TRAINING
COIN INTELLIGENCE PREPARATION OF THE BATTLESPACE
Intelligence preparation of the battlespace is a systematic, continuous process of analyzing the threatand environment in a specific area. The commander uses IPB to understand the battlespace and theoptions it presents to friendly and threat forces. By applying the IPB process, the commander gains theinformation necessary to selectively apply and maximize his combat power at critical points in time andspace on the battlespace.The CLIC has the ability to conduct all IPB requirements based on their training, intelligence environment,and communications environment and the availability of intelligence assets. In addition, the granularityprovided by the CLIC will balance the intent and needs of the commander and the information availableto analysts.For example, counterinsurgency (COIN) IPB requires existing data to be analyzed and assessed in adifferent manner because it is focused on the local population’s potential courses of action (COAs).
Mission4.Determine Threat COAs
3.Evaluate the Threat
2.Describe the
Battlespace Effects
1.Define the Battlespace
Evironment
Basic SkillsCensus Ops; Kinetic/Nonkinetic Targeting; Economic Targeting and Analysis;
Black/White CA; IO Theme Design and Delivery with Cultural Attenuation;
Interagency Integration
Nonkinetic Targeting; Link Analysis; Operationalized Pattern Analysis;
Demographic Mapping and Leadership Analysis; CHD Integration;
Effective Intelligence Cells to Companies
Kinetic Targeting; Pattern Analysis; Trend Analysis;
UAS Employment; RadBn Employment; TFC Integration;
EMAC and TSE at Subordinate Elements
Weather Effects Operationalized; SOPs for Section
Operation Published; Watch Procedures Refined,
IM/Share Drive Organization; POI for Analysts as
Part of PTP
Degree of Difficulty
DEFINE THE BATTLESPACE In order to maximize the use of available resources, including time and personnel, each resource must be
used only on the commander’s areas of interest (AI). Clear boundaries must be set in order to prevent use of
resources in areas, or on topics, not relevant to the operational needs of the commander.
The CLIC should consider both current company operations and the battalion’s mission when identifying the
physical limits of friendly and enemy territory and outlining the AO, area of influence, and area of interest.
When the CLIC is identifying significant characteristics of the environment, they should examine the AI’s
physical environment and the influences of the people who occupy that area to include the following:
• Geography (weather/terrain).
• Population demographics.
• Political/socioeconomic factors.
• Infrastructures.
• Threat forces.
Once aware of the physical environment, the intelligence planner can evaluate the human dynamics within
the AI caused by the population centers or groupings. Items that should be taken into consideration within
the AI include the following:
• Physical lines of communications (LOCs).
• Tribal boundaries.
• Demographic boundaries.
• Geographic boundaries.
• Economical boundaries.
• Cultural boundaries.
The CLIC must identify the amount of detail required in the IPB and feasibility of completing the IPB
within the time available. Intelligence planning requires an examination of the information gained throughout
the IPB process. This IPB effort should result in a better understanding of the physical and cultural
influences on the commander’s operational scenario and yield suggested areas for IPB and COAs.
Therefore,
the following must be taken into consideration:
• Collecting initial intelligence for baseline IPB and identifying intelligence gaps based on the commander’s
operational scenario, commander’s intent, and possible COAs.
• Collecting the material and intelligence required to conduct the remaining IPB.
• Analyzing and evaluating a previous unit’s turnover products (e.g., updated IPB, targeting products)if available.
DESCRIBE THE BATTLESPACE EFFECTS Company level intelligence cell analysts must identify and analyze the various influences that may impact
civilian life and military operations. Basic considerations include weather, enemy, and terrain, but the commander
may prescribe additional considerations.
1.Weather
It is vital that the effects of weather—visibility, winds, precipitation, cloud cover, and temperature and
humidity—on civilian life and military operations be identified and analyzed.
2.Enemy
When deciding on the civil and military factors to be examined in the analysis of the battlespace, consider
both civilian personnel and equipment and military personnel and equipment.
3.Terrain
It is vital that elements of terrain be analyzed from both the friendly and enemy perspectives. There are
numerous models and formats used to identify terrain information; however, the most commonly used
methods are—
• The memory aid KOCOA:
—Key terrain (population centers, access control points, LOCs).
—Observation and fields of fire (Where can friendly and enemy forces see and shoot from?).
—Cover and concealment (from fire/view of friendly and enemy forces).
—Obstacles (manmade or natural, political, LOCs, or rules of engagement).
—Avenues of approach (mounted and dismounted ingress/egress routes).
• Areas, structures, capabilities, organizations, people, and events (ASCOPE)
—Areas.
—Structures.
—Capabilities.
—Organizations.
—People.
—Events.
Areas Structures Capabilities Organization People Events
Typical Civil Considerations Within Each Areas,Structures, Capabilities, Organizations, People, and Events Category.
- Tribe
- Families/clans
- Ethnicity
- Economic districts
- Smuggling routes
- National boundaries
- Social classes
- Political districts
- Military districts
- School districts
- Road systems
- Water sources
- Water coverage
- Water districts
- Construction sites
- Gang territory
- Safe areas/
- sanctuaries
- Trade routes
- Power grids
- Cemeteries
- Religious shrines
- Houses of worship
- Bars/tea shops
- Social gathering
- places
- Print shops
- Internet cafes
- Television stations
- Radio stations
- Hospitals
- Banks
- Dams
- Bridges
- Police stations
- Gas stations
- Military barracks
- Jails
- Water pumping
- stations
- Oil/gas pipelines
- Water lines
- Power lines
- Storage facilities
- Sewer
- Water
- Electrical
- Academic
- Trash
- Medical
- Security
- Market
- Employment and
- commerce
- Crime and justice
- Basic needs
- Public health
- Economic (jobs)
- Religion
- Displaced persons
- and refugees
- Political voice
- Civil/individual
- rights
- Tribal
- Family/clan
- Religious
- Ethnic
- US/coalition forces
- Governmental
- agencies
- Farmers or unions
- Community organizations
- Military/milia units
- Illicit organizations
- Insurgent groups
- Gangs
- Business organizations
- Police
- Nomands
- Displaced persons
- and refugees
- Volunteer groups
- Intergovernmental
- organizations
- Political
- Contractors
- Nongovernmental
- organizations
- Labor unions
- Phones
- Speeches
- Face-to-face meetings
- Media (radio)
- Media (TV)
- Media (print, newspapers)
- Visual (graffiti,
- signs)
- Visual (videos,
- DVDs)
- Audio (pirated or
- illegal radio)
- Rallies or demonstrations
- Restaurants
- Door-to-door
- Internet
- Market
- Sports
- Religious gatherings
- Parks
- Family gatherings
- Gas lines
- Bars/tea shops
- Food lines
- Job lines
- Weddings
- Birthdays
- Religious gatherings
- Funerals
- Major religious
- events
- Anniversaries of
- wars/battles
- Holidays
- Harvests or plantings
- Reconstruction
- openings
- Town or council
- meetings
- Elections
- Sports events
EVALUATE THE THREAT In order to describe the possible impact on friendly operations and to influence the commander’s decisionmaking
options/process
during analysis, CLIC personnel must try to fuse the threat and the
environment to construct likely COAs. Considerations for COIN IPB will
also be useful in threat models for crisis.A threat is defined as any
force, group, person, action event, or condition that would cause a
commander to
fail to achieve the specified end state and therefore
the mission. Different types of military operations will require
specific threat identification. For example, conventional and COIN
operations have significantlydifferent IPB considerations and require
attention to the motivations of the threat, relationships between the
actors,
and pattern of life changes. In a new AO, critical capability, critical
requirement,and critical vulnerability are useful tools used to
identify the threat
COIN Considerations for IPB Eight Dynamics of the Insurgency
Leaders of the insurgency
Ideology of the insurgency
Objectives
Environment and geography the insurgency
prefers
Internal support to the insurgency
External support to the insurgency
Phase of the insurgency
Organizational and operational patterns
Description of TTP (shown graphically) with
intelligence and analysis products
Identification of HVTs
Threat model
Conventional IPBOrder of Battle
Composition
Disposition
Strength
Tactics
Training
Logistics
Combat effectiveness
Electronic/technical data
C2 warfare data
Miscellaneous data
Doctrinal template
Description of tactics and options
Identification of HVTs
Defense
Conventional warfare and COIN models reflect an asymmetric
environment and offer a basis from which to tailor CLIC analysis to other military operations.
After a thorough evaluation of the battlespace has occurred, the CLIC must identify threat activities and
capabilities by considering the geographic, environmental, civil, and military factors.
DETERMINE THREAT COURSES OF ACTIONIntelligence preparation of the battlespace provides insight into actions the threat is capable (or incapable)
of attempting.The CLIC’s analysis provides the commander with the threat’s most likely and most dangerous
COAs. The identification of threat COAs helps refine the commander’s understanding of the battlespace,
allowing
for the development of friendly COAs to combat anticipated threat
action.The threat’s most likely COA depends upon his capabilities,
doctrinal employment of forces, and intentions to affect a desired
outcome. Examining a threat’s doctrinal employment of forces provides
the CLIC with information to support anticipating future actions. The
employment of forces must be examined using knowledge of the threat’s
current strength and capabilities. The threat’s intentions are
determined by examining his centers of influence—demonstrated, stated,
or anticipated—that will direct his lines of effort.
EMAC - every Marine a collector
IM - information management
IO - information operations
IW - irregular warfare
Ops - operations
POI - program of instruction
PTP - predeployment training program
RadBn - radio battalion
TFC - tactical fusion center
TSE - tactical site exploitation
UAS - unmanned aerial system