE PREPARED --------- DA TE REVISED : ; ~'.DECLASSIFIED ~ A<my • n.&VA, n. Ril oy. Kono,. H·98': OC/..JCH ~; ?.:24 f OlO(~ DATE HOUR DEPT. (UNIT) DEi-T. NO. 110 minutes) I 2906 c SUBJECT: HISIDRY OF TECHNICAL INTEILIGENCE Organization and operations of technical intelligence during and immediately following World War II.
    [Show full text]
  • The Appropriate Use of Human Intelligence in Combating Terrorism
    THE APPROPRIATE USE OF HUMAN INTELLIGENCE IN COMBATING TERRORISM Mutlu Koseli B.A. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS August 2003 APROVED John Liederbach, Committee Chair D. Kall Loper, Committee Member Chad Trulson, Committee Member Robert W. Taylor, Chair of the Department of Criminal Justice, David W. Hartman, Dean of the School of Community Services C. Neal Tate, Dean of the Robert B. Toulouse School of Graduate Studies Koseli, Mutlu, The Appropriate Use of Human Intelligence in Combating Terrorism. Master of Science (Criminal Justice), August 2003, 93 pp., references, 111 titles. When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can be occur at anytime, and in any place, and it seems that terrorism threat will still be exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism. ACKNOWLEDGMENTS I would like to thank to my committee for their efforts. First I’m Greatful to Dr.
    [Show full text]