Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Other

USArmy-IntelAnalysis COMPLETE STUDY GUIDE

Rating
-
Sold
-
Pages
160
Uploaded on
25-07-2023
Written in
2022/2023

Intelligence Analysis Contents Page PREFACE v INTRODUCTION vii Chapter 1 INTELLIGENCE ANALYSIS OVERVIEW 1-1 The Intelligence Warfighting Function 1-1 The Intelligence Analyst 1-1 Intelligence Analysis Process 1-2 Characteristics of Effective Intelligence 1-2 The Intelligence Process 1-2 Intelligence Preparation of the Battlefield 1-3 Intelligence Running Estimate 1-3 The Military Decisionmaking Process 1-3 Chapter 2 ANALYTICAL PROCESSES, METHODOLOGIES, AND TERMS 2-1 Overview 2-1 Critical Thinking 2-1 Types of Reasoning 2-8 The Scientific Method 2-9 Analysis of Competing Hypotheses 2-10 Situational Logic 2-18 Applying Theory 2-19 Comparison 2-19 Modeling 2-19 Processes for Intelligence Analysis 2-20 Analytical Terms 2-21 DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG Z Mar 04. This determination was made on 12 January 2009. Contractor and other requests must be referred to ATTN: ATZS- CDI-D, U.S. Army Intelligence Center and Fort Huachuca, AZ , or via email at ATZS-FDC- . DESTRUCTION NOTICE: Destroy by any method that prevents disclosure of contents or reconstruction of the document in accordance with AR 380-5. * This publication supersedes FM 34-3, 15 March 1990. i Chapter 3 ANALYTICAL SUPPORT TO SITUATIONAL UNDERSTANDING 3-1 Threat Analysis 3-1 Threat Characteristics Recordkeeping and Database 3-12 Terrain Analysis 3-14 Weather Analysis 3-17 Civil Considerations 3-20 Cultural Database 3-24 Chapter 4 ANALYTICAL SUPPORT TO COURSE OF ACTION DEVELOPMENT 4-1 Situation Development 4-1 The Situation Map 4-2 Functional Analysis 4-6 Threat Courses of Action 4-9 Indicators 4-11 Chapter 5 ANALYTICAL TOOLS AND PRODUCTS 5-1 Analytical Techniques and Tools 5-1 Automation Support to Intelligence Analysis 5-18 Appendix A ANALYTICAL PITFALLS .................................................................................. A-1 Appendix B THE INTELLIGENCE RUNNING ESTIMATE ................................................... B-1 Appendix C INDICATORS..................................................................................................... C-1 Appendix D OTHER ANALYTICAL APPROACHES ............................................................ D-1 Appendix E THREAT CHARACTERISTICS AND INTELLIGENCE ANALYSIS IN COUNTERINSURGENCY OPERATIONS ........................................................ E-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES.................................................................................. References-1 INDEX ......................................................................................................... Index-1 Figures Figure 2-1. Example of analysis of competing hypotheses matrix 2-13 Figure 3-1. Grouping mobility corridors to establish avenues of approach 3-15 Figure 3-2. Combined obstacle overlay example 3-16 Figure 3-3. Example light data chart 3-18 Figure 3-4. National Weather Service wind chill factor chart 3-18 Figure 3-5. Example of a weather effects chart 3-19 Figure 3-6. Example of shared weather effects analysis 3-20 Figure 3-7. Example civil considerations product concerning tribes and ethnic groups 3-23 Figure 3-8. Example population status overlay 3-24 Figure 4-1. Cycle for situational understanding 4-2 Figure 4-2. Example of a situation map 4-5 Figure 4-3. Depiction of threat functions during an assault 4-7 Contents Figure 4-4. Using a complete mission as an enabler for another larger mission 4-8 Figure 5-1. Example of a pattern analysis plot sheet 5-3 Figure 5-2. Example of an incident overlay 5-4 Figure 5-3. Example of nodes in a network 5-5 Figure 5-4. Notional iconic representation of nodal component analysis by activity. 5-6 Figure 5-5. Example enemy IED network nodal diagram showing relationships 5-9 Figure 5-6. Sample time event chart 5-10 Figure 5-7. Example time event chart using Analyst Notebook software 5-11 Figure 5-8. Association matrix symbology 5-12 Figure 5-9. Association matrix example 5-13 Figure 5-10. Activities matrix example 5-13 Figure 5-11. Link diagram concept 5-14 Figure 5-12. Example link diagram using Analyst Notebook 5-15 Figure 5-13. Link diagram example using Analyst Notebook software 5-15 Figure 5-14. Analyst Notebook link diagram showing information from an activity matrix 5-16 Figure 5-15. Analyst Notebook link diagram showing nonpersonal relationship 5-16 Figure 5-16. Analyst Notebook hierarchy layout 5-17 Figure 5-17. Completed link diagram with supporting matrices 5-17 Figure B-1. Annotated intelligence running estimate format ..................................................B-2 Figure D-1. CARVER value rating scale (notional) ............................................................... D-2 Figure D-2. Example of DSHARPP matrix tool ..................................................................... D-4 Figure D-3. Sample imagery of target area ........................................................................... D-5 Figure D-4. Sample sketch of target area ............................................................................. D-6 Figure D-5. Sample of labeled target building (rear) ............................................................. D-8 Tables Table 3-1. Threat characteristics 3-2 Table 3-2. Examples of civil considerations 3-22 Table 5-1. Possible nodes located in an improvised explosive device network 5-7 Table C-1. Sample offensive indicators................................................................................. C-2 Table C-2. Sample defensive indicators ............................................................................... C-4 Table C-3. Sample delaying indicators.................................................................................. C-5 Table C-4. Sample withdrawal indicators .............................................................................. C-5 Table C-5. Sample population indicators .............................................................................. C-6 Table C-6. Sample propaganda indicators............................................................................ C-8 Table C-7. Sample commodities indicators........................................................................... C-9 Table C-8. Environment-related indicators.......................................................................... C-10 Table C-9. Improvised explosive device indicators ............................................................. C-11 Table C-10. Sample threat environment indicators C-11 Table C-11. Recurrence of same clan indicators ................................................................ C-12 Table D-1. Structure analysis matrix...................................................................................... D-6 Table D-2. Sample building analysis matrix........................................................................... D-7 Table D-3. Example intelligence requirements for individual buildings ................................. D-8 Table D-4. Example intelligence requirements for an individual person .............................D-10 ................................................continued...................................

Show more Read less
Institution
Course

Content preview

TC 2-33.4



Intelligence Analysis




July 2009




DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it
requires protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913Z Mar
04. This determination was made on 12 January 2009. Contractor and other requests must be referred to
ATTN: ATZS-CDI-D, U.S. Army Intelligence Center and Fort Huachuca, AZ 85613-7017, or via email at
.


DESTRUCTION NOTICE: Destroy by any method that prevents disclosure of contents or reconstruction of
the document in accordance with AR 380-5.




Headquarters, Department of the Army



FOR OFFICIAL USE ONLY

,This page intentionally left blank.

, *TC 2-33.4

Training Circular Headquarters
No. 2-33.4 Department of the Army
Washington, DC, 1 July 2009




Intelligence Analysis

Contents
Page
PREFACE ............................................................................................................... v
INTRODUCTION .................................................................................................. vii
Chapter 1 INTELLIGENCE ANALYSIS OVERVIEW ........................................................... 1-1
The Intelligence Warfighting Function ................................................................. 1-1
The Intelligence Analyst ....................................................................................... 1-1
Intelligence Analysis Process ..............................................................................1-2
Characteristics of Effective Intelligence ...............................................................1-2
The Intelligence Process ..................................................................................... 1-2
Intelligence Preparation of the Battlefield ............................................................. 1-3
Intelligence Running Estimate ............................................................................. 1-3
The Military Decisionmaking Process ..................................................................1-3
Chapter 2 ANALYTICAL PROCESSES, METHODOLOGIES, AND TERMS .....................2-1
Overview .............................................................................................................. 2-1
Critical Thinking ................................................................................................... 2-1
Types of Reasoning ............................................................................................. 2-8
The Scientific Method .......................................................................................... 2-9
Analysis of Competing Hypotheses ...................................................................2-10
Situational Logic .................................................................................................2-18
Applying Theory ................................................................................................. 2-19
Comparison ........................................................................................................2-19
Modeling ............................................................................................................ 2-19
Processes for Intelligence Analysis ...................................................................2-20
Analytical Terms ................................................................................................ 2-21

DISTRIBUTION RESTRICTION: Distribution authorized to U.S. Government agencies only because it requires
protection in accordance with AR 380-5 and as specified by DCS G-3 Message DTG 091913Z Mar 04. This
determination was made on 12 January 2009. Contractor and other requests must be referred to ATTN: ATZS-
CDI-D, U.S. Army Intelligence Center and Fort Huachuca, AZ 85613-7017, or via email at ATZS-FDC-
.

DESTRUCTION NOTICE: Destroy by any method that prevents disclosure of contents or reconstruction of the
document in accordance with AR 380-5.

* This publication supersedes FM 34-3, 15 March 1990.

i

FOR OFFICIAL USE ONLY

, Contents



Chapter 3 ANALYTICAL SUPPORT TO SITUATIONAL UNDERSTANDING ................... 3-1
Threat Analysis .................................................................................................... 3-1
Threat Characteristics Recordkeeping and Database ...................................... 3-12
Terrain Analysis ................................................................................................. 3-14
Weather Analysis .............................................................................................. 3-17
Civil Considerations ........................................................................................... 3-20
Cultural Database .............................................................................................. 3-24
Chapter 4 ANALYTICAL SUPPORT TO COURSE OF ACTION DEVELOPMENT 4-1
Situation Development ........................................................................................ 4-1
The Situation Map ............................................................................................... 4-2
Functional Analysis.............................................................................................. 4-6
Threat Courses of Action..................................................................................... 4-9
Indicators ........................................................................................................... 4-11
Chapter 5 ANALYTICAL TOOLS AND PRODUCTS .......................................................... 5-1
Analytical Techniques and Tools ......................................................................... 5-1
Automation Support to Intelligence Analysis ..................................................... 5-18
Appendix A ANALYTICAL PITFALLS .................................................................................. A-1
Appendix B THE INTELLIGENCE RUNNING ESTIMATE ................................................... B-1
Appendix C INDICATORS..................................................................................................... C-1
Appendix D OTHER ANALYTICAL APPROACHES ............................................................ D-1
Appendix E THREAT CHARACTERISTICS AND INTELLIGENCE ANALYSIS IN
COUNTERINSURGENCY OPERATIONS ........................................................ E-1
GLOSSARY .......................................................................................... Glossary-1
REFERENCES.................................................................................. References-1
INDEX ......................................................................................................... Index-1



Figures
Figure 2-1. Example of analysis of competing hypotheses matrix ........................................ 2-13
Figure 3-1. Grouping mobility corridors to establish avenues of approach ........................... 3-15
Figure 3-2. Combined obstacle overlay example .................................................................. 3-16
Figure 3-3. Example light data chart......................................................................................3-18
Figure 3-4. National Weather Service wind chill factor chart ................................................ 3-18
Figure 3-5. Example of a weather effects chart ..................................................................... 3-19
Figure 3-6. Example of shared weather effects analysis ....................................................... 3-20
Figure 3-7. Example civil considerations product concerning tribes and ethnic groups .......3-23
Figure 3-8. Example population status overlay ..................................................................... 3-24
Figure 4-1. Cycle for situational understanding ....................................................................... 4-2
Figure 4-2. Example of a situation map ................................................................................... 4-5
Figure 4-3. Depiction of threat functions during an assault ..................................................... 4-7

Contents
iv TC 2-33.4 1 July 2009


FOR OFFICIAL USE ONLY

Written for

Institution
Course

Document information

Uploaded on
July 25, 2023
Number of pages
160
Written in
2022/2023
Type
OTHER
Person
Unknown

Subjects

$12.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BROWSEGRADES76 Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
54
Member since
4 year
Number of followers
41
Documents
520
Last sold
1 month ago

4.3

12 reviews

5
7
4
2
3
2
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions