jieddo atn lexicon
TRANSCRIPT
-
8/13/2019 Jieddo Atn Lexicon
1/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Attack the Network Lexicon
May 2011
UNCLASSIFIED//FOR OFFICIAL USE ONLYThis document is approved for release to ISAF, NATO, GCTF.
-
8/13/2019 Jieddo Atn Lexicon
2/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
DISTRIBUTION STATEMENT D. Distribution authorized to theDepartment of Defense and U.S. DoD contractors only (DeputySecretary of Defense Memorandum dated April 2006, Policy onDiscussion of IEDs and IED-Defeat Efforts in Open Sources)(20110524), FOIA Exemption 2 applies. Disclosure and release ofthis document is authorized to ISAF and GCTF coalitions and NATO
UNCLASSIFIED//FOR OFFICIAL USE ONLY
.
Organization, J5 Division. Provision of this information does notimply a commitment on the part of the United States government tofurnish, transfer, or export information or equipment referred toherein.
-
8/13/2019 Jieddo Atn Lexicon
3/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Attack the Network Lexicon
INTRODUCTION
UNCLASSIFIED//FOR OFFICIAL USE ONLY3
-
8/13/2019 Jieddo Atn Lexicon
4/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
INTRODUCTIONThis first edition of the Attack the Network (AtN) Lexicon was
produced by the Joint Improvised Explosive Device DefeatOrganization (JIEDDO). The lexicon contents were developedafter extensive interviews with military units who successfullyemployed AtN principles and practices to reduce the number and
effectiveness of Improvised Explosive Devices (IEDs) in theCounter-Insurgency (COIN) environment where they encounteredmultiple and sometimes interconnected adversary networks. Thelexicon contents were further developed and refined by subjectmatter experts from over fifty organizations across theDepartments of Defense, Justice, and Homeland Security.
Attack the Network (AtN) Lexicon
SCOPEWhile the original requirements and applications that led to
the creation of this AtN Lexicon involved IED networks in the COINenvironment, the terminology herein is not limited to that particularAtN application. The AtN Lexicon provides terminology commonlyused to attack networks in a more generic sense so that this
document can be used for AtN in any application domain (IED,drug, criminal, insurgent, etc.)
APPROACHThis lexicon is intended to be a living document that is updated to
reflect changes in the state of the art for AtN principles and practices.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
PURPOSE
This lexicon is intended to provide a common operationalvocabulary across the many organizations and technical/militarydisciplines who must coordinate their efforts to successfully attackthe many different varieties of adversary networks. Adoption andwidespread use of the terms in this lexicon will improveinformation exchange among AtN practitioners at the tactical,operational, and strategic levels. This lexicon will:
Standardize reporting and improve database contentmanagement
Enable AtN-related education and training
Serve as an information resource for staffs preparing toenter an AtN operational environment
Support the harmonization and development of AtN policyand doctrine
(printed or electronic) of the most current version of theAttack the Network Lexicon can be submitted to:
4
The field guide will be posted and available to download and
print from https://jknife.jieddo.dod.mil, under the C-IED
References tab. It will also be available on BICES at http://knife.act.nato.int/portal under C-IED Information and on the
Afghan Mission Network on the CENTRIXS-ISAF site http://
www.jknife.usa.isaf.cmil.mil under C-IED Resources/CIED
References.
-
8/13/2019 Jieddo Atn Lexicon
5/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
CONTENTS
UNDERSTAND THE MISSION
UNDERSTAND THE OPERATIONALENVIRONMENT
10
18
GENERAL TERMS 6 ENGAGE THE NETWORKS 78
89ASSESS
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNDERSTAND THE NETWORKS
ORGANIZE FOR THE FIGHT
27
50
5
-
8/13/2019 Jieddo Atn Lexicon
6/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
AtN Lexicon: Construct
Understand theCommanders Intent
Understand the Campaign
Attack
Area of Interest
Area of Responsibility
Analyze the Network
Understand NetworkConcepts
Understand the Mission
Understand the OperationalEnvironment
Understand the Networks
UNCLASSIFIED//FOR OFFICIAL USE ONLY
theNetwork
ID Staff Requirements
Prepare the Organization
Monitor
Influence Neutral Networks
Support Friendly Networks
Neutralize Threat Networks
EvaluateAssess
Organize for the Fight
Engage the Networks
6
-
8/13/2019 Jieddo Atn Lexicon
7/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
GENERAL TERMS
Attack the Network (AtN)This line of operation (LOO) consists oflethal and nonlethal actions andoperations against networks conducted
continuously and simultaneously atmultiple levels (tactical, operational, andstrategic) that capitalize on, or create,
key vulnerabilities and disrupt activitiesto eliminate the enemy's ability tofunction in order to enable success of theoperation or campaign.
Understand the Mission
AtN Lexicon: GENERAL TERMS
Understand the OperationalEnvironment (OE)Understanding the operational
environment is to comprehend thecomposite of the conditions,circumstances, and influences that affectthe employment of capabilities and bear
on the decisions of the commander.
Understand the Networks
Understanding the network or local cellsmeans having an appreciation for thenature of adaptive networked threats,
Engage the NetworksTo engage the networks is to uselethal and nonlethal means tosupport, influence, or neutralizenetwork members or cells or an entirenetwork.
AssessTo measure continuously the overalleffectiveness of employing joint forcecapabilities during military operations.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
To place AtN operations in the broader
operational context in which they areconducted. It has two components:Understanding the Campaign (i.e. thebroader objectives that are trying to beachieved) and Understanding theCommander's Intent (i.e. the immediate
objectives of current and planned
operations) AtN operations must bedevised to reinforce and support bothcomponents of the mission.
, , ,
and purpose.
Organize for the Fight
Organize for the fight is to identify,organize and direct the resources(personnel, tools and equipment) that areneeded to facilitate attack the network
operations.
7
-
8/13/2019 Jieddo Atn Lexicon
8/99
-
8/13/2019 Jieddo Atn Lexicon
9/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
AtN Lexicon: GENERAL TERMS
RaidsRaids are operations to temporarily seizean area in order to secure information,confuse an adversary, capture personnelor equipment, or to destroy a capability. Itends with a planned withdrawal uponcompletion of the assigned mission.
Show of ForceA show of forces is an operationdesigned to demonstrate US resolve thatinvolves increased visibility of USdeployed forces in an attempt to defuse
Protection of Shipping OperationsProtection of shipping is the use ofproportionate force by US warships,military aircraft, and other forces, whennecessary for the protection of US flagvessels and aircraft, US citizens(whether embarked in US or foreign
vessels), and their property againstunlawful violence. This protection may beextended (consistent with internationallaw) to foreign flag vessels, aircraft, andpersons.
GENERAL TERMS
Recovery OperationsRecovery operations are actions taken tosearch for, locate, identify, recover, andreturn isolated personnel, humanremains, sensitive equipment, or itemscritical to national security.
Homeland DefenseHomeland defense is the protection ofUnited States sovereignty, territory,domestic population, and critical defenseinfrastructure against external threatsand aggression or other threats as
UNCLASSIFIED//FOR OFFICIAL USE ONLY
,
continue, may be detrimental to USinterests or national objectives.
Enforcement of Sanctions (PeaceEnforcement)Enforcement of sanctions is the
application of military force, or the threatof its use, normally pursuant tointernational authorization, to compelcompliance with resolutions or sanctionsdesigned to maintain or restore peaceand order.
.
Civil SupportCivil support is support by theDepartment of Defense to US civilauthorities for domestic emergencies,and for designated law enforcement and
other activities. Also known as DefenseSupport to Civil Authorities (DSCA).
StrikesStrikes are attacks to damage or destroyan objective or a capability.
9
-
8/13/2019 Jieddo Atn Lexicon
10/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
AtN Lexicon: GENERAL TERMS
Non-combatant EvacuationOperations (NEOS)Non-combatant evacuation operationsare planned actions by the Department
of State or other appropriate authority, inconjunction with the Department ofDefense, whereby noncombatants are
evacuated from foreign countries whentheir lives are endangered by war, civilunrest, or natural disaster to safe havensas designated by the Department of
State.
Decisive PointsA decisive point is a geographic place,specific key event, critical factor, orfunction that, when acted upon, allows
a commander to gain a markedadvantage over an adversary orcontributes materially to achieving
success.
Shaping OperationA shaping operation is an operation at
any echelon that creates andpreserves conditions for the success of
GENERAL TERMS
Freedom of Navigation OperationsFreedom of navigation operations are
planned actions to demonstrate US orinternational rights to navigate air or searoutes.
Peace Operations
Peace operations are organized actionsthat encompass multiagency and
multinational crisis response and limitedcontingency operations involving allinstruments of national power to containconflict, redress the peace, and shape
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Lines of operations are logical lines thatconnect actions on nodes and/ordecisive points related in time andpurpose with an objective(s).
Line of EffortA line of effort is a line that links multiple
tasks and missions using the logic ofpurposecause and effectto focusefforts toward establishing operational
and strategic conditions.
.
Sustaining OperationA sustaining operation is an operationat any echelon that enables the
decisive operation or shapingoperations by generating andmaintaining combat power.
reconciliation and rebuilding and facilitatethe transition to legitimate governance.Peace operations include peacekeeping,peace enforcement, peacemaking,peace building, and conflict preventionefforts.
10
-
8/13/2019 Jieddo Atn Lexicon
11/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understand the Mission
Understand the OperationalEnvironment
Six pillars of Attack the Network:
1
2
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Assess6
Understand the Networks3
Organize for the Fight4
Engage the Networks5
11
-
8/13/2019 Jieddo Atn Lexicon
12/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
To place AtN operations in the broader operational context in which theyare conducted. It has two components: Understanding the Campaign(i.e. the broader objectives that are trying to be achieved) andUnderstanding the Commander's Intent (i.e. the immediate objectives of
current and planned operations) AtN operations must be devised toreinforce and support both components of the mission.
UNDERSTAND THE MISSION1
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understand the MissionUnderstand the
Campaign
Understand theCommanders Intent
12
-
8/13/2019 Jieddo Atn Lexicon
13/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Commanders Guidance
Restated Mission
Understand the
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Commanders CriticalInformation Requirements
Friendly Forces
Information Requirement
Commanders Intent
13
-
8/13/2019 Jieddo Atn Lexicon
14/99
-
8/13/2019 Jieddo Atn Lexicon
15/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understand theCampaign
Major OperationsTraditional Warfare
Irregular Warfare
Counter Insurgency
Major Operations
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Support to Insurgency
Combating Terrorism
15
-
8/13/2019 Jieddo Atn Lexicon
16/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Deter
Shape
Seize Initiative
Full Spectrum
of OperationsDefensive Operations
Offensive Operations
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Stabilize
Enable Civil Authority
Stability Operations
16
-
8/13/2019 Jieddo Atn Lexicon
17/99
-
8/13/2019 Jieddo Atn Lexicon
18/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understand the Campaign
Defensive OperationsDefensive operations are combatoperations conducted to defeat anenemy attack, gain time, economizeforces, and develop conditions favorablefor offensive or stability operations.
Stability OperationsStability operations encompass variousmilitary missions, tasks, and activitiesconducted outside the United States incoordination with other instruments ofnational power to maintain or reestablish
Seize InitiativeTo seize the initiative is to executeoffensive operations at the earliestpossible time, forcing the adversary tooffensive culmination and setting the
conditions for decisive operations.
DominateTo dominate is to break the enemys willfor organized resistance or, in noncombatsituations, to control the operationalenvironment. Success in this phase
depends upon overmatching joint force
UNCLASSIFIED//FOR OFFICIAL USE ONLY
,essential governmental services,emergency infrastructure reconstruction,and humanitarian relief.
ShapeTo shape is to conduct kinetic and/or
nonkinetic actions to manipulate enemyactivities.
DeterTo deter is to prevent undesirable actionby the adversary by demonstrating the
capabilities and resolve of the joint force.
.
StabilizeTo stabilize is to employ processes bywhich underlying tensions that might leadto resurgence in violence and a
breakdown in law and order aremanaged and reduced, while efforts aremade to support preconditions forsuccessful long-term development.
Enable Civil AuthorityTo enable civil authority in an operation
or campaign is to take those actions thatsupport legitimate civil governance intheater.
18
-
8/13/2019 Jieddo Atn Lexicon
19/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Six pillars of Attack the Network:
Understand the Mission1
Understand the OperationalEnvironment
2
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Assess6
Understand the Networks3
Organize for the Fight4
Engage the Networks5
19
-
8/13/2019 Jieddo Atn Lexicon
20/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understanding the operational environment (OE) is to comprehend the"composite of the conditions, circumstances, and influences that affect theemployment of capabilities and bear on the decisions of the commander.
UNDERSTAND THE OPERATIONAL
ENVIRONMENT2
Operational Variables
Area of Responsibility
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Mission VariablesUnderstand the
Operational Environment
rea o n eres
Area of Influence
Area of Operations
Historical Considerations
20
-
8/13/2019 Jieddo Atn Lexicon
21/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understand the OperationalEnvironment
Area of ResponsibilityAn area of responsibility is thegeographical area associated with acommand within which a commander hasauthority to plan and conduct operations.
Area of Interest
An Area of Interest (AOI) is an areabeyond the area of influence thatcontains forces and/or other factors thatcould jeopardize friendly missionaccomplishment. In combat operations,
the AOI normally extends into enemy
Area of OperationsAn area of operations is geographicalspace on the earth that is defined by thejoint force commander for land andmaritime forces. Areas of operation do
not typically encompass the entireoperational area of the joint force
commander, but should be large enoughfor component commanders toaccomplish their missions and protecttheir forces.
Operational Variables
Historical ConsiderationsHistorical considerations includesthe cultural norms, religious beliefs,and past military and politicalevents of a region as they impact
the adversary's capabilities andshould be considered in operational
planning.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
planned friendly operations if thoseobjectives are not currently located withinthe assigned operational area.
Area of Influence
An area of influence is a geographic areain which a commander can directlyinfluence operations by maneuver or fires
capabilities normally under thecommander's command or control. Thearea of influence normally surrounds and
includes the assigned operational area.
factors within an operational environmentor situation around which a unit, system,or individual is expected to operate andwhich may affect performance.
Mission VariablesMission variables are those aspects ofthe operational environment that directly
affect a mission. They consist of mission,enemy, terrain and weather, troops andsupport available, time available, and
civil considerations.
21
-
8/13/2019 Jieddo Atn Lexicon
22/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Political
Network FormationConditions
Economic
Military
Water
Receptive Audience
Accommodating
Environment
Catalyst of Leadership
Sewer
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Operational VariablesInfrastructure
Society
Information Transportation
Medical
Safety
Academics
Electricity
22
-
8/13/2019 Jieddo Atn Lexicon
23/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Operational Variables
Network Formation ConditionsNetwork formation conditions are those
existing state of affairs in the operationalenvironment that allow a series of directand indirect ties from one actor to acollection of others (a network) todevelop.
Receptive Audience
A receptive audience is a body ofpersons each of whom feels that he hassomething to gain by engaging in theactivities of the network.
Political (operational variable)Political variables are those operationalvariables that describe the distribution ofresponsibility and power at all levels ofgovernance.
Military (operational variable)
Military variables are those operationalvariables that include the militarycapabilities of all armed forces in a givenoperational environment.
Economic (operational variable)
WaterWater infrastructure refers to a source,means, or process of supplying water(as for a community) usually including
reservoirs, tunnels, and pipelines.
Electricity
Electricity infrastructure consists of thepower stations and conduits necessaryfor delivering electric power to a
society.
Academia
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Catalyst of Leadership
In the context of network formation acatalyst leader is a motivating personthat serves as an initiator for formation ofthe network. This can but does notnecessarily take the form of personalleadership by an individual(s).
Accommodating EnvironmentThe tangible elements (such asinfrastructure and terrain) and intangibleattributes (such as culture andgovernance) environment that arerequired for any network to form oroperate.
variables that encompass individual andgroup behaviors related to producing,distributing, and consuming resources.
Infrastructure
Infrastructure variables are thoseoperational variables that comprise thebasic facilities, services, and installations
needed for a societys functioning.
Sewer
Sewer infrastructure is an artificialusually subterranean conduit to carry offsewage and sometimes surface water(as from rainfall).
, ,world of teachers, schools, andeducation.
23
-
8/13/2019 Jieddo Atn Lexicon
24/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Operational Variables
TransportationThe range of infrastructure (rail, road, air,etc,) that moves people, property, andcommerce within a society. The natureand extent of this infrastructure and theimplications to AtN planning must be
understood when conducting operations.
MedicalThe range of professional services thatprovide medical care to a society. Thenature and extent of this infrastructureand the implications to AtN planning must
Information VariablesInformational variables are thoseoperational variables that wherebyindividuals, organizations, and systemscollect, process, disseminate, or act oninformation.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
operations.
SafetyThe range of services that protect thepeople in a society from fire and crime orthat respond to disasters. The nature
and extent of this infrastructure and theimplications to AtN planning must be
understood when conducting operations.
SocietalSocietal variables are those operational
variables that describes societies withinan operational environment. A society isa population whose members are subject
to the same political authority, occupy acommon territory, have a commonculture, and share a sense of identity.
24
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
25/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Mission
Network FormationConditions
Terrain and Weather
Enemy
Receptive Audience
Accommodating
Environment
Catalyst of Leadership
ASOPE
Structures
Areas
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Mission VariablesCivil Considerations
Troops
Time Available
District StabilityFramework
People
Events
Organizations
Capabilities
Historical Considerations
25
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
26/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Mission Variables
MissionIdentifying the mission before a militaryaction is to determine the task, togetherwith the purpose, that clearly indicatesthe action to be taken and the reasontherefore.
EnemyAn enemy is a party identified as hostileagainst which the use of force isauthorized.
Terrain and Weather
.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
a military action is to determine thenatural features (such as rivers andmountains) and man-made features(such as cities, airfields, and bridges)that will affect the mission as well as theeffect of the weather on the mission.
Civil Considerations
Civil considerations entails reflectingbefore the mission how the manmadeinfrastructure, civilian institutions, andattitudes and activities of the civilian
leaders, populations, and organizationswithin an area of operations will influencethe conduct of the mission. *The Marine
Corps does not recognize civilconsiderations as a mission variable. 26
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
27/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Mission Variables
ASCOPEASCOPE is a memory aid when makingcivil considerations during mission
analysis: areas, structures, capabilities,organizations, people, events .
Areas
Areas in the context of the memory aidASCOPE are localities or physicalterrains that have direct impact on the
population and its activities. Examplesinclude tribal regions, police districts,political boundaries, religious boundaries,
CapabilitiesCapabilities are key functions andservices. They include, but are notlimited to, administration, safety,emergency services, food distribution,agricultural systems, public works and
utilities, health, public transportation,
electricity, economics, and commerce.Sewage, water, electricity, trash, medical,and security (SWEAT-MS) are theessential services local authorities mustprovide.
EventsEvents in the context of the memoryaid ASCOPE are routine, cyclical,planned, or spontaneous activitiesthat significantly affect the operatingenvironment.
District Stability FrameworkThe District Stability Framework(formerly TCAPF) was a practicalframework designed to assistcommanders and their staffs identify
the causes of instability in an area of
UNCLASSIFIED//FOR OFFICIAL USE ONLY
, ,polling stations, and government centers.
Structures
Structures in the context of the memoryaid ASCOPE are existing importantinfrastructure. Examples includehospitals, bridges, communicationstowers, and power plants.
Organizations in the context of thememory aid ASCOPE are groups ofindividuals that have associatedthemselves around some purpose orinterest. They can be religious, fraternal,
criminal, media, patriotic or service, andcommunity watch groups. They includemedia, IGOs, NGOs, merchants,
squatters, and other groups.
PeoplePeople in the context of the memory aid
ASCOPE are all nonmilitary personnel inthe area of interest.
,diminish or mitigate them, andevaluate the effectiveness of theactivities in fostering stability.
27
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
28/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Mission Variables
District Stability FrameworkA practical framework designed to assistcommanders and their staffs identify thecauses of instability in an area of
operation, develop activities to diminishor mitigate them, and evaluate theeffectiveness of the activities in fostering
stability.
TroopsIdentifying the troops before a military
action is to determine the number, type,capabilities, and condition of available
Historical Considerations
Historical ConsiderationsHistorical considerations include thecultural norms, religious beliefs, and pastmilitary and political events of a region asthey impact the adversary's capabilitiesand should be considered in operational
planning.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
required for the given mission. Theseforces include resources from joint,interagency, multinational, host-nation,commercial (via contracting), and private
organizations. It also includes supportprovided by civilians.
Time Available
Identifying the time available before amilitary action is to assess the time
available for planning, preparing, andexecuting the mission. This includes thetime required to assemble, deploy, andmaneuver units to where they can bestmass the effects of combat power.
Includes time to plan and prepareoperations. 28
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
29/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Six pillars of Attack the Network:
Understand the OperationalEnvironment
2
Understand the Mission1
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Assess6
Organize for the Fight4
Engage the Networks5
n ers an e e wor s
29
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
30/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Understanding the network or local cells means having an appreciation forthe nature of adaptive networked threats, their structure, characteristics,dynamics, and purpose.
Understand the Networks3
Understand the
Understand NetworkConcepts
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Networks
na yze t e etwor
Categorize the Network
30
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
31/99
Understand the Networks
Understand Network ConceptsUnderstanding network concepts is thecomprehension of the generalcharacteristics of networks to includenetwork components, network structures,network dynamics, and related conceptsand terms.
Analyze the NetworkAnalyze the Network is the application ofanalytical techniques to produceintelligence that describes the friendly,neutral, and threat network goals,
'
UNCLASSIFIED//FOR OFFICIAL USE ONLY
, ,
understand the operational environmentin which they operate.
Categorize the NetworkCategorize the Network is the recognitionthat any network (particularly in aCounterinsurgency environment where
the people are the center of gravity) can
be considered to be friendly, neutral, or athreat .
31
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
32/99
SpecializedNetwork
CulturalNetwork
FamilyNetwork
Virtual Network
ProximityNetwork
Examples
UnderstandNetwork Concepts
Dyad
Cell
Node
Link
Components
UNCLASSIFIED//FOR OFFICIAL USE ONLY
RegenerativeSelf Organizing
Co-Adaptive Emergent
Non-Hierarchical
Hierarchical Blended
32
Network Structure
Network Density
Complex AdaptiveSystem
Characteristics
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
33/99
Understand NetworksConcepts
ComponentsNetwork components are the elementalparts of a network when graphicallymapping a social network.
Dyad
A dyad in a social network analysis
consists of two nodes and a single link.Individuals in a network are called actorsor nodes. (Actor and node are often usedinterchangeably.) The contacts betweennodes are called links. The basic element
of a social network graph is the dyad.
Family NetworkA family network is a series of direct andindirect ties among various actors thatbelong to the same family. These can becross-generational.
Cultural Network
A cultural network is a series of directand indirect associations among variousactors that belong to the same culture;that is, a shared language, religion,ideology, country of origin and/or senseof identity. Some of these networks may
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Cell
A cell in social network analysis consistsof a small group of individuals who worktogether for some common purpose.
NodeA node in social network analysis is anelement of a system that represents a
person, place, or physical thing.Individuals in a network are called actorsor nodes.
LinkA link in social network analysisrepresents the contacts between nodes
or actors.
proximity based.
Proximity NetworkA proximity network is a series of directand indirect associations among variousactors due to the geographical ties of its
members (ex. past bonding incorrectional or other institutions, or living
within specific regions orneighborhoods). Members may also forma network with proximity to an areastrategic to their criminal interests (ex. aneighborhood or key border entry point).
There may be a dominant ethnicity withinthe group, but they are primarily together
for geographical reasons.33
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
34/99
Understand NetworksConcepts
Virtual NetworkA virtual network is a series of direct andindirect associations among variousactors that may never physically meet,but work together through the Internet orother means of communication (ex.
networks involved in online fraud, theft or
money laundering).
Specialized NetworkIn a specialized network, individualscome together to undertake activities
primarily based on the skills, expertise or
HierarchicalHierarchical networks have a well-
defined vertical chain of command andresponsibility. Information flows up anddown organizational channels thatcorrespond to these vertical chains, butmay not move horizontally through the
organization. This is more traditional, andis common of groups that are well
established with a command and supportstructure. Hierarchical organizationsfeature greater specialization of functionsin their subordinate cells (support,
UNCLASSIFIED//FOR OFFICIAL USE ONLY
.
CharacteristicsCharacteristics of a human network arethe discernible physical, operational, andtechnical features of a human network.
Network StructureThe network structure shows how an
organization is connected, how itbehaves, and how its connectivity affectsits behavior. Network structure may be avariation of several basic nodal concepts,
a node being an individual, a cell,another networked organization, or evena hierarchical organization.
, .
Non-Hierarchical
Non-hierarchical networks are anydecentralized decision-making structure.
BlendedA blended network has a structure that isa combination of hierarchical and non-
Hierarchical organizations.
Network DensityA property of a network pertaining to thenumber of nodes connected within thenetwork.
34
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
35/99
Understand NetworksConcepts
Complex Adaptive SystemComplex adaptive systems consist ofmany diverse and autonomouscomponents or parts which areinterrelated, interdependent, and behave
as a unified whole in learning fromexperience and in adjusting to changesin the environment.
Co-AdaptiveSymbiotic systems adapt to somethingthat is adapting to it. These systems
must continually evolve to survive, and
RegenerativeA regenerative systems is a complex,adaptive system that can rebuild itselfafter attack. Removal of a single node
has minimal impact on the system as awhole.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
environment and the forces that counter
it.
Self Organizing
Self-organizing systems operate withouta central authority or external elementimposing structure upon it. This isbasically a bottom up developed
organization.
Emergent
Emergent systems displaycharacteristics that are ambiguous, thatcannot be anticipated from the propertiesof its components or parts.
35
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
36/99
Describe the Network
IntelligenceRequirements
Sources
Methods
Network Tools
Observables
UNCLASSIFIED//FOR OFFICIAL USE ONLY
na yze e e wor
Determine NAIs/TAIs
Signatures
Event Template
Event Matrix
eve op n ca ors
Signatures
ISR
36
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
37/99
Analyze the Network
Describe the NetworkAn act of characterizing and representinga network to others in words and picturesas accurately to reality as possible inorder to make estimates of the networkand to take actions against it. This is
done through various tools andrepeatable approaches.
Intelligence RequirementsIntelligence requirements (IRs) aredocumented needs for information thatwhen satisfied will fill a gap in the
'
Network ToolsNetwork tools are the various collectionand analytical systems that enable anetwork analyst to represent, analyze,
and make estimates on networks.
Develop Indicators
In intelligence usage, to developindicators is to collect information thatreflects the intention or capability of an
adversary to adopt or reject a course ofaction.
Determine NAIs/TAIsA Named Area of Interest (NAI) is thegeospatial area or systems node or linkagainst which information that willsatisfy a specific informationrequirement can be collected. A TargetArea of Interest (TAI) is thegeographical area where high-value
targets can be acquiredand engaged by friendly forces.
Event TemplateAn event template is a guide for
UNCLASSIFIED//FOR OFFICIAL USE ONLY
of the operational environment or threat
forces.
SourcesA source of intelligence is a person,thing, activity or agency from which
information is obtained.
MethodsMethods for describing the network arethe systematic procedures, analyticaltechniques, or modes of inquiry used to
characterize or represent a network.
Observables are indicators that can be
directly or indirectly observed throughcollection.
SignaturesSignatures are indicators that can beinferred through measurements.
.depicts the named areas of interest
where activity, or its lack of activity, willindicate which course of action theadversary has adopted.
Event MatrixA description of the indicators and
activity expected to occur in each
named area of interest. It normallycross-references each named area ofinterest and indicator with the timesthey are expected to occur and thecourses of action they will confirm ordeny. There is no prescribed format.
37
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
38/99
IntelligenceRequirements
Commanders Critical
Intelligence Requirement
Friendly ForcesIntelligence Requirement
Host Nation
Common Operational
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Priority IntelligenceRequirement
Intelligence Requirement
38
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
39/99
Intelligence Requirements
Host Nation Intelligence Requirement(HNIR)A Host Nation Intelligence Requirement(HNIR) is an intelligence requirement,stated as a priority for intelligencesupport, that the commander and staff
need answered to understand the hostnation's government, defense, orintelligence agencies or their respectiveactivities.
Priority Intelligence Requirements(PIR)
Commander's Critical InformationRequirement (CCIR)
See page 13.
Friendly Force Informationrequirement (FFIR)See page 13.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
are intelligence requirements that are
stated as a priority for intelligencesupport and that the commander andstaff need to understand the adversary orthe operational environment. They aresubordinate to or lower in priority than
Essential Elements of Information (EEIs).
Common Operational PictureA common operational picture (COP) is asingle identical display of relevantinformation shared by more than one
command. A common operational picturefacilitates collaborative planning andassists all echelons to achieve situational
awareness.39
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
40/99
Sources
DOMEX
PoliceIntelligence
CI
Forensics
MASINT
WTI
SIGNIT
GeospatialIntelligence
TECHINT
HUMINT
Biometrics
OperationsReporting
Examples
UNCLASSIFIED//FOR OFFICIAL USE ONLY
OSINT
40
-
8/13/2019 Jieddo Atn Lexicon
41/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
42/99
Sources
Counterintelligence (CI)Information gathered and activitiesconducted to protect against espionage,other intelligence activities, sabotage, orassassinations conducted by or on behalfof foreign governments or elementsthereof, foreign organizations, or foreign
persons, or international terroristactivities.
Operations ReportingOperations reporting is a source ofinformation generated in the prosecution
Document and Media Exploitation(DOMEX)The Document and Media Exploitation(DOMEX) center is responsible for therapid and accurate extraction,exploitation, and analysis of capturedenemy documents, media, and material
collected during operations.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
o operat ons.
BiometricsBiometrics is the process of recognizingan individual based on measurableanatomical, physiological, and behavioralcharacteristics.
Forensics
Forensics is the application of multi-disciplinary science capabilities toestablish facts.
42
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Examples
-
8/13/2019 Jieddo Atn Lexicon
43/99
FinanceInfrastructure
Disposition
Information/Intelligence
Members
Leaders
Logistics
Structure/Organization
Freedom ofMovement
Operations PopularSupport
Motivation
Communications
Pattern AnalysisPlot Sheet
Time-EventCritical Factors
Network Model
Pattern Analysis
Event/TrendPredictiveAnalysis
Examples
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Association Matrix
Activities Matrix
Link Diagram
IndividualComponent Nodal
ComponentFunctionalAnalysis
Analysis
Centers of Gravity
Critical
Vulnerabilities
CriticalRequirements
Critical Capabilities
Link Analysis
Network/NodalAnalysis
Social NetworkAnalysis
43
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
44/99
Methods
Critical Factors AnalysisCritical Factors Analysis is themethodical examination of the criticalcapabilities, critical requirements,
specific activities, observable andmeasureable indicators, and criticalvulnerabilities of an adversary.
Centers of GravityCenters of gravity are the sources of
power for an adversary that providemoral or physical strength, freedom ofaction, or will to act.
LeadersLeaders in a network refer to
individuals who exhibit thecharacteristics and the specificpersonalities of those with authority inthe network.
MembersMembers in a network refer to
individuals who exhibit thecharacteristics and the specificpersonalities of those serving in thenetwork.
Critical VulnerabilitiesCritical vulnerabilities are aspects of a
critical requirement that are deficient inan adversary or vulnerable to direct orindirect attack in him, which whenattacked will create decisive or significanteffects.
Network Model
Factors representative of a network thatcan be used as a framework to develop amodel of the network.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Critical CapabilitiesCritical capabilities are inherent abilitiesthat enable a CG to function as such.
Critical Capabilities provide the primarycapacity for achieving specific objectives.
Critical RequirementsCritical requirements are the essential
conditions, resources, and means for acritical capability to be fully operational.
Popular Support
The degree to which the network hasthe explicit or implicit backing of thepublic .
Structure/OrganizationThe composition of the networks(hierarchical, cellular, etc.).
DispositionThe geographic location of networkelements .
InfrastructureRefers to the physical facilities that a
network utilizes to conductoperations.
The series of actions carried out by the
members of a network that are directedtoward the objectives of the network.
Freedom of MovementThe conditions for or resources availableto a network that allows its actors tomove when and where it wants to.
MotivationMotivation in the network is the sourceand the degree to which leaders andmembers of the network are inspired tocontinue in the operations of the network.
44
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
45/99
Methods
LogisticsLogistics is the science of planning,preparing, executing, and assessing themovement and maintenance of forces.
CommunicationsCommunications refers to the kind and
quantity of assets that a network uses toexchange information; it also includesthe means by which it exchanges
information.
Information/Intelligence
FinanceFinance refers to the provision of venture
or financial capital to another individual,company, or organization, with theexpectation that the initial investedprincipal will be returned with interest, ora specified percentage rate of return; orthe provision of funding to anotherindividual, company, or organization; or
the provision of loans, trade credit, orsimilar financial instruments toindividuals, companies, or organizations;or the provision of any financial service
Pattern AnalysisThe use of prior actions and activitiesto identify trends in activities orbehaviors. Once identified, these
patterns can be used to predict futureenemy actions and to plan ISRactivities.
Pattern Analysis Plot SheetA pattern analysis plot sheets helps
distinguish patterns in activitiesassociated with particular days,dates, or times when they are
UNCLASSIFIED//FOR OFFICIAL USE ONLY
e ers o e n e gence sys em a anetwork exercises to include the sourcesit has, the means of collection andanalysis, and the persons engaged in the
intelligence enterprise.
, ,fund-raising, financing, payment, or
investment plans, actions, and activitiesby individuals, companies, ororganizations.
Event/Trend Predictive AnalysisEvent/trend, and predictive analysis arevarious analytical methods that attempt
to anticipate enemy behavior based onpast behavior.
.choose to modify this product to track
longer or shorter period asappropriate.
Time-Event ChartThe time event chart is achronological record of an individual'sor a group's activities. It is designed
to store and display large amounts ofinformation in as little space as
possible.
Link AnalysisLink analysis is an analytical methodfor determining the relationships
between critical personalities andmembers within their network.45
-
8/13/2019 Jieddo Atn Lexicon
46/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
47/99
UDOP/GoogleEarth
AnalystNotebook
IdentityInstacheck
WEBTAS
RFS Tracker
Web Threads
Data Tracker
ARC
Global NameRecognition
CELLPACK
GIS3D Dashboard
Examples
UNCLASSIFIED//FOR OFFICIAL USE ONLY
e wor oo s
CIDNE
ELISRD
Service ToolsOrganizationalRisk Analyzer
Palantir
AIS
GNRE
AXIS Pro
DetaineeTracker
Geo Browser
47
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
48/99
Network Tools
Analyst NotebookAnalyst Notebook is a commercial linkanalysis and visualization tool thatquickly turns large sets of disparate
information into high-quality andactionable intelligence to prevent crimeand terrorism.
RFS TrackerRFS Tracker is a database created in-
house at the JIEDDO COIC to documentand track requests for support from thewarfighter.
Organizational Risk AnalyzerOrganizational Risk Analyzer (ORA) is adynamic meta-network assessment andanalysis tool developed by CASOS atCarnegie Mellon. It contains hundreds ofsocial network, dynamic network metrics,trail metrics, procedures for grouping
nodes, identifying local patterns,
comparing and contrasting networks,groups, and individuals from a dynamicmeta-network perspective. ORA hasbeen used to examine how networkschange through space and time.
UDOP/Google EarthA JIEDDO/COIC data-mining tool
that supports the situationalawareness through the delivery ofproducts formatted for geospatialvisualization.
Identity InstacheckIdentify Instacheck is a COIC tool
that provides identity resolutionsupport and analysis by massingand fusing sources of contextualdata and results of biometric
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Global Name Recognition
The Global Name Recognition System isa commercial product used by the COIC
that constraints the best of breedtechnologies designed to addressspecific needs and demands ofmanaging, searching, analyzing, andcomparing multicultural name and data
fields.
Global Name Reference Encyclopedia
(GNRE)The Global Name ReferenceEncyclopedia (GNRE) is a JIEDDOCOIC tool that includes much of thedetailed information that one needs inorder to perform name analysis work on
networks.
Detainee TrackerThe Detainee Tracker is a JIEDDO COICtool that searches for intelligence onreleased detainees in order to discover
those actor who have reengaged on thebattlefield.
.
Data TrackerThe COIC tool is a web-deployable client application thatconverts tracking data in MSExcel format to Google Earth.
Service Tools
Service tools are the variouscollection and analytical systemsprocured by a service (Air Force,Navy, Army, or Marine Corps) thatenable a network analyst torepresent, analyze, and makeestimates on networks.
48
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
49/99
3D DashboardThe 3D Dashboard is a tool used by theJIEDDO COIC to view, navigate, andmark 3D map models.
AXIS ProAxis Pro is a JIEDDO COIC tool that
links entities to original data sources and
enables advanced queries of datacontained with separate link nodalprojects.
Combined Information Data Exchange
Network Tools
PalantirPalantir is a commercial tool used by theJIEDDO COIC that integrates, visualizes,and analyzes various data, to include
structured, unstructured, relational,temporal, and geospatial data.
ELISRDELISRD is an ISR analysis tool used bythe JIEDDO COIC that automatically
correlates ISR coverage with user drivenpoints of interest or key events in theaterto highlight "exploitation opportunities."
WebTASWebTAS is a Government Off-The-
Shelf (GOTS) software toolkitproviding visualization, integrationand analysis of disparate data in aService Oriented Architecture (SOA)compliant platform. Built using non-proprietary software, WebTAS
provides both Java thick client andweb browser-based access,visualization and analysis capabilities.
ARC/GIS
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Combined Information Data Exchange
Network (CIDNE) is the CENTCOM-directed reporting tool within Iraq andAfghanistan. CIDNE serves as theprimary bridge between disparatecommunities who might not otherwise
share data by providing a standardizedreporting framework across intelligence
and operations disciplines. This commonframework allows structured operationaland intelligence information to be sharedvertically and horizontally as part offlexible, user-defined workflow processes
that collect, correlate, aggregate andexpose information.
Web Threads
Web Threads is a JIEDDO COIC tool toassist Counter Threat and Force
Protection analysts corroborate humanintelligence reporting of Terrorist/Forceprotection threats through the fusion ofspace systems-generated data.
CELLPACKCELLPACK is a program used by the
JIEDDO COIC to analyze and data minea list of phone numbers in order to returnmultiple results as an HTML page.
rely on accurate geographic
information to make decisions. Itfacilitates collaboration and lets youeasily author data, maps, globes, andmodels on the desktop and servethem out for use on a desktop, in abrowser, or in the field, depending onthe needs of your organization.
49
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
50/99
Network Tools
Automated Information System (AIS)Automated Information System is anassembly of computer hardware,software, and/or firmware configured tocollect, create, communicate, compute,disseminate, process, store and/orcontrol data or information.
Geo BrowserGEO Browser is a tool used by theJIEDDO COIC for situational awarenessand data mining. The tool displays andcorrelates the COIC Multi-INT Core both
UNCLASSIFIED//FOR OFFICIAL USE ONLY
spat a y an tempora y.
50
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
51/99
ISRIdentify Collection
Requirements
External
Internal
Request forInformation
ISR Sync Matrix
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ISR Tasks
51
UNCLASSIFIED//FOR OFFICIAL USE ONLY
ISR
-
8/13/2019 Jieddo Atn Lexicon
52/99
ISR
Provide ISR collectionrecommendationsTo provide ISR collectionrecommendation is to make informed
suggestions to an authority on the propersequence and combination of ISRcollection assets based upon the missionat hand.
External ISR collection capabilities
External ISR collection capabilities arethose intelligence, surveillance anreconnaissance collection assets that are
Request for Information (RFI)A Request for Information (RFI) is anyspecific, time-sensitive, ad hocrequirement for intelligence informationor products to support an ongoing crisisor operation not necessarily related to
standing requirements or scheduledintelligence production. An RFI can be
initiated to respond to operationalrequirements and will be validated inaccordance with the combatantcommands procedures.
ISR Sync MatrixThe ISR sync matrix is a tool toplan and direct the collection effort.It may consist of a list of availablecollection means, plus brief notesor reminders on current intelligence
requirements and specificinformation to collect. The S-2
section initially prepares the ISRsynchronization matrix, which theISR working group completes, andthe S-3 authorizes as part of theISR plan.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
non-organ c o a un an mus erequested.
Internal ISR collection capabilities
Internal ISR collection capabilities arethose intelligence, surveillance andreconnaissance collection assets that areorganic or natural to a unit and thereforedo not have to be requested for their
utilization.
ISR tasks are the actions of the
intelligence collection effort. Theseactions synchronize or integrate theplanning and operation of sensors,assets, and processing, exploitation, anddissemination systems in direct support
of current and future operations.
52
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
53/99
Six pillars of Attack the Network:
Understand the Operational
Environment2
Understand the Networks3
Understand the Mission1
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Assess6
Engage the Networks5
Organize for the Fight4
53
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
54/99
Organize for the fight is to identify, organize and direct the resources(personnel, tools and equipment) that are needed to facilitate attack thenetwork operations.
ORGANIZE FOR THE FIGHT4
Training
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Organize for the Fight
Identify Staff Requirements
Prepare the Organization
Manning
Organize the Staff
Integrate Enablers
54
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Organize for the Fight
-
8/13/2019 Jieddo Atn Lexicon
55/99
Organize for the Fight
Prepare the Organization (forattacking the network)Preparing the organization is theplanning, training, organization andoutfitting of an organization with thepersonnel and capabilities necessary for
conducting attack the networkoperations.
Identify Staff RequirementsTo identify staff requirements is tocharacterize systematically and toquantify the skills and the training in
ManningManning is the analysis of the skills andtheir quantities in persons that areneeded for conducting a specific AtNoperation or it is the process ofidentifying and providing such manpower
for an operation.
Organize the StaffTo organize the staff is to define thestructure, roles, and responsibilities of aunit and its leadership in order to conduct
attack the network operations.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
staff to conduct attack the network
operations.
AtN TrainingAtN Training is the instruction ofpersonnel to enhance their capacity to
perform specific AtN functions and tasks.It is also the exercise of one or more
military units conducted to enhance theircombat readiness.
theater, division, and tactical levels
because their missions, theircomposition, and the enablers availableto them are different.
Integrate EnablersTo integrate enablers is to blendefficiently and effectively the necessary
organic and inorganic experts, tools, andmaterial for attack the networkoperations.
55
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
56/99
Training
Service Requirements
Skill Set/Professional
CCDR Requirements
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Military Education Gaps
Other Non-Military
56
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Training
-
8/13/2019 Jieddo Atn Lexicon
57/99
Training
CCDR Requirements (for training)
CCDR requirements are those skills ormaterials mandated by the CombatantCommand in anticipation of attack thenetwork operations in theater.
Service Requirements (for training)Service requirements are those skills or
materials mandated by the service (AirForce, Marine Corps, Army, or Navy) inanticipation of attack the networkoperations in theater.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Education Gaps
Identifying PME gaps is the deliberateidentification of those skills necessary forconducting attack the network operationsand the inventory of the unit's currentskills against those necessary skills.
Other Non-Military (training)
Other non-military training are thoseskills or materials that are not standardor typical for the military, but should beacquired in anticipation of attack the
network operations in theater (e.g.criminal forensic analysis).
57
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
58/99
Organize the Staff
Threat Working Group
Prosecution WorkingGroup
Fusion Cells
- -
AtN Lead
Division/MEF (Fwd)
Theater
UNCLASSIFIED//FOR OFFICIAL USE ONLY
arge ng oar(Lethal/Non-Lethal)
Assessment WorkingGroup
58
BCT/RCT
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Organize the Staff
-
8/13/2019 Jieddo Atn Lexicon
59/99
g
Organize the Theater Staff
Organize the theater staff is to define thestructure, roles, and responsibilities forthe theater-level staff in order to conductattack the network operations.
Organize Division StaffOrganizing the staff at the division-level
is to define the structure, roles, andresponsibilities for the division-level staffin order to conduct attack the networkoperations."
S-3 or Assistant S-3
The S-3 or Assistant S-3 is theoperations officer of a battalion orregiment that typically would direct AtNoperations for the unit.
Fusion Cells
Theater level fusion centers called the
Joint Intelligence Operations Center(JIOC), are a DoD and CombatantCommand (CCDR) level organization.The JIOC mission is to seamlesslyintegrate all DoD intelligence functions
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Organizing the staff at the regimental or
brigade-level is to define the structure,roles, and responsibilities for the tactical-level staff in order to conduct attack thenetwork operations.
AtN LeadThe Attack the Network Lead is thatindividual whose function is to organizeand supervise the attack the networkactivities within the staff, to include thevarious fusion cells and working groups.
,information are available across the DoD,
and improving the integration ofintelligence with traditional operationsand plans functions to increase thespeed, power and combat effectivenessof DoD operations.
Threat Working GroupThe threat working group is cross-functional by design and includesmembership from across the staff, liaisonpersonnel, and other partners outside theheadquarters. The threat working group
identifies, prioritizes, and recommendstargets to the operational arm of the staff.
59
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Organize the Staff
-
8/13/2019 Jieddo Atn Lexicon
60/99
Prosecution Working Group
The prosecution group is cross-functionalby design and includes membership fromacross the staff, liaison personnel, andother partners outside the headquarters.This working group identifies, prioritizes,
and coordinates actions regardingtargets for non-lethal targeting by
removing him from the battlefield byusing intelligence collection and analysisto build a case that will effectivelyprosecute him in a host nation's criminalsystem.
Assessment Working GroupThe assessment working group is cross-functional by design and includesmembership from acrossthe staff, liaison personnel, and otherpartners outside the headquarters. The
assessment working group fusesassessment information to provide a
comprehensive assessment of theoperation. They consolidate and discussemerging trends, issues, and impactsrelating to events over the various
planning horizons.
.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Targeting Board (Lethal/Non-lethal)
A targeting board is a temporarygrouping of designated staffrepresentatives withdecision authority to coordinate andsynchronize the targeting process.
60
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
61/99
Integrate Enablers
Reachback Capabilities
Inte rate Host Nation
Deployed Capabilities
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Capabilities
Integrate US/PartnerCapabilities
61
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Integrate Enablers
-
8/13/2019 Jieddo Atn Lexicon
62/99
Deployed Capabilities
Deployed capabilities are the personnel,tools, services, and material that areresident in theater versus the personnel,tools, services, and material that areavailable by reach back to the
continental US for support.
Reach Back CapabilitiesReach back capabilities are thoseexperts, tools, equipment, services, ormaterial that are provided byorganizations that are not forward
Integrate US/Partner Capabilities
The integration of US/Partner capabilitiesis achieved by blending efficiently intoattack the network operations therelevant national assets and services ofthe US and its coalition partners. These
assets and services span the diplomatic,intelligence, legal, law enforcement,
informational, military, and economicfunctions of commercial, government,and non-government organizations.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
.
Integrate Host Nation CapabilitiesTo integrate Host Nation capabilities is toblend efficiently into attack the networkoperations the relevant national assetsand services of the host nation where the
US and its coalition are operating. Theseassets and services span the diplomatic,intelligence, legal, law enforcement,informational, military, and economicfunctions of commercial, government,and non-government organizations.
62
UNCLASSIFIED//FOR OFFICIAL USE ONLYExamples
Theater C-IEDTask Force
Theater COIC
-
8/13/2019 Jieddo Atn Lexicon
63/99
DSE
CTF
IntelligenceAgencies
NATO/CCDR C-IED Cell
USAID
TheaterForensics DIA DTK Labs
EmbassyTeam
IDC ISR TaskForce
CFSOCC
Provincial
CEXCTask Force
Weapons C-IED Support
Civil AffairsMilitary Police ORSA EW
BCT/RCT
Division or MEF (Fwd)
Theater
DeployedCa abilities
UNCLASSIFIED//FOR OFFICIAL USE ONLY
econs ruc onTeam
C-IED SE
n e genceTeams
emen
STT CID/LEP JET
EOD CITP
HTT
AWG
Multifunctional Team
CombatHunter/USMC
TacticalExploitation Team
CAAT-ARoute Clearance
Patrols
COIST/CLIC
Battalion Task Force
Company Team
63
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Deployed CapabilitiesInformation Dominance Center
-
8/13/2019 Jieddo Atn Lexicon
64/99
Theater C-IED Task Force
A Task Force designed and deployed tospecifically address or counter the IEDthreat in a given theater of operation.
Theater COIC
The theater COIC has the samemission - albeit with fewer personnel
and tools - as the national COIC. Itprovides all source analytical productson IEDs in order to conduct counter-IEDoperations.
Combined Explosives Exploitation
Cell (CEXC)The Combined Explosives ExploitationCell (CEXC) is a U.S. Navy led taskorganized unit created to meet thetechnical and forensic intelligencerequirements for the combatant
commander. The CEXC provides expert
level technical and forensic exploitationand analysis of WTI- related material inorder to determine enemy tactics,identify IED trends and bomb makers,and assist in the development of
Information Dominance Center(IDC)
The Information Dominance Center(IDC) supports Army commandsand units worldwide through G-2channels for intelligence-reachoperations. The IDC can provide
tailored intelligence products to thefield to meet their operational
requirements on a quick responsebasis. The IDC monitors potentialtrouble spots, preparing to supportcontingency operations with
intelligence related products. The
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
measures. The CEXC conducts
investigations of significant events;exploits IED devices, recoveringfrequencies from RC IED devices toupdate EW equipment; tests explosiveresidue; recovers and evaluatesforensic and biometric material;
identifies IED trends and bomb makersignatures; creates profiles to betterenable offensive operations; andconducts limited component tracking.
analytical technologies and
emerging concepts to support Armywarfighters.
Theater Forensics
Theater forensics labs includeExpeditionary Forensics Labs(EFLs) and the CombinedExplosives Exploitation Cell(CEXC).
ISR Task Force
The ISR Task Force is establishedto maximize and optimize currentlydeployed ISR capabilities,especially those in Iraq and
Afghanistan. 64
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Deployed Capabilities
-
8/13/2019 Jieddo Atn Lexicon
65/99
DIA DTK Labs
The DIA DTK Lab is a strategic-levelforensics lab for IEDs and CBRNE.
CFSOCCCombined Forces Special Operations
Component Command (CFSOCC) is theforward headquarters for SOCCENT and
has operational control (OPCON) overSOF units in the CENTCOM AOR.
Embassy Team
The embassy team is the group of
DSE
The Division C-IED Support Element(DSE) coordinates and integrates C-IEDoperations within the division operationalarea, and integrates C-IED enablers,analysis, and products into the division
targeting process in order to support thedivision in maintaining freedom of action
and defeating insurgent networks. TheDivision C-IED Support element iscomprised of a mix of specialized C-IEDpersonnel such as CEXC, CITP,intelligence analysis, operations
USAID
US Agency for InternationalDevelopment (USAID) is anindependent federal governmentagency that receives overall foreignpolicy guidance from the Secretary of
State. Our Work supports long-termand equitable economic growth and
advances U.S. foreign policyobjectives by supporting economicgrowth, agriculture and trade; globalhealth; and, democracy, conflictprevention and humanitarian
UNCLASSIFIED//FOR OFFICIAL USE ONLY
,the United States Mission in country and
operates under the oversight of theDepartment of States.
NATO/CCDR C-IED Cell
The Counter-IED team provided byNATO or the CCRD that provides C-IEDanalysis, C-IED services, and liaison toother C-IED capabilities.
,with intelligence and operations staff.
CTFCounter threat finance is the prevention,inhibition, or interdiction of thegeneration, movement, storage,
management, control, investment,accounting, distribution, disbursement,and expenditure of funds, assets, and/orvaluable commodities that can be usedto fund, finance, pay for, or facilitatelethal and non-lethal actions and
activities by illicit adversaries andnetworks.
.
Intelligence AgenciesSixteen national-level agenciesspecialize in the collection andanalysis of intelligence are relevant toattack the network operations. Most
provide some sort of deployed orreach back capability to warfighters intheater. Those agencies include CIA,DIA, NGA, NSA and others.
65
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Deployed Capabilities
-
8/13/2019 Jieddo Atn Lexicon
66/99
C-IED Support Element
The C-IED Support Elements are teamsdesigned to assist the maneuver unit inthe planning, coordination and integrationof their immediate C-IED operations, andthey act as a liaison to the C-IED TF. The
C-IED support elements also coordinatethe units IED infrastructure targeting
efforts.
Electronic WarfareElectronic Warfare are those military
actions involving the use of
Provincial Reconstruction Team
A Provincial Reconstruction Team(PRT) helps stabilize theoperational environment in aprovince or locality through itscombined diplomatic, informational,
military, and economic capabilities.It combines representatives from
interagency and internationalpartners into a cohesive unitcapable of independentlyconducting operations to stabilizethe environment by enhancing the
Military Police
Military police are those law enforcementexperts that are organic to the militarywith skills relevant to AtN, to includeweapons handling, small-unit tactics,special weapons employment, convoy
escort, riot control, traffic control,prisoner and detainee handling and
processing, police intelligence, criminalintelligence, criminal handling, stationsmanagement.
Weapons Intelligence Teams (WIT)
UNCLASSIFIED//FOR OFFICIAL USE ONLY
control the electromagnetic spectrum or
to attack the enemy. Electronic warfareconsists of three functions: electronicattack, electronic protection, andelectronic warfare support. Some EW
actions are successful in disrupting IEDdevices.
the Host Nation government.
-IED teams are assigned to the C-IED TF.
Normally an EOD company, with a directsupport WIT, will be placed in directsupport of each brigade combat team.They will be placed OPCON to the TFs
C-IED commander.
ORSAOperational Research/ StatisticalAnalysis is the analytical study ofmilitary problems undertaken to provideresponsible commanders and staff
agencies with a scientific basis fordecision on action to improve militaryoperations.
66
-
8/13/2019 Jieddo Atn Lexicon
67/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Deployed Capabilities
-
8/13/2019 Jieddo Atn Lexicon
68/99
Joint Expeditionary Team
A Joint Expeditionary Team (JET)supports all echelons of the joint force,interagency, and multinational partners.Its purpose is to train, advise, observe,analyze, and to collect and disseminate
tactics, techniques, and procedures(TTPs), lessons learned, and best
practices to mitigate the IED threat. It willnormally operate in two to three manteams and be placed OPCON to the TFsC-IED commander.
AWG
The Asymmetric Warfare Group(AWG) is a Sensitive Activity under theHQDA G-3/5/7 that providesoperational advisory assistance in
support of Army and joint forcecommanders. The AWG was createdby the Army to enhance the combat
effectiveness of the operating forceand enable the defeat of asymmetricthreats to include IEDs. The AWGdeploys its forces worldwide to
observe, assess and analyze
C-IED/SE
The C-CIED Site Exploitation teamsrecognize, collect, process,preserve, or analyze information,personnel, and materiel found duringthe conduct of C-IED operations for
follow-on use by the intelligence orwarfighting functions of the staff.
Multi-functional TeamMulti-functional teams are createdout of personnel that are organic to
the Division. The teams combine
UNCLASSIFIED//FOR OFFICIAL USE ONLY
operating environment and the threat.
It also assists in the development,dissemination and integration ofmaterial and non material solutionsincluding countermeasures. The AWG
serves as an agent of changeproviding key observations andperspectives for leaders whenconsidering policy and resourcedecisions.
, ,perform time-sensitive targeting.
Counterinsurgency Advisory andAssistance Team Afghanistan(CAAT-A)
The CAAT-A's mission is to assistcommanders in integrating allaspects of COIN operations. Itspurpose is to assist Commanders,identify trends, and disseminatelessons learned to facilitate ISAForganizational and cultural change.
68
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Deployed Capabilities
-
8/13/2019 Jieddo Atn Lexicon
69/99
Tactical Exploitation Team
Tactical Exploitation Teams deploy fromthe C-IED task forces on short-notice to
provide site exploitation. Site exploitationare those activities that recognize,collect, process, preserve, or analyzeinformation, personnel, and materielfound during the conduct of C-IED
operations.
Route Clearance PatrolsRoute clearance patrols detect,investigate, mark, report, and neutralize
Combat Hunter (USMC)
Combat Hunter is a ten-day courseprovided by the Marine Corps to create ahunting mindset by integrating enhancedobservation, combat profiling, andcombat tracking skills in order to produce
a more ethically minded, tacticallycunning, and lethal infantryman that is
better prepared to succeed across therange of military operations.
COIST/CLICCompany Intelligence Support Teams
UNCLASSIFIED//FOR OFFICIAL USE ONLY
obstacles along a defined route to enable
assured mobility for the maneuvercommander. It is a combined armsoperation that relies on a reconnaissanceof the route to be cleared. The goal ofroute clearance is to detect andneutralize EH and improve and know theroute to be able to conduct future changedetection operations.
-Cells (CLICs) are a recently developed
capability to provide analytical products(that have typically been resident at thebattalion level and higher) down to thecompany-level.
69
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Examples
National & Service Intel
Law Enforcement
-
8/13/2019 Jieddo Atn Lexicon
70/99
CCDR
C-IED Cell
CALL
NATO C-IEDCell
JKnIFE
CITP AAAPReachback
Capabilities
JTCOIC
JET
Service KnowledgeManagement Database
NATO AtN Enablers
CCDR/Interagency
NGIC
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Wargaming
SAT
Team Phoenix
CoalitionIntegration
SOF-TFComprehensiveLook Team
TBDUNS
JUONS In-TheaterContract Soln
ome r csWTI
Team-L
CPAT/ORSA
Red Team
InteragencyCollaboration
InformationAssurance
CFA
ForeignDisclosure
70
Academia
AWG
TEDAC
COIC
Human Terrain System
Mission SpecificMaterial
JCOE/Service COEs
TPE
Capability Gap &Solution Analysis
RFI
PEO-PMs
-
8/13/2019 Jieddo Atn Lexicon
71/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
NGIC
Reachback Capabilities
CCDR/I t C biliti
-
8/13/2019 Jieddo Atn Lexicon
72/99
NGIC
The National Ground IntelligenceCenter, located in Charlottesville,Virginia, is assigned to INSCOM and isunder the operational control (OPCON)of the Army G-2. NGIC is the ServiceNational production center for groundforces intelligence and has DODIPP
primary production responsibility formost ground force intelligencefunctional codes.
CITP
WTI
Weapons Technical Intelligence is acategory of intelligence derived fromthe technical and forensic collectionand exploitation of IEDs, associatedcomponents, improvised weapons,
and other weapon systems.
AAAPThe Anti-Armor Analysis Program(AAAP) is an analytic program runby the National Ground Intelligence
Center that analyzes and discerns
CCDR/Interagency Capabilities
The various skills and services that areinorganic to deployed forces but areprovided by the CombatantCommander or partner agencies of theUSG.
CCDR C-IED Cell
The CCDR C-IED cell is the counter-IED team formed and staffed by CCDRthat provides C-IED analysis, C-IEDservices, and liaison to other C-IEDcapabilities.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Program (CITP) is located at the NGIC
in Charlottesville, Virginia and conductsWTI-related identity analysis, biometricanalysis, and device or componentanalysis to support the targeting of keyindividuals in adversary IED networks.They work closely with the NGICs
biometrics effort to rapidly matchindividuals to specific IED incidents by
matching and assessing latent prints,fibers, and other data.
,manufacture, procurement and use
of anti-armor weapons.
BiometricsBiometrics is the process of
recognizing an individual based onmeasurable anatomical,physiological, and behavioralcharacteristics.
JTCOICThe Joint Training Counter-IEDOperations Integration Center(JTCOIC) was officially opened in April2009 to ensure Army and jointorganizations are aware of and able to
employ rapidly fielded counter-IEDcapabilities. Established as apartnership between JIEDDO and
TRADOC, the state-of-the-art centercombines the operational focus of theDepartment of Defense's lead counter-
IED organization with the trainingresources and expertise of the Army'spremier training command.
72
-
8/13/2019 Jieddo Atn Lexicon
73/99
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Reachback Capabilities
Coalition Integration Wargaming through adversarial emulation
-
8/13/2019 Jieddo Atn Lexicon
74/99
Coalition Integration
The COIC facilitates coalitionintegration by integrating coalitionmulti-discipline databases into itsnetwork analysis process.
COIC Pattern Analysis Team(CPAT)
The COIC Pattern Analysis Team(CPAT) identifies, analyzes, andresolves tactical patterns in support ofJIEDDO/COIC and its partners in theDefense, Intelligence, and National
Wargaming
Wargaming from the JIEDDO COICprovides standing, on-demandwargaming capability to enhance C-IED strategy development usingthreat scenarios and modeling and
simulation resources to assess futureoperations in the context of friendly
and enemy courses of action (COA),concepts of operations (CONOPS),tactics, techniques, and procedures(TTP), and emerging technologies.
through adversarial emulation,
independent analysis, and criticalreview in support of current operations,plans, and capabilities for committed
units and JIEDDO in order to enhancethe Counter-IED fight.
Team-L
Team L is a Comprehensive LookTeam at the JIEDDO COIC thatsupports offensive operations focused
on attacking networks as part of theoverall Joint Improvised Explosive
UNCLASSIFIED//FOR OFFICIAL USE ONLY
,tactical pattern analysis methods toother problems in response torequests for support from authorizedusers worldwide.
Team Phoenix
A military organization that integratesintelligence, operations, andtechnology with training to enable
pre-emptive analysis to attacknetworks.
The mission of the Red Team at
JIEDDO's COIC is to provide itsparent organization with a continuousprocess of analysis and counter-analysis that assesses: the likely
enemy operational and tactical TTPinnovations; countermeasures;wargaming the effectiveness of thosecountermeasures. The Red Team
also identifies gaps, challengesassumptions and predicts 2nd and3rd order effects. The Red Team
does that
,Counter-IED Operations Integration
Center (COIC) C-IED supportstructure.
Interagency CollaborationThe JIEDDO COIC hosts andcollaborates with multiple agencyliaisons to facilitate integration ofintelligence community capabilities in
support of warfighter operations.
Special Operations Forces TaskForce (SOF-TF)SOF-TF Provides multi-disciplineintelligence analysis, fusion andintegration to support SOCOM
Operations. 74
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Reachback Capabilities
I f ti A Human Terrain System (HTS) Request for Information (RFI)
-
8/13/2019 Jieddo Atn Lexicon
75/99
Information Assurance
COIC Information assurance supportsintegration of innovative advancedtechnologies and methodologies required
to better identify threat networks throughgaining interim authority to operate ongovernment communications systems(Source: COIC Support Capabilities
Document).
Foreign Disclosure
Foreign disclosure supports the transferof classified information through
Human Terrain System (HTS)
The Human Terrain System (HTS) is aproof of concept program, run by theU.S. Army Training and Doctrine
Command (TRADOC), and serves thejoint community. The near term focus ofthe HTS program is to improve themilitarys ability to understand the highly
complex local socio-cultural environmentin areas where they are deployed.
Mission Specific MaterialItems that are necessary for a mission,
-
Request for Information (RFI)
A Request for Information (RFI) isany specific, time-sensitive, ad hocrequirement for intelligence
information or products to supportan ongoing crisis or operation notnecessarily related to standingrequirements or scheduled
intelligence production. An RFI canbe initiated to respond to operationalrequirements and will be validated in
accordance with the combatantcommands procedures.
UNCLASSIFIED//FOR OFFICIAL USE ONLY
approve c anne s o an au or zerepresentative of a foreign government or
international organization.
Critical Factors Analysis (CFA)Critical Factors Analysis: The CriticalFactors Analysis (CFA) ComprehensiveLook Team (CLT) analyzes Blue, Red,Green, and White critical capabilities
(CC), critical requirements (CR) anddeduces critical vulnerabilities (CV) for
exploitation to facilitate US forceinterests against threat networks atstrategic, operational and tactical levels.
- ,they cannot be accurately identified inadvance.
Theater Provided Equipment (TPE)
Theater Provided Equipment (TPE) isequipment that is not organic to the unitnor does the unit have to procure it foritself; the Combatant Commander or theJTF commander provides the equipment
to the deployed unit.
75
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Reachback Capabilities
Peace Enforcement Universal Needs Statement (UNS)Capability Gap & Solution Analysis
-
8/13/2019 Jieddo Atn Lexicon
76/99
Peace Enforcement
Operations/Peace-Making (PEO-PM)Peace Enforcement Operations(PEOs) are generally coercive innature and rely on the threat of or use
of force; however, PEOs also rely onthe development of working
relationships with the local population.The impartiality with which the peaceoperating force treats all parties andthe nature of its objectives separatePEO from COIN and
-
Universal Needs Statement (UNS)
An universal needs statement (UNS)is an official request submitted to aservice's requirements process bywhich a unit makes a request forcurrent and future wartime
capabilities.
In-theater Contract SolutionThe provision of basic goods, supportservices, minor construction, andother services that occur throughcontracting officers and from vendors
Capability Gap & Solution Analysis
Capability gap & solution analysis is apart of the systematic procurementprocess established by the DOD toidentify a missing or incompletecapabilities and the solutions to
provide the capability. The FunctionalSolutions Analysis follows the
Functional Need Analysis thatidentifies the capability requirement indetail.
Joint Urgent Operational Need
UNCLASSIFIED//FOR OFFICIAL USE ONLY
.making (PM) is a diplomatic processthat may include mediation,negotiation, or conciliation. PM effortsmay take advantage of seams ininsurgent organizations byestablishing separate agreements
with individual organizations orgroups that make up an insurgencymovement. Commanders should
constantly seek opportunities for PMthroughout COIN.
.
To Be Determined CapabilitiesCapabilities that will be needed in thefuture, but at the current time areindeterminable.
AcademiaAcademia is the life, community, orworld of teachers, schools, and
education.
A Joint Urgent Operational NeedStatement (JUONS) is an urgentoperational need identified by acombatant commander involved in anongoing named operation. A JUONS
main purpose is to identify andsubsequently gain Joint Staffvalidation and resourcing of asolution, usually within days or
weeks, to meet a specific high-prioritycombatant commander need.
76
UNCLASSIFIED//FOR OFFICIAL USE ONLY
-
8/13/2019 Jieddo Atn Lexicon
77/99
HN Info and
HN IntelligenceDiplomatic
Examples
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Capabilities
CommunicationInfrastructure
Enforcement
Economic/Business
DevelopmentMilitary
77
UNCLASSIFIED//FOR OFFICIAL USE ONLY
Integrate Host NationCapabilities
Diplomatic Host Nation Information and
-
8/13/2019 Jieddo Atn Lexicon
78/99
Diplomatic
Actions taken by State Department orsenior US/coalition military leaders toalign, coordinate, and harmonize thediplomatic efforts with those of the hostnation to maintain common purposeand achieve common goals andobjectives.
Host Nation IntelligenceHost Nation Intelligence is the nationalgovernments traditional informationresources and the integrating of central
Host Nation Information and
Communication InfrastructureHost Nation information andcommunications infrastructure which may
be written, visual, audio, word-of-mouth,etc. and avoiding noticeably foreignmessaging to legitimize localgovernment. Be conscious of tribal,
ethnic, religious, professional, school,messaging venues/distribution channels
(etc. mosques, schools, tribal, localmedium).
UNCLASSIFIED//FOR OFFICIAL USE ONLY
capabilities.
Host Nation Legal/Law EnforcementHost Nation Law Enforcementcapabilities are those host nationfaculties that provide for the publicsafety.
Actions taken by US and coalition military
leaders to align, coordinate, andsynchronize military planning, operations
and capabilities with those of the hostnation to achieve agreed upon militarygoals and objectives.
Economic/Business DevelopmentActions taken by US and coalition
government agents (like USA