Misplaced Pages

Document Exploitation

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions . This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

#859140

39-475: Document Exploitation ( DOCEX ) is a set of military intelligence procedures used by the United States Armed Forces to discover, categorize, and use documents seized in combat operations . It is similar to, but otherwise separate from, Document and Media Exploitation ( DOMEX ), which is used by the U.S. Intelligence Community and the U.S. government . DOCEX was formulated during

78-459: A need-to-know basis in order to protect the sources and methods from foreign traffic analysis. Analysis consists of assessment of an adversary's capabilities and vulnerabilities. In a real sense, these are threats and opportunities. Analysts generally look for the least defended or most fragile resource that is necessary for important military capabilities. These are then flagged as critical vulnerabilities. For example, in modern mechanized warfare,

117-597: A DD Form 2745 (Enemy Prisoner of War Capture Tag) to each document. Ongoing combat operations suspends this requirement (to tag a document) until cessation of hostilities. All CEDs are placed in weatherproof containers and the containers are marked with a DTG , name of the capturing unit, identity of the source(s) of the CEDs, and a summary of conditions and circumstances under which the CEDs were obtained. The first DOCEX unit to receive CEDs will categorize and inventory all CEDs. Captured enemy documents are assigned file numbers and

156-403: A continuously-updated list of typical vulnerabilities. Critical vulnerabilities are then indexed in a way that makes them easily available to advisors and line intelligence personnel who package this information for policy-makers and war-fighters. Vulnerabilities are usually indexed by the nation and military unit with a list of possible attack methods. Critical threats are usually maintained in

195-656: A country. Photointerpreters generally maintain catalogs of munitions factories, military bases and crate designs in order to interpret munition shipments and inventories. Most intelligence services maintain or support groups whose only purpose is to keep maps. Since maps also have valuable civilian uses, these agencies are often publicly associated or identified as other parts of the government. Some historic counterintelligence services, especially in Russia and China, have intentionally banned or placed disinformation in public maps; good intelligence can identify this disinformation. It

234-487: A nation may be unavailable from outside the country. This is why most intelligence services attach members to foreign service offices. Some industrialized nations also eavesdrop continuously on the entire radio spectrum, interpreting it in real time. This includes not only broadcasts of national and local radio and television, but also local military traffic, radar emissions and even microwaved telephone and telegraph traffic, including satellite traffic. The U.S. in particular

273-479: A prioritized file, with important enemy capabilities analyzed on a schedule set by an estimate of the enemy's preparation time. For example, nuclear threats between the USSR and the U.S. were analyzed in real time by continuously on-duty staffs. In contrast, analysis of tank or army deployments are usually triggered by accumulations of fuel and munitions, which are monitored every few days. In some cases, automated analysis

312-618: Is commonplace for the intelligence services of large countries to read every published journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence. It is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence. For western democracies, it is extremely rare for journalists to be paid by an official intelligence service, but they may still patriotically pass on tidbits of information they gather as they carry on their legitimate business. Also, much public information in

351-712: Is focused on support or denial of intelligence at operational tiers. The operational tier is below the strategic level of leadership and refers to the design of practical manifestation. Formally defined as "Intelligence that is required for planning and conducting campaigns and major operations to accomplish strategic objectives within theaters or operational areas." It aligns with the Operational Level of Warfare, defined as "The level of warfare at which campaigns and major operations are planned, conducted, and sustained to achieve strategic objectives within theaters or other operational areas." The term operation intelligence

390-464: Is focused on support to operations at the tactical level and would be attached to the battlegroup. At the tactical level, briefings are delivered to patrols on current threats and collection priorities. These patrols are then debriefed to elicit information for analysis and communication through the reporting chain. Tactical Intelligence is formally defined as "intelligence required for the planning and conduct of tactical operations", and corresponds with

429-565: Is further developed and applied in Michael Maccoby, "Strategic Intelligence, Conceptual Tools for Leading Change," Oxford University Press, 2015. Recent thought leadership on strategic intelligence focuses on the consequences of the modern information age, which has led to the availability of substantial volumes of information than previously encountered. Alfred Rolington, the former CEO of Jane's Information Group and Oxford Analytica , recommends that intelligence organizations approach

SECTION 10

#1732776375860

468-597: Is known to maintain satellites that can intercept cell-phone and pager traffic, usually referred to as the ECHELON system. Analysis of bulk traffic is normally performed by complex computer programs that parse natural language and phone numbers looking for threatening conversations and correspondents. In some extraordinary cases, undersea or land-based cables have been tapped as well. More exotic secret information, such as encryption keys, diplomatic message traffic, policy and orders of battle are usually restricted to analysts on

507-509: Is not required at this phase of the DOCEX process, but sufficient translation of documents is required to determine significance and relevance to priority intelligence requirements. Translations in and of themselves are not intelligence reports, but translation is a precondition for DOCEX. Translation reports must include: where the report will be sent, which unit prepared the report, DTG of the translation, document serial number and description of

546-494: Is performed at the company level by a DOCEX Site Exploitation Team, and first analysis of CED is performed by intelligence personnel assigned to battalion - or brigade -level DOCEX Support Teams. Actionable information gained from this analysis is reported back to the original unit as soon as possible. The processing of CED progresses from the lowest echelon to the highest, undergoing multiple information extraction applications that increase in complexity and sophistication until

585-465: Is performed in real time on automated data traffic. Packaging threats and vulnerabilities for decision-makers is a crucial part of military intelligence. A good intelligence officer will stay very close to the policy-maker or war fighter to anticipate their information requirements and tailor the information needed. A good intelligence officer will also ask a fairly large number of questions in order to help anticipate needs. For an important policy-maker,

624-667: Is the most widely recognized and accepted format within the Intelligence Community, and is typically generated at higher echelons, such as division, corps or theater commands. SALUTE reports are also referred to as SPOT reports or SPOTREPS and are expeditious reports to provide timely intelligence or status updates regarding events that could have an immediate and significant effect on current planning and operations. Tactical commanders, interrogators and intelligence analysts contribute content for SALUTE reports and IRRs. Military intelligence Areas of study may include

663-502: Is used within law enforcement to refer to intelligence that supports long-term investigations into multiple, similar targets. Operational intelligence, in the discipline of law enforcement intelligence, is concerned primarily with identifying, targeting, detecting and intervening in criminal activity. The use within law enforcement and law enforcement intelligence is not scaled to its use in general intelligence or military/naval intelligence, being more narrowed in scope. Tactical intelligence

702-748: The War on Terror , during which U.S. military personnel frequently discovered large volumes of documents in various formats and languages. When documents are found that could have potentially valuable intelligence, DOCEX helps military units rapidly and accurately analyze and interpret the documents for information. A DOCEX facility was also operated by the Secure Evidence Unit (SEU) of the Iraqi High Tribunal to extract evidence from documents seized from Saddam Hussein 's Ba'athist government . Over 6 million pages were processed, mostly from

741-654: The intelligence cycle . Strategic intelligence Strategic intelligence (STRATINT) pertains to the collection, processing, analysis, and dissemination of intelligence that is required for forming policy and military plans at the national and international level. Much of the information needed for strategic reflections comes from Open Source Intelligence . Other sources include traditional HUMINT (especially in recent years), Signals intelligence including ELINT, MASINT which overlaps with SIGINT/ELINT to some degree, and ' National technical means of verification ' (e.g. spysats ). The father of intelligence analysis and of

780-449: The 1980s, that resulted in numerous execution orders and other incriminating documents being made available to the court. The DOCEX process occurs at the lowest echelons possible to ensure the information gained from the documents can be understood and used as swiftly as possible. U.S. military personnel learn DOCEX in common skills training, such as the U.S. Army's Basic Leader Course . The initial intake of captured enemy documents (CED)

819-652: The Tactical Level of Warfare, itself defined as "the level of warfare at which battles and engagements are planned and executed to achieve military objectives assigned to tactical units or task forces". Intelligence should respond to the needs of leadership , based on the military objective and operational plans. The military objective provides a focus for the estimate process, from which a number of information requirements are derived. Information requirements may be related to terrain and impact on vehicle or personnel movement, disposition of hostile forces, sentiments of

SECTION 20

#1732776375860

858-428: The U.S. and/or allied nation(s), and are marked classified. The document screening phase is an integral step in the DOCEX process as screening determines applicability of a variety of exploitation treatments and procedures. Interpreters and qualified intelligence analysts working alongside communications and information technology specialists decide the DOCEX course of action during the screening phase. Complete translation

897-439: The U.S. military, Joint Publication 2-0 (JP 2-0) states: "The six categories of intelligence operations are: planning and direction; collection; processing and exploitation; analysis and production; dissemination and integration; and evaluation and feedback." Many of the most important facts are well known or may be gathered from public sources. This form of information collection is known as open-source intelligence . For example,

936-672: The area in question, such as geography , demographics and industrial capacities. Strategic Intelligence is formally defined as "intelligence required for the formation of policy and military plans at national and international levels", and corresponds to the Strategic Level of Warfare, which is formally defined as "the level of warfare at which a nation, often as a member of a group of nations, determines national or multinational (alliance or coalition) strategic security objectives and guidance, then develops and uses national resources to achieve those objectives." Operational intelligence

975-500: The detailed act and carry it out. Once hostilities begin, target selection often moves into the upper end of the military chain of command. Once ready stocks of weapons and fuel are depleted, logistic concerns are often exported to civilian policy-makers. The processed intelligence information is disseminated through database systems, intel bulletins and briefings to the different decision-makers. The bulletins may also include consequently resulting information requirements and thus conclude

1014-433: The document, name of translator, type of translation (full, extract or summary), remarks for clarification and classification (if applicable). Analysis of CEDs produces intelligence and involves three steps: assessment, integration and deduction. Information collected from CEDs is normally reported in a SALUTE report or Intelligence Information Report (IIR) (SALUTE = Size, Activity, Location, Unit, Time, Equipment). The IIR

1053-665: The following information is logged: name of capturing unit, file number, DTG the CEDs were received by the DOCEX unit, description of the CEDs, destination of outgoing transmittals of CEDs and pertinent remarks. Proper categorization and inventory of captured enemy documents ensures strict accountability and preserves evidentiary value. Document screening is the rapid but systematic evaluation of documents to determine which documents contain priority information. Selected priority documents will be exploited immediately to meet intelligence collection management priorities. For screening purposes, CEDs are considered unclassified unless originated in

1092-483: The information is categorized as DOMEX under the auspices of the U.S. Intelligence Community and the Director of National Intelligence . The sequence of events in the DOCEX process as performed by a DOCEX Site Exploitation Team is as follows: Document accountability begins the moment the document is received into U.S. possession. Original documents must not be marked, altered or defaced and the capturing unit must attach

1131-405: The intelligence officer will have a staff to which research projects can be assigned. Developing a plan of attack is not the responsibility of intelligence, though it helps an analyst to know the capabilities of common types of military units. Generally, policy-makers are presented with a list of threats and opportunities. They approve some basic action, and then professional military personnel plan

1170-438: The local population and capabilities of the hostile order of battle . In response to the information requirements, analysts examine existing information, identifying gaps in the available knowledge. Where gaps in knowledge exist, the staff may be able to task collection assets to target the requirement. Analysis reports draw on all available sources of information, whether drawn from existing material or collected in response to

1209-403: The logistics chain for a military unit's fuel supply is often the most vulnerable part of a nation's order of battle. Human intelligence, gathered by spies, is usually carefully tested against unrelated sources. It is notoriously prone to inaccuracy. In some cases, sources will just make up imaginative stories for pay, or they may try to settle grudges by identifying personal enemies as enemies of

Document Exploitation - Misplaced Pages Continue

1248-599: The most successful leaders in business, government and military.: In "Transforming Health Care Leadership, A Systems Guide to Improve Patient Care, Decrease Costs, and Improve Population Health," Jossey Bass, 2013, Maccoby and his co-authors Clifford L. Norman, C. Jane Norman, and Richard Margolies apply strategic intelligence to health care leadership and add to strategic intelligence leadership philosophy and W. Edwards Deming's four elements of "profound Knowledge": understanding variation, systems thinking , understanding personality, and understanding knowledge creation. The concept

1287-569: The operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other broader areas of interest. Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and during a war itself. Most governments maintain a military intelligence capability to provide analytical and information collection personnel in both specialist units and from other arms and services. The military and civilian intelligence capabilities collaborate to inform

1326-559: The overall intelligence value after careful analysis. The tonnage and basic weaponry of most capital ships and aircraft are also public, and their speeds and ranges can often be reasonably estimated by experts, often just from photographs. Ordinary facts like the lunar phase on particular days or the ballistic range of common military weapons are also very valuable to planning, and are habitually collected in an intelligence library. A great deal of useful intelligence can be gathered from photointerpretation of detailed high-altitude pictures of

1365-537: The population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public. It is however imperative that the collector of information understands that what is collected is "information", and does not become intelligence until after an analyst has evaluated and verified this information. Collection of read materials, composition of units or elements, disposition of strength, training, tactics, personalities (leaders) of these units and elements contribute to

1404-518: The requirement. The analysis reports are used to inform the remaining planning staff, influencing planning and seeking to predict adversary intent. This process is described as Collection Co-ordination and Intelligence Requirement Management (CCIRM). The process of intelligence has four phases: collection, analysis, processing and dissemination. In the United Kingdom these are known as direction, collection, processing and dissemination. In

1443-658: The spectrum of political and military activities. Personnel performing intelligence duties may be selected for their analytical abilities and personal intelligence before receiving formal training. Intelligence operations are carried out throughout the hierarchy of political and military activity. Strategic intelligence is concerned with broad issues such as economics, political assessments, military capabilities and intentions of foreign nations (and, increasingly, non-state actors ). Such intelligence may be scientific, technical, tactical, diplomatic or sociological , but these changes are analyzed in combination with known facts about

1482-550: The state that is paying for the intelligence. However, human intelligence is often the only form of intelligence that provides information about an opponent's intentions and rationales, and it is therefore often uniquely valuable to successful negotiation of diplomatic solutions. In some intelligence organizations, analysis follows a procedure. First, general media and sources are screened to locate items or groups of interest, and then their location, capabilities, inputs and environment are systematically assessed for vulnerabilities using

1521-405: The strategic intelligence concept was Sherman Kent, in his seminal work Strategic Intelligence for American World Policy , first published in 1949. For Kent, strategic intelligence is ”the knowledge upon which our nation's foreign relations, in war and peace, must rest". Strategic intelligence pertains to the following system of abilities that, according to Michael Maccoby , characterize some of

#859140