Chapter 5
CA Methodology: Develop and Detect
The success of the Torch operation is critically dependent upon the reactions of the authorities, inhabitants, and troops of North Africa. With this in mind, General Eisenhower has on this staff a Civil Administrative Section to coordinate the civil and political matters in immediate relation to the operation. He urgently requests that men from the State Department be released to serve on this body.. | |
Memo, GEN George C. Marshall for President Roosevelt, |
OVERVIEW |
|
5-1. Execution of the CA plan is initiated during the develop and detect phase. This phase begins when CA elements enter into the AO to establish relationships, develop rapport, and conduct deliberate assessments to confirm or deny the plan. This phase is characterized by numerous activities, such as expanding the CMOC to facilitate increased interagency operations; conducting interviews, surveys, and local meetings; supporting DC control points; monitoring indigenous public information programs; making contact with key communicators; submitting periodic CA/CMO reports; and managing a database of operation-specific information. 5-2. CA activities and CMO develop the civilian component of the COP and assist commanders in finalizing their COR to the actual situation (as opposed to the situation as it was understood during preliminary assessments and mission planning). They detect (confirm or deny) the conditions, standards of care, and attitudes, which serve to either cancel or trigger planned and on-call CA activities and CMO branches and sequels to the operation. The execution of these planned contingencies is the subject of the deliver phase. 5-3. The products of this step include continuous assessments, revised or updated plans, formalized CMOC terms of reference, and FRAG orders. This chapter will focus on the activities that support and occur during the develop and detect phase. |
|
CMOC (INTERAGENCY) OPERATIONS |
|
5-4. The CMOC is normally established early in the planning of an operation, typically during the decide phase. The CMOC's purpose is to support the commander by providing a forum in which trained soldiers and civilian planners analyze the civilian component of an operation, decide how to conduct initial CA activities and CMO during the develop and detect phase, and begin to synchronize a COR in the deliver phase. 5-5. As the operation matures, the CMOC continues to monitor the civil component of the AO and expands, as necessary, to meet the needs of the commander. Depending on the situation and the operational level at which the CMOC is operating, the CMOC may remain in place or it may deploy forward into the AO. If it deploys or relocates within the AO, CA soldiers follow procedures to establish the CMOC as discussed in Chapter 4. |
|
MAINTAINING THE CMOC | |
5-6. As a coordination center, the CMOC should be able to execute certain tasks, as necessary. These tasks include the following:
5-7. To accomplish these tasks, the CMOC maintains maps and charts that depict current and future CA activities and CMO. Map overlays contain graphics depicting the current enemy and friendly situations; current and planned DC operations; the status of arts, monuments, and archives; and other details, as required. CA/CMO graphics are discussed later in this chapter. Charts should depict important ongoing requirements such as work requests, logistic requirements, DC statistics, and SITREP information. (Appendix D provides examples of CMOC status boards and report formats.) Additional items that may be useful in maintaining a CMOC include-
|
|
REACHBACK REQUIREMENTS | |
5-8. Preliminary assessments are only as good as the date of the last database entry or the last known data before deployment from home station. Information on the ground changes. Information in the rear (CONUS) also changes (follow-on unit status, national-level policies, and decisions). 5-9. The effectiveness of the CMOC depends significantly on its ability to exploit nonorganic capabilities located within and outside the theater. As the situation matures and assessments yield updated information, there are times when deployed CA teams need to gain access to existing databases, products, and analytic expertise resident in national, joint, and Service resources. This requirement entails a reachback capability. |
|
In late January and February of 1993, during Operation RESTORE HOPE, CADST 32 of Company C, 96th Civil Affairs Battalion (Airborne), had met various groups of elders throughout the city of Mogadishu to determine city district boundaries, district demographics, and concerns. Noting there were some conflicting claims to control over several of the districts, CADST 32 met with a political officer at the U.S. Liaison Office (USLO) in an attempt to confirm the validity of the elders' claims to district leadership. The political officer informed the CA team that the DOS database for the city was only current up to 1989, when the U.S. Embassy pulled out of Somalia. That database was not in Mogadishu, but in Washington, D.C. CADST 32 had no way to query the database from Somalia. The DOS, however, was using CADST 32's Periodic CA Reports to build a new database. | |
Notes of Team Leader, CADST 32, |
5-10. CMOC personnel may need to deconflict communications with external agencies through the information management officer (IMO) or the IO cell of the supported unit HQ. 5-11. The IMO of the supported unit HQ is usually responsible for managing the flow of information throughout the force HQ. As the RFI manager, the IMO is responsible for receiving and routing requests coming into the force HQ and sending all official RFIs generated with the collaborative networks of the force HQ to the appropriate external agencies for resolution. 5-12. IO planners and operators at the supported unit HQ theater employ reachback to IO planners and operators at the Joint Information Operations Center (JIOC), Joint Warfare Analysis Center (JWAC), Defense Intelligence Agency (DIA), National Imagery and Mapping Agency (NIMA), National Security Agency (NSA), and others. |
|
EXPANDING THE CMOC | |
5-13. As a vehicle for coordinating interagency operations, the CMOC should be adaptable and capable of expanding its support to participating foreign military organizations and U.S and foreign civilian organizations. Representatives from nonmilitary organizations that can participate in CMOC operations come from such agencies as the U.S. Country Team, UN, USAID, local officials, HN agencies, and NGOs. Regardless of manning and organization, the CMOC should have sufficient personnel to conduct 24-hour operations. 5-14. As new members join the CMOC, the director ensures certain principles of the organization are maintained. These include-
A CMOC may sponsor various types of meetings, such as-
5-15. Figure 5-1, outlines the typical meetings sponsored or attended by CA soldiers of the Task Force 2-327 (KFOR 2B) S-5 in Kosovo. More information on conducting meetings and reaching agreements is found later in this chapter. |
|
|
Figure 5-1. Typical Meetings Sponsored or Attended by CA Soldiers of the Task Force 2-327 (KFOR 2B) S-5 in Kosovo
DELIBERATE ASSESSMENTS |
|
5-16. Assessments are part of the continuous IPB process and provide the commander with critical information required for making decisions regarding mission tasks, task organization, and allocation of resources. As noted in Chapter 3, CA soldiers conduct two types of assessments: the preliminary assessment (conducted during the assess phase) and the deliberate assessment (conducted during the develop and detect phase). 5-17. Deliberate assessments are normally tasked during the decide phase to appropriate elements that will be in a position to satisfy information shortfalls. Deliberate assessments can also be directed for emergencies, single issues, or special situations, such as a damage assessment incident to a claim. Elements may be task-organized for each deliberate assessment mission. 5-18. The deliberate assessment consists of two phases: the initial assessment, conducted upon entry into the designated AO, and the survey, which is more detailed. 5-19. While conducting initial assessments and surveys, CA soldiers obtain information by conducting direct observation, using checklists, and interviewing civilians in various settings. Gathering information should not be a haphazard process. As with all military missions, this task requires a well-formed, practical plan. The basic steps of this plan include the following:
5-20. Every assessment must contain well-defined geographical boundaries and timeframes within which the assessment is valid. As mere "snapshots in time," assessments and surveys must be updated as often as necessary to remain current. |
|
INITIAL ASSESSMENT | |
5-21. The initial assessment is conducted upon entry into the designated AO. The objectives or focus of the initial assessment should be broad yet manageable; for example, assess general conditions of the AO in the areas of public health, public safety, public works and utilities, civil information, and emergency services. CA teams conducting initial assessments must be aware of the security situation at all times. 5-22. During the initial assessment, the CA team takes a cursory look at the conditions of the area as directed by the mission statement. Using the CA area assessment format found in FM 41-10 and the principles of METT-TC for analyzing a situation, the CA team visits locations that will most likely provide the information it has been directed to find. Sources of pertinent information include municipal government and public safety offices, hospitals, medical clinics, feed centers, and HN, UN, and NGO relief sites. 5-23. Products of the initial assessment include SITREPs, spot reports, and requests for assistance. The findings of an initial assessment may lead to refined mission statements or reallocation of forces and resources. The Hasty Village Assessment sheet in Figure 5-2, shows the type of information that can be obtained during an initial assessment. |
Figure 5-2. Hasty Village Assessment Sheet
SURVEY | |
5-24. The survey is conducted as time and circumstances permit. The survey can be considered a detailed assessment in which the object of the assessment is examined carefully, as during an inspection or investigation. The objectives or focus of the survey should be well-defined; for example, assess the ability of all municipalities in the AO to perform government functions effectively, or, assess the needs of Town X to sustain the populace for the next 72 hours. CA teams conducting surveys must be aware of the security situation at all times. 5-25. During the survey, the CA team uses detailed checklists to ensure all aspects of the area are scrutinized appropriately, as directed by the mission statement. Using the CA Area Assessment Format, the principles of METT-TC, and objective-specific questions prepared by the assessment team, the CA team visits locations that will most likely provide the information it has been directed to find. Sources of pertinent information include clergy, major private industry, foreign embassies, and multinational corporations. 5-26. Products of the survey include updated SITREPs that portray actual conditions, project nominations, and interim or final reports validating the status of projects. The findings of a survey may lead to refined mission statements or reallocation of forces and resources. |
|
CIVILIAN INTERVIEW TECHNIQUES |
|
5-27. CA soldiers conduct interviews to gather information in support of hasty or detailed assessments. In some cases, the interviewer knows the interviewee in advance. In other cases, the interviewer must seek out interviewees based on the position they hold in the community or the knowledge they may have on a subject area. This section describes techniques for planning and conducting interviews in both cases. 5-28. The interview process consists of three distinct phases: the preparatory phase, the interview phase, and the postinterview phase. These phases are discussed in the following paragraphs. |
|
PREPARATORY PHASE | |
5-29. A successful interview begins with proper preparation. During the preparatory phase, the interviewer follows a process designed to maximize his knowledge of the subject matter, facilitate actions during the interview phase, and foster a relationship with the interviewee that will allow future contact with the interviewee, if required. Specifically, the CA soldier will-
|
Table 5-1. Examples of CA/CMO PIR, EEFI, and FFIR
PIR |
Potential Sources |
|
Municipal Leaders, Chamber of Commerce, Police and Prison Officials |
|
Public Health Officials, Public Safety Officials, Emergency Management Director, Public Information Officer |
|
Local Community Leaders, Religious Leaders, Emergency Management Director, Public Safety Officials |
EEFI |
Potential Sources |
|
U.S. Forces, CSS Units of Allied/Coalition Forces |
|
Commander, G/S-3, NGO Representatives, UN Representatives |
FFIR |
Potential Sources |
|
CSS Units of U.S. Forces, CSS Units of Allied/Coalition Forces |
|
NGO Representatives, UN Representatives, Local Community Leaders |
INTERVIEW PHASE | |
5-30. An interview may take place under varying conditions or environments. The interviewer should strive to conduct the interview in the best conditions possible, but he must remain flexible and focused enough to obtain information in any situation. He must also act in a manner that facilitates approaching the interviewee as a source of additional information at some future time. The following techniques apply to every interview. The interviewer should-
|
|
POSTINTERVIEW PHASE | |
5-31. Actions taken after the interview are as critical as gathering the information. The interviewer should, at a minimum, take the following actions:
|
|
TECHNIQUES IN REACHING AGREEMENTS |
|
5-32. The very nature of CA activities often puts CA soldiers in contact with people who have differences of opinion over what they can or cannot and should or should not do in specific situations. The CA soldier must be able to influence the actions of people to meet both the objectives of a commander and the national policies and objectives of the United States. He must be able to do this in any scenario. 5-33. When resolving disagreements between parties, CA soldiers must display a combination of patience, tenacity, creativity, and focus to succeed. They must-
Examples of the range of challenges CA soldiers may encounter include-
5-34. Each of these examples represents a significant CMO event that requires the full knowledge and support of the commander responsible for the AO. Each example also demonstrates that the CA soldier must be properly trained and prepared to meet many similar, yet different, challenges. 5-35. Before entering an agreement process, the CA soldier must know what a good agreement looks like. A successfully negotiated agreement meets four standard criteria:
5-36. The following discussion provides techniques to assist the CA soldier in bringing a successful conclusion to situations that require two or more parties to come to a mutual agreement. Knowledge of these techniques does not qualify a CA soldier to act as a hostage negotiator or a trade negotiator for international, national, or regional trade agreements. These types of agreements require specific expertise and legal status that are beyond the normal scope of CA activities. 5-37. There are three basic methods one can use to bring opposing sides together to reach an agreement: negotiation, arbitration, and mediation. Each method has its place in CA operations, as explained below. Negotiation and arbitration are likely to place the CA soldier in a position of opposition to one or more of the local parties. As the most effective and least divisive of the three, mediation is the preferred method of reaching agreements. |
|
NEGOTIATION | |
5-38. Negotiation is conferring, discussing, or bargaining to reach an agreement. Negotiation is a central technique in conflict resolution. Although they will rarely be called on to negotiate a major agreement in a postconflict environment, CA soldiers at all levels must be competent and knowledgeable in the art of negotiation. Under normal circumstances, the DOS conducts international negotiations on behalf of the United States. Typically, exceptions to this rule occur when details of a status-of-forces agreement (SOFA) need clarification or when the U.S. military requires goods or services from a local provider. 5-39. When a U.S. military representative is a party to a negotiation, he is then injected into the problem and is seen as a competitor and not as a disinterested party. Once any of the local representatives regard the United States as an interested party, the United States surrenders the cloak of neutrality, and all actions become suspect. It is very difficult to shake the ensuing suspicion and mistrust, even by subsequent U.S. actions or representatives. 5-40. To be effective, CA soldiers must develop competencies in conflict style management, the dynamics of conflict, verbal communications skills, and cultural awareness. |
|
Conflict Style Management | |
5-41. Negotiators must appraise and evaluate personality traits and profiles in relation to conflict. These appraisals give insight into how individuals and groups react to, and interact in, a conflict situation. Since all individuals are different, the negotiator must be flexible but assertive. Learning to recognize his styles of communication and the styles of others and to adapt his processes can lead to more sustainable agreements. |
|
Dynamics of Conflict | |
5-42. CA soldiers will be called upon to resolve conflict when not all parties are willing to engage in negotiation or mediation processes. Moreover, CA soldiers will have to negotiate fair outcomes when there is an uneven power dynamic between the parties. Many issues will involve intractable conflicts that are considered nonnegotiable when the communication channels have broken down. Parties frequently attempt to use force to prevail in these situations. Although force can sometimes work quickly and effectively, it has many dangers. |
|
Verbal Communication Skills | |
5-43. The success or failure of a negotiation is directly related to the depth of communication achieved by the parties involved. Problems often arise because intentions are miscommunicated. The assumptions and perceptions about a person, group, or situation affect the outcome of communication; listening skills and questioning techniques are important. |
|
Cultural Awareness | |
5-44. Cross-cultural training increases the awareness and understanding of other cultures. This ability enables the CA participants to interact successfully with the population in the host country, and provides a framework in which to work. An understanding of one's own culture allows him to see cultural differences and similarities with other cultures. |
|
Negotiation Tactics, Techniques, and Procedures | |
5-45. As it becomes necessary to act as a negotiator, the CA soldier must do the following:
Additionally, the CA soldier will find the following tactics or ploys useful during the negotiation process:
|
|
ARBITRATION | |
5-46. Arbitration is a conflict settlement with the decision made by a neutral party. There are two forms of arbitration: binding and nonbinding. Binding arbitration refers to situations where local representatives agree to comply with the arbitrator's decision. Nonbinding arbitration refers to situations where parties are not compelled to comply with the arbitrator's decision. In CA operations, either form of arbitration is ineffective because the arbitrator acts as judge, and as such will make a decision that will adversely affect one or more parties. Since this is virtually always a decision on a subject where contention is so rampant that the participants could not bring themselves to agree, the arbitrator's decision will in all likelihood anger everyone involved and decrease the chances of future cooperation with U.S. policy goals. 5-47. For the CA soldier, the only tangible advantage in acting as an arbitrator is that a quick and decisive decision can be made. Without local support, however, implementing the decision can be extremely difficult or impossible. Without local support for the arbitrator's decision, the local commander, and, for that matter, the U.S. military as a diplomatic player, must be prepared to lose prestige and influence. Unless the United States is willing to commit sufficient resources to enforce compliance, it will appear weak and ineffective. In those situations where the U.S. military is willing to commit resources to enforce compliance, the U.S. military commander must be advised that a potential long-term negative effect may be lasting resistance to future U.S.-led efforts designed to enhance stability. |
|
MEDIATION | |
5-48. Mediation is a conflict settlement with the decision made by the opponents with the assistance of a neutral third party. During mediation, the role of the CA soldier is to act as a facilitator whose aim is to guide the local parties toward an agreement that supports the policy goals of the U.S. government. The mediator is not representing the aspirations of any of the opposing sides, but acts solely to further the altruistic goals of lasting peace, stability, and cooperation within the framework of the military commander's intent and the international agreements that authorized U.S. involvement. 5-49. Although the goals are altruistic, the mediator should not assume there would be little or no resistance from the indigenous population or institutions. There are numerous groups and individuals that will actively or passively hamper attempts to establish peace. In mediation, the United States is not in a position to support the aims or goals of one of the opposing parties, and therefore the likelihood of persistent animosity and aggression directed at the United States or U.S. representatives is reduced. 5-50. During the mediation cycle, the mediator may find that he may have to enforce a decision that has a disproportionate benefit to one participant over another. The mediator will have to prepare for that situation by ensuring that throughout the mediation cycle he has remained impartial, clearly outlined what behavior was expected from the participants, and what rewards or punishments would be apportioned. Mediation includes the risk of upsetting a participant. However, the mediator can prevent long-term friction through effective communication and by eliminating the possibility that the mediator's actions appear arbitrary. 5-51. The CA soldier must remember that mediation, if at all possible, is the preferred method when pursuing an agreement between two opposing parties. Appendix G contains additional guidelines on how to successfully reach an agreement. |
|
CONDUCTING MEETINGS |
|
5-52. A meeting is a gathering of people who come together to discuss or decide on matters. CA soldiers often find themselves responsible for setting up meetings for various reasons or occasions. Some examples include the following:
5-53. It may be necessary to conduct periodic meetings with certain groups for specific recurring or sequential topics. Weekly meetings may be appropriate for planning operations, tracking progress, and managing projects. Monthly meetings provide a better chance to look at certain long-range or developmental subjects in greater depth. 5-54. Every meeting ought to be assigned to a single meeting coordinator. The meeting coordinator is responsible for the planning, coordination, and execution of the meeting. Depending on the circumstances and level of the meeting, the meeting coordinator may or may not also serve as the moderator of the meeting. 5-55. Successful meetings require detailed planning regardless of the location, circumstances, timing, or frequency. Successful planning requires the meeting coordinator to approach the task professionally and systematically. He must understand the purpose, expected outcome, and implications of the meeting. He must be aware of the agendas of attendees and satisfy their need to perceive benefit from attending this and future meetings. The more care taken in preparing and structuring the meeting, the more likely the outcome of the meeting will be favorable. When planning the meeting, the meeting coordinator should-
During the meeting, the meeting moderator should-
After the meeting, the meeting coordinator or moderator should-
5-56. Although the processes of planning and conducting meetings should be approached as any other military operation, the meeting coordinator must be careful not to overconstrain the meeting agenda or participation. If the atmosphere is too tense or rigid, nommilitary participants may be intimidated or alienated and, therefore, may resist attending future meetings. On the other hand, the meeting moderator must be aware of certain skills or tactics that he or meeting participants may try to employ to turn the meeting in his favor. The use of the following skills or tactics is situational-dependent. |
|
AGGRESSION | |
5-57. Psychologists differentiate between angry aggression and instrumental aggression (aggression designed to achieve a specific goal). There is no place for angry aggression in meetings. Instrumental aggression should be employed sparingly but forcefully. Tone of voice and body language will often suffice. If an individual sounds furious, people will believe he is furious. He who loses his rage completely will usually regret it. |
|
CONCILIATION | |
5-58. Conciliation is usually the best way to defuse aggression. An aggressive opponent can be temporarily pacified with appeasement signals and submissive gestures. As with aggression, conciliation must be used sparingly. Admitting one is wrong about something can be a mark of strength, not weakness. Often, a well-timed apology can put even the most abusive attacker off guard and bring a situation back under control. |
|
ENTHUSIASM | |
5-59. Unlike aggression and conciliation, enthusiasm is encouraged. Enthusiasm fosters participation by reinforcing the feeling that each participant's idea counts. The meeting moderator should be wary, however, of giving the impression of false enthusiasm. |
|
INTERROGATION | |
5-60. Interrogation in the context of meetings means making interrogative statements rather than making speeches. Asking pointed and relevant questions is often a more effective means of promoting communication. |
|
PATIENCE | |
5-61. Patience allows the listener to hear the arguments advanced by all sides with an open mind. It enables the listener to assess the general trends of discussion, formulate arguments, and identify moments when it is most appropriate to act. |
|
SULKING | |
5-62. Sulking is a way of eliciting sympathy from other meeting attendees to get one's way against seemingly insurmountable odds. As with aggression and conciliation, sulking should be used sparingly. |
|
WITHDRAWAL | |
5-63. Withdrawing from a meeting is a tactic of last resort and should be used most sparingly of all. The purpose of withdrawal is to shock the remaining participants into confusion and disarray and cause them to reconsider the position that prompted the withdrawal. It is an extremely risky tactic, as the withdrawing party no longer has control over what transpires in the meeting once he has left. |
|
ATTENDING MEETINGS |
|
5-64. CA soldiers will often attend meetings run by NGOs, IROs, or local civilians. These meetings are an excellent opportunity to share information, network with influential individuals, and build relationships beneficial to the military mission. CA soldiers must understand their role in such meetings and how to maximize the value of the opportunity. Their effectiveness in future collaborative efforts will often be influenced by their military rank, where they sit, how they behave, and what they say or do not say during these meetings. 5-65. Nonmilitary participants of a meeting will often relate the military rank of the attendee to the level of importance the commander places on the meeting participants or subject matter. Lower-ranking soldiers may consider carrying an official letter of introduction from the commander, especially to initial meetings with nonmilitary groups. 5-66. At times, CA soldiers may intend to be passive observers at a particular meeting or series of meetings. Depending on the status of the military in certain environments, however, the mere presence of military representatives at a meeting is a statement in its own right. CA soldiers must display competence, reliability, and professionalism at all times. 5-67. Often, the most productive coordination is made between individuals during breaks and after adjournment of a meeting. CA soldiers must prudently observe meeting protocols. They must understand what information is appropriate for presentation to the group, when to present it, and when to keep information for appropriately timed "sidebars." Additional meeting attendance guidelines for the CA soldier include the following:
|
|
MANAGING AND CLASSIFYING CA AND CMO INFORMATION |
|
Information provided by friendly, adversary, and neutral parties has a significant effect on CMO planners' ability to establish and maintain relations between joint forces and the civil authorities and general population, resources, and institutions in friendly, neutral, or hostile areas. | |
JP 3-57, Joint Doctrine for Civil-Military Operations, |
5-68. During the initial planning stages of CA operations and CMO, much of the information used by CA/CMO planners is characterized by the completed area study based on the format found in FM 41-10. This information, kept current through routine and continuous study and research, is obtained using a combination of open-source and restricted source materials. Open-source materials include political, economic, military, cultural, and informational journals, the CIA source book, and numerous public web sites. Restricted source materials include the CA database and the OSIS. 5-69. As operations mature and CA soldiers begin conducting hasty and detailed surveys, the information used by CA/CMO planners becomes more sensitive in terms of how it was obtained and to what uses it will be put. Characterized by personal contact and direct observation, this information has associated costs in terms of soldiers' time, effort, and resources, as well as the potential requirement to protect information sources. 5-70. While conducting assessments, CA soldiers may uncover information that is politically sensitive, proprietary in nature, or potentially harmful to the source if the information is obtained by the source's adversaries or competitors. In the first case, dissemination of politically sensitive information may hurt reputations, cost lives, or hinder the attainment of U.S. goals and objectives. In the second case, release of proprietary information may diminish the CA soldiers' ability to obtain useful or important information in the future. In the latter case, information obtained in confidentiality must be protected according to the desires of the confidant. 5-71. Whether compiled from open-source materials, restricted source materials, personal contacts, or direct observation, the information gathered by CA soldiers must be carefully managed to ensure-
|
|
DATABASE REQUIREMENTS | |
5-72. Information pertaining to CA operations and CMO must be carefully catalogued and managed during all phases of operations. This requirement is especially important during long-term operations when continuity is paramount to success, and knowledge of previous actions must be passed to succeeding CA teams and interagency participants. The CMOC, as the repository for all CA and CMO information, must establish a system that achieves this objective. The system must be initiated early in the operation, simple to maintain, and easily shared with other agencies, as applicable, to facilitate planning and operations. 5-73. A paper-based system that achieves the purpose of cataloguing and managing CA/CMO information uses the daily staff journal (DA Form 1594), the CA (G-5) Workbook, CMO situation maps and overlays, and a resource card file, as discussed below:
Examples of each of the items listed above can be found in Appendix D. 5-74. An automated system that achieves the purpose of cataloguing and managing CA/CMO information might be preferable in some environments. An automated system maintains the same data as the paper-based system yet offers the advantage of being more versatile and more easily shared with other participants for collaborative planning. If compatible with ABCS, this automated system expands the COP, provides greater visibility of CMO and CA operations to the supported commander and his subordinates, and reduces the potential for misinterpreting information transmitted between units. |
|
The lack of a uniform standard for tracking of DC movement throughout the corps led to double counting at both division and corps levels and false reporting of numbers of DCs that had a cascading effect as the exercise lengthened. Armed with bad data, poor tracking of DCs resulted in faulty planning by CSS BOSs at both division and corps levels causing them to energize CSS assets that were not necessary and could have been used elsewhere. | |
Urgent Victory 01 AAR, |
5-75. The automated CA/CMO information system should incorporate several features. These features include-
|
|
OPERATIONAL SECURITY ASSESSMENT AND MEASURES | |
5-76. OPSEC is an operations function and a command responsibility. The OPSEC assessment is mission-specific. Its purpose is to protect sensitive and critical CA/CMO information from unauthorized disclosure. The unit collecting the information must take the time, before and during an operation, to determine-
Common measures used to protect information include the following:
5-77. Additional information on OPSEC can be found in USASOC Directive 530-1, Plans and Operations: Operations Security. NATO security procedures are contained in the International Programs Security Handbook. |
|
CLASSIFICATION OF INFORMATION | |
5-78. AR 380-5, Information Security, governs the DOD Information Security Program and takes precedence over all DOD component regulations that implement that program. It establishes, for the DOD, uniform policies, standards, criteria, and procedures for the security classification, downgrading, declassification, and safeguarding of information that is owned by, produced for or by, or under the control of the DOD or its components. Accordingly, information is considered for classification if it concerns-
|
|
ORIGINAL CLASSIFICATION AUTHORITY | |
CA soldiers must work closely with the classification authority and chain of command concerning the nature, source, and use of the information they produce. Unclassified material gathered during CA assessments is sometimes incorporated into classified reports, making sharing information with uncleared sources-even those sources who originally provided the information-problematic. For example, the CJ9 CIMIC [staff section] at KFOR produced an unclassified CIMIC update, which encompassed all the [four UN] pillars [of humanitarian activities, civil administration, institution-building, and reconstruc-tion] and was the only consolidated report of its kind. The document was provided to local representatives of the international community, who highly valued the information. When this same material was later incorporated into a classified KFOR update, the practice of sharing information with the international community was halted. This quickly degraded the ability of CJ9 CIMIC soldiers to work freely with their contacts. | |
Notes of a CJ9 CIMIC Officer, |
5-79. Information can only be classified by an original classification authority or an individual who has delegated original classification authority according to the provisions of AR 380-5. Delegated original classification authority limits the number of individuals with such authority and the classification levels delegated to those individuals. 5-80. The classification levels denote the degree of damage to national defense or foreign relations of the United States in the event of unauthorized disclosure of the information. They also denote the degree of protection such information requires. Classification may not be used to conceal violations of law, inefficiency, or administrative error; to prevent embarrassment to a person, organization or agency; or to restrain competition. 5-81. The three classification levels are-
5-82. A fourth category-Unclassified (U)-is applied to a wide range of unclassified types of official information, which, although not requiring protection as national security information, is limited to official use and is not publicly releasable. Markings such as For Official Use Only (FOUO) and Limited Official Use are not used to identify classified information. 5-83. Classifiers of information produce classification guides. Classification guides-
5-84. The classification guide is approved personally and in writing by an official who is authorized to classify information originally at the highest level of classification prescribed in the guide. This official will also approve personally and in writing all changes, errata sheets, and revisions to basic guides that affect a classification. 5-85. CA soldiers must be familiar with the contents of the classification guide, its application to CA/CMO information, and what to do if CA/CMO information is not addressed properly. The best way to influence changes to the guide is to coordinate with the G-2 or S-2 of the supported unit. 5-86. If a CA soldier originates or develops information that he believes should be safeguarded, he should take the following measures (according to AR 380-5):
Additionally, CA soldiers must treat the following as sensitive or close-hold:
|
|
FOREIGN GOVERNMENT INFORMATION | |
5-87. Foreign government information is defined by Executive Order 12356 as-
5-88. Executive Order 12356 states that there is a presumption of damage to national security in the event of unauthorized disclosure of foreign government information. For this reason, foreign government unclassified information that is provided in confidence is to be classified at least Confidential. It should be classified higher whenever the damage criteria for Secret or Top Secret are met. Unclassified foreign government information provided in confidence must be classified by an original classification authority. If there is uncertainty concerning whether the information is to be handled "in confidence," the providing government or international organization should be consulted to reach agreement on controls to be applied. 5-89. Foreign government information must retain its original classification or be assigned a U.S. classification designation that will provide protection equivalent to that provided by the furnishing government or organization. When unclassified foreign government "in confidence" information is involved in an international program, program documentation (the memorandum of understanding [MOU]) should include procedures on handling the information. 5-90. U.S. documents that contain foreign government information must be marked with a notation that states "THIS DOCUMENT CONTAINS FOREIGN GOVERNMENT INFORMATION." In addition, the portions containing foreign government information must be marked to identify the country of origin and classification level (for example, UK-C or UK-R). The foreign government document or authority on which the classification is based, in addition to the identification of any U.S. classification authority, must be identified on the "Classified by" line. A continuation sheet should be used for multiple sources, if necessary. 5-91. Foreign government information cannot be disclosed to nationals of third countries, including intending citizens, or to any other third party, or used for other than the purpose for which the foreign government provided it without the written consent of the originating government. Government agencies must submit requests for other uses or further disclosure to the originating government. |
|
ACCESS TO CLASSIFIED INFORMATION | |
5-92. No person may have access to classified information unless that person has been determined to be trustworthy and unless access is essential to the accomplishment of lawful and authorized Government purposes. That is, the person must have the appropriate security clearance and a need-to-know. Further, cleared individuals may not have access until they have been given an initial security briefing. 5-93. Units at every level must establish procedures to prevent unnecessary access to classified information. In the end, every individual who has authorized possession, knowledge, or control of classified or sensitive information has the final responsibility for determining that a prospective recipient's official duties require possession of, or access to, any element or item of classified information and whether the individual has been granted the appropriate security clearance by proper authority. |
|
TRANSMISSION OF CA/CMO INFORMATION | |
5-94. CA/CMO information can be transmitted by various methods, including oral, hard copy, and electronic. The method chosen must conform to published policies and procedures put in place to protect loss or accidental disclosure of that information to unauthorized individuals. In the absence of published policies and procedures, CA soldiers should use common sense to ensure OPSEC. 5-95. Oral transmission includes formal and informal briefings, personal conversations in public or private places, and telephone or radio conversations. Before transmitting CA/CMO information orally, CA soldiers must take precautions to protect the information commensurate with its classification. Examples of protective measures include-
5-96. Hard-copy transmission includes handcarrying, sending by authorized courier, and mailing. AR 380-5 governs the marking, transmission, and safeguarding of hard-copy classified information. CA soldiers should also consult with their local S-2 or G-2 section for the existence of any additional command guidelines regarding handling classified materials. Electronic transmission includes FAXs, E-mail, and posting on web sites and common network drives. Examples of protective measures for electronic media include-
|
|
OPERATING WITH THE MEDIA |
|
5-97. DOD and major news organizations reached agreement on guidelines that apply to media coverage of U.S. military forces engaged in armed conflict. The rules listed below have been endorsed by DOD and most major news organizations, and will govern media coverage of future U.S. armed conflicts:
These principles will apply as well to the operations of the standing DOD National Media Pool system. NOTE: CA soldiers must always work through the PAO, as well as notify and get approval from their chain of command before talking to the press. 5-98. What CA soldiers do before they meet the media is as important as what they do when they actually meet them. Often, it is the preparatory activities that will determine the success or failure of a media interview. By being prepared, CA soldiers will not only be more confident and comfortable, but will also be able to get their story across to the audience. 5-99. CA commanders should always ensure that their unit members are fully prepared to meet and speak with media personnel. The following suggestions are for the soldier who is preparing for an interview. He should-
|
|
FORCE PROTECTION |
|
5-100. Force protection refers to measures designed to protect personnel, facilities, and equipment that conduct or support national defense missions. JP 1-02 defines force protection as "Security program(s) designed to protect Service members, civilian employees, family members, facilities, and equipment, in all locations and situations, accomplished through planned and integrated application of combatting terrorism, physical security, operations security, and personal protective services, and supported by intelligence, counterintelligence, and other security programs." 5-101. Force protection is a concern for all commanders and soldiers in military operations across the spectrum of conflict, both CONUS and OCONUS. The Joint Doctrine Encyclopedia states- |
In peacetime, geographic combatant commanders establish measures and procedures that preserve the combat power of their forces. In wartime, geographic combatant commanders carry out assigned and implied missions in pursuit of theater strategic objectives derived from national and alliance or coalition strategic goals. Force protection responsibilities are modified as necessary in order to ensure security of assigned forces and to protect US interests in their areas of responsibility. | |
Joint Doctrine Encyclopedia, |
5-102. DODD 2000.12, DOD Antiterrorism/Force Protection (AT/FP) Program, directs regional and functional combatant commanders to establish command policies and AT/FP programs for the protection of all assigned forces. The responsibility of geographic combatant commanders extends to all forces in the AOR, as well as forces conducting operations, training, or exercises in countries not assigned to a geographic combatant commander for whom the combatant commander has operational control. These programs include family members (dependents), resources, and facilities. These programs generally require prescribed levels of awareness and training for every applicable individual, as well as coordination with the officials of indigenous (and domestic, in the case of DSOs) populations and institutions on matters involving AT/FP policies and measures. 5-103. When the threat of terrorism exists, commanders implement and enforce measures according to the force protection condition (FPCON) procedures outlined in JP 3-07.2, Joint Tactics, Techniques, and Procedures for Antiterrorism, and Appendix BB of DOD Handbook O-2000.12-H, Protection of DOD Personnel and Activities Against Acts of Terrorism and Political Turbulence. These FPCON levels are discussed below:
5-104. Force protection initiatives at all levels must be coordinated closely with the appropriate security, intelligence, and investigative forces, given their knowledge of threat possibilities and appropriate responses. Effective force protection planning includes input, guidance, and decisions from other interested agencies and personnel. These may include civil government and law enforcement officials and, in some cases, private security firms (as in the proprietary security offices of multinational corporations in the AO which may be more organized or better informed than local authorities). Ultimate responsibility for force protection rests with the force commander, and any actions taken must be consistent with the commander's decisions. More information is contained in DOD Handbook O-2000.12-H. |
|
CA ROLE IN FORCE PROTECTION | |
5-105. CA soldiers focus on force protection at two distinct levels: the individual or team level and the supported force level. These levels are discussed below:
|
The case of the Bon Repos [Haiti] marketplace emphasizes the critical role that civil affairs assets played in [TF Castle's] ability to secure [its] area of operations. Since the site of the existing town market would be directly outside the main gate of the proposed base camp, vendors expressed concerns to the civil affairs team about the impact of troops operating in the town. Through constant dialogue and negotiations with the merchants and the town's leaders, the TF commander decided to build a larger market down the road from the existing site. The engineers constructed a new access road from Route 100 to the new marketplace. The relocated market opened with a formal ceremony involving the TF Castle commander, local landowners, clergy, and police. In fact, the new market attracted approximately 150 more vendors than the original marketplace and increased the commerce of the town. By meeting the terms of the agreement to move the marketplace, the engineers established credibility with a population not accustomed to trusting uniformed personnel. This step proved crucial to ensuring the security of the engineer forces. | |
Force Protection: Integrating Civil Affairs and Intelligence, |
5-106. CA soldiers enhance force protection in any operation by doing their normal duties. This means they must-
5-107. As stated in the Joint Doctrine Encyclopedia, "Force protection can be significantly improved with the proper mix of intelligence and information gathering.In some military operations other than war (such as peacekeeping), the term 'information gathering' is used rather than the term 'intelligence' because of the sensitivity of the operation." Since information gathering is an inherent part of CA operations, CA soldiers must be sure to share their observations with the intelligence community. It is critical, however, that CA soldiers be careful not to misrepresent themselves as gatherers of intelligence. |
|
PLANNING FORCE PROTECTION OPERATIONS | |
5-108. Commanders plan force protection operations using trained organic or attached force protection specialists. CA/CMO planners support the force protection plan by integrating CA operations into the plan and sharing information contained in routine CA reports. While subordinate units and teams comply with the senior commander's force protection plan, they also augment the plan by planning at their own level to account for nuances specific to their AO and operations. For example, a CMOC operating outside the security perimeter of a supported unit may require additional force protection considerations than the CMOC inside the perimeter. 5-109. CA soldiers planning force protection operations follow basic security planning steps and principles. The following steps and principles apply whether planning at the individual or team level or the supported force level:
These steps and principles also apply to CA teams conducting mobile operations or operating from a fixed site. The CA teams are focused not only on terrorist threats, but on all threats. |
|
Threat Assessment | |
5-110. The first step in developing a force protection program is to identify and characterize the potential threats to the force. Understanding the threat enables CA soldiers to assess their vulnerability to attack and to develop effective protective and response measures. The following is an overview of the elements within a threat assessment. 5-111. Threat Identification. CA soldiers identify threats from the civil component during preliminary and deliberate assessments. Their analysis of the situation using CASCOPE yields potential threats to the force from CASCOPE. Examples of threats for each of the CASCOPE factors are as follows:
5-112. When considering terrorists or other human threats, threat identification focuses on three components: aggressors; tools, weapons, and explosives; and tactics.
Aggressors may use the first three objectives to accomplish the fourth.
5-113. Threat Definition. Once the threat is identified, the CA soldier determines the negative effects of the threat on the force. For example-
5-114. Terrorists operate in a clandestine mode, so the information needed to define and analyze a terrorist threat is often more difficult to acquire than information dealing with less esoteric military threats. To build a composite picture of threat conditions, police and intelligence personnel gather information from numerous sources, such as newspapers, criminal records, government records, local organizations and people, and other intelligence organizations. As outlined in DOD Handbook O-2000.12-H, DOD has identified six factors to be used in the collection and analysis of information from all sources bearing a terrorist threat:
5-115. Each of the Services maintains its own terrorist threat analysis capability. Differences in perspective among DIA, Services, or combatant command threat analysis may lead to divergent conclusions about specific terrorist threats. While the threat to all DOD assets in a country may be at one level, the local commander may decide it faces no threat or a greater threat of terrorism in the country or locale in question. 5-116. Threat Level. Force protection planning responds to the threat level. The threat level for an area is determined after information on the threat factors is gathered and analyzed. The greater the presence of threat factors, the higher the threat level. Five of the six factors are used together to define the threat level; the sixth, security considerations, is used separately as a modifying factor. Table 5-2 depicts the relationships of the threat factors and threat levels. (Additional information is in DOD Handbook O-2000.12-H, Chapter 5.) |
Table 5-2. DOD-Level Determination of Terrorist Threat Level
Threat Level |
Threat Analysis Factors |
|||||
Existence |
Capability |
History |
Intentions |
Targeting |
||
Critical | a |
a |
b |
b |
b |
|
High | a |
a |
a |
a |
||
Medium | a |
a |
a |
b |
||
Low | a |
a |
b |
|||
Negligible | b |
b |
||||
a - Factor must be present | b - Factor may or may not be present |
5-117. Unit commanders rely on local intelligence and counterintelligence personnel to provide warnings and indicators about specific and general threats to the installations, resources, and personnel. The Federal Bureau of Investigation (FBI) determines threat levels in CONUS, and DIA determines threat levels OCONUS for DOD installations. Commanders at all levels establish the FPCONs mentioned above based on the FBI or DIA threat level and locally developed information. This information, coupled with the vulnerability assessment discussed in the following section, will influence decisions as to which force protection measures are applied to installation assets. |
|
VULNERABILITY ASSESSMENT | |
5-118. A vulnerability assessment addresses the susceptibility of the force to the threats identified during the threat assessment. A vulnerability assessment applies to fixed sites as well as to mobile operations. It is an ongoing process that includes all three components of threat assessment. This very essential step helps to identify and prioritize the resources required to defeat the threat, providing a basis for determining antiterrorism measures that can protect personnel and assets from terrorist attacks. 5-119. A vulnerability assessment looks at several aspects of security related to the force and its operations. These aspects include-
5-120. During the vulnerability assessment, CA soldiers identify any shortcomings in each of these areas as they apply to team or site operations. DOD Handbook O-2000.12-H contains guidelines and sample survey checklists that can be applied to a CA/CMO vulnerability assessment. 5-121. The results of the vulnerability assessment are evaluated against the type of threat and identified threat level to determine the appropriate level of protection. Figure 5-3 shows the steps to conduct a vulnerability assessment. |
Figure 5-3. Steps to Conduct a Vulnerability Assessment
DETERMINE APPROPRIATE COUNTERMEASURES | |
5-122. Countermeasures are those measures taken by a unit or individual to counter a specific threat at a specific time and place. Countermeasures take many forms. They include specialized procedures, personal equipment, unit or team equipment, facilities, and training. They may require reorganization of land use, reorientation of roadways, security improvements to installation entries, and improvements to existing structures and the surrounding site area. They may also require the creation of specialized elements that are task-organized to mitigate threats, respond to threats, and recover from the aftermath of threats.
5-123. Some threats may require the identification of multiple scenarios, or alternatives, for achieving the desired goal. All alternatives should undergo a suitability analysis, which takes into account factors that may limit the feasibility of an action or project. Limiting factors consist of physical, resource, and political constraints, such as land area restrictions, limited availability of construction materials, and HN or civilian sensitivities. 5-124. Examples of threat-specific countermeasures for CA/CMO are in Table 5-3. |
Table 5-3. Examples of Threat-Specific Countermeasures
Threat ID |
Threat Definition |
Threat Level |
Countermeasure |
Civil Areas | |||
Criminal enclave. | History of criminal violence against passers-through. | High | Mitigation-Travel according to supported unit force protection guidelines (2-man rule, 2-vehicle rule). Maintain situational awareness, weapons security, and radio contact with base unit. Identify patterns and methods of operation. |
Response-Follow mission ROE. Notify base unit. Identify characteristics, personalities, and methods used by hostiles. | |||
Recovery-Return to base. Report any compromised information or equipment. Debrief. Refine policies, as necessary. | |||
Structures | |||
Chemical processes on adjacent property. | Hazardous chemicals may spill, explode, or pollute the air. | Low-Medium | Mitigation-Identify HAZMAT areas and pertinent safety precautions. Monitor HAZMAT situation. Coordinate with local and military HAZMAT managers to identify response plans and agency capabilities. |
Response-Follow approved response plans. Report all information to base unit. | |||
Recovery-Coordinate for cooperation and assistance between organizations involved. Review response plans. Refine response plans, as necessary. Assist in upgrading response capabilities. | |||
Capabilities | |||
Local militia or hostile community. | Capability to organize and mobilize rapidly when provoked. | Low |
Mitigation-Identify what provokes the community to become hostile or to mobilize the militia. Train the force in how not to provoke the community. Establish positive relationship with militia, political, law enforcement, and other leaders. Engage the populace with normal CA activities. Establish a plan that includes assistance from local authorities. |
Response-Follow approved response plans. Perform as liaison between supported unit and local authorities to help diffuse the situation. Maintain awareness of personal security situation. Report all information to base unit. | |||
Recovery-Conduct projects or other activities to reestablish or enhance a positive relationship between the force and the community. Refine response plans, as necessary. | |||
Organizations | |||
Terrorist organization. | History of truck/boat bombings against U.S. targets in region. | Critical |
Mitigation-Engage the populace with normal CA activities. Travel according to supported unit force protection guidelines (2 man rule, 2 vehicle rule). Maintain situational awareness, weapons security, and radio contact with base unit. Observe indicators among populace, such as excessive interest in military activities, unexplained or suspicious cancellation of civilian activities, and unusual movement of vehicles, materials, or people. Report observations to appropriate channels. |
Response-Take a protective posture according to unit SOP. Notify base unit. Identify characteristics, personalities, and methods used by aggressors. | |||
Recovery-Assist investigators as liaison between supported unit and local authorities. Refine SOP, as necessary. | |||
People | |||
Thieves. | Penetration of military facilities, vehicles, or personal space for equipment/ information. | Critical |
Mitigation-Employ strict PHYSEC, OPSEC, and PERSEC measures. Maintain situational awareness. Keep civilians no closer than one-arm distance from soldiers. |
Recovery-Prosecute thieves according to appropriate law. Publicize incident through PSYOP and public information assets. Hold meeting with local authorities or public forum to discuss the implications of stealing equipment or information from military forces. Get commitment from local authorities to prevent future incidents. | |||
Events | |||
Disease. | Sickness caused by poor sanitary conditions among populace. | Medium |
Mitigation-Conduct early assessments of local conditions in coordination with preventive medical assets, if available. Conduct training programs for locals, possibly as MCA projects, to correct deficiencies. Coordinate with local health officials, NGOs, and international organizations. |
Response-Notify base unit. Coordinate with military and local medical agencies. Implement containment, treatment, and clean-up plans. | |||
Recovery-Assess results of containment, treatment, and clean-up plans. Continue and modify, as necessary. Train the populace in sanitation procedures. |
5-125. CA soldiers must keep in mind that countermeasures are most effective when endorsed by the commander, understood by all participants, war-gamed, written into operations and contingency plans, resourced, and exercised or rehearsed. Failure to achieve any of these reduces the chance a countermeasure will succeed. |
|
IMPLEMENT COUNTERMEASURES | |
5-126. Countermeasures must be implemented as soon as possible after a threat has been identified. The least costly and often the most effective protection measures are those incorporated during the planning phase. Implementing appropriate force protection measures at the planning stage can preclude the need for piecemeal and costly security enhancements later on. |
|
EVALUATE EFFECTIVENESS OF THE COUNTERMEASURES | |
5-127. Over time, threats change as situations change. Countermeasures that may have been effective one day may no longer be effective today. As CA soldiers conduct continuous assessments, they reevaluate the threat and the countermeasures arrayed against the threat. They develop new countermeasures as old ones are determined to be no longer effective. As before, they ensure the new countermeasures are endorsed by the commander, understood by all participants, war-gamed, written into operations and contingency plans, resourced, and exercised or rehearsed. |
|
PRODUCTS OF THE DEVELOP AND DETECT PHASE |
|
5-128. The products of this phase are both tangible and intangible. They include working relationships and rapport with nonmilitary participants in an operation; detailed deliberate assessments; and CA/CMO briefings and reports. 5-129. The duration of the develop and detect phase will vary based on the factors of METT-TC. The briefings and reports produced during this phase influence the timing of, and activities implemented during, the execute phase. 5-130. Commanders and senior civilian leaders make decisions based on the information provided to them by their subordinate commanders and staff members. This information is presented formally in the form of briefings and reports. Briefings are presented orally and may include an orientation to maps, diagrams, charts, photos, or other documents that improve the commander's understanding of the information. Reports are presented in written form and usually follow an approved format. They are stand-alone documents that serve as historical records. As such, reports contain as much detail as possible of the events about which they are written. 5-131. CA officers and senior NCOs are adept at conducting briefings and writing reports. Formats for briefings and reports are found in Appendixes C and D. The following are examples of the types of briefings and reports CA personnel use to present CA/CMO information:
|
|
CA/CMO BRIEFINGS | |
5-132. The capabilities briefing to the supported commander or senior civilian leader is tailored to the situation. A thorough briefing would generally contain the following information:
5-133. A current CA/CMO briefing, such as that given during the BUB or TOC shift-change, provides a "snapshot" of CA activities and CMO conducted during a specified period of time. Using the principles of CASCOPE, a typical briefing might be organized as follows:
5-134. An effective briefing technique is to use overlays, sector sketches, and execution matrixes that demonstrate how CA activities and CMO are integrated into the supported organization's scheme of maneuver or action plan. These can be depicted on a CA support matrix. An example of this technique is contained in Appendix C. |
|
CA/CMO REPORTS | |
5-135. Reports contain information that is essential to the military decision-making process at all levels of command. Detailed, accurate, and timely reports help planners create appropriate and realistic COAs that, in turn, help commanders make informed decisions. 5-136. Reports vary in their submission requirements. Some reports are periodic (daily, weekly, and monthly situation updates), some are routine (upon completion of an action such as an area assessment, a site visit, or a coordination meeting), and some are time-sensitive (serious incident reports). 5-137. All reports must be handled in a manner appropriate to their classification (Top Secret, Secret, Confidential, or Unclassified). They are disseminated according to unit SOP, usually to all parties that have an interest in and are granted a need-to-know status on the reported information. The following list provides examples of the various means by which reports may be transmitted:
5-138. Figure 5-4, shows a typical dissemination of CA reports that contain information pertinent to multiple organizations and agencies. This figure also describes the routing of requests for information or assistance. The diagram assumes operations in a digital environment. |
Figure 5-4. Typical Dissemination of CA Reports and Requests for Information or Assistance
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|