Vision Enabling Document
Collection Management: Organized, Responsive,
Creative
Inculcate Organized and Responsive Collection Management
System
- Develop database for tracking requests for information
- Develop procedures for checking to see if current holdings
at USFK or other data bases satisfy requirements.
- Develop process/flow chart for RFI activity.
- Develop collection management system that changes and adapts
quickly to accommodate user needs.
- Develop formal mechanisms for interacting with and keeping
consumers informed on progress of requests for information.
- Develop GTW collection plan for 1st and 2nd front area.
Create Combinations To Promote Synergy
- Develop system to promote synergy among collection systems
-- tipping and cueing, timing schedules to promote complementary
relationships among collectors.
- Develop learning system so we know collection systems and
people who operate them well enough to initiate tipping and cueing
operations easily.
- Develop intelligence combinations to support PDE/DST, wargame,
and ways to practice planned and ad hoc combinations.
Interact with consumers of our information
- Continue to improve procedures to determine if collection
system is responding with timeliness, accuracy, and specificity
consumers need.
- Conduct frequent dialog with users of our intelligence collection
system.
- Keep consumers in the loop of intelligence collection, requirements
management, and satisfaction of requirements.
- Exercise channels of communication and information flows continuously.
- Develop systematic way to determine off-peninsula information
requirements.
Synchronize Intelligence Collection
- Develop, use intelligence collection synchronization matrices
to support commander's decision support templates (DST) and attack
guidance matrices.
- Develop system to interact with J2 estimates and C3/J3 plans
to focus collection to monitor NAIs, TAIs, and DPs.
- Provide collection to support commanders' battle rhythm and
PDE cycles.
- Develop system to ensure correlation and harmony of intelligence
collection to support CTB, DAGRR, PDE, attack guidance matrices,
and decision support templates (DSTs).
Couple Information With Killing Systems.
- Develop system to couple information with combat killing systems.
- Develop check to ensure collection efforts relate to commander's
efforts to create effects to shape battlefield conditions.
- Improve system where collection management works closely with
planners developing deep and future battle plans.
- Expend efforts to use webs of information, contacts to exchange
information, seek advice and help from people in other locations,
on- and off-peninsula.
- Develop system to provide collection support to all-source
BDA and information operations (C2 Attack, C2 Exploit, C2 Protect).
Respond to fast changing conditions.
- Develop collection management system that responds to consumer
needs in fast changing conditions.
- Develop system to establish collection priorities. Ensure
all consumers understand how we prioritize collection.
- Develop collection system responsive to tactical and operational
conditions, e.g., collectors provide fine-grained tactical intelligence
along with broader information requirements prevalent at the operational
level of war.
Exercise/train collection management system.
- Develop, exercise collection management and train personnel
who work with collection at every opportunity to ensure we can
perform wartime tasks along with what we do in armistice.
- Use peninsula exercises and information situational training
exercises (STXs) as training vehicles.
Guard against complacency.
- Develop system to alert us should complacency start to surface
-- for the possibility we may be overlooking a piece of key evidence,
be missing something, or not taking enemy reaction to our collection
into account. or be confusing valuable with minimum value information.
- Develop system where collection management effort has procedures
to review and study collection statistics produced by collection
agencies and activities systematically to discern trends, aggregates
and feed results of analysis into I&W system..
Design and implement system to achieve SIGINT collection
coherence and synergy.
- Design, implement, codify SIGINT tasking system for GTW operations
that promote synergy and effective combinations to support CINC's
battle rhythm and PDE cycles.
- Develop program to discipline SIGINT tasking during combat
operations. Bring CSP into life; develop means to tip and cue
SIGINT and achieve SIGINT synergy among combined, and U.S. joint
and national systems.
Operations: Capable Operations System
-- Crisis and War.
Weight battlefield with information.
- Develop system to weight battlefield with information by moving
processors, intelligence communications around the battlefield
IAW CINC's priorities.
- Understand automation, communications, analytic capabilities
of 501st MI Brigade's deployable intelligence support element
(DISE) and off-peninsula DISE's arriving during war. Identify
TPFDL DISE arrival and connectivity with peninsula DISE.
- Develop training to help our people know how to use mobile
systems that offer capability to weight battlefield with information
including TROJAN SPIRIT, JMICS, STICS, Critical Source, and mini-DISE.
Track arriving intelligence assets and maintain RSRs.
- Develop schema to track arriving 5027 and FDO/ processors,
collectors, communications devices - where they go, who they connect
with, who supports them. Ensure those affected know plan, connectivity
paths.
- Develop system to track subordinate information processing,
collection, and communications resource status reports (RSRs).
Know and Use Communications.
- Develop system and training sufficient to send information
by primary plus alternative routes.
- Develop system to monitor redundant communications; choose
routes with necessary and available bandwidth to move information
we deem necessary, plus alternative routes.
Design Effective Intelligence Dissemination System -- Works
in Armistice and War. Information must reach consumers
in the form they need, with timeliness they need, with accuracy
they require, to degree of specificity they define.
- Design multiple paths to reach consumers of information.
Develop system where managers possess sufficient knowledge, mechanisms
to send information over the best route; what costs will be in
time and bandwidth.
- Design and implement alternative routes for moving information.
Alternative routes will include SATCOM, TRITAC terrestrial and
SATCOM, UHF SATCOM and terrestrial, microwave, and FM/HF/UHF.
Our system will routinely practice all primary
and alternative routes for sending information.
- Design communications connectivity architectures.
Design communication process and connectivity architectures,
on- and off-peninsula, terrestrial and SATCOM. Pay particular
attention to ACC and GCC fusion centers. Design communications
connectivity architectures for connecting with enroute and arriving
TPFDL units.
Automation and communications
- Develop plan to migrate peninsula intelligence communications
and automation systems into 21st century. Develop
short, mid- and long-range plan. Make plan compliant with legacy
and migration policies of DoD.
- Develop, plan, seek opportunities to work with new technologies
and apply information they produce to execution of combat power
and setting conditions for successful planning and execution of
combat power effects.
- Develop plans to execute VTC LAN - at minimum GCC-ACE, ACC
fusion center, SUSLAK armistice and GTW locations with J2 at Yongsan,
Tango.
- Develop plan to take advantage of emerging technologies, such
as integrated service data networks (ISDN), asynchronous transfer
mode (ATM). Our future goal: access T-1 to T-4 when and where
we need such access.
- Develop plan to leverage JPSD technologies, resources to support
theater intelligence architecture, warfighting issues.
- Develop plan to solve language problem in intelligence automation.
Develop system easy to use, enabling ROK and U.S. users the comfort
and practicality of their languages.
- Develop plan to ensure our communications and automation will
be state of the art with respect to processing speed and memory,
operate in the common operating environment (COE), and totally
adaptive to new technologies without having to buy new hardware
with every new advancement.
- Develop plan for achieving joint fusion. Machines will be
totally interactive among U.S. joint services and with our ROK
counterparts. Our machines will populate database fields and
send automatic data feeds into machines of coalition partners
or among joint services without manual processing.
- Develop automation and communications system allowing for
graphic situational awareness (visualization) of the battlefield
and virtual reality to allow wargaming through simulation.
- Develop plan to obtain automation and communications that
allow us to use video to gain knowledge of the battlefield, plan
courses of action -- video will come from a combination of simulation
and imagery.
- Develop plan where intelligence automation and communications
systems will have bandwidth sufficient for moving video and imagery
at will to those who need it. At the same time, our system will
have the means to manage bandwidth intelligently by using large
pipes for pithy products and small pipes for text, updates or
less time-sensitive information.
- Develop plan for our intelligence system to evolve to dial-up
broadcast dissemination schema akin to dialing up a television.
People will use input screens, filters, formats that identify
types of information they need and broadcast systems will provide
what they ask for when they want it.
- Develop learning programs to facilitate proficiency in automation
and communications. Develop plan to bring distance learning,
complete with interactive video, to couple our analysts with others,
to include electronically connected mentors, on- and off-peninsula.
Design Seamless Intelligence Connectivity, Armistice and
War.
- Identify and analyze intelligence connectivity links. Know
what processes occur, what automation is present. Include capabilities,
limitations, and communications pipes, bandwidth, primary, and
alternate routes at each link.
- Design follow-on to deep attack exercises; use as test bed
for new technology and to resolve complex, theater GTW problems.
- Improve intelligence support to combined warfighting - GCC-TCAE
project, ROK knowledge of automation, communications, collection,
combined doctrine, intelligence support to deep attack.
- Know, diagram theater's fusion centers, capabilities and limitations.
Know joint and combined collection, communications, automation
systems. Develop process, flow charts to capture.
- Develop system to leverage J-2 CINCPAC and JICPAC, along with
national agencies, to obtain information most effectively.
- Identify what contractors we need to keep automation, communications
working at each link. Prioritize contractor support for key intelligence
links.
- Design plan to exercise and stress key intelligence links
(automation, communications, collections) systematically over
next year. Get all concerned, e.g., J-6/Signal Brigade on board
now.
- Work with 7th AF/ACC to design BDA and TMD analytic processes.
Ensure feeds from JSTARS, EMTI, ARL feed into GALE automatically.
- Design systems flow charts to educate our people about automation
and communications attention to detail --
routers, protocols, crypto, segments, uplinks, downlinks, bandwidth,
net control, net discipline, maintenance, frequencies, satellite
locations and vulnerabilities.
- Design and implement joint broadcast architecture thereby
improving access to information. System will allow us to push
information easily to consumers over multiple routes. System
will facilitate consumers easily pulling information
from us.
- Design ways we can practice pushing and pulling information
with on-and off-peninsular units on a daily basis.
- Design, implement U-2 EMTI, ARL MTI architectures on- and
off-peninsula.
- Design and practice JSTARS architecture on- and off-peninsula.
- Design migration plan for advent of CTT and JTT from existing
ICTTs.
Intelligence Support To Targeting -- Responsive
to Warfighters.
- Develop intelligence support to targeting that provides
timely, specific, accurate information. Intelligence
support to targeting works close fight and deep battle. Review,
improve, diagram procedures for HVT analysis and processes for
turning HVTs into HPTs.
- Develop procedures for coupling information collection
tools with killing systems, practice couplings in a wide variety
of conditions. Orchestrate collection, automation, communications,
driven by analysis and synthesis, to produce information targeteers
require when they need it.
- Design CONOPS for use of GRCS CHAALS. Work
with 501st MI Brigade to develop system for intelligent
use of CHAALS. Work out cost factors for using three vs two aircraft
and when to achieve greatest payoff. Design system to provide
CHAALS targeting support to ICTTs in critical C2 nodes.
- Develop means to manipulate right combination of collectors
to achieve precision and timeliness targeteers require.
Work with collection management to develop combinations of collection
to achieve synergy in relation to NAIs, TAIs, and DPs. Plan should
address how we monitor critical sites, when to monitor, and seek
best combinations of assets. Along with planning, develop mechanical
means to move information into fusion processors with minimal
delays.
- Develop intelligence support to targeting system that
always seeks, uses relationships. Our support to targeting
depends front-end analyses, focused, complementary collection,
processing, meaningful information. Focus collection efforts
on what's meaningful to those we serve. Establish strong correlation
among PIR, centers of gravity, high payoff targets (HPTs). Centers
of gravity and high payoff targets should be part of PIR and correlate
with overall targeting effort
- Develop, promulgate, institutionalize intelligence support
to decision maker battle rhythm. Our planning, decide,
execute (PDE) cycle will be an essential ingredient in winning
quickly in a fight on the peninsula. In war, a rhythm will develop
where our leadership thinks ahead, develops a vision, designs
a concept of operations, establishes conditions to shape the enemy.
This process takes time - to think, plan, coordinate, orchestrate
information collectors, and killing systems. We call this cycle
battle rhythm.
- Develop system that proactively, aggressively structures combinations
of collection and analytic/synthesis efforts to anticipate, produce
information the commander needs to fuel decisions in shaping battlefield,
and creating effects necessary to establish conditions to defeat
foes. Our support will draw its rationale from predictive estimates,
interaction with joint and combined forces on combined targeting
board, and GCC deep operations coordination cell (DOCC). Future
battle targeting efforts must drive our collection efforts.
- Design system that will orchestrate efforts of peninsula fusion
centers and national collectors to satisfy information requirements
coming from theater battle rhythm.
- Design this system so DAGRR process correlates with combined
targeting board and future battle processes.
Theater missile defense. Continue with theater
missile defense efforts. We'll have a theater missile defense
system that captures the good work already done and move into
the future with even better analyses, tied to the quick capture
of information from collection systems and synthesis..
- Tie our TMD efforts into other theater efforts and national
intelligence agencies. Exploit the strengths inherent to each
level of command, minimize weaknesses of each.
- Design collection to execute what we've planned.
Intelligence and Security:
Develop, implement active, system-wide armistice and war intelligence
security system.
Anticipate, deny strategic and tactical terrorism, armistice
and war
- Anticipate potential acts of terrorism, strategic, tactical
armistice and war.
- Develop briefing for tactical terrorism threats, vulnerabilities
to U.S. forces during crisis and war.
- Perform vulnerability analyses applicable to armistice, crisis,
war; design countermeasures.
- Gain access for U.S. counterintelligence personnel to Defense
Information Terrorist Database System (DTIDS) run by DIA, to assist
in force protection.
Develop and Promulgate GTW HUMINT Architecture
- Develop and promulgate go-to-war HUMINT architecture -- include
HUMINT communications, critical nodes, personnel, activities on-
and off-peninsula, roles and missions, tasking,
coordination, reporting, and communications
for all Services, agencies, people involved in crises and combat
on-peninsula.
- Practice GTW architecture during Foal Eagle and RSOI exercises,
and as much as possible in UFL.
- Codify, promulgate architecture so those participating in
crisis or war, and those following us in service on the peninsula
know the system and its stringent, unforgiving requirements.
- Identify requirements for HUMINT database that makes sense
on-peninsula and to those who would join us in war. Leverage
OSD, Army Staff, JICPAC, DIA to obtain resources, expertise to
develop, implement database.
Develop system to gain timely access to information collected
by SOC-K and CUWTF
- Design and implement workable plan for long-range surveillance
at tactical, operational levels of war including tasking,
coordinating, processing, reporting.
- Design process charts for tasking, reporting, communicating
SOF operational information at all critical nodes.
- Design and practice routing of specific CUWTF derived information
coming to GCC-ACE, being included in screen capture updates and
graphic fusion INTSUMs.
- Practice in armistice what we say we can do in war - use Foal
Eagle, Deep Attack STX, and to the greatest extent possible, UFL.
- Determine information requirements of those who will perform
SOF information collecting activities.
Develop and promulgate enemy prisoner of war plan
- Develop, promulgate, practice workable combined enemy prisoner
of war plan -- include locations, communications, automation,
manning for combined interrogation facilities (CIFs).
- Design multi-disciplined teams (CI, analysts, interrogators)
to deploy to ROKA collection cages early in crisis or opening
days of war to obtain information from EPWs, refugees, agents,
saboteurs, line-crossers. Teams will provide timely information
to warfighters using TRRIP, INMARSAT.
- Plan for ways to interrogate high-level, sensitive, or important
enemy prisoners of war. Information from such sources will be
critical to CINC's war planning.
- Design, coordinate plans to interrogate EPWs at CIF's farther
from the front lines than ROK Army collection cages.
Sustain counterintelligence support to force protection
for Armistice; design system for crisis and war
- Sustain first-class force protection operation in armistice.
- Design, promulgate system for force protection in crisis and
wartime.
- Design, implement training to work through challenges CI personnel
will face while conducting force protection operations during
crisis and war.
- Brief and prepare TPFDL units to operate in a hostile rear-area
environment, in our force protection system, should a crisis erupt
or war occur.
All Divisions and their leaders:
Develop Environment Conducive to Intellectual
Growth and Development. Our intelligence system
will be characterized by intellectual energy, growth, development.
Analysts and technicians will work in an environment where issues
are addressed, problems resolved.
- Develop conditions within each division and section
where creativity flourishes. People in the organization
will have freedom to try different ways of doing things and new
ideas without fear of failing. Leaders at all levels will seek
creative ideas and ways of doing things. Design ways that ideas
of all people, regardless of rank, find reverence among organizational
leaders.
- Design J-2 council of elders. These sessions
will occur every quarter. Sessions will start with a developmental
session by J-2, involve matrix groups working on J-2 problems,
provide back-briefs on results of deliberations. Lead: P&O.
- Develop subordinates. Leaders will take an
active role in developing their subordinate's intellects. Means
will come through OPDs, NCOPDs, seminars, brown-bag lunches and
discussions, analyst mysteries program, consistent interaction
among all people in the system.
- Help subordinates learn how they relate to the whole
of J-2 and intelligence system. Work on enabling people
to understand pieces of the system. Design ways analysts, technicians
will know and understand entirety of the system, not just the
piece they work in.
- Design ways to teach synthesis and synergy.
Leaders in our intelligence system will actively teach synthesis,
holistic thinking, tipping and cueing, combinations, synergy,
fundamentals of enemy, weather, and terrain.
- Design and execute J-2 computer literacy program.
All people in the organization will be computer literate. In
particular, ground analysts shall know basics of ASAS, PASS-K
applications. All key people will know how to access and use
various applications resident on PASS-K, to include ASAS-W, INTELINK,
JDISS, calling up and printing graphic displays of information
that come from the GCC-ACE and other fusion centers on- and off-peninsula.
- Support J-2 mystery program. Executive agent
for this program is Director, IP. We'll have mystery conferences
every quarter. All analysts will have mysteries that deal with
unknowns about North Korea. The program isn't limited to analysts
- communications and automation operators can work on solving
questions or unknowns, capturing what they have learned on Powerpoint,
and briefing their efforts to leadership.
IP, Plans & Operations, Collection Management:
Provide Intelligence Support to Information
Operations. Information operations will become
increasingly important as we approach, then move into the 21st
century. USFK J2, as an organization, will play a significant
role in information operations. Ultimately, we'll become intimately
involved in all information operations but specifically in C2
attack, C2 exploit, C2 protect.
- Design, implement intelligence support to C2 Attack.
Identify, in great detail, critical nodes for attacking with
lethal and non-lethal means of attack. Develop means to guide
artillery, aircraft with ordnance, jamming aircraft to affect
enemy's information system to extent combat commanders desire.
Identify critical nodes, protecting air defense weapons, template
them in context of situation, weather, and terrain, identify frequencies
of operation, horizontal, vertical connectivity. Become active
partner, with C/J3, in deciding whether enemy critical nodes need
attacking with artillery, bombs, or electrons. Predict effects
of such attacks on nodes. Lead: IP, support Plans & Operations,
Collection Management.
- Design, implement intelligence support to C2 Exploit.
Provide fine-grained analysis and synthesis to know, understand
how enemy processes information, makes decisions, moves results
of those decisions to higher and lower headquarters, receives
feedback to make new decisions. Use our powerful automation to
template enemy fixed and mobile communications. Focus on moving
and stationary targets and on division, brigade, corps levels
of nK battle command. Design, model extensive net diagrams; show
vertical and horizontal linkages. Know what processes occur in
each node. Model effects of affecting key nodes on entire system.
Provide fine-grain resolution collection sufficient to support
C2W. Use fusion centers at Camp Humphreys and Osan to help in
C2W collection effort. At a minimum, these centers will coordinate
their efforts to develop detailed SIGINT templating and automated
aids to assist in focusing intelligence collection on critical
command and control nodes. Moreover, they will possess expertise
necessary to guide collection system on enemy command and control
nodes to include orchestrating databases, sharing information
among nodes and other intelligence entities on- and off-peninsula.
Lead: IP, support Plans & Operations.
- Design and implement intelligence support to C2 Protect.
Recognize and help others understand there are information
centers of gravity on the modern battlefield. We have ours;
enemy has theirs - we'll go after theirs and just as surely, they'll
come after ours. Lead: I&S.
- Anticipate these attacks and design actual, physical protection
with rings of protection and virtual rings of protection with
information webs overlayed on top of the concentric rings of protection.
- Anticipate how opponent will attempt to gain information about
centers of gravity, how he will attempt to influence operations
inside, whether effort be physical attack on structure, virus
attack on automation.
- Design ways we can be an active participant in efforts to
protect these critical hubs of power.
- Identify USFK's information centers of gravity; identify how
to protect each information center of gravity.
Intelligence Production:
Produce Relevant Intelligence -- Armistice
and War. Our intelligence system will produce
relevant, fused (where possible), timely information and intelligence.
- Focus intelligence production. Relevance comes
from information requirements of warfighters we support. Warfighters
define presentation. Success of our efforts will relate to relevance
of what we produce.
- Develop, train system to conduct effective indications
and warning operations. Interact with collection management
to achieve optimum mix of collectors. Seek, articulate context
that surrounds bits and pieces of information coming into I&W
system. Seek all-source intelligence analysis to help system
make best possible call on what information means.
- Develop, implement J-2 mystery program. All
analysts, regardless of rank, will have a mystery involving nK
or how their intelligence/communications systems work. Leaders
will be involved in helping them find information, network, prepare
briefings, write about what they have learned.
- Develop plan for analytic conferences. We'll
have two types of analytic conferences. First, we'll meet once
a month much like we do now only with a slightly modified guest
list. Second, twice a year, we'll ask the best and brightest
to come to the peninsula to work on analytic problems and questions
and our progress concerning North Korea.
- Design ways to seek and obtain warfighter's feedback
on our intelligence production. Our system production
efforts will be based on commander's needs and feedback from intelligence
consumers.
- Design intelligence production to have a twin focus
-- armistice and war. Meet the requirements of armistice
production that focuses on early warning of activity or attack
and the type of production we'll need should nKs attack.
- Design, coordinate, implement federated intelligence
production system. Capitalize on expertise of combined
and joint analysts into a holistic appraisal, meaningful, relevant
to all. Design system fully capable of producing useable information
to consumers during crisis and war, on- and off-peninsula. Make
use of Joint Service capabilities; make combined and joint effort.
During armistice, our efforts will help decision makers
and other consumers of our information become wiser and help them
understand the volumes of information that will be available.
Our intelligence system will always produce information that
is reasoned and answers the questions -- So what? What does it
mean? How does it relate? During war, our system's output
will be relevant, timely, and it will make a difference
in determining the outcome of hostilities -- engagements, battles,
and campaigns.
- Design and implement intelligence support to battlefield
damage assessment (BDA). Develop plan to provide support
to KCOIC's BDA efforts as a part of their combat assessment program.
Design system that will use all-source intelligence analysis
to guide our efforts in BDA. Use single source BDA only when
the opportunity for all-source BDA isn't possible. Develop system
that counts enemy things killed, determines extent of damage,
assesses functionality and effects of strikes on systems, and
assesses effects of weapons systems on the adversary's psychology.
- Design appropriate methodology to support aforementioned
thrust for intelligence production.
- Design heavy interaction between analyst and
collection personnel. Analysts will provide guidance to collection
system through requests for information (RFIs) originating with
PIR indicator analysis and analytical mysteries.
- Develop way to audit threads from PIR, associated analytical
work, to warfighter information requirements springing from vision,
concept of operation, high payoff targets,
center of gravity analyses.
- Design production system where we view intelligence production
not as an end-state but as a state-of-continuity that we're always
revising, updating, closing out old mysteries, trying to answer
new.
- Design production system that recognizes tactical units are
producing intelligence as well as national agencies. Support
those efforts to the best of our capabilities.
- Enable analysts to maintain electronic connectivity with production
centers at the tactical level of war as well as with analysts
at the strategic level of war. Analysts at all levels will exchange
ideas, leverage associated production efforts to provide maximum
benefit at minimum costs.
- Design methodology for intelligence production (IP) section
to provide effective guidance, steerage to GCC-ACE and ACC analytic
centers as complementary satellites to CINC's main intelligence
effort. Our IP personnel will interact with, exchange ideas with,
depend upon these two analytic centers to produce fine-grained
information and intelligence ground, air, naval component commanders
require.
- Develop IPB of the rear area. Work with IP, GCC-ACE, IS,
SROKA to design rear area IPB on 1:100,000 map sheets. Results
of analytical products will drive collection plan for rear area
-- work with CM to develop collection plan.