USAIC&FH SO AD01425
FEB 95

PROCESSING OF ALL SOURCE INTELLIGENCE

1. In the intelligence cycle, processing comes after collection and before production. Through processing, situation and target development occur and all-source intelligence is provided to the tactical commander. The objective of information processing is to:

a. Answer the commanders requirements (PIR/IR) regarding threat movers, shooters, sitters, emitters, capabilities, vulnerabilities, probable courses of action, and intentions. We also include assessments of the weather and terrain in the area of operations and interest, better known as Situation Development.

b. Develop targeting data required for effective attack of movers, shooters, sitters and emitters.

2. Processing includes the following functions:

a. Recording
b. Evaluation
c. Analysis

3. RECORDING

a. Intelligence Journal: The journal is an official, permanent, and chronological record of reports and messages that have been received and transmitted, important events that have occurred, and actions taken in response. Accuracy and completeness are essential, since various elements of the headquarters will refer to it later. It covers a specific period of time, usually 24 hours. The journal is recorded on DA Form 1594, Daily Staff Journal or Duty Officer's Log.

b. SITMAP - The working situation map is the primary analytical tool at all echelons. It is a temporary graphic display of the current dispositions and major activities of the threat. Information about friendly forces on this map usually is limited to boundaries; locations of command posts (CPs) of higher, lower, and adjacent units; reconnaissance units; the forward edge of the battlefield (FEBA), and forward line of own troops (FLOT). The level of detail of the working SITMAP will be proportionate to the echelon at which it is maintained.

c. Intelligence Workbook - Contains information arranged by subject heading. This arrangement helps to sort, evaluate, interpret information, and prepare intelligence reports. It is not a permanent record and it is not distributed to an outside agency. This workbook is kept current with obsolete entries deleted. There is no prescribed format for the workbook. A message that furnishes information on different subjects, results in several entries.

d. Intelligence Files: Intelligence files permit ready access to available information. The files most commonly maintained are: journal files, reference files, and OB files.
1) Journal File - The journal file contains all previously recorded journal sheets and supporting materials.

2) Reference File - The reference file includes all information that is not of immediate interest, but may be of future value. Information is cross-indexed to permit easy retrieval.

3) Order of Battle Files - Order of Battle is the identification, strength, command structure, and disposition of the personnel, units, and equipment of any military force. Order of Battle is known, collected information about a military force. It often is incomplete because we may not have collected some of the information on that force. It may also contradict doctrine because not all units organized as per their doctrine. OB consists of evaluated information on:

a) Composition
b) Disposition (usually posted on SITMAP or overlay)
c) Strength
d) Training status
e) Tactics
f) Logistics
g) Combat Effectiveness
h) Electronic Technical Data
i) Miscellaneous Data

OB files may include personality files, installation files, organizational files, and strength files. In addition to the files, OB may bee organized into ground, air or electronic order of battle.

e. Coordinates Register - The coordinates register is a recording device primarily designed to provide the brigade and lower echelon intelligence officer with a means of noting intelligence associated with specific areas. It graphically illustrates the situation over a small geographical area. The register is usually a looseleaf notebook. Each page represents a single grid square on the operational map which covers the geographical AO and AI.

4. EVALUATION - Includes determining the pertinence of information, the reliability of the source or agency through which the information was derived and its credibility. Information which relates to the unit's AO and AI id pertinent; Information relating to areas outside the area of interest may or may not be pertinent. The brigade and battalion S2 may not be able to judge the reliability of a source because the S2 may not have repetitive contact with that source. The difference between higher and lower echelons is information received from higher headquarters normally has been processed, evaluated, and interpreted.

a. Pertinence: The examination of information for pertinence specifically determines whether the information is:

(1) Pertinent with regard to the threat or the characteristics of the area of interest.
(2) Needed immediately, and if so, by who?
(3) Of possible present or future value, and if so, by who?
(4) Of no apparent value.

b. Reliability of the source/agency - Page 2-15, FM 34-3

c. Credibility of the source/agency - Page 2-15, FM 34-3

d. Determination of reliability and credibility or accuracy are considered independently, but are used together in establishing an overall rating. The rating would be expressed in a letter-number combination.

5. ANALYSIS is the transforming of information into intelligence. It consist of three steps:

a. ASSESSMENT
b. INTEGRATION
c. DEDUCTION

(1) ASSESSMENT - Is sifting and sorting of evaluated information to isolate significant elements.

(2) INTEGRATION - Is the combination of isolated significant elements other known information to form a logical picture or hypothesis of threat activity.

(3) DEDUCTION - Is drawing meaning from a confirmed/denied hypothesis; it is designed to answer the question: What does this information mean in relation to the projected the threat situation?

- Analysis required judgement and a through knowledge of the principles of military operations, the characteristics of the area of interest, and the threat situation, to include threat doctrine and past practices.

- Threat indicators are key. Indicators are any positive or negative evidence of threat activity or any characteristic of the area of interest that points toward threat capabilities, vulnerabilities or intentions. In-depth knowledge of threat capabilities will assist you in the analysis.