|
|
|
FM 2-22.3 _____________________________________________________________________________________
READINGS RECOMMENDED
These sources contain relevant supplemental information.
ARMY PUBLICATIONS
Most Army doctrinal publications are available online:
AR 190-8. Enemy Prisoners of War, Retained Personnel, Civilian Internees and Other
Detainees. 1 October 1997.
AR 190-40. Serious Incident Report. 15 July 2005.
AR 195-5. Criminal Investigation Evidence Procedures. 28 August 1982.
AR 380-5. Department of the Army Information Security Program. September 2000.
AR 380-10. Technology Transfer, Disclosure of Information, and Contacts with
Foreign Representatives. 15 February 2001.
AR 380-15. (C) Safeguarding Classified NATO Information. 1 March 1984.
AR 380-28. Department of the Army Special Security System. 12 December 1991.
AR 380-40. Policy for Controlling and Safeguarding Communications Security
(COMSEC) Material. 22 October 1990.
AR 380-49. Industrial Security. 15 April 1982.
AR 380-53. Telecommunications Security Monitoring. 29 April 1998.
AR 380-67. Personnel Security Program. 9 September 1988.
AR 381-1. Security Controls on Dissemination of Intelligence Information.
12 February 1990.
AR 381-10. US Army Intelligence Activities. 1 July 1984.
AR 381-12. Subversion and Espionage Directed Against the US Army (SAEDA).
15 January 1993.
AR 381-14. Technical Counterintelligence (TCI). 30 September 2002.
AR 381-20. (U) US Army Counterintelligence Activities (S). 26 September 1986.
AR 381-45. Investigative Records Repository. 25 August 1989.
AR 381-47. (U) US Army Offensive Counterespionage Activities (S). 30 July 1990.
AR 381-100. (U) Army Human Intelligence Collection Program (S//NF). 15 May
1988.
AR 381-102. (U) US Army Cover Support Program (S). 10 January 1991.
AR 381-143. Military Intelligence Nonstandard Material Polices and Procedures.
1 December 1986.
AR 381-172. (U) Counterintelligence Force Protection Operations (CFSO) and Low
Level Source Operations (LLSO) (S//NF). 30 December 1994.
AR 385-10. The Army Safety Program. 23 May 1988.
AR 614-115. Military Intelligence Excepted Career Program. 12 April 2004.
6 September 2006
Bibliography-2
_________________________________________________________________________________ FM 2-22.3
AR 614-200. Military Intelligence Civilian Excepted Career Program.
30 September 2004.
AR 715-9. Contractors Accompanying the Force. 29 October 1999.
DA Pam 381-15. Foreign Military Intelligence Collection Activities Program.
1 June 1988.
DA Pam 385-1. Small Unit Safety Officer/NCO Guide. 29 November 2001.
TRADOC Reg 25-36. The TRADOC Doctrinal Literature Program (DLP). 1 October
2004.
FM 2-0. Intelligence. 17 May 2004.
FM 3-19.4. Military Police Leader’s Handbook. March 2002.
FM 3-19-40. Military Police Internment/Resettlement Operations. August 2001.
FM 4-02.21. Division and Brigade Surgeon’s Handbook of Tactics, Techniques and
Procedures. November 2000.
FM 5-0. Staff Organizations and Operations. 31 May 1997.
FM 19-4. Military Police Battlefield Circulation Control, Area Security, and Enemy
Prisoner of War Operations. 7 May 1993.
FM 27-10. Law of Land Warfare. July 1956.
FM 34-3. Intelligence Analysis. March 1990.
FM 34-7-1. Tactical Human Intelligence and Counterintelligence Operations.
April 2002.
FM 34-8. Combat Commander’s Handbook for Intelligence. September 1992.
FM 34-54. Technical Intelligence. January 1998.
FM 34-60. Counterintelligence. 3 October 1995.
FM 41-10. Civil Affairs Operations. 11 January 1993.
FMI 3-19.40. Military Police Internment/Resettlement Operations. 30 September
2005.
TC 25-20. A Leader’s Guide to After-Action Reviews. 30 September 1993.
ST 2-22.7. Tactical Human Intelligence and Counterintelligence Operations.
April 2002.
ST 2-33.5. US Army Intelligence Reach Operations. 1 June 2001.
ST 2-50. Intelligence and Electronic Warfare Assets. June 2002.
ST 2-91.6. Small Unit Support to Intelligence. March 2004.
OTHER PUBLICATIONS
JP 2-01. Joint Intelligence Support to Military Operations. November 1996.
AR 350-1. Army Training and Education. 9 April 2003.
DIAM 58-11. (U) DOD HUMINT Policies and Procedures (S//NF). August 1993.
DIAM 58-12. (U) DOD HUMINT Management Systems (S//NF). June 1997.
6 September 2006
Bibliography-3
FM 2-22.3 _____________________________________________________________________________________
AJP-2.5. Handling of Captured Personnel, Materiel, and Documents. September
2001.
DOD Directive 2310.1. DOD Program for Enemy Prisoners of War (POW) and Other
Detainees (Short Title: DOD Enemy POW Detainee Program). 18 August 1994.
DOD Directive 2310.1E. The Department of Defense Detainee Program.
DOD Directive 3115.09. DOD Intelligence Interrogations, Detainee Debriefings, and
Tactical Questioning. 3 November 2005.
DOD Directive 5100.77. DOD Law of War Program. 9 December 1998.
DOD Directive 5240.1. DOD Intelligence Activities. 3 December 1982.
DOD Directive 5525.5. DOD Cooperation with Civilian Law Enforcement Officials. 15
January 1986.
DOD Instruction 3020.41. Contractor Personnel Authorized to Accompany the U.S.
Armed Forces. 3 October 2005
DOD Regulation 5200.1-R. Information Security Program, 1977.
DOD Regulation 5240.0-R. Procedures Governing the Activities of DOD Intelligence
Components That Affect United States Persons. December 1982.
DOD SOP for Collecting and Processing Detainee Biometric Data. 11 February 05
Protocol 1 Additional to the Geneva Conventions. Part IV: Civilian Population,
Section 1: General Protection Against Effects of Hostilities. 1977.
Executive Order 12333, United States Intelligence Activities. 4 December 1981.
Under Secretary of Defense for Intelligence (USD(I) Memorandum, “Guidance for the
Conduct and Oversight of Defense Human Intelligence (HUMINT) (U).” 14
December 2004.
Implementing Instructions to the USD(I) Memorandum. “Guidance for the Conduct
and Oversight of Defense Human Intelligence (HUMINT) (U).” 7 September
2004.
SECDEF Memorandum, Policy on Assigning Detainee Serial Numbers (ISN) (U). 20
September 2005.
18 U.S.C. Posse Comitatus Act of 1878, § 1385.
Homeland Security Act of 2002.
Detainee Treatment Act of 2005, Public Law No. 109-163, Title XIV.
DA Form 1132-R. Prisoner’s Personal Property List - Personal Deposit Fund (LRA).
April 1986.
DA Form 4137. Evidence/Property Custody Document. July 1976.
DA Form 4237-R. Detainee Personal Record. August 1995.
DD Form 2745. Enemy Prisoner of War Capture Tag. May 1996.
Standardization Agreements (STANAG):
STANAG 1059. Distinguishing Letters for Geographic Entities for Use by
NATO Armed Forces. Edition 8. April 2003.
STANAG 2022. Intelligence Reports. 29 September 1988.
6 September 2006
Bibliography-4
_________________________________________________________________________________ FM 2-22.3
STANAG 2033. Interrogation of Prisoners of War (PW). Edition 6. December
1994.
STANAG 2044. Procedures for Dealing with Prisoners of War (PW). Edition 5.
June 1994.
STANAG 2084. Handling and Reporting of Captured Enemy Equipment and
Documents. June 1986.
6 September 2006
Bibliography-5
This page intentionally left blank.
FM 2-22.3
Index
Entries are by paragraph number
A
Area of operations, 1-29
Change of Scenery Approach,
8-63
ACE. See analysis and control
Assets, HUMINT Collection,
element.
4-40
Checkpoint Operations, 5-7,
5-36, 5-42
AJP 2.5, Appendix E
Association Matrix, 12-19, Figure
12-2
CIA. See Central Intelligence
AO. See area of operations.
Agency.
Audio recording, 9-29
Activities matrix, 12-23,
CICA. See Counterintelligence
Figure 12-3. See also
Automation, 13-2
Coordination Authority.
Automation analysis tools.
Analysis tools, 13-13
CID. See Criminal Investigation
Analysis and control element,
Requirements for collectors,
Division.
2-16
13-24
Civil Affairs (CA) Units, 4-47,
Analyst support, 9-30.
Systems, 13-21, L-3
4-58
Analytical
Workstation requirements,
Cold leads, 9-22
Support, 12-2
13-25
Collect, 1-2
Tools, 12-16
B
Collection
Approach, 1-10, 7-15, 8-1
Objectives, 7-2
Basic Source Data Reports
Phase, 8-4
(BSD), 10-13
Priority, 4-45
Rapport, 8-9
Battlefield Operating System
Requirements, 7-4
Strategies, 8-77
(BOS), 1-1
Combat Service Support Units,
Debriefing, 8-82
BEST MAPS, 5-45
4-58
Elicitation, 8-86
Biographic Intelligence, 5-45
Combatants, viii
Interrogation, 8-77
Biometrics, 13-4
Lawful, 6-18
Techniques, 8-17
Unlawful, 6-18
Transitions, 8-73
C
Command Debriefing Team,
Approaches
C2X, 2-4
2-13
Change of Scenery, 8-63
CA. See Civil Affairs.
Command Relationships,
(HUMINT) 4-11
Direct, 8-19
Capabilities, 1-31
Army, Table 4-2
Emotional, 8-23
Capture Rates, 5-90
Joint, Table 4-3
Establish Your Identity, 8-58
Capture tag, Figure D-1
Common points of reference,
False Flag, 8-69
Captured document
9-39. See also Map tracking.
File and Dossier, 8-55
Handling, I-12
Communication requirements,
Incentive, 8-21
Log, I-24, Figure I-3
13-27, 13-30, L-7
Mutt and Jeff, 8-65
Transmittal sheet, I-19,
Contact reports, 10-14
Rapid Fire, 8-60
Figure I-2
Continuous Contacts, 5-16
Repetition, 8-59
Captured equipment handling,
Contractor, 1-7, K-1
D-21
Silent, 8-62
Control Questions, 9-10
Central Intelligence Agency,
We Know All, 8-53
Coordinates register, 12-41
3-24
Area Handbook, 7-4
6 September 2006
Index-1
_________________________________________________________________________________ Index
Coordination with other units and
Drug Enforcement Agency, 4-58
Restricted to Base Camp,
operations, 5-42, 5-56, 5-102
3-14
Counterintelligence
E
Hot leads, 9-21
Coordination Authority, 2-8
EAC HUMINT, 3-22
Human Intelligence, 1-4,
Functions, 1-7, Figure 1-2
Emotional Approach, 8-23
Structure, 2-1
Screening, 6-39, table 6-1
EPW
HUMINT, 1-4
Courses of Action, 4-44
Serial number, 6-12, 6-13
Agencies, 3-24
Criminal Investigation Division,
Status, 6-14
Analysis, 12-1
4-58, 4-60, 5-42
Early Entry Operations. See also
Analysis Cell, 2-16
Cultural Awareness, 1-29, 8-4
HUMINT operations.
Asset Capabilities, 4-17,
HUMINT Support of, 3-6
4-26, 4-45
D
Economic Intelligence, 5-45
HUMINT Collection, 1-8, 5-1
DEA. See Drug Enforcement
Elicitation, 8-80
Aids, 9-28
Agency.
Establish Your Identity
Constraints, 4-41
Databases, 12-46, 13-18
Approach, 8-58
In a Hostile Environment,
Debriefing, 1-21
Exploit dispositions, 9-43
3-21
Debriefing Operations, 1-21,
In Permissive Environment,
5-30
F
3-19
Legal Guidelines, 5-33
False Flag, 8-69
In Semi-permissive
Operational Considerations,
Environment, 3-20
Field Interrogations Operations,
5-34
5-95
Phases, 1-8
Deceit, 9-23, 9-25, 9-26
File and Dossier Approach, 8-55
Plan, 7-9
Defensive Operations, 3-7
Fingerprint scanner, 13-4
HUMINT Collection Team, 2-11
Detainee, 5-26
Five S’s, D-7
Allocation to maneuver
Geneva Convention
units, 5-96
Forced Entry Operations. See
categories, 6-14
also HUMINT operations.
HUMINT Collector, 1-7
Security, 5-58, 5-78
HUMINT Support of , 3-5
Traits, 1-28
Interrogation Operations,
Formal Contacts, 5-28
HUMINT Command and Control,
1-20
4-9
Friendly Force Debriefing
Direct Approach, 8-19
Operations, 1-21, 5-39
HUMINT Contacts, 5-5
Direct Questioning, 9-4
One Time Contact, 5-7
Document
G
Continuous Contacts, 5-16
Accountability, I-19
G2X, 2-4
Formal Contact, 5-28
Associated with a source,
Geneva Conventions, 5-68, 5-72
HUMINT Control Organizations,
I-51
Categories of detainees,
2-3 through 2-14
Categories, I-27
6-15
HUMINT Collection and Related
Exploitation (DOCEX)
Excerpts, Appendix A
Activities, 1-14
Operations, 1-24, 4-51,
HUMINT Methodology, 1-14,
E-12, I-1, I-11, I-48
H
1-18
Exploitation Team, 2-14
HCT, 2-11. See also HUMINT
HUMINT Mission Planning, 4-35,
Evacuation, I-12
Collection Team.
4-44
Handling, I-14
As an Independent Patrol,
HUMINT Operations, 1-23
3-14
Screening, I-25
Assessing, 4-8
Integrated with other
Tag, I-14
Executing, 4-7
operations, 3-14
Translation, I-43
Planning, 4-3
Transmittal, I-34
Preparing, 4-5
Index-2
6 September 2006
FM 2-22.3_______________________________________________________________________________
HUMINT Organization,
Advantages, 11-2
M
Figure 2-1
Briefing, 11-18
Machine translation, 13-8
HUMINT Requirements
Cautions, 11-4
Maneuver unit support, 4-9
Analysis, 4-18
Controlling and correcting,
Map tracking, 9-35
HUMINT Requirements
11-24
Matrices, 12-18
Management, 4-16
Disadvantages, 11-3
Measurement and Signals
HUMINT Source, 1-6
Evaluating, 11-28
Intelligence (MASINT), 4-57
Database, 2-9, 12-7
Methods, 11-6, 11-7
Military geographic intelligence,
Collection Activities, 1-16
Placement, 11-21
5-46
Selection, 12-45
Techniques, 11-16
Military Intelligence
HUMINT Structure, 2-1
Organizations, 4-57
Interpreters, 11-1, 11-26
HUMINT Tasks, 1-5
Military Police in Association
Civilian, 11-15
HUMINT Technical Control, 4-10
with Interrogation Operations,
Evaluating, 11-28
5-56, Figure 6-2
Military, 11-14
I
Internment/resettlement
INTSUM, 7-4
operations, 6-14,
Imagery Intelligence, 4-57
Iris scanner, 13-6
Figure 6-2
Incentive Approach, 8-21
ISR Plan (Integrated), 4-3, 4-27,
Units, 4-58, 5-42
Information Dissemination, 4-32
4-28
Mutt and Jeff, 8-65
INSCOM, 3-22
Updating, 4-34
Intelligence Battlefield Operating
N
System, 1-1
J
National level intelligence
Intelligence Estimate, 7-4
J2X, 2-4
agencies, 3-24
Intelligence information reports,
JIDC Analysis Section, 2-17
Notice of intelligence potential,
10-6
10-15
Joint HUMINT, 3-23, 5-91
Intelligence preparation of the
battlefield, 12-3
Joint Interrogation and
O
Debriefing Center (JIDC),
Intelligence Process, 1-2,
5-102
OB Factors, 12-43
Figure 1-1
Joint interrogation operations,
Offensive Operations, 3-2
Intelligence Production, 4-31
5-99
One-Time Contact, 5-7
Intelligence Reach, 7-5, 7-6
Open source documents, I-10
Interrogation, 1-20, 5-50
K
Operational analysis and
Of wounded detainees,
Knowledgeability Brief, 10-15
assessment, 12-8
5-91
Operational Coordination, 4-9
Priorities, Figure, 6-3
L
Operational Management Team
Prohibited techniques, 5-68,
Lawful enemy combatants, 6-18
(OMT), 2-10
5-74
Lead development report, 10-15
Team leader requirements,
Prohibition against use of
Leads, 9-20
13-23
force, 5-73
Levels of Employment, 3-14
Operational reports, 10-4
Serial number allocation,
Liaison Operations, 1-22, 5-46
Operations Orders, 4-53
Appendix F
Link analysis diagram, 12-16,
Operations Plans, 4-54
Interrogation Operations, 5-50
12-25, Figure 12-4
Operations Support Cell, 2-7
Field, 5-96
Limitations, 1-32
Orders
Joint, 5-100
Local civilian debriefing
Illegal, 5-80, 5-82
Interpreter program, 11-28,
operations, 1-21
11-29, 11-30
Organizational Chart, 9-28,
Long-Range Surveillance, 5-42
Figure 2-1
Interpreter use, 11-2
6 September 2006
Index-3
_________________________________________________________________________________ Index
P
Repetition Approach, 8-59
Single-discipline HUMINT
analysis and production,
Pattern analysis, 12-40, 12-42
Reporting, 1-13, 7-24, 10-1
12-14
Plan, 1-2
Channels, 10-3, 10-16,
Situation Map (SITMAP), 7-4
Figure 10-1
Planning and Preparation, 1-9,
Sociological Intelligence, 5-45
7-1
Evaluation, 4-33
SOF. See Special operation
Political intelligence, 5-45
Principles, 10-2
forces.
Polygraph, 13-7
Report types, 10-3
SOR development, 12-5
Detainee status, 6-14 through
Required areas of knowledge,
Source, 1-6
6-23, E-8
1-29
Administrative reports, 10-5
Pre-deployment planning,
Research, 7-3
Appendix C
Source-specific, 7-8, 7-25
Analysis, 12-11
Prepare, 1-2
Reserve component integration,
Assessment, 6-36
Primary approach strategy, 7-15
4-50
Coverage overlay, 12-50
Process, 1-2
Restricted Interrogation
Map reading skills, 9-38
Techniques, 8-71
Produce, 1-2
Profiles, 12-51
Retained personnel, 6-22
Protected persons, 6-17
Reliability matrix, B-1
Risk assessment, 4-43
Protocol I Additional to the
Special Operation Forces, 5-42
Geneva Conventions,
Stability and reconstruction
S
Appendix B
operations, 3-9
Psychological Operations
S2 Guide for Handling
Staff coordination, 4-59
(PSYOP) Units, 4-58, 5-42
Detainees, Appendix D
Strategic Debriefing Operations,
S2X, 2-4
5-43
Q
SALUTE reports, 10-10
Subject matter expert (SME),
Questioning, 1-11
Format, Appendix H
7-4
Illiterates, 9-46
Science and technical
Support Operations, 3-15
Plan, 7-18
intelligence, 5-45
Support Relationships
Principles, 9-2
Screening, 1-18, 6-1
(HUMINT), 4-13
Quick reference guide,
Codes, Table 6-1
Direct Support, Table 4-2
Appendix G
Community, 6-38
General Support, Table 4-2
Sequence, 7-19, 7-20
Documents, I-25
Support Scheme Development,
Questions, 9-2
Local employees, 6-37
4-27, 4-60
Direct, 9-4
Methodologies, 6-9
T
Follow Up, 9-7
MP support, 6-14, Figure
Tactical Debriefing Operations,
Non-pertinent, 9-8
6-2
5-35
Prepared, 9-12
Observations, 6-30
Tactical questioning, 1-17
Repeat, 9-9
Operations, 1-19, 6-7, 6-8
Target Folder, 4-39, 12-47
To avoid, 9-14
Prisoner of war and refugee,
Task Organization, 4-47
6-9 , 6-13
Taskings and Requests, 4-28
R
Reports, 10-15
Technical expert support, 9-30
Rapid Fire Approach, 8-60
Requirements, 6-7
Technical intelligence
Reach. See Intelligence Reach.
Sheet, Figure 6-1
(TECHINT), 4-57
Recording principles and
Search engine, 13-14
Screening requirements for,
techniques, 9-29
Separation, M-1
6-42
References, Appendix J
Signals Intelligence, 4-57
Support, 7-17
Refugee debriefing operations,
Silent Approach, 8-62
Termination, 1-12
1-21, 5-31
Index-4
6 September 2006
FM 2-22.3_______________________________________________________________________________
Phase, 8-84
Trusted Workstation (TWS),
Warning Order, 4-37
13-3
Report, 10-15
W
Third-party information, 9-33
U
We Know All Approach, 8-53
Time Event Chart, 9-28, 12-17,
Umbrella concept, 7-4
Figure 12-1
Web-based reporting, 13-15
Unit Augmentation, 4-58
Traits of a HUMINT Collector,
Wounded detainees
1-28
Unlawful enemy combatant, viii,
Interrogation of, 5-91,
6-18
9-45
Translation machines, 13-8
Urban Operations, 3-16
Translators, I-47
Transportation and
V
telecommunication
intelligence, 5-45
Video Recording, 9-29
6 September 2006
Index-5
|