Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
  • Salesforce
Menu

IT0560, The Collection Effort

Posted on September 25, 2018November 23, 2019 by Dustin

Table of Contents

Introduction

IT0560, The Collection Effort is an intelligence analyst subcourse, part of the Advanced Intelligence Analysis Course. This course describes the Intelligence Cycle.

Learning Objectives

  • To be able to properly prepare the intelligence annex and collection plan and be able to describe the steps in the collection cycle. You will also be able to distinguish between agencies and sources
  • To be able to identify, prioritize and refine uncertainties concerning the threat and the battlefield environment that a command must resolve to accomplish the mission
  • To be able to identify the collectors available to you and which of those are best equipped to collect the information for the mission
  • Implement the collection plan through execution of system specific
    tasking or request mechanisms
  • Describe the information and procedures required to disseminate
    intelligence reports
  • Maintain status of each intelligence requirement and synchronization of the intelligence systems

Collection Management

  • The Intelligence Cycle describes the process to collect and analyze intelligence
  • Intelligence preparation of the battlefield (IPB) is the primary intelligence task which helps the G2 (S2) focus and decide what intelligence should be collected
  • Collection management is the set of procedures that orchestrate Intelligence System of Systems (ISOS) organizations and systems to focus the intelligence effort in support of warfighting and stability and support operations (SASO)
  • Collection Management contains 3 subtasks:
    • Requirements Management (RM) defines what to collect, when, and where
    • Mission Management (MM) defines how to employ collection resources to satisfy requirements
    • Asset Management (AM) executes collection and/or exploitation in accordance with collection plan requirements and tasking. AM combines the “what, when and where” to collect from the RM “how” from MM, and executes the collection mission with specific assets and resources
  • Collection Management consists of six steps:
    • Develop collection plan
    • Task or request collection
    • Disseminate
    • Evaluate reporting
    • Update collection planning

Develop Requirements

  • Wargaming: Units generate intelligence requirements through staff wargaming. Intelligence officers role play the enemy commander using enemy course of actions (COAs) developed during the intelligence preparation of the battlefield (IPB) process
  • Collection managers should participate in wargaming to direct intelligence collection needs (what information you need)
  • Wargamers often discuss the specific intelligence that will and will not
    support each decision
  • Participating in staff wargaming allows the collection manager to fully
    integrate the CM process into the decision-making process
  • Develop Requirements
    • To ensure the most effective use of assets, first analyze each requirement
      to determine the best way to satisfy it. Sometimes this does not require
      collection activity. Often a newly requested requirement can be satisfied by
      intelligence already in the data base or duplicates one that has already been
      processed
    • Next, validate requirements
      • Feasibility: is this something that can be answered timely with existing assets?
      • Completeness: should indicate what, where, when, why, who
      • Do you need to collect it or do you already have the information?
    • Collection requirements should be specific and justified; a time where the intelligence will be useful should be specified where possible
  • Specific Information Requirements
    • Identifying the sets of specific information that will provide
      an answer to each intelligence requirement
    • SIRs break requirements into smaller, more specific questions which, when
      answered, can satisfy the larger intelligence requirement
    • SIRs describe what
      information is required, where on the battlefield it can be obtained, and when it is to be answered. SIRs are as detailed as possible

Develop Collection Plan

  • A collection strategy and employment scheme that will produce the
    intelligence required to effectively answer the command’s intelligence
    requirements.
  • Success results in synchronization of intelligence collection with the command’s COA through effective use of collection assets at the right time and place on the battlefield.
  • Failure results in waste of time, effort, and potential loss of resources
  • Necessary to understand intelligence asset:
    • Availability (are HUMINT assets busy right now?)
    • Capability (what can existing IMINT or SIGINT tell us?)
    • Vulnerability (what are the limits of our intelligence collectors?)
    • Performance History (have they performed adequately in the past for this type of collection?)
  • Develop Collection Strategy
    • Select Resources
    • Synchronize Collection to Requirements (ensure collection matches information desired by command)
    • Prioritize Specific Orders and Requests (SORs)

Task or Request Collection

  • Three Tasks
    • Determine Tasking or Request Mechanism (determine what you need to collect)
    • Execute and Implement (begin the collection)
    • Collection and Exploit (identify the desired intelligence, exploit it on the battlefield)

Disseminate Intelligence Report

  • To ensure proper dissemination, ensure direct dissemination to the proper user
  • Direct dissemination is especially important for intelligence that supports
    targeting efforts
  • Even with direct dissemination, you must arrange a system that allows you
    to track the status of each request
  • Sometimes direct dissemination is impossible due to communications system
    limitations or the classification level of the intelligence. Using the steps
    which follow below, arrange for dissemination that is as direct as possible
  • Dissemination Process:
    • Determine the time sensitivity of each report to make decisions about the best means of dissemination
    • Identify users who requested or would benefit from the intelligence
    • Perform hindsight war-gaming, distribute intelligence to anyone:
      • If an intelligence user failed to anticipate the event the intelligence indicates
      • If the user would have established a decision point (DP) based on that intelligence, had he anticipated it.
      • If the intelligence will cause the user to modify a COA, or select a branch or sequel to a COA
    • Determine how much to disseminate
      • Evaluate each element of reported information against the decisions, requirements, and supporting SIRs and SORs for the identified consumer
    • Identify Method of Dissemination:
      • When disseminating relatively small amounts of information, use a combination of voice, graphics, and text deliveries
      • Optimal mix is graphics or text with follow-up voice conference for clarification

Evaluate Reporting

  • Determine whether collected intelligence satisfied SOR
  • Provide feedback to collectors and exploiters (what intelligence remains to be collected?)

Bibliography

IT0560, The Collection Effort. (1998). United States Army.

 

1 thought on “IT0560, The Collection Effort”

  1. Pingback: Advanced Intelligence Analyst Course - Dustin K MacDonald

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance information technology intelligence intelligence analysis keokuk county language learning legal management peer support personal development phd politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training university of the cumberlands violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • ITS833 Information Governance
  • Enhanced Care Management (ECM) with Salesforce
  • ITS835 Enterprise Risk Management
  • Glorifind Christian Search Engine
  • Sigourney Iowa Election Results, 2023

Archives

  • November 2023 (6)
  • October 2023 (1)
  • September 2023 (3)
  • August 2023 (1)
  • July 2023 (1)
  • May 2023 (1)
  • March 2023 (1)
  • February 2023 (2)
  • January 2023 (4)
  • December 2022 (2)
  • May 2022 (1)
  • April 2022 (2)
  • March 2022 (1)
  • February 2022 (1)
  • December 2021 (1)
  • October 2021 (1)
  • August 2021 (2)
  • May 2021 (3)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • Dustin on Starting a Crisis Line or Hotline
  • HAPPINESSHEALTHCOURAGE, LLC on Starting a Crisis Line or Hotline
  • ITS833 Information Governance - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology
  • Elected Officials in Sigourney, Iowa - Dustin K MacDonald on Sigourney Iowa Election Results, 2023
  • ITS 835 Enterprise Risk Management - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology

Tags

analytical technique assessment communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance information technology intelligence intelligence analysis keokuk county language learning legal management peer support personal development phd politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training university of the cumberlands violence risk assessment youth
© 2023 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme