Attp 3-39.20
Attp 3-39.20
50)
July 2010
Contents
Page
PREFACE..............................................................................................................iv
INTRODUCTION ...................................................................................................vi
Chapter 1 OPERATIONAL ENVIRONMENT AND POLICE INTELLIGENCE
OPERATIONS .................................................................................................... 1-1
Understanding the Operational Environment ..................................................... 1-1
Police Intelligence Operations Framework ......................................................... 1-4
Military Police and Police Intelligence ................................................................ 1-6
Police Intelligence Support to Full Spectrum Operations ................................... 1-9
Chapter 2 INTEGRATED MILITARY POLICE FUNCTION ................................................ 2-1
Law and Order Operations ................................................................................. 2-1
Internment and Resettlement Operations .......................................................... 2-7
Maneuver and Mobility Support Operations ....................................................... 2-9
Area Security Operations ................................................................................. 2-10
Chapter 3 INTEGRATION INTO THE OPERATIONS PROCESS ..................................... 3-1
Police Intelligence Operations Activities............................................................. 3-1
Integrating Activities ........................................................................................... 3-9
Police Intelligence Operations Integration With the Operations Process ......... 3-13
Police Intelligence Operations Spanning the Levels of War ............................ 3-19
Chapter 4 SOURCES OF POLICE INFORMATION ........................................................... 4-1
Information Requirements .................................................................................. 4-1
Collection of Police Information .......................................................................... 4-2
Methods and Sources of Information ................................................................. 4-2
Reporting Collected Information ....................................................................... 4-13
Chapter 5 ANALYSIS ......................................................................................................... 5-1
Responsibilities ................................................................................................... 5-1
Analysis of Police Information ............................................................................ 5-3
Areas of Analytical Focus ................................................................................... 5-4
Analytical Tools and Techniques to Identify Trends, Patterns, and
Associations (Crime Pattern Analysis) ............................................................... 5-7
Crime and Criminal Threat Analysis ................................................................. 5-15
Additional Analysis Considerations and Techniques ....................................... 5-22
Database and Automation Requirements ........................................................ 5-23
i
Contents
Figures
Figure 3-1. Police intelligence operations activities ......................................................... 3-2
Figure 3-2. PIO support to military police operations and the operations process ........ 3-13
Figure 5-1. Example of an association matrix .................................................................. 5-9
Figure 5-2. Example of an incident map ........................................................................ 5-10
Figure 5-3. Example of standard link analysis symbology ............................................. 5-11
Figure 5-4. Example of a link diagram ........................................................................... 5-12
Figure 5-5. Example of standard time event symbology................................................ 5-13
Figure 5-6. Example of a time event chart ..................................................................... 5-13
Figure 6-1. Example of an FBI BOLO alert ...................................................................... 6-3
Figure 6-2. Example of a BOLO alert............................................................................... 6-4
Figure 6-3. Example of a crime prevention flyer .............................................................. 6-6
Figure 6-4. Example of a PIA ......................................................................................... 6-10
Figure 6-5. Example of a police intelligence alert notice ............................................... 6-11
Figure 6-6. Example of a bar graph showing the rate of select quarterly offenses ....... 6-12
Figure 6-7. Example of a line chart displaying annual larceny trends ........................... 6-13
Figure 6-8. Example of a pie chart showing crime percentages over a one-year
period .......................................................................................................... 6-13
Figure 6-9. Example of an FBI wanted poster ............................................................... 6-15
Figure 6-10. Example of a USACIDC wanted poster..................................................... 6-16
Figure 6-11. Example of a reward poster....................................................................... 6-17
Figure 6-12. Typical police intelligence network in support of a post, camp, or station 6-19
Figure 6-13. Typical PIO network in a deployed OE...................................................... 6-20
Tables
Table 3-1. Targeting methodology ................................................................................ 3-15
Table 5-1. Source reliability scale ................................................................................. 5-16
Table 5-2. Information credibility scale .......................................................................... 5-17
Table 5-3. Example of an MSHARPP matrix................................................................. 5-18
Table 5-4. Example of a CARVER criteria matrix.......................................................... 5-19
Table 5-5. Example of CARVER matrix ........................................................................ 5-20
Table 6-1. Example of police intelligence fusion cell composition ................................ 6-22
• Chapter 3 discusses the application and integration of PIO in the operations process and the
supporting integrating processes: intelligence preparation of the battlefield (IPB); targeting;
intelligence, surveillance, and reconnaissance (ISR) synchronization (and the associated
continuing activity of integration); composite risk management (CRM); and knowledge
management (KM).
• Chapter 4 describes sources of police information used to support analysis.
• Chapter 5 focuses on the analysis of police information. This chapter discusses the critical
thinking and predictive analysis techniques applied by trained police intelligence analysts to
support the formation of a holistic common operating picture (COP) and continuously feed the
operations process.
• Chapter 6 discusses the production of police intelligence products. This chapter provides a brief
description of some of the more common products that may be produced by the military police
or USACIDC staff and their associated analysts. The chapter also discusses police intelligence
networks.
• Appendix A provides information on briefing and debriefing requirements in support of PIO.
• Appendix B addresses applicable laws, regulations, and directives most relevant to the PIO
collection efforts. Additionally, it provides a summary of each document (with respect to its
relevancy and applicability to the PIO function) and its restrictions and previsions to Army law
enforcement (LE) and the conduct of PIO.
• Appendix C identifies initiatives used by other agencies in an effort to facilitate necessary
interaction and the timely exchange of police information and intelligence.
This ATTP provides the operational architecture and guidance for military police commanders and trainers at
all echelons for the integration and instruction of PIO for established curriculum in the Army’s education
system. It applies to all military police Soldiers in the Regular Army, ARNG, and USAR. This doctrine will
help Army leaders and trainers at branch schools plan for, integrate, and teach the integration of PIO
capabilities into Army and joint operations.
Terms that have joint or Army definitions are identified in the text. Terms for which ATTP 3-39.20 is the
proponent manual (the authority) are indicated in the glossary. Text references: Definitions for which
ATTP 3-39.20 is the proponent are printed in boldface and italicized in the text. These terms and their
definitions will be incorporated into the next revision of FM 1-02. For other definitions in the text, the term is
italicized, and the number of the proponent manual follows the definition.
Military police refer to their analysts as police intelligence analysts, while USACIDC analysts are typically
referred to as criminal intelligence analysts (due to the focused criminal investigative mission of USACIDC).
For the purpose of brevity, the term police intelligence analyst is used in this manual to refer to both military
police and USACIDC analysts.
This publication applies to the Active Army, the Army National Guard (ARNG)/Army National Guard of the
United States (ARNGUS), and the United States Army Reserve (USAR), and Department of the Army (DA)
civilian and contract personnel, unless otherwise stated.
The proponent for this publication is the United States Army Training and Doctrine Command (TRADOC).
Send comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank
Forms) directly to Commandant, United States Army Military Police School, ATTN: ATZT-TDD-M,
320 MANSCEN Loop, Suite 270, Fort Leonard Wood, and Missouri 65473-8929. Submit an electronic
DA Form 2028 or comments and recommendations in the DA Form 2028 format by e-mail to
<[email protected]>.
Unless this publication states otherwise, masculine nouns and pronouns do not exclusively refer to men.
PIO focuses the collection efforts of military police formations to ensure that the proper police information
is collected and forwarded. At times, this collection effort will be in response to a specific requirement
from a commander request—possibly in the form of priority intelligence requirements (PIR) or intelligence
requirements (IR)—to address an enemy course of action (COA). At other times, the information will come
directly from an investigation or event, without any preconception of its value. This information feeds into
the operations process, including the commander’s targeting cycle to enable informed decisionmaking and
targeting of people, groups, and networks for both lethal and nonlethal effects, depending on the
commander’s assessment and the selected engagement method. Targets may also be identified for further
informational exploitation as a conduit to attack an enemy, criminal, or terrorist network. The end result of
PIO may be an actual prosecution in a court of law. If the prosecution takes place in an emerging
democracy, it will also serve as an example to the people of that nation as to the value of a professional
police force operating within the rule of law. PIO activities also provide information critical to determining
measures required to protect the force.
1-4. To gain a broad understanding of these influences, commanders typically consult with technical
specialists in each area. Military police, with their technical expertise in policing, penal, and general
application of the rule of law are among the specialists available to add breadth and depth to the overall
understanding of the OE. Military police contribute to situational understanding, an enhanced intelligence
picture, and a more complete COP through the application of PIO. PIO activities are integrated into the
execution of L&O, I/R, MMS, and AS operations in support of the commander’s strategic, operational, and
tactical plans. The strength of PIO comes from ensuring that it is planned and integrated into each of the
military police functions and that the resulting information and police intelligence is integrated into the
operations process. This integration provides flexibility for the exploitation of police intelligence and
ensures that police actions meet the commander’s intent throughout operations.
NATURE OF THE THREAT
1-5. The struggle by external elements to challenge and redefine global and regional distribution of power
remains a significant threat to the United States and its interests, at home and abroad. States, nations,
transnational actors, and nonstate entities will continue to engage in efforts to achieve positions of power
and dominance to further political, economic, religious, or ideological interests. Threats may be
characterized in four major categories: traditional, irregular, catastrophic, and disruptive. While these
characterizations are helpful in describing the threats, our enemies will not likely fit neatly into any one
category. Instead, they will likely simultaneously use tactics consistent with multiple categories in an effort
to keep U.S. forces off-balance and strike where we are least prepared. See FM 3-0 for further discussion of
the changing nature of the threat.
1-6. The nature of threats against the United States will continue to evolve, requiring changes in our
methods to counter those threats. Arguably, the most urgent threats in the modern OE come from
unconventional state and nonstate actors—terrorists and criminals operating under the banner of ideological
or religious fanaticism or the lure of illicit gains. Modern communications—satellite telephones and the
internet—and the ease of travel allow groups of similar ideology to form associations, partnerships, and
networks with fewer obstacles than in the past. These groupings, both formal and informal, while
increasing the capabilities of opponents, also offer potential avenues for exploitation.
1-7. While the United States holds significant advantages over traditional or conventional threats, the
ability of threat elements to rapidly adjust and attack us with nontraditional warfare will continue to be a
challenge. Our enemies will continue to operate in and among the local populace, making traditional lethal
engagement more constrained. Many enemy tactics will be consistent with traditional criminal behavior
faced by policing organizations worldwide. Some of these threat organizations will operate with highly
sophisticated criminal enterprises to organize, fund, and otherwise support their operations.
1-8. Even while U.S. forces are training and operating with host nation security forces to improve and
increase force capabilities and apply the rule of law, threat organizations (criminal and terrorist) will likely
attempt to modify their capabilities and modes of operation in reaction to changes in the OE and pressure
from security forces. This recognition is critical to combating adaptive threat organizations.
THE CRIMINAL ENVIRONMENT
1-9. Criminals seek economical and political gain through illegal activities, to include trafficking in
drugs, weapons, people, and other contraband. Violence is often a primary tool, either through intimidation
or actual attacks to steal property, influence the population, and escape prosecution. While many criminals
operate independently, today’s technology facilitates criminal organizations with much less regard for
physical and political boundaries than at any other time in history. Drug cartels can move money and gather
information on their distribution network without any need to expose members to international travel.
Known associates or clever imitators can repeat a crime committed in one country the same day on another
continent.
1-10. Irregular threat elements are able to use the same tools to further their causes. Funding moves
smoothly across time zones and borders, even changing from a base currency to a local currency almost
instantly. Information gathering and planning can also occur without ever leaving safe houses and between
personnel who have never had face-to-face contact (to protect identities). Terrorist organizations have
always recruited and trained members and conducted operations; however, today’s technology provides our
adversaries with the ability to recruit, indoctrinate, conduct operations, and share information on a scale
nearly unimaginable twenty years ago.
1-11. Similarities between criminal and many irregular threat organizations—in techniques and in the
advantages they gain in chaotic political and degraded security environments—have led to many confirmed
instances of threat elements joining forces or morphing from an enterprise with a single focus to
multifaceted, international organizations with diverse holdings, intentions, and operating locations. Threat
organizations may turn to criminal activities to fund their training and operations, while criminal cartels
may use terror to further their causes or to retaliate against government and police actions. These criminal
and terrorist activities may interfere with U.S. objectives.
SOCIAL ORDER
1-12. The social fabric of a community often dictates the ability of criminals and criminal organizations to
operate freely or with minimal police interference. Military police must understand the social order to begin
to understand the patterns that offer insight into what is happening in the community and the region in
which they operate. Religious, political, economic, ethnic, and agricultural patterns are just some examples
of what military forces must be attuned to, especially when operating in unfamiliar areas. These patterns
are so well understood in parts of the United States that Americans may fail to recognize them. Examples
of such patterns include–
z Traditional summer vacations for schools, traditional holiday breaks between mid-December
until after the New Year, and spring break in March or early April.
z Friday and Saturday “weekends.”
z Daylight saving time.
z Sport seasons.
z Thanksgiving weekend “black Friday” shopping.
z Election cycles for public office holders.
1-13. These same types of patterns are present around the world and can be important indicators of stability
in the social order, either by their presence or by their absence. The challenge for military police and other
U.S. forces is to recognize these patterns and social nuances so that disruptions can be identified. For
example, if Saturday is normally a busy business day for the local economy and U.S. forces encounter a
normally bustling market that is deserted, this is an obvious indicator that should be investigated. The
absence of activity could be the result of an important religious holiday or some external criminal
influence. The recognition of such an anomaly in the social order and the reasons behind it require
understanding of specific religious, political, economic, ethnic, and agricultural patterns in local
communities. Recognition of unexplained variations in the environment should lead to further observation
and investigation to determine the cause. The cause may be innocent, but it may also lead to the discovery
of criminal elements operating in the AO.
1-14. Another social phenomenon that may influence U.S. operations is the reluctance in some societies to
cooperate with LE, even when civilians are victims of crimes. Fear of police and governmental officials, a
desire to not be seen as cooperating with LE entities, or other cultural mores may play a role in these
actions. Military police must investigate and understand such societal beliefs so that they can tailor police
engagement strategies to overcome obstacles to ensure timely reporting.
1-15. Early and thorough understanding of the social dynamics of the societies in the OE is critical to
achieving strategic and operational objectives. Failure to understand these dynamics can result in mistrust
of U.S. forces or, worse, outright contempt that could drive the populace to sympathize or support criminal,
terrorist, or insurgent forces operating or attempting to gain a foothold in the OE. Military police are
positioned early in any operation due to their dispersion throughout the AO while executing MMS and AS
missions, to engage with and gain information from the local population and informal authority structures
(such as clan or tribal leaders). These activities are synchronized and integrated with civil affairs, command
information engagement priorities, and IR. These interactions, if successful, can be the first steps toward
building legitimacy in the eyes of the host nation population. Information gained through these interactions
feed valuable information into the operations process and police intelligence activities. This early tactical
information may not be directly applicable to policing operations or criminal investigations, but can be
critical to a commander’s COP, fulfilling operational and tactical IR, enabling decisionmaking, and
developing additional IR required to increase situational understanding.
1-19. Due to the complexity of the environment, units often need to respond to multiple threats. The
commander must understand how current and potential threat systems organize, equip, and employ their
forces. It is also vitally important that the commander understand how friendly elements organize, equip,
and employ their organizations. This is especially true of host nation policing organizations responsible for
police and prison systems critical to stability and security in the OE. Military police conducting PIO
provide the capability to rapidly identify and assess these entities. PIO provides a unique police capability
supporting military police operation and the missions and operations of multifunctional commanders. The
result of PIO, when integrated into the operations process, helps leaders and commanders to better
understand crime and criminal networks and how they leverage illicit activities to facilitate criminal
activity, subversion, general lawlessness, and insurgency. This understanding and insight can facilitate
Army operations designed to disrupt these actions by targeting criminal activities and criminal networks.
1-20. In support of full spectrum operations, PIO will occur as an integrated activity within all other
military police missions. During offensive and defensive operations, police intelligence can enable the staff
to identify organizations and networks (police and criminal) in the AO that may provide indications of
disruptive activities and conditions requiring corrective action to establish stability. As operations become
more protracted and conventional threat levels are reduced from a traditional military threat to an irregular
threat, the lines between criminal, terrorist, and insurgent activities normally associated with stability
operations become blurred. PIO planned and conducted by military police staffs and PM sections contribute
to the operations process and enhance the commander’s situational understanding. This is especially true
during stability operations where the role of the military police focuses on developing a country’s ability to
protect its communities and establish or reestablish civil security and civil control. PIO planned and
conducted in stability operations provides police intelligence key in shaping the OE and contributing to the
success of civil security and civil control lines of operation.
1-21. PIO provides essential products and services in support of military operations at posts, camps, and
stations. In particular, police intelligence provides the commander and PM with situational understanding
necessary to reduce threats against Army installations; provide threat intelligence for in-transit security; and
focus the development and implementation of threat countermeasures to safeguard Army personnel,
material, and information. Regardless of the OE, PIO helps bridge the information gap between what a
commander knows and does not know. PIO provides direct support to the intelligence cycle, with the most
reliable information being obtained through effective PIO networks.
BRIDGING THE INFORMATION GAP
1-22. PIO activities provide capabilities that can bridge the gap between traditional military intelligence
(MI) and information focused on policing and the criminal environment. When the intelligence staff officer
(S-2) or Army Chief of Staff, Intelligence (G-2) identifies a gap in the commander’s knowledge of the
threat and the current threat situation, that gap may be included as PIR or selected as indications and
warnings (I&W). (FM 2-0 contains information on I&W.) The S-2 or G-2 will then develop a collection
plan to help the commander in filling this information gap. Military police staffs and PM sections will also
identify information gaps pertinent to policing activities and develop IR to fill those gaps. The IR findings
may also be included in the PIR of the echelon commander.
Note. The S-2 and G-2 are restricted from collecting information on U.S. persons (see
Department of Defense [DOD] 5240.1-R) and will not direct military police or USACIDC
elements to conduct such DOD collection activities (see Army Regulation [AR] 381-10).
1-23. Part of the commander’s collection strategy is to select the best collection asset available to cover
each information requirement. After a thorough analysis—an analysis that includes availability, capability,
and performance history—the collection manager identifies which collection assets can best be used. In
military police brigades and battalions, military police commanders and their staffs identify information
gaps; develop IR; develop, synchronize, and integrate collection plans; and task or coordinate for collection
assets. In echelons above brigade, a brigade combat team, or a maneuver enhancement brigade (MEB)
structure, the PM section (working as part of the Assistant Chief of Staff, Operations and Plans [G-3] or the
operations staff officer [S-3]) will typically coordinate with the S-2 or G-2 to ensure that military police-
related IR information is synchronized and integrated in the overall ISR plan. When military police or
USACIDC assets are tasked with the police information collection mission, they are provided specific
guidelines and a prioritized collection requirement.
1-24. In the United States or its territories, effective PIO can provide installation commanders with
situational understanding and address information gaps to ensure that threat assessments are valid and
reliable. PIO in support of posts, camps, and stations is conducted by PMs and their staffs responsible for
LE operations. USACIDC elements conduct PIO in their AO to support investigative and other support
requirements. PIO capitalizes on connectivity between installation LE and civilian domestic agencies. In
this OE, the MI involvement is typically limited. According to Department of Defense Directive
(DODD) 5200.27, excluding specific LE and protection-related missions “where collection activities are
authorized to meet an essential requirement for information, maximum reliance shall be placed on domestic
civilian investigative agencies, federal, state, and local.” MI personnel may actively participate in PIO
activities when assigned to an LE agency and supporting an LE function.
1-39. The military police support commanders, Soldiers, family members, and visitors to installations (in
both CONUS and outside the continental United States [OCONUS] posts, camps, and stations) through
comprehensive policing activities. L&O operations are normally the most visible aspect of this support,
with military and DA civilian police forces providing for a safe and secure environment on installations and
in training areas. PIO, when properly resourced and employed, also provides critical support to personnel
on and near installations.
1-40. The training and experience that military police Soldiers receive while conducting LE and PIO at
their home stations becomes invaluable assets when deployed. Military police capabilities developed in
support of posts, camps, and stations are critical to successful military police support to full spectrum
operations and support to maneuver commanders. When not supporting deployed operations, military
police must be integrated into PM operations to develop and hone their LE skills. Likewise, police
intelligence analysts must be integrated into garrison PM police intelligence sections to remain current and
continue to develop their analytical skills. This provides key support to the installation and ensures that
police analytical capabilities are relevant and effective during deployment and support to the operational
commander.
OFFENSE
1-41. Offensive operations are combat operations conducted to defeat and destroy enemy forces and seize
terrain, resources, and population centers. They impose the commander’s will on the enemy. (FM 3-0)
Military police support offensive operations with a focus on conducting maneuver and mobility support to
regulate movement on main supply routes (MSRs) and alternate supply routes, allowing for the execution
of plans and orders in the required sequence and timing methods. They support operational AS
requirements throughout the AO and conduct I/R operations at detention (internment) and DC
(resettlement) facilities. The tempo of offensive operations may not allow the time required to fully
establish a police intelligence network necessary to integrate PIO across the entire AO. Military police
Soldiers may be required to support site exploitation and collection of evidence or biometrics information
that will be passed to follow-on units and retained for possible exploitation and/or future criminal
prosecution.
1-42. The importance of PIO during offensive operations should not be overlooked. Enforcing rules of
evidence, facilitating forensic examination of key items, obtaining biometric identity, and collecting
information for criminal prosecution allow for a rapid transition to a formal court system and empower
detention facility commanders by enabling them to make informed decisions. Information and police
intelligence derived from PIO can play a key role in establishing civil security and civil control in the AO.
DEFENSE
1-43. Defensive operations are combat operations conducted to defeat an enemy attack, gain time,
economize forces, and develop conditions favorable for offensive or stability operations. (FM 3-0) Military
police support defensive operations by conducting support missions across the full range of mission sets.
The maneuver commander will direct the priority of missions based on his assessment of conditions and
mission variables. Generally, interior lines of communication (LOCs) are more stable during defensive
operations. This relative stability in unit locations and operations in the AO allows for rapid and extensive
development of police intelligence networks with host nation police, the local population, community
leaders, OGAs, and NGOs, enabling the establishment of a more robust police intelligence capability.
1-44. As commanders seek to develop conditions favorable for offensive or stability operations, buildup of
personnel and sustainment support is often required. During this time, criminals and terrorists may attempt
to take advantage of the situation. Stockpiles of weapons, ammunition, food, fuel, and spare parts are
valuable commodities, especially in areas affected by warfare. A successful attack against a U.S.
sustainment hub may provide terrorists with levels of attention much higher than the actual value of what
they attacked.
STABILITY
1-45. Stability operations encompass various military missions, tasks, and activities conducted outside the
United States in coordination with other instruments of national power to maintain or reestablish a safe and
secure environment, provide essential governmental services, emergency infrastructure reconstruction, and
humanitarian relief. (JP 3-0) Military police support stability operations through the conduct of all five
military police functions. Stability operations typically require military police units to focus significant
effort toward building the capacity of host nation police, security, and military forces supporting efforts to
restore public order and enable transition toward normalcy for the host nation.
1-46. PIO is a critical enabler in the early phases of any operation as military police and USACIDC
elements gather, analyze, and disseminate critical information and police intelligence regarding police and
prison systems, host nation capability, policing and prison activities capabilities, and criminal environment
assessments in the AO. This information and police intelligence provides commanders and staffs with
situational understanding required for planning and executing stability operations. This is especially
relevant to civil security and civil control lines of operations. Throughout the conduct of stability
operations, military police and USACIDC organizations continue to update their running estimates and
refine data and recommendations, based on gathered police information, analyses, and the production of
police intelligence.
CIVIL SUPPORT
1-47. Civil support is the Department of Defense support to U.S. civil authorities for domestic emergencies
and for designated law enforcement and other activities. (JP 1-02) Civil support operations are conducted
in the United States and its territories and are divided into the three broad categories of domestic
emergencies, support of designated LE agencies, and other support activities. (JP 3-28) This includes
responding during disasters and declared emergencies, support or restoration of public health and services
and civil order, national special security events, and periodic planned support of other activities. Military
LE personnel conduct PIO in support of protection operations during defense support to civilian authorities
(DSCA) events through the development of U.S.-based networks integrated with local, county, state, tribal,
and federal LE agencies. This information is combined with MI within applicable legal and policy
constraints to provide a total threat picture for the tasked commander. This threat picture is essential to
assessing the risk associated with the operation or task.
1-48. In CONUS, commanders must work closely with the staff judge advocates (SJAs) to ensure that they
conduct PIO according to sensitive-information guidelines, intelligence oversight laws, privacy act rules,
and DOD policy (see appendix C for information regarding legal requirements and authorities). In most
cases, the collection, reporting, processing, and storing of information on non-DOD-affiliated U.S. persons
or organizations is restricted to DOD LE personnel only—only regarding those matters with a clear military
nexus or interest.
1-49. In Section 1385, Title 18, United States Code (18 United States Code [USC] 1385), the Posse
Comitatus Act (PCA) specifically restricts the use of military forces to enforce civilian laws in the United
States. There are exceptions to the PCA, which can be enacted by the President or Secretary of Defense
during DSCA operations. The PCA applies to military personnel operating under federal authority (Title
10, USC). National Guard elements operating under state control (Title 32, USC) are not restricted by the
PCA. Once National Guard elements are mobilized under federal authority, they become subject to PCA
restrictions. See appendix C for additional discussion of the legal authorities controlling military police
operations.
intelligence products that provide early warning to commanders, PMs, and LE investigators—allowing
them to develop protection strategies to counter complex criminal threats.
CIVIL CONSIDERATIONS FOR ASSESSING POLICE SYSTEMS AND THE CRIMINAL
ENVIRONMENT
2-4. Military police evaluate police-related civil considerations through an assessment of the police and
criminal environment using the variables of police and prison structures, organized criminal networks, legal
systems, investigations and interviews, crime-conducive conditions, and enforcement gaps and mechanisms
(POLICE). Military police and the USACIDC elements identify existing host nation police organizations,
to include personnel and leadership. PIO integrated within L&O operations enables the staff and police
intelligence analyst to analyze and assess police structures and identify current police capability and
capacity, to include the existence or lack of, a functioning legal system. Military police also conduct crime
and criminal analysis to assess the criminal environment, to include the existence of organized criminal
elements, crime-conducive conditions, and general levels of criminal activity. The factors of POLICE are
used to determine–
z Police and prison structures. What police and prison structures exist? This factor may answer
information requirements, such as–
Does a functional police or security force exist?
What police infrastructure is available? Is it in operational condition? What is needed?
Is the indigenous police force corrupt?
How is this police force received by the community?
Can the indigenous police force be relied on as an asset to assist U.S. and joint forces?
What equipment, communications, and other capabilities does the indigenous police force
have if it is reliable? What equipment and capabilities are needed?
Does the police force have adequate systems in place to operate effectively (such as
administrative, training, logistical, and investigative)?
How many prison structures exist in the AO? What are their types and capacities? Are they
operational?
Are jurisdictional boundaries established? What is the historical reason for the establishment
of jurisdictional boundaries?
z Organized criminal elements. Is organized criminal activity present? If so, what are the–
Indications of organized crime?
Motivation factors for the organized criminal activity—financial or facilitating insurgent
activity?
Specific criminal activities identified?
Public attitudes toward organized criminal activities?
People, organizations, or businesses targeted by organized criminal elements?
z Legal systems. What is the composition of the legal system–
Is there a law-enforcing mechanism? If so, what is it?
Is there an adjudicating body?
Does the legal system operate based on the rule of law? If not, what is the basis?
Are all three elements of the criminal justice system (police, prisons, and judiciary) present,
functional, and synchronized?
Are appropriate administrative records systems in place to support the legal system?
z Investigations and interviews. Are adequate criminal investigative systems functioning and
enforced–
Do adequate investigative capabilities exist to perform police and administrative
investigations (such as criminal, traffic, internal affairs, and administrative functions)?
Are adequate administrative and database systems in place to support investigations, to
include PIO?
How are internal and external investigations, inquiries, and assessments initiated, managed,
tracked, and reported? Are records appropriately transparent to the public? Are they
consistently applied?
Are police and criminal investigative capabilities leveraged to support site exploitation and
targeting?
z Crime-conducive conditions. What conditions exist that contribute to the initiation,
development, and expansion of crime–
What specific resources or commodities are available and attractive to criminals?
What locations are vulnerable to criminals?
What security gaps exist that could create vulnerabilities to criminal behavior (such as
systems, procedures, and physical security measures)?
z Enforcement gaps and enforcement mechanisms. What enforcement gaps are present and
what assets are available? Are gaps present or imminent due to movement or elimination of an
asset or capability? Do these enforcement mechanisms include–
Local security or police forces?
Guards?
Response forces (such as special response teams, civilian police special weapons units, and
military and paramilitary response forces)?
Informal religious, ethnic, or family structures and influence?
Organized criminal elements?
Multinational or interagency organizations?
Informal social authorities?
POLICE DEVELOPMENT AND TRANSITION TEAMS
2-5. PIO, when properly resourced and conducted, provides an invaluable tool to U.S. Army commanders
at all echelons and to the military police forces that support them. In operations where building police
capacity and capability is a key measure of effectiveness, it is imperative to train and resource the
developing host nation police and security forces so that they can also leverage the ability to connect people
to locations and events, while at the same time recognizing trends, patterns, and associations. Military
police and USACIDC personnel working in, or in support of, police development and transition teams
(PDTTs) not only train host nation police and security forces to conduct police intelligence activities, but
also place them in an advantageous position to gain information about the police force, criminal
environment, and other information about the population in which the host nation police operate.
2-6. Military police conducting missions to build host nation police capability and capacity will likely be
required to engage in the vetting, hiring, training, leading, and safeguarding of new police forces (often
across a widely dispersed AO). These new police forces may be manned by some former police who may
wish to return to their previous modes of operation to increase personal wealth and influence. There may
also be criminal or insurgent elements that infiltrate newly forming police organizations for the same
reasons or to carry out direct attacks on U.S. military and host nation police forces. The ability to conduct
effective PIO will be a critical task in these situations.
Integrating Police Intelligence Activities
2-7. There is no single doctrinal template for how forces engaged in building police capacity and
capability should be organized for their mission. The organization of forces will be determined by mission
assignments, the current OE, and what forces are available to theater-level commanders. If PDTTs are
determined to be the commander’s main effort, then resources may be more robust; however, the force will
always be constrained by resource availability. Regardless of resource constraints, military police
conducting or supporting PDTTs are in a unique position to observe, interact, and gain significant
information on the host nation police they support.
2-8. In the context of PIO, PDTTs support separate but complementing requirements. These requirements
are to–
z Report passive observations and deliberately collected information to their chains of command
and technical channels for analysis and integration into the operations process.
z Train and build host nation policing capability to conduct police intelligence activities in support
of internal police and criminal investigative missions.
2-9. PDTTs working side by side with their host nation counterparts gain access to information regarding
the personnel, systems, infrastructure, customs, and disposition of the police and the population they serve.
It also enables military police to assess the criminal environment of the host nation with a level of detail
and insight not typically available to U.S. Soldiers. Although building a police intelligence capability in
host nation police organizations is typically not the first priority of police development and transition
teams, it is important to lay the groundwork for police intelligence capability through the identification and
task organization of all available resources that can support PIO in the host nation organization. When a
police intelligence capability is present in host nation police organizations, U.S. military police forces will
benefit from the host nation effort by virtue of their organizational oversight and information sharing.
Building Host Nation Police Intelligence Capability
2-10. Building host nation police intelligence capability and capacity requires a detailed assessment of the
host nation police organization, followed by the training and mentoring of host nation police personnel by
military police Soldiers and multinational and civilian LE personnel supporting police development and
transition teams. As U.S. military police units conduct police development and transition activities with
host nation security forces to build police capacity and capability, a careful mission analysis is required to
determine the current training and status of the host nation forces. Some OEs may have intact host nation
police organizations with significant existing capabilities to conduct policing and investigative activities (to
include PIO) in the population. Others may have limited or no existing capability and capacity.
2-11. It is important to accurately assess these capabilities and capacities. Failure to properly identify
existing capabilities can result in wasted resources and time to build what is already available. Also, if
adequate capability exists, U.S. forces can alienate host nation personnel or be seen as condescending
toward the host nation population. PDTTs should take care to properly assess and assist host nation police
with legitimate requirements and avoid preconceived notions of host nation limitations. This action requires
a significant cultural understanding, close coordination and interaction with host nation police personnel,
and a robust PIO effort on the part of military police and USACIDC elements early in an operation to
accurately assess police capabilities and capacities to arrive at an accurate assessment of gaps in those
capabilities.
2-12. The ability of host nation police to support and conduct the full range of police intelligence activities
and enabling tasks may be limited by personnel education and training, available resources, societal norms,
host nation legal systems, and tactical environments. For example, in some societies, taking a photograph
of a person is generally not accepted. These populations could be expected to resist being photographed or
having an iris scan taken. In other areas and societies, many of the modalities of biometrics and forensic
analysis may not be understood and, therefore, will not be acceptable. A history of abuse of police power in
a host nation can adversely affect development of police intelligence capability. Deliberate police
engagements with prospective leaders of emerging police forces are vital in establishing a hierarchy of
available and planned police intelligence capabilities.
Organizing Police Intelligence Operations in Police Development and Transition Teams
2-13. PDTTs working to build a host nation police capability and capacity require a coordinated and
synchronized effort across the entire AO. They are typically employed by assigning individual PDTTs to
specific police stations or organizations. The teams are arrayed in a manner that maintains the integrity of
military police squads, platoons, and companies. Command and control of these elements is typically
retained in a functional military police battalion and brigade chain of command. Functional alignment of
PDTTs in a military police chain of command ensures synchronized and consistent application of policy,
operational decisions, training, uniform standards, and applications of police and criminal investigative
capability across the entire AO. FM 3-39 discusses military police task organization and criteria that would
warrant functional versus decentralized command and control of military police forces.
2-14. Centralized functional alignment and reporting in a functional military police battalion or brigade
provides a consistent, synchronized, and comprehensive focus and allows military police staff and police
intelligence analysts the ability to collate police information collected across the AO, thus enabling the
analysis and identification of trends, patterns, and associations vital to understanding civil considerations in
the OE as they pertain to the criminal and security environment. This enables the identification of problem
areas, specific I&W, and informed decisionmaking.
2-15. Military police units maintain and facilitate communications in their assigned military chain of
command. PDTT mission boundaries will often cross or be embedded in the AOs of multiple maneuver
units (and possibly across host nation police or governmental boundaries). Coordination of PDTT activities
crossing unit boundaries is critical to the protection of U.S. and host nation elements. Further, this
coordination synchronizes the PIO efforts of PDTT elements to support the IR of maneuver commanders
across multiple AOs. Military police Soldiers conducting PIO in support of PDTTs should aggressively
conduct coordination with all operational elements in the area to ensure that IR are synchronized and
relevant information and police intelligence is shared appropriately.
2-16. When implementing a police intelligence collection plan and subsequent staff and analysis, the
experience and training of the force available must be considered. The amount of L&O and police
intelligence analytical experience that military police units bring to the AO or to a PDTT mission may vary
greatly. Military police commanders can enhance their organic capability through formal and informal
associations, including task organization changes, cross-unit partnerships, multinational partnerships, and
other programs (including the LE Professionals Program and support from civilian police officers). Reserve
and National Guard military police units often have a high percentage of civilian police officers who may
have years or even decades of investigative and analytical experience. Although most common in military
police units, there may also be civilian police officers in other reserve component organizations who may
be detailed to help with PDTT missions. Commanders should identify unique skills and capabilities in their
ranks of assigned and attached reserve component Soldiers and civilian and multinational police personnel
early in any mission or operation to ensure optimum employment of critical capabilities.
2-17. A strong forensic analysis capability with forensic laboratory support is required for successful host
nation police intelligence activities. If not available at the commencement of PDTT support, this area
should be addressed early to ensure a viable host nation capability. Military police, USACIDC, and other
U.S. elements conducting PIO have access to forensic laboratories, either CONUS-based or via
expeditionary forensic facilities in the theater of operations. These facilities may also support host nation
requirements until a host nation capability is developed.
ADDITIONAL POLICE INTELLIGENCE CAPABILITIES SUPPORTING LAW AND ORDER
OPERATIONS
2-18. PIO integrated within L&O operations and the other military police functions provides a unique
capability that readily transitions from major combat operations (MCO) to stability operations and the civil
security and civil support lines of operation. Police intelligence capabilities integrated within maneuver and
other multifunctional headquarters can enable near-real‐time actionable police intelligence for tactical
commanders. Fusion cells and activities can provide relevant information and police intelligence applicable
across all levels of war. (Chapter 6 provides specific information on police intelligence fusion.) LE
professionals integrated within multifunctional headquarters elements and the Criminal Investigation Task
Force are examples of specific PIO capabilities supporting commanders in support of full spectrum
operations.
Law Enforcement Professionals
2-19. The Law Enforcement Professionals Program embeds a police intelligence capability directly into
corps, division, brigade combat team, battalion, and company headquarters to assist commanders. This
program provides expertise and methodology to understand, identify, target, interdict, and suppress
criminal networks or threats using criminal enterprises and techniques to facilitate operations. Typically,
embedded LE professionals are civilian or Army investigators with extensive background and experience in
complex criminal investigations (civilian investigators are used when requirements exceed U.S. Army LE
capacity). These experts are assigned in the PM section to support L&O planning and police intelligence
fusion and integration and provide advice to the command on collection and targeting missions. LE
professionals are managed by the Office of the Provost Marshal General and integrated by the echelon PM.
2-20. LE professionals ideally join a maneuver formation before deployment to gain a better understanding
of unit tactics, techniques, and procedures and standing operating procedures (SOPs). They provide an
understanding of criminal networks and tactics, techniques, and procedures to identify networks, key
individuals in the network, and methods for analyzing and building evidence for targeting and/or criminal
prosecution. LE professionals coordinate closely with USACIDC personnel, PM sections, military police
commanders and staff, MI personnel, host nation police and security, and forensic labs. They can provide
expert advice on processing incident sites and crime scenes to identify, collect, and protect valuable
evidence, such as forensic and biometric data. They can also train other personnel on the proper handling
and packaging of critical evidence and assist Soldiers with understanding the requirements for valid and
accurate forensic analyses.
2-22. The CITF combines USACIDC special agents (and criminal investigators from other Services),
police and intelligence analysts, and attorneys into teams. These teams synchronize and fuse information
and intelligence from all available sources to conduct criminal investigations that enable criminal
prosecution in U.S. or host nation legal systems.
CRIMINAL INVESTIGATIONS
2-30. Police information and police intelligence can help Army LE investigators to develop patterns and
criminal associations in a facility. This can lead to identification and documentation of criminal behavior
and individual perpetrators. This information and police intelligence also enables the commander and
military police staff to identify criminal groups forming in the facility and to take steps to interdict these
groups before serious breaches of security occur. Information collected and police intelligence produced
may also be valuable to Army LE investigators conducting criminal investigations focused on crimes
within and outside the facility. PIO can link detainees in the facility to crimes, criminals, and activities
outside the facility. This enables Army LE investigators and police intelligence analysts to further develop
their understanding of the criminal environment, key players, and associations, thus allowing investigators
to focus their efforts more effectively.
2-31. Commanders may also direct criminal investigations concerning events in a facility. These events
may include a variety of serious criminal infractions, to include attacks on other detainees or U.S.
personnel, contraband smuggling, and escape attempts. Care must be taken to recognize, preserve, collect,
and process items with evidentiary value. Once collected, this evidence is packaged and forwarded to a
supporting forensic lab for further examination and analysis.
INTELLIGENCE SUPPORT
2-32. Doctrine and legal requirements call for close cooperation between MI and military police personnel
during all I/R operations, especially during detainee operations. This tenet of I/R operations ensures the
maximum benefit to the commander and the mission and that U.S. forces stay within the limits of U.S. and
international laws and treaties (see FM 3-39.40 for more information). Due to the extensive contact and
visibility military police Soldiers and support personnel maintain with detainees, they become recipients of
large amounts of information. This information is collected passively through activity observations,
contraband or writing (such as notes and graffiti) discoveries, and overheard conversations. These
observations are reported through the chain of command and collated by staff and police intelligence
analysts. Simultaneously, this information is passed to the supporting MI personnel through intelligence
channels. This sharing of information enables MI personnel to capitalize on passively collected
information, further enhancing their ability to form a coherent picture of the environment. Information
collected and passed through the intelligence channels is also passed through operational channels to
contribute to the Army operations process.
GENERATE KNOWLEDGE
3-7. Generating knowledge refers to actions aimed at gathering and collating information to support
operations planning and execution. It is performed continuously in an effort to understand the AO in which
military police and USACIDC elements will operate. Generating knowledge is driven by the commander
and begins at or before receipt of a mission to build a base of relevant knowledge of the OE required for
planning and conducting operations. The generating knowledge process should begin as early as possible,
in some cases when only the general location or category of a mission for a projected operation is known.
This process lays the foundational base and situational understanding on which future PIO is built.
Knowledge generation includes information on the OE (threat, civil considerations, terrain, and weather). It
also fills knowledge gaps regarding mission requirements and functional capabilities available to the unit.
Knowledge sources may include in-theater and reachback capability; existing databases, open-source
information, academia, and research organizations; after-action reviews; and coordination with U.S. and
multinational elements with relevant information.
3-8. The initial actions taken to generate knowledge result in the creation and population of data files
directed by the commander and assessed by the staff. This data is the basis of information on which future
collection and analysis are built. The military police, USACIDC, and PM staff (including police
intelligence) analysts assess the OE to determine what information is required for collection, based on the
mission set and known characteristics of the OE. This initial data build focuses on supporting command
requirements, the IPB, and answering CCIRs and other IR. PIO typically will focus on civil considerations
specifically relating to the police and criminal environment using the variables of POLICE. These variables
are discussed in detail in chapter 2.
3-9. Generating knowledge is a continuous process. Many factors can drive the requirement to update
baseline knowledge, to include current operations, higher operations, results of police intelligence analysis
or assessments, changes in missions, and changes in the OE. Significant changes in the OE can include
many factors, such as political and/or election results, shifts in influence on a population or region
(including the effects of informal groups, such as tribal, criminal, or insurgent groups), changes to police
and prison infrastructure, changes to capabilities organizations and systems affecting the police and
security environment, and events outside the unit’s projected AO that may impact operations. During a
deployment, a unit’s information database becomes a source of information for follow-on units to complete
the generating knowledge step. During and after deployment, the generate knowledge step also supports the
collection of lessons learned data. Generating knowledge is the precursor for conducting IPB and mission
analysis and is also the basis for developing the initial police intelligence survey.
PLAN
3-10. Staff planning develops the means to support the commander’s concept of operations and intent.
Planning in the context of PIO consists of the activities that identify relevant IR and develop the means to
collect information to satisfy those requirements. Planners review the CCIR, set priorities, and provide
guidance for the management of collection or interdiction assets. Consideration is given to identifying
what, where, when, who, and why.
3-11. Military police and USACIDC planners preparing for PIO must rapidly access information and
conduct collaboration and information sharing with other units and organizations across the OE. This
planning includes reaching forward while preparing to deploy and making full use of reachback capability
from the AO to ensure that planners and analysts have a clear picture of the OE before arrival and
throughout operations. The situation in one AO will likely have an effect on other adjacent AOs.
Knowledge of the broader operational area will provide insights for a particular AO as well.
3-12. Planning results in identified police information requirements which, in turn, may become CCIR.
The commander’s intent, planning guidance, and CCIR drive the planning of PIO. The CCIRs (PIR and
friendly force information requirement) drive the planning of the ISR effort and establish priorities for the
management of collection assets. The G-3 or S-3, the PM, and the G-2 or S-2 must work closely to ensure
that the police information collection plan is synchronized and integrated with the ISR effort at all echelons
(based on staff planning) to achieve the desired collection results. Military police or USACIDC assets with
specific collection capabilities or knowledge to perform collection activities are also identified. PIO
planning activities include–
z Participating in IPB.
z Identifying and managing police information requirements.
z Preparing the police information collection plan.
z Establishing guidelines in the commander’s intent to focus collectors.
z Disseminating CCIR and police information requirements to subordinate units and collection
assets.
z Providing input and continuous updates to military police running estimates.
z Identifying appropriate collection assets.
z Reviewing intelligence flow to synchronize tasks and resources.
z Evaluating collected and reported information.
z Establishing the communications and dissemination architecture.
z Providing input (in the form of a police information collection plan) and coordinating the
development and revision of the intelligence synchronization plan and the ISR plan as mission
requirements change.
z Establishing debriefing procedures to gather collected information (this includes debriefing
patrols with no deliberate collection mission to gain information gathered during the execution
of normal operations).
z Participating in crime prevention program analyses, law enforcement and/or threat working
groups, fusion cells, and other applicable meetings and venues. (Chapter 6 provides discussion
on working groups, fusion cells, and interagency coordination.)
3-15. The missions that are to be tasked to respective collectors must be determined. Information collectors
can typically be tasked with more than one mission at a time. However, it is imperative that their tasks be
prioritized, based on mission requirements and available time. Organic assets are generally more
responsive; however, capabilities beyond the scope of organic military police or USACIDC assets may be
required. Regardless, appropriate tasking orders or requests must be issued to request collection assets or
capability beyond those organic to the initiating command. When issuing tasking orders or requests, the
following must be specified–
z The collection objectives.
z The specific collection tasks (PIR with indicators) and where to look (named areas of interest
[NAIs]).
z The start and termination times for collection or surveillance operations and the time the
information is needed.
z The reporting procedures (such as to whom, how often, and on what frequency net to report).
z The location and activity of other elements operating in the AO.
z The identification and coordination for linguists or special skills personnel, such as civilian or
host nation police, engineers, psychological operations personnel, civil affairs personnel, MI
personnel, or reconnaissance assets.
z Other necessary information bearing on operations in the AO.
Identifying Collection Assets
3-16. The commander or PM, supported by the operations staff, selects and prepares collection assets,
based on their capabilities and limitations. Military police and USACIDC Soldiers are trained collectors
and highly adaptable to any collection plan. These Soldiers operate in direct contact with the local
population, allowing them to identify, assess, and interact with potential sources of information. Military
police personnel can also effectively collect information as a deliberate collection mission or concurrent
with the conduct of other missions and functions. Information can be collected actively (through direct
observation and/or engagement with target personnel) or passively (by observing and listening to the
surrounding environment and personnel). These collection activities span all environments and spectrums,
from routine and relatively stable environments associated with LE in support of posts, camps, and stations
to the extreme instability of the MCO.
3-17. On military installations, military police and USACIDC personnel are the lead for targeting,
collecting, and interdicting against a broad range of threat activities, including terrorism, organized crime,
contraband trafficking, and other illegal activities. Collection of police information in this environment is
conducted by military police and USACIDC assets through deliberate surveillance missions or through
missions tasked to LE patrols and conducted in the course of their routine patrol or investigative activities.
3-18. In support of full spectrum operations, military police personnel may be tasked as the primary
collectors of information on enemy forces operating along extended LOCs and on MSRs, or in support of a
movement corridor (see FM 3-90.31). During this time, the priority of effort for military police units may
be focused on MMS and AS operations. Concurrent with the requirements to collect information in support
of identified IR, personnel conduct police information collection supporting PIO. This information
collection, pertinent to the police and criminal environment, facilitates the transition to stability operations
and the establishment and maintenance of civil security and civil control. As the dominant operation
transitions from offense and defense associated with MCO to stability operations, the weighted focus for
military police units typically shifts from MMS and AS to L&O and possibly I/R operations. Military
police and USACIDC personnel will typically increase PIO efforts during stability operations to focus
support to host nation police and internment and corrections activities. USACIDC elements will increase
documentation of threat criminal activity identified during military operations in preparation for potential
criminal prosecution. During stability operations, technical police collection and assessment efforts
increase significantly.
3-19. Missions that may result in police information collection opportunities include –
z Deliberate collection missions–
Route R&S.
Area and zone reconnaissance.
LE surveillance.
PREPARE
3-23. Preparation includes staff and leader activities that take place on receiving the operation order
(OPORD), operation plan (OPLAN), warning order, or commander’s intent to improve the unit’s ability to
execute tasks or missions. Preparation transitions staff, unit, and Soldier actions from the planning to the
execution stage.
3-24. Preparation consists of a series of activities that help Soldiers and units improve their ability to
execute an operation and create conditions that improve the probability of success. Preparation activities
(such as preexecution checks, back briefs, rehearsals, and inspections) help all elements involved to
understand their role, practice complicated tasks, and ensure that equipment and weapons function
properly.
3-25. An element tasked with a collection mission ensures that appropriate preparation is conducted. Upon
being tasked for a collection mission, leaders conduct thorough mission analysis before execution. Leaders
of the tasked collection asset plan for a myriad of considerations, to include–
z The method the element will use to get to its assigned area (such as routes, passage points, and
boundaries). These locations may include –
Friendly elements and suspected threat activity in the area, including friendly elements
(such as the nearest medical facilities [to include trauma centers], friendly bases or stations,
and response patrols or forces [in the event that a compromise or engagement occurs]).
Restricted or danger areas.
Call signs and frequencies.
Passwords and recognition signals.
Movement through friendly AOs.
z Procedures for departing or reentering friendly lines or AOs.
z Fire and close air support—enroute, at the mission location, and on the return.
z Casualty evacuation procedures.
COLLECT
3-26. Collection involves gathering and reporting police information to answer IR and the gathering of
relevant data and raw information or existing intelligence products. The collected police information is then
available for analysis and subsequent production and dissemination. The goal of any collection effort is to
answer specific IR and to produce actionable intelligence. To be effective, collection efforts are generated
and driven by the operations process; they must be planned, focused, and directed, based on the CCIR,
police intelligence, and investigative requirements.
3-27. Development of a viable collection strategy, including management and supervision of the collection
effort, is critical to successful PIO. Military police, USACIDC, or other collection assets collect
information and data about criminal or other threats and police systems, infrastructure, processes,
capabilities, and resources. Collection may also target and answer IR concerning environmental and
geographical characteristics, cultural and ethnic norms, formal and informal authority structures, and other
factors affecting policing activities and the criminal environment. A successful PIO effort results in the
timely collection and reporting of relevant and accurate information. This collected information is critical
to successful compilation of police intelligence databases, enabling analyses of police information, and the
production of police intelligence.
3-28. The collection and managing of police information and intelligence is enabled by, and subject to, the
laws, regulations, and policies described in appendix C. These documents ensure the proper conduct of
PIO. In the United States and its territories, collection of police information and intelligence involving U.S.
citizens is limited to LE personnel performing legitimate LE functions. Intelligence personnel are generally
restricted from collecting or maintaining information or intelligence on U.S. citizens. While restrictions
may be present in an OE where PIO targets individuals other than U.S. persons, the ability to collect and
share police intelligence is less restrictive. Restrictions and guidance regarding the collection and
maintenance of police information and intelligence may be included in the following–
z USCs.
z Executive orders (EOs).
z National Security Council intelligence directives.
z ARs.
z Status-of-forces agreements (SOFAs).
z ROE.
z Other international laws and directives.
3-29. The success of police information collection depends on skillful management and execution by
personnel. When an organization with a collection asset is tasked and receives a collection plan, the
commander and unit operations section perform the following–
z Review police information collection plans and identify the collection requirements.
z Implement the plan by–
Tasking subordinate collection elements.
Establishing guidelines for discretionary decisions regarding police information collection
efforts.
z Update the collection plan as necessary.
z Perform police information collection efforts through–
Reconnaissance (such as route, zone, area reconnaissance, and technical assessment teams).
Surveillance.
Interviews and interrogations.
Evidence collection (to include forensic and biometric data) and evidence response teams.
Coordination and information sharing with adjacent units.
Searches of database records.
Examinations of statistical records.
Reviews of case files.
Reviews of administrative data.
Open source data. This data can include many sites that cannot be accessed through
computers connected to a DOD network, such as social networking or other prohibited sites.
Personnel should coordinate with the network manager for specific restrictions. For ongoing
mission-essential access, approval for standalone systems connected via civilian service
providers may be obtained.
Police engagement. This includes patrol interaction with the population; liaison with host
nation authorities, military and civilian police agencies, and other organizations; and the
exchange of police information with host nation authorities, military and civilian police
agencies, and other organizations.
3-32. Some information may be of immediate time value and passed without analysis due to time
sensitivity or other factors. Exceptional information is information that would have answered one of the
commander’s critical information requirements if the requirement for it had been foreseen and stated as one
of the commander’s critical information requirements. (FM 6-0) This exceptional information is
immediately formatted and disseminated through the appropriate command, staff, and functional LE
channels (PM, USACIDC, and interagency LE) for action as appropriate. When in the United States or its
territories, due to the restrictions placed on information gathered on U.S. citizens, police intelligence must
be maintained within military police, USACIDC, and interagency LE channels. Commanders with
responsibility for LE may also be included in police intelligence dissemination when required.
Processing
3-33. Police information processing involves the evaluation of initial information to reduce raw data into
manageable portions for analysis and production. Following analysis and production of police intelligence,
processing involves an initial evaluation to ensure that the police intelligence is accurate, precise, and
relevant. During processing, police information and subsequent police intelligence is prioritized according
to current collection and production requirements. Military police and USACIDC staff responsible for
managing police information and police intelligence will–
z Prioritize incoming data according to collection and production requirements.
z Organize police information and intelligence by category (such as crime, threat, or police
systems and capabilities).
z Organize police information and police intelligence by a particular product or user.
z Enter the information into databases.
z Collate police information and actionable police intelligence into interim products.
PRODUCE
3-34. Production involves combining analyzed police information and intelligence from single or multiple
sources into police intelligence or police intelligence products in support of known or anticipated
requirements. Production also involves combining new and existing police information and intelligence to
produce updated police intelligence that can be used by commanders, PMs, and other members of the staff
to revise military police running estimates, apply to the military decisionmaking process (MDMP), and
facilitate enhanced situational understanding. During the production phase, military police, USACIDC, or
other staff members exploit information by–
z Analyzing the information to isolate significant elements.
z Evaluating the information to determine accuracy, timeliness, usability, completeness, precision,
and reliability. It must also be evaluated to determine if it is relevant, predictive, and properly
tailored.
z Combining the information with other relevant information and previously developed police
intelligence.
z Applying the information to estimate possible outcomes.
z Presenting the information in a format that will be most useful to its user.
3-35. The military police staff deals with numerous and varied production requirements that are based on
PIR and IR; diverse missions, environments, and situations; and user format requirements. Through
analysis, collaboration, and reachback, military police and USACIDC units or the PM section in other units
use the collective analysis and production capability of higher, lateral, and subordinate echelons to meet
PIO requirements.
INTEGRATING ACTIVITIES
3-36. Throughout the intelligence process (when applied in the context of PIO), police information is
analyzed, assessed, and propagated. These three continuing activities drive and shape the intelligence
process, and they are integrated throughout the conduct of PIO activities.
ANALYZE
3-37. Analysis is the process by which collected information is evaluated and integrated with existing
information to produce intelligence that describes the current—and attempts to predict the future—impact
of the threat, terrain and weather, and civil considerations on operations. (Training Circular [TC] 2-33.4)
The intelligence staff analyzes intelligence and information about threat capabilities, friendly
vulnerabilities, and AO to determine how they will impact operations.
3-38. During police intelligence analysis, police information and raw data become police intelligence.
Analysis is based on critical examinations of all available and relevant information to determine
capabilities and trends and to develop predictive analysis for the police and criminal environments and
specific criminal threats. The police intelligence analyst specifically analyzes police information and data
and conducts predictive analysis in an effort to–
z Determine the COA that a specific criminal threat is likely to take, enabling commanders, PMs,
and investigators to identify possible friendly COAs to counter the threat.
z Predict crime trends in an AO, based on extrapolation of statistical crime data, enabling
adjustments to patrol and distribution to counter criminal activity.
z Determine presence, capabilities, and likely actions of organized criminal elements in the AO.
z Determine the status and capabilities of police organizations, infrastructure, and systems.
z Determine capability gaps in existing police organizations, infrastructure, and systems.
z Identify probable trends and effectiveness pertaining to police organizations, based on analyses
of current and historical performance, equipment, and personnel data.
z Identify likely areas of corruption and public distrust of policing systems, based on current and
historical data and information.
z Determine patterns in criminal activity and LE in the AO that can assist in identifying crime-
conducive conditions.
z Determine the construct, capability, and functionality of host nation legal systems, focusing on
the police and prisons.
z Determine the identity of individual criminals, criminal groups, and applicable associations.
3-39. Analysis continues throughout all PIO activities. During the analysis phase, military police staff and
police intelligence analysts evaluate police information and information gained from other sources for
relevancy, reliability, and timeliness. Evaluating police information includes determining whether the
information is relevant to existing IR and if pieces of police information are related. Initially, information
may seem irrelevant; however, it should be indexed, queried, and periodically reviewed in future analyses.
When reevaluated, this fragmentary information may be fused with additional data and information
received to provide an understanding not achievable when analyzed as a singular piece of data.
Additionally, it must be determined whether the police information is reliable for presentation or if
additional confirmation is required. Last, it must be determined if the police information and police
intelligence has been collected and analyzed in time to affect operations. Chapter 5 contains additional
considerations and techniques specific to police intelligence analysis.
3-40. Police information and intelligence must be integrated into the operations process and the COP to
affect operations. Integrating police information and intelligence in tactical plans exploits the information
and intelligence gathered, promoting the emergence of the bigger common operational picture. As police
information continues to be collected, reported, recorded, and analyzed, a more holistic picture begins to
emerge.
ASSESS
3-41. Assessment is the continuous monitoring and evaluation of the current situation and progress of an
operation. (Field Manual Interim [FMI] 5-0.1) Continuous assessment plays a critical role in evaluating the
information collected during the PIO process. The continuous assessment of PIO activities, available
information and intelligence, and various aspects of the mission variables are critical to ensuring that the
staff–
z Answers the CCIRs and IRs.
z Provides appropriate input to redirect assets in support of police intelligence collection and
assessment of changing requirements.
z Provides clarification to ensure that collection asset elements understand the intent and target to
achieve resolution of police IR.
PROPAGATE
3-42. Propagation of police information and intelligence includes activities involving direct dissemination,
access approval, database information sharing, and COP updates. Timely and accurate dissemination of
police information and police intelligence enabling effective decisionmaking is key to successful PIO.
Dissemination
3-43. Dissemination is the act of getting relevant information to the right personnel, units, or agencies; it is
critical to the timely integration of police information and intelligence. Dissemination entails delivering
timely, relevant, accurate, predictive, and tailored police intelligence to appropriate and authorized
stakeholders. Identifying recipients, determining the product format, and selecting the means of delivery
are key aspects of dissemination. Recipients of information and police intelligence generated through PIO
efforts must be evaluated to ensure compliance with any legal dissemination restrictions, mission
requirements, and protection considerations. Stakeholders may be any element or entity that–
z Possesses an IR that can be answered by the information or police intelligence disseminated.
z Operates in an AO that may be directly or indirectly impacted by the information or police
intelligence.
z Possesses an assigned mission that may be directly or indirectly impacted by the information or
police intelligence.
z Provides support to elements impacted by the information or police intelligence.
3-44. Information presentation may be in a verbal, written, interactive, or graphic format. The type of
information, the time allocated, and the directives of the commander, unit, or agency requiring police
information and intelligence all influence the information format. In the LE community, some standard
formats and means exist for disseminating police information and police intelligence between agencies;
many formats are developed locally. These dissemination conduits are typically closed to personnel and
agencies outside the LE community. In the operational Army operating outside the United States or its
territories, police information and intelligence may be disseminated across tactical command and control
systems or appropriate military networks. These networks and systems facilitate the dissemination of
answers to CCIRs.
3-45. Military police and USACIDC staff responsible for police intelligence must identify the appropriate
and authorized users of police intelligence products well in advance of a mission to ensure that the right
products get to the right people at the right time. Typically, in LE operations in the United States and its
territories, the users are the personnel or organizations initiating the requirements and those further
identified as needing the products. Identified LE-sensitive police information and intelligence are retained
in LE channels. When supporting operations in an OE outside the United States and its territories, the
recipients of police information and intelligence are typically more broadly defined and are not limited to
LE.
3-46. Military police and USACIDC staff must also determine what method will be used to disseminate
police intelligence products. Methods of dissemination may vary from such tools as military police reports
and police bulletins to threat assessments and information briefs. Geospatial products may provide
assistance to personnel by highlighting necessary information (see FM 3-34.230). Regardless of the method
used, military police and USACIDC staff must ensure that the products are delivered to the appropriate
users when, where, and in the proper form needed. Dissemination occurs at every echelon and is entered in
the data stream for continued analysis, when applicable. Frequently, when police intelligence products are
delivered, additional police information collection requirements are identified.
Note. Local police intelligence files may be exempt from certain disclosure requirements by
AR 25-55 and the Freedom of Information Act. When a written extract from local police
intelligence files is provided to an authorized investigative agency, the following statement must
be included on the transmittal documents: THIS DOCUMENT IS PROVIDED FOR
INFORMATION AND USE. COPIES OF THIS DOCUMENT, ENCLOSURES THERETO,
AND INFORMATION THEREFROM, WILL NOT BE FURTHER RELEASED WITHOUT
THE PRIOR APPROVAL OF THE INSTALLATION PROVOST MARSHAL.
Figure 3-2. PIO support to military police operations and the operations process
3-55. The PIO function represents the military police capability to collect, analyze, and process relevant
information from many sources focused on policing and LE activities. PIO activities are continuously
conducted by military police and USACIDC personnel to collect, analyze, and disseminate police
information and police intelligence on infrastructure, systems, populations, and individuals gathered while
conducting military police operations. Information is collected and analyzed from a policing viewpoint (see
FM 3-39). Information and intelligence from other operational elements are also fused with information
collected by military police and USACIDC Soldiers to develop a common operational picture. Police
information obtained in the execution of the remaining four military police functions (L&O, I/R, MMS, and
AS) and subsequent police intelligence can help form a complete view of the OE and increase situational
understanding, shaping future operations across all military police functions.
3-56. Information collected through the execution of PIO is disseminated throughout the LE community
and pushed into the intelligence and operations processes. This process ensures a continuous flow of police
information to promote the development of a holistic COP for commanders and staffs. PIO integration
within the Army operations integrating process is addressed in the following paragraphs.
recommendations enabling commanders to make informed targeting decisions. The process enables the
commander and staff to decide which targets to engage, detect the targets, deliver (conduct the appropriate
engagement operation), and assess the effects of the engagement. Table 3-1 illustrates the key activities of
D3A—how military police and USACIDC staff conducting PIO integrate within the overall targeting
process.
Table 3-1. Targeting methodology
MP and USACIDC Staff and Police
D3A Activities Intelligence Analyst Support to
Targeting
Decide Perform continuous activity based on • Develop IR pertinent to policing
which the mission, commander’s intent, and LE operations.
targets to concept of the operation, and planning • Develop the police information
engage guidance to produce or determine— collection plan.
• IR. • Ensure that police IR and
• ISR plans. collection plan are integrated and
• Target acquisition taskings. synchronized with the ISR plan.
• High-payoff target lists. • Identify change indicators
relevant to the police and criminal
• Target selection standards.
environment.
• Assessment criteria.
• Identify MP, USACIDC, or other
• Relative importance of the collection assets capable of
targets. collecting against specific police
• Recommended engagement IR.
means to produce desired • Nominate police-related IR as
effects. CCIRs (as required).
• Expected effects of • Nominate criminal or police-
engagement. related targets as high-payoff
• Attack guidance matrix. targets (as required).
(Enables the commander or • Make recommendations
leader to make a decision on regarding engagement means.
who, what, when, where, and
• Assess probable effects of
how to engage.)
recommended engagements.
• Task appropriate military
police or USACIDC
collection elements (if
applicable).
Detect the • Produce ISR synchronization • Participate in ISR synchronization
targets matrix. to ensure that police information
• Dedicate collection assets to collection efforts are
gather information. synchronized with maneuver and
other collection elements.
• Direct operational elements to
report observations based on • Monitor collection efforts.
IR. • Gather reports, evidence, and
• Develop target. other pertinent police-related
information.
• Vet target.
• Conduct debriefings of collection
• Determine threat/target
elements to ensure that all
validity.
available police-related
information is gathered and
collated.
• Conduct analyses of collected
data to determine trends,
patterns, and associations
regarding crime, criminals, and
associated data.
3-71. Though restricted to LE personnel, the same ISR processes apply to LE operations in support of
posts, camps, and stations. The PM section or USACIDC element conducts an analysis of the IR and gaps
to determine available internal and external assets for collection against those requirements. These
information requirements may be regarding policing activities affecting patrol distribution plans, traffic
operations, crime trends, crime prevention, disruption of criminal activity, or specific individual
investigations. When a capability gap exists, the PM or USACIDC SAC may request assets external to the
organic elements. These gaps may be from an adjacent military police or USACIDC element or through
interagency cooperation with civilian LE organizations. These assets are then tasked with specific
collection requirements to close information gaps pertinent to the mission, investigation, or other data
requirements.
KNOWLEDGE MANAGEMENT
3-74. Knowledge management is the art of creating, organizing, applying, and transferring knowledge to
facilitate situational understanding and decisionmaking. Knowledge management supports improving
organizational learning, innovation, and performance. Knowledge management processes ensure that
knowledge products and services are relevant, accurate, timely, and usable to commanders and decision
makers. (FM 3-0)
3-75. PIO activities produce relevant and timely information and intelligence to facilitate situational
understanding and decisionmaking. The unique contribution of information pertinent to civil
considerations, specifically related to the police and criminal environment in the OE, is critical to fully
understanding the dynamics of criminal threats and the ability of policing organizations to combat these
threats.
TACTICAL LEVEL
3-80. Operational planning and tactical planning complement one another but have different aims.
Operational planning links tactics and strategy by establishing operational objectives needed to achieve
strategic objectives, sequencing events to achieve operational objectives, initiating actions, and applying
resources to bring about and sustain these events. Tactical missions are complex, and planning must
consider both symmetric and asymmetric threat capabilities. Tactical planning emphasizes flexibility and
options. Comprehensive planning may be feasible only for the first event or phase in an operation;
succeeding actions depend on enemy responses and circumstances. Regardless, the staff must plan for PIO
integration and develop and continually revise relevant information requirements. These requirements can
then be integrated into the conduct of military police missions. Specific military police and USACIDC
capabilities are required, depending on the nature of tactical operations.
3-81. Typically, baseline military police units and USACIDC agents can accomplish PIO requirements
during offensive and defensive operations. The military police Soldier and USACIDC agent must
understand how operations affect security functions in the AO. PIO executed during MMS and AS
missions can provide the commander with increased situational understanding and information and police
intelligence critical to civil security and civil control objectives as operations transition to a stability focus.
During offensive operations, military police–
z Understand the IPB, the CCIR, and the PIR and make efforts through the PIO function to
support those requirements.
z Conduct deliberate PIO and L&O operations in the local population.
z Provide information on MSR conditions along LOCs to facilitate movement and protection for
the force. Perform I/R operations to reduce the impact on forces. Military police coordinate the
treatment of DCs with the host nation or foreign forces during I/R functions while passively
collecting police information and conducting criminal investigations as required.
z Conduct MMS functions to assist the commander in facilitating the shift of forces to support the
main effort and enhance overall trafficability. Military police conduct reconnaissance and
assessments of the routes to support maneuver commanders in orchestrating the effort to mass,
sustaining offensive momentum. Information gathered also enables the staff to determine
trafficability and feasible or suitable improvements to the LOCs.
z Conduct AS operations to protect command and control nodes, such as the main CP and tactical
CP. They maintain surveillance, provide early warning, and attack the enemy with supporting
and organic fires, ensuring freedom of action of the force. Information collected by military
police elements facilitates quick response by enabling the attack of enemy reconnaissance forces
in the AO. Military police gather and develop police information during movement corridor
operations.
3-82. During defensive operations, military police–
z Understand the IPB, the CCIR, and the PIR and make efforts through the PIO function to
support those requirements.
z Conduct PIO and L&O operations in the local population.
z Consider the type and size of the AO, LOC security, and threat and plan for internment
operations and resettlement operations, considering the effect on the movement of friendly
forces. Perform necessary I/R operations resulting from previous offensive or ongoing stability
operations to reduce the impact on other friendly forces. Military police coordinate the treatment
of DCs with the host nation, interagency, and NGOs, as appropriate.
z Conduct MMS operations to aid a force to maneuver and mass. Military police must anticipate
transitions from the defense to the offense and assist the forward movement of reserves or
reaction forces. Deliberate police engagement and PIO targeting the local population can provide
critical police information regarding threat conditions and the local environment, enabling
commanders to make appropriate decisions.
z Conduct AS operations to deny information to enemy reconnaissance elements seeking the
location of the defending force. Military police conduct aggressive R&S to deny enemy access
to critical logistical and sustainment facilities. They support movement corridors established in
high-threat areas. Military police elements position assets to control key terrain or improve the
defensive capability of bases and base clusters and gather critical information in support of
integrated PIO.
3-83. During stability operations, the demand for increased specificity in technical capability may be
required. This is especially true during extensive nation building when ongoing support to host nation
police and prison systems is required. Support to policing and penal institutions (which may include
training, development, or mentorship) is a critical capability to enable the maneuver commander at the
tactical level during stability operations. Military police facilitate the ability to discern and identify patterns
and plan specific strategies that are based on the criminal threat, providing specific threat information in the
form of police intelligence. Stability operations may be supported through all five military police functions.
However, support to stability operations may be primarily focused on L&O and I/R operations. PIO, as an
integrated military police function, is executed continuously throughout all military police operations. This
includes potentially establishing, using, and transferring host nation PIO information. Specific missions
during stability operations may include the following–
z Establishing a strategic LE stationing plan.
z Executing theater LE operations.
z Establishing, operating, and transferring police stations to trained and skilled host nation police.
z Establishing regional police academies.
z Controlling the movement of civilians and providing relief to human suffering.
z Establishing and training regional or urban police patrol operations (such as traffic control
management and emergency first-responder operations).
z Establishing and training special police operations (such as special reaction teams, emergency
response, protective services, riot control, and functional patrols).
z Establishing and training criminal investigative capabilities.
z Establishing indigenous highway patrols.
z Establishing indigenous police information systems (such as administrative, logistics, training,
and operations).
z Establishing vehicle registration systems.
z Conducting information management liaison operations for all required echelons.
z Establishing host nation police reports, forms, databases, and management protocols.
z Recommending the procurement of material to create police infrastructure, communications
equipment, and uniform sets.
z Establishing strategic detainee and penal system templates.
z Executing theater detainee operations.
z Establishing, operating, and transferring theater-level internment facilities to host nation control.
z Establishing regional detainee and penal academies.
z Transferring or adjudicating criminal detainees.
z Establishing juvenile detainee operations.
z Training special teams (such as special reaction teams, forced cell moves, escorts, and riot
control teams).
z Conducting counterinsurgency-related detection efforts.
z Conducting multilevel information management liaison operations.
z Establishing rehabilitative and reconciliation programs to facilitate the return of detainees to
society.
z Providing detainee and penal police transition teams.
z Recommending procurement of internment infrastructure (such as utilities, communications
equipment, and uniforms).
z Establishing indigenous detainee automation and information systems (administration, logistics,
operations, and training).
z Establishing standard detainee reports, forms, databases, and management protocols.
z Establishing and supporting resettlement facilities in support of civil-military operations.
UNIFIED ACTION
3-84. Unified action is the synchronization, coordination, and/or integration of the activities of
governmental and nongovernmental entities with military operations to achieve unity of effort. (JP 1-0)
Unified action includes coordination and/or integration of the activities and actions of other government
agencies and multinational military and nonmilitary organizations. See FM 3-0 for more information on
unified action.
3-85. Successful PIO requires unified action. The joint nature of U.S. military operations requires close
coordination among the Services. Military police and USACIDC personnel conducting PIO regularly
coordinate with their counterparts from the other Services to pass and receive information and police
intelligence and to leverage inherent capabilities. Integration and synchronization of police intelligence
activities may occur in-theater or out of theater. For example, extensive forensics analytical capability
supporting PIO at the tactical and operational levels may occur in-theater by modular deployed forensics
assets or through laboratory capabilities outside the theater of operations. Combined efforts between U.S.
LE elements, multinational, and host nation military and civilian police agencies in collecting, analyzing,
and sharing police information and intelligence are conducted throughout the AO to enable successful civil
security and civil control efforts and transition to host nation control. At the strategic level, the CITF
provides integrated and synchronized investigative and analytical support to elements in multiple AOs.
3-86. Multinational operations is a collective term to describe military actions conducted by forces of two
or more nations, usually undertaken within the structure of a coalition or alliance. (JP 3-16) Military police
and USACIDC staffs coordinate and share information and police intelligence (as necessary and
applicable) with multinational forces supporting the overall operation. Many multinational military police
organizations provide extensive policing capabilities and experiences, to include analytical capabilities and
insights that are not resident in the U.S. military. Proactive liaison with these elements not only ensures
unified action but complements and enhances U.S. capabilities. See FM 3-0 for more information on
multinational operations.
3-87. Interagency coordination occurs within the context of Department of Defense involvement, the
coordination that occurs between elements of the Department of Defense, and engaged U.S. government
agencies for the purpose of achieving an objective. (JP 3-0) Military police conducting PIO share
information and police intelligence with other U.S. government agencies operating in the AO. This
decreases the likelihood that information gaps pertinent to policing and LE operations cause unintended
consequences that could jeopardize the operations of either the agency or U.S. military organizations.
Interagency cooperation in sharing police intelligence also fuses the capabilities of the separate agencies to
enhance police intelligence and overall situational understanding. Commanders and PMs typically establish
liaison and information-sharing networks with civilian organizations directly impacting military police
operations to facilitate integration of civilian agency, military police, and U.S. military capabilities.
3-88. Unified action also involves synchronizing joint or multinational military operations with activities
of indigenous populations and institutions, IGOs, and NGOs. Indigenous populations and institutions,
IGOs, and NGOs may be a significant source of valuable police information, although this information will
typically be collected informally and passively in the course of normal operations.
INFORMATION REQUIREMENTS
4-1. Collection includes the activities required to gather and report police information to answer IR.
Collection may involve gathering new relevant data and raw information or exploiting existing police
intelligence products. IR drive the collection effort of military police and USACIDC elements. Effective
collection efforts are generated and driven by the operations process. They are planned, focused, and
directed, based on the CCIR, threat assessments, police intelligence, and investigative requirements.
Whether on a CONUS installation, at an operating base preparing for MCO, or in a remote village during
stability operations, success comes from integrating information gathered during military police collection
and assessment activities and conducting analysis and fusion with other sources of information to answer
IR.
4-2. Commanders designate the most important, time-sensitive items of intelligence they need to collect
and protect as CCIR; PIO anticipates and responds to the CCIR. As discussed in chapter 3, the intelligence
community, LE, or other staff sections and subordinate units may nominate PIR. Police intelligence
analysts monitor the PIR and subordinate IR for information of value in determining enemy and criminal
COAs.
4-3. Requirements related to civil considerations concerning police and prison systems, policing
activities, and criminal environments are of specific interest to military police and USACIDC commanders
and staff and police intelligence analysts. PIR of interest to police intelligence analysts may include the
identification of previously unknown criminal or terrorist organizations. Methods and routes for the
concealment and movement of contraband (such as weapons, money, personnel, or drugs) may also be of
particular importance. Capability and capacity of host nation police and prison systems and infrastructure,
determination and impact of criminal activity in the AO, and the functionality of the criminal justice system
are also of specific concern and focus for military police and USACIDC personnel.
4-4. At times, received PIR or IR data may be specific enough to be recognized as having immediate
value. Other times, PIR will simply fill in a piece of a puzzle. It is important to monitor both current and
previous PIR and IR reporting. Older information that was not originally recognized as being of value may
increase in importance as other new information is gained through information sources or ongoing
investigations.
POLICE ENGAGEMENT
4-14. Police engagement is a cornerstone to successful long-term police operations. Successful police
organizations interact with and gain support from the majority of the population they serve. This holds true
for both civilian and military forces in any OE and is reflected in the military police motto: Assist, Protect,
Defend. Police engagement occurs—formally and informally—any time military police and USACIDC
personnel interact with area residents, host nation police and security forces, media personnel, and any of
the numerous other avenues that allow personnel to gain and share information about threat and criminal
activity in an AO. Data (information) obtained through police engagements must be collected, analyzed,
and distributed in a timely fashion to be of maximum value to commanders, Soldiers, and the mission.
4-15. Police engagement is a specific type of information engagement; it occurs between police personnel,
organizations, or populations to establish trust and maintain social order and the rule of law. Military police
and USACIDC personnel engage local, host nation, and multinational police partners; police agencies; civil
leaders; and local populations to obtain critical information that can influence military operations or
destabilize an AO. The goal of police engagement is to develop a routine and reliable network through
which police information can flow to military police and USACIDC personnel and into the operations
process. Based on the tactical situation and designated IR, police engagement can be formal or informal.
4-16. Police engagement is an activity with two distinct purposes. It is used to inform the populace or other
agencies and organizations of specific data points and themes in an effort to persuade the population to
cooperate with civil and military authorities; mitigate potential or occurring discontent or animosity;
provide advanced notification of program, policy, or procedural changes to mitigate potential problems; or
gain support and develop a sense of community involvement. Police engagement is also a means to interact
with and gain valuable information from the population or other agencies and organizations. It is enhanced
by regular contact and the subsequent development of trust.
4-17. Formal police engagement is generally conducted as part of deliberate information engagement
strategies to gain support or information or to convey a message. This function requires preparation,
coordination, and proper reporting after a police engagement activity. Through formal police engagements,
military police and USACIDC personnel interact with and influence a wide range of personnel and
organizations, to include indigenous or multinational police, civil leadership, governmental agencies, and
NGOs. It is essential that information and data exchanged are accurate and consistent with the
informational themes and operations they represent.
4-18. Informal police engagement is widespread and less directive in nature; however, it is no less
important to the overall success of the mission. Every interaction between military police Soldiers and
personnel outside of their military police unit has the potential to be an informal police engagement. This
level of engagement can occur dozens of times in a single shift. It is not constrained by location, prior
coordination, or resources. By building a rapport with the community, military police Soldiers establish
avenues to obtain police information.
4-19. Commanders set the priorities and strategic goals for police engagement and resource police
engagement activities. Individual military police Soldiers and teams interacting with the population conduct
the bulk of police engagement missions. During formal and informal police engagement, military police
leaders and Soldiers maintain a deliberate focus and commitment to identifying criminal actors, crime-
conducive conditions, and other criminal or policing factors that could destabilize an area or threaten the
short- or long-term mission success. Police engagement should be reported through established reporting
methods at the conclusion of the mission. This can be done through verbal back briefs, written patrol
reports, automated databases, or other reporting mediums. The information can then be evaluated for
further dissemination, analysis, and action, as required. If valuable information is identified, an informal
police engagement can quickly transition to a deliberate collection effort. Chapter 6 discusses the
production and dissemination of police information and intelligence.
Community Leaders
4-20. Community leaders can be a valuable source of information specific to their areas of influence. They
will typically have historic knowledge of persons and activities in their cities, towns, neighborhoods, or
bases. While all information received should be confirmed and vetted, community leaders can provide
military police, USACIDC personnel, and police intelligence analysts with valuable information regarding
the criminal history in their area (such as activities, persons, and groups), the arrival of new persons or the
emergence of groups, and activities and observations that are “out of the norm.” These leaders can also
provide insight into the disposition of the population reference police in the area (such as animosity, levels
of trust, and perceptions).
4-21. Community leaders in another culture may require time and effort by military police and USACIDC
personnel to build a level of trust that will facilitate open sharing of information. Care must be exercised to
ensure that interactions with local leaders are initiated at the appropriate level. Failure to do so may result
in individuals feeling slighted or developing an inflated sense and perception of importance among other
community members. These assessments should be made early in an operation to determine the appropriate
level of engagement. Community leaders may include–
z City or town government officials.
z Installation or base commanders and staff.
z School officials.
z Neighborhood mayors and watch leaders.
z Religious and tribal leaders.
z Informal leaders.
Initial Complaints and Contacts
4-22. Military police and USACIDC personnel can gain a significant amount of information from initial
complaints or calls for response due to specific emergencies or incidents. The initial contact with
complainants or individuals at the scene of an incident (such as witnesses, victims, or potential
perpetrators) can result in valuable pieces of information that may not be available with the passage of
time. These circumstances provide witnesses, victims, and perhaps contact with potential perpetrators that
have recent memory of an event or a valuable observation. It is important that this information is captured
and documented as quickly, thoroughly, and accurately as possible. The passage of time will result in faded
memories; modified recollections based on external inputs; internal rationalizations and thought patterns;
and intentional or unintentional corroboration between witnesses, victims, and perpetrators. Accurate and
timely information is critical to the development of accurate assessments by the military police, USACIDC
staff, and police intelligence analysts.
Interagency Coordination
4-23. Military police and USACIDC personnel regularly interact with representatives of local, state, and
federal LE agencies. In a deployed OE, this interaction may also expand to OGAs, such as the Department
of State, multinational partners, and host nation governmental organizations. NGOs may also be present in
an AO, depending on the type of operation and the security environment. The development of appropriate
relationships with these entities can provide a wealth of valuable information to military police and
USACIDC operations. See chapter 6 for more information regarding interagency coordination. Interagency
coordination may include–
z Host nation police.
z Civilian LE agencies (local, state, federal).
z Multinational police forces.
z U.S. governmental agencies (such as the Department of State or DHS).
z NGOs (such as the Red Cross or Doctors Without Borders).
MILITARY POLICE RECONNAISSANCE, SURVEILLANCE, AND ASSESSMENT
4-24. Military police reconnaissance and assessment capabilities cover a wide span. These task capabilities
range from tactical reconnaissance requiring relatively little technical capability to technically specific
assessments requiring military police or USACIDC elements with specialized technical training and
experience. Tactical reconnaissance missions by military police Soldiers still benefit from the basic LE
training that separates military police Soldiers from non-military police Soldiers. Military police and
USACIDC Soldiers with specific technical capabilities may augment baseline military police patrols or be
employed as part of a multifunctional reconnaissance or assessment team. Capabilities in military police
and USACIDC units that facilitate the conduct or support of reconnaissance and assessment include–
z Area, zone, and route reconnaissance.
z Detention requirement assessments.
z Police and prison infrastructure assessments.
z Police and prison capability and capacity assessments.
4-28. Military police and USACIDC personnel may be required to conduct surveillance focused on
observing specific criminal or threat targets and gathering required information. LE surveillance may be
required to confirm suspected criminal activity, establish association of a suspected criminal in terms of
time and place, and confirm association between persons, groups, or entities. Surveillance may be physical
observation of a person or location, visual surveillance by remote video equipment, or audio surveillance
via a myriad of technologies employed to intercept audio evidence. LE surveillance is typically associated
with specific criminal investigations. However, LE surveillance may also be performed to conduct
assessments, such as traffic studies, physical security assessments, or other security and protection
requirements.
CRIMINAL INVESTIGATIONS
4-29. Military criminal investigations are official inquiries into crimes involving the military community.
A criminal investigation is the process of searching, collecting, preparing, identifying, and presenting
evidence to prove the truth or falsity of an issue of law. (FM 3-19.13) Criminal investigations involve
activities to collect pertinent information related to a criminal or suspected criminal activity. These
activities are focused on determination if in fact a crime has been committed, to identify any perpetrators,
and collect and organize evidence for the purpose of enabling successful prosecution.
4-30. Military police Soldiers investigate a wide range of crimes, incidents, and accidents in environments
where military personnel, assets, and interests are found. These investigations range from simple
investigations completed quickly by Soldiers on routine patrols to extremely complicated fraud
investigations spanning several years. Investigations may result from information gathered and police
intelligence developed during operations that point to a person, network, or location that could be
associated with threat forces. At other times, investigations may result from known criminal events or
incidents.
4-31. All military police Soldiers are trained to conduct initial investigations. Specially trained military
police investigators and USACIDC special agents conduct most formal criminal investigations in the
Army. These investigators are trained in technical investigation techniques, to include evidence
identification, processing, and preservation critical to successful criminal investigations. USACIDC
typically maintains purview over all criminal cases as outlined in AR 195-2. Military police Soldiers
investigate incidents by identifying, collecting, and preserving potential evidence; observing physical
characteristics of locations and items; and conducting interviews with witnesses, victims, suspects, and
technical experts.
4-32. Police intelligence analysts support investigators through the collection, collation, and analysis of
investigative information from case files that involve allegations and testimony from witnesses, suspects,
and victims. Information drawn from these case files can benefit from the inherent analytical framework
and scrutiny performed by investigators. Information can also be derived through testimonial evidence or
from quality information that has been vetted through the rigor of the criminal investigative process and
can result in timely and relevant information and police intelligence in support of criminal investigators.
Information gained via criminal investigative files can result in an accelerated generation of police
intelligence. In complex cases involving criminal networks or criminal activity crossing jurisdictional
boundaries, analysis can be a laborious and time-consuming process.
4-33. Typically, police information and police intelligence associated with criminal investigations is
LE-sensitive and remains within LE channels. Depending on the environment and mission, this police
intelligence may be directly integrated into the operations process to enhance situational awareness in the
Army at large. PIO can provide significant, relevant, and timely police intelligence derived from U.S. and
host nation criminal investigative efforts focused on active criminal, terrorist, and irregular threats against
U.S. and host nation assets and interests (see FM 3-19.13 for in-depth discussion LE investigations).
INTERVIEWS AND LAW ENFORCEMENT INTERROGATIONS
4-34. Although physical evidence, records, and recordings can often provide critical bits of information
about an incident, there is almost always significant benefit in asking questions of persons who have some
knowledge of an incident (including preparation and aftermath activity). There are three categories of
question-and-answer sessions: interviews, LE interrogations, and tactical interrogations. Interviews are
conducted with persons who may or may not have information important to an incident and are, by general
definition, not confrontational. Interviews are used by LE personnel during the initial-response phase to
determine facts regarding an incident. They are also conducted by military police or USACIDC personnel
in an effort to gain background or corroborative information. LE interrogations are conducted by military
police investigators, USACIDC special agents, or host nation security forces with individuals suspected of
a crime in which some type of prosecutorial outcome is expected. LE interrogations are generally more
confrontational than interviews. Tactical interrogations are conducted by MI Soldiers when the status of a
person and the circumstances of the incident indicate that the matter will not likely be part of a criminal
prosecution.
critical in forming a conclusion or judgment. Effective evidence collection requires planning, preparation,
execution, and training. Evidence collection teams can be selected ahead of time to focus training and
resources. Digital cameras, rubber gloves, paper bags, boxes, tape, and marking supplies are all tools
required to properly collect evidence. Evidence collection should be performed as a deliberate and
methodical process, unless the tactical situation requires a hasty collection effort. Evidence should also be
handled by as few personnel as possible to avoid contamination and risk of breaking the legal chain of
custody.
4-39. Chain-of-custody documentation is critical for evidence to be used in criminal proceedings. Chain of
custody extends from the moment of collection, through final disposition, and must document every
transfer of custody in between. Chain of custody should always be maintained and documented to ensure
validity of the evidence in a criminal trial. Even if criminal proceedings are not anticipated due to the
tactical situation, individuals may be detained and criminal prosecution sought at a later date. Following
proper evidence procedures, including chain-of-custody documentation, ensures that collected evidence can
be used in criminal proceedings.
4-40. The most recognizable evidence consists of physical items that are related to crimes or incidents,
including firearms, illegal drugs, and blood-spattered clothing. Although these items all have obvious
evidentiary value, their value is increased when placed in the hands of police intelligence and forensic
analysts. For example, when properly handled and analyzed, weapons confiscated at the scene of an attack
on U.S. forces may provide—through the discovery of fingerprints or deoxyribonucleic acid (DNA)
evidence—information on the individuals who last handled the firearms. The barrel and firing pin of a
weapon may be an exact match to a weapon used in previous attacks against U.S. or multinational partners.
The evaluation of drugs and associated materials may also provide fingerprints or DNA evidence; a
chemical analysis may even specify the region the drug was grown in or how it was processed.
4-41. The tremendous growth in electronic devices, including cell phones, digital cameras, laptop
computers, and global positioning systems (GPSs) has also expanded the types of evidence that can be
collected. Photographs, video and audio recordings, recording equipment, and computers (to include other
portable data storage such as diskettes, thumb drives, memory cards, and media players) can provide a
wealth of information about a criminal or terrorist organization, including identities, training techniques,
weapons capabilities, targets, and locations. Photographic evidence may come from U.S. or host nation
security forces, including manned or unmanned aircraft.
4-42. Written or printed (hard copy) documents are a valuable source of police information. Fingerprints
and DNA can be lifted from sheets of paper or envelopes. The type of paper or print used may provide
clues as to the system used or the age of the document. Word choices and spelling may provide clues as to
a person’s background and education. A handwriting analysis may give investigators another means of
identifying a specific individual. Lists kept near the computer may be valuable as they may contain
passwords, Web site addresses, access codes, e-mail addresses, and aliases. This category of evidence also
includes identity papers, including passports, visas, licenses, property ownership, and shipping documents.
An analysis of written and printed documentation may identify locations that an individual has visited,
suppliers used, funding sources, and associates (see FM 3-19.13 for more information on evidence
collection).
4-43. The use of forensic evidence and biometric identification through numerous modalities, such as
fingerprints, DNA, and iris scans; firearms and toolmark analyses, and forensic examinations has
significantly increased the ability of investigators and police intelligence analysts to add clarity and
certainty to their understanding of events and the involvement of individuals in those events. Forensic and
biometric capability requires–
z Military police personnel, LE investigators, and trained Soldiers who can recognize, preserve,
and collect potential forensic evidence.
z Forensic laboratory examiners who can extract usable information from the collected evidence.
z Biometric collection and storage capability and manipulation software for comparison and
analysis of biometric samples.
4-44. Biometric and forensic identification tools and capabilities can be significant assets to distinguish
friendly and threat forces and in establishing identity dominance in the AO. These tools are also critical in
criminal investigations to identify an individual, establish a person’s presence at a specific location in
relation to time and space, establish a suspect’s physical contact with material related to an investigation, or
identify indicators of deception. Military police and USACIDC organizations extensively employ the use of
biometric and forensic capabilities while conducting LE in support of posts, camps, and stations or full
spectrum operations.
Biometric Data
4-45. A biometric is a measurable physical characteristic or personal behavioral trait used to recognize the
identity or verify the claimed identity of an individual. (JP 2-0) Biometrics is the process of recognizing an
individual based on measurable anatomical, physiological, and behavioral characteristics. (JP 2-0)
Biometrics applications measure these biological characteristics or personal behavioral traits and compile
the data in databases for future comparison.
4-46. These characteristics and traits can be useful for tracking individuals, making positive
identifications, establishing security procedures, or using as tools to detect deception based on measurable
biological responses to stimulus. Biometric data can be used for protection and security efforts and as
evidence in investigations and criminal prosecutions. The following two major types of biometric data are
useful to police and intelligence collectors–
z Identification data. This data includes biological information, such as fingerprints, voiceprints,
facial scans, retinal scans, and DNA. This data is used to match an individual to a source
database. Police assets can verify the identity of a specific individual from a target population
during screening or search the database to establish the identity of an unknown individual.
z Data that indicates source truthfulness. Biometric devices, such as the polygraph, are useful
in determining a subject’s truthfulness. This device is useful to criminal investigators, but has
limited use across the Army and in routine military police operations or intelligence due to
training and certification requirements and the level of expertise needed to accurately use the
equipment and interpret the data. USACIDC and the United States Army Intelligence and
Security Command maintain the only polygraph capability in the Army. The Commanding
General, USACIDC, in coordination with the Army Deputy Chief of Staff for Operations and
Plans, exercises overall Army Staff responsibility for the DA Polygraph Program and for
providing policy guidance with respect to using the polygraph in criminal investigations. The
Army Deputy Chief of Staff for Intelligence provides policy guidance for use of the polygraph in
intelligence and counterintelligence applications (see AR 195-6).
4-47. Military police and USACIDC staff and investigators or police intelligence analysts can leverage
biometric data to develop trends, patterns, and associations between individuals. Biometric data that results
in identifications, confirmation of an individual’s presence at specific times and locations, and
determinations of truthfulness or deception can be extremely useful in building singular associations to
linking groups, cells, or organizations.
Forensic Evidence
4-48. Forensics is the deliberate collection and methodical analysis of evidence that establishes facts that
can be used to identify connections between persons, objects, or data. It is most commonly associated with
evidence collected at crime scenes or incident sites, but also includes methodologies for analysis of
computers and networks, accounting, psychiatry, and other specialized fields. Forensics is typically
employed to support legal proceedings that lead to criminal prosecution. Additionally, forensics is used
during analysis and subsequent targeting in support of full spectrum operations. The USACIDC supports
Army forensics requirements through the USACIL. The USACIL facility is stationary due to the nature of
the equipment required and other operational requirements.
4-49. Operational requirements for forward-deployed forensic capability have resulted in the development,
deployment, and operation of mobile forensics laboratories in the supported AO. The USACIDC provides
limited deployable forensics labs to support commanders conducting full spectrum operations as far
forward as possible. This expeditionary capability enables timely forensic analyses across a broad range of
forensic capabilities, to include latent fingerprints, toolmarks, firearms, and DNA. USACIDC laboratory
capabilities may be operated in conjunction with forensic laboratory capabilities resident in our sister
Services, capitalizing on complementary capabilities to support the operational commander.
4-50. Forensic analysis expands the ability of police intelligence analysts to establish trends, patterns, and
associations by providing scientific documentation of relationships between persons, objects, or data.
Criminals, terrorists, or other threat elements tend to operate in predictable ways. The challenge is
identifying the patterns. The analyses and comparisons of fragments left at the scenes of improvised
explosive device (IED) bombings or sites in an AO can identify similarities in the materials used, the
construct of the trigger device, and other variables. This can lead to the development of patterns in which
events can be associated with the same bombmaker. Information derived from analyses of the materials
used, to include the identification of chemical characteristics, can enable police intelligence analysts to
develop associations leading to specific suppliers of those materials. All these efforts can lead investigators
to the resolution of criminal investigations and operational commanders to develop targeting strategies, as
appropriate.
4-51. Proper handling of material from crime scenes or incident sites is critical to the success of forensic
examination by forensic scientists and technicians. Military police are trained to properly identify, preserve,
and collect material, whether in the context of crime scene processing, collecting, or through protecting
material at an incident or sensitive site. Operational requirements have resulted in all Soldiers being trained
on the basics of evidence collection and preservation in the context of incident sites in an operational AO.
INFORMANTS AND LAW ENFORCEMENT SOURCES
4-52. In some circumstances, investigators may attempt to gain recurring access and insight into the
workings of a criminal or terrorist network. At other times, they will seek similar access to an organization
that may knowingly or unknowingly provide support to criminals or terrorists. Army LE personnel
frequently obtain information from informants or LE sources. Informants or LE sources may be insiders
who, for a variety of reasons, are willing to provide such information. At times, these persons may be
anonymous and available only once or twice. At other times, they will be known to the investigator and
may be willing to provide additional information, including information they obtain specifically at the
request of an investigator or analyst.
4-53. Informants are informal contacts that are willing to provide information to LE personnel; there is no
formal relationship established between an informant and LE personnel. They can be repetitive sources of
information or may provide information only once. LE sources are managed formally and include strict
controls to protect the source and control contact and information flow. Army LE sources are registered and
managed by USACIDC source managers.
Note. Personnel involved with selecting, recruiting, and managing a registered source will
normally coordinate and deconflict their sources with other source managers operating in the
AO. This coordination occurs between USACIDC source managers and the supporting
HUMINT and counterintelligence sections. TC 2-22.303 states that at each echelon, the
HUMINT and counterintelligence section coordinate with nonintelligence activities (such as LE)
and with non-DOD agencies See TC 2-22.303 for more information on MI source operations.
Army LE sources are governed by AR 195-2.
4-54. Individuals may be motivated to serve as informants or LE sources for a variety of reasons. They
may be motivated by money, either through the assumed protection of their assets or through payments
from investigators. Other informants or LE sources may cooperate with U.S. and LE authorities to prevent
prosecution or attack or to direct prosecution or attacks against their rivals. Still others are motivated by
feelings of patriotism, justice, or simply because they support U.S. ideals. Some informants and LE sources
will be motivated by feelings or revenge against the organization they are reporting against. It is important
for police investigators and police intelligence analysts and staff to understand these motives. This
understanding may provide insight into biases and potential areas of informant or LE source unreliability
that may make information suspect or, at minimum, warrant more deliberate corroboration.
INTERNMENT AND RESETTLEMENT OPERATIONS
4-55. Detained or imprisoned individuals frequently are sources of information pertaining to other
investigations and trials due to their direct or indirect connections with crime or criminal activity or
personnel internal or external to the detention facility. Only trained interrogators or investigators are
authorized to interrogate or interview detained or imprisoned individuals. HUMINT interrogations are not
LE-related collection activities and, therefore, are executed only by trained intelligence personnel. Military
police Soldiers are prohibited from conducting or participating in HUMINT interrogations of detainees.
Trained police personnel, usually military police investigators or USACIDC special agents, may interview
or conduct LE interrogations of individuals for specific LE investigation purposes.
4-56. Military police guard personnel continuously employ passive collection techniques to gather
information about the population of U.S. military corrections facilities and I/R facilities in support of full
spectrum operations. This passive collection stems from observing the activities, routines, and interactions
of prisoners, detainees, or DCs in resettlement facilities. Military police personnel conducting I/R
operations use both observation and listening techniques to gain and maintain situational awareness critical
to protection of the cadre and population in the facility. This passive collection requires attention to detail
and significant and continuous attention on the part of the military police Soldier. Information collected by
guard personnel is passed through their chain of command to the echelon G-2 or S-2 using established
debriefing procedures.
4-57. Information collected in an I/R environment assists the staff in determining potential security issues.
Criminal groups may organize and exert their influence or act out in violent manners, often targeting I/R
facility cadre or other persons in the population. These associations can be critical to LE investigators as
they develop criminal cases for crimes committed external and internal to a facility. Regular debriefings of
the cadre and guard personnel operating in close proximity to the population in the facility can provide the
military police staff and police intelligence analyst the pieces of information necessary to develop and
identify the formation of disruptive trends, patterns, and associations in the facility.
4-58. Persons in a facility may also provide information relevant to criminal or threat activity outside the
facility. This information should be immediately reported to the military police staff for dissemination to
the appropriate external element for action. In the context of corrections operations, this will typically be
SJA and Army LE investigators. In an I/R facility in a deployed OE, the appropriate external element will
be the command chain and the S-2 or G-2. The external element may also require additional HUMINT or
LE interviews or interrogations. FM 3-39.40 contains additional information concerning I/R operations and
associated PIO.
OPEN SOURCE AND PUBLIC INFORMATION
4-59. Open source and public information can provide a significant amount of information that may be
useful to police intelligence analysts. Trends, patterns, and associations can be determined from open
sources, such as newspapers, press releases, and other publications. With the proliferation of data in the
public domain over the internet, police intelligence analysts can find significant information for integration
and fusion with existing police information and intelligence. Individuals, groups, and organizations
regularly populate public sites, providing valuable information about their associations, organizations,
motivations, and other aspects of their operations and activities.
CONTRACTORS
4-60. A contractor is a person or business that provides products or services for monetary compensation. A
contractor furnishes supplies and services or performs work at a certain price or rate based on the terms of a
contract. (FM 3-100.21) Contractor support in the modern OE has expanded significantly. Contracted
support often includes traditional goods and services support, but may include interpreter communications,
infrastructure, security, and other technical support.
4-61. Integration of contractor information as an element of unified action falls into two categories:
passively collected information provided by contractors and contracted personnel directly integrated into
operations to fill capability gaps. Military police and USACIDC Soldiers may gain valuable information
from contractors. Contractors perform functions throughout an AO and may witness events firsthand or
through interaction with host nation, U.S. military, multinational, IGO, or NGO personnel. Military police
and USACIDC Soldiers should not overlook contractors as a possible source of information. Policing
capabilities may be contracted and integrated into U.S. military operations to enhance existing capabilities;
however, these actions are typically short-term solutions.
RESPONSIBILITIES
5-1. The commander, PM, and LE investigators play a critical role in the analysis process. They
determine IR needed to plan and execute an operation. The commander provides guidance to the staff to
ensure that the analysis effort is integrated with other capabilities of the command (biometrics, forensics,
and exploitation) and that it is focused on critical requirements and priorities. The commander approves or
modifies the recommended PIR.
5-2. Stakeholders (commanders, PMs, and LE investigators) in the analysis of police information must
deconflict their priorities to ensure that their limited analysis assets are synchronized and focused in a
manner that best supports operational and investigative requirements. Military police and USACIDC staff
and police intelligence analysts must understand the priorities of commanders, PMs, and investigators so
decisions regarding analysis priorities are consistent with stakeholder requirements.
5-3. PMs responsible for LE in support of posts, camps, and stations and military police or USACIDC
commanders are responsible for PIO in their assigned AOs. PIO is an operational function; the S-3, G-3, or
PM operations officer is typically responsible for planning and directing PIO. An integral element of PIO is
the analysis of police information enabling the subsequent production of police intelligence. The operations
element responsible for PIO will typically have a trained Soldier or DA civilian police intelligence analyst
assigned. An analyst’s skill set includes–
z Technical expertise.
z Knowledge of targets.
z Analytical-technique expertise and experience.
z Search and organizational abilities.
z Inductive reasoning and data-synthesizing abilities.
z Report-writing and briefing abilities.
5-4. The CCIAC at USAMPS is the approved course to train police intelligence analysts for military
police and USACIDC units. In support of full spectrum operations outside the United States or its
territories, military police and USACIDC staffs conducting PIO coordinate closely with the S-2 or G-2 to
ensure that PIO is synchronized and integrated in the intelligence process. In support of posts, camps, and
stations, police information and intelligence typically remain in LE channels due to legal restrictions placed
on intelligence collection on U.S. citizens. See appendix C for more information on legal authorities
pertaining to PIO.
5-5. PIO conducted in support of installations, posts, camps, and stations in the United States and its
territories must be conducted within legal and policy restrictions regarding the collection and maintenance
of information on persons in the United States. In these OEs, LE personnel may collect information and
maintain police information and police intelligence on specific individuals and groups, if a military nexus
exists (an offense that has been committed or evidence that exists indicating that a crime may be committed
that has a military connection). Intelligence personnel are typically restricted from collecting or storing
information or intelligence on U.S. persons. In OCONUS operations dealing with non-U.S. persons, the
restrictions on collecting and maintaining information and intelligence are typically less restrictive.
5-6. In support of full spectrum operations, police information and intelligence fed into the operations
process is fused with other information and intelligence. Police information and intelligence is integrated
within the overall COP to enable commanders to take effective actions against threat forces. Police
intelligence analysts, MI analysts and, in selected cases, other LE and intelligence agency analysts provide
mutual support to each other. Close coordination and interaction between these elements enhance the
effectiveness of PIO. Analysts at all echelons exchange requirements, information, and intelligence
products horizontally and vertically throughout the system (see chapter 3 for more detailed discussion of
PIO as part of the operations process).
5-7. Regardless of the environment, police intelligence analysts analyze information and produce
intelligence data with the objective of supporting commanders, PMs, and investigators. The ultimate goal
for police intelligence analysts and staff performing police intelligence activities is to develop actionable
intelligence. The trained police intelligence analyst provides the following capabilities to the unit
commander, PM, or LE investigator–
z Development of initial background data and knowledge relative to police operations and the
criminal environment for a specific AO or police investigation.
z Compilation and integration of collected police information for subsequent analysis and
dissemination.
z Information and police intelligence on crime and criminal trends, patterns, associations, and
other police-related statistics and information that increase understanding of–
Offenders, groups, and criminal networks.
Funding sources of criminals.
Activities of specific individuals and groups (supporter, financier, corrupt official, supplier,
trafficker, smuggler, recruiter, or other categorization).
Geographic relationships of crime and criminals.
Human terrain from the perspective of policing and the criminal domain.
5-12. There are many categories of analyses used to organize and guide the analytic process. Analysis is a
very broad term without consistent nomenclature, especially across analytical disciplines. Military police
and USACIDC personnel apply a policing and investigative focus in the use of analytic methods. Examples
of categories and techniques particularly relevant to police intelligence analyses are discussed in the
following paragraphs.
PREDICTIVE ANALYSIS
5-30. Predictive analysis employs multiple analytical techniques to analyze current and historical
information and intelligence to predict future activities, behaviors, trends, or events. It captures statistical
and historical data and, through analyses of previous and current associations, uses patterns and trends to
enable the analyst to predict potential incidents or activities. Predictive analysis is not guessing; it is based
on reasoning, deliberate analysis, and appropriate analytical tools and methodologies. It may focus on
specific criminal or disruptive individuals, groups, or organizations to determine their capabilities,
vulnerabilities, intent, and probable COAs. Predictive analysis can also be valuable in identifying crime
trends and extrapolating future patterns. The value in predictive analysis lies in enabling commanders and
PMs to make informed decisions regarding threat mitigation and interdiction. It also enables them to make
adjustments in task organization and asset distribution to counter negative or disruptive trends.
5-34. Police intelligence resulting from trend analysis is the baseline that analysts and units should use as a
statistical point of reference for future analyses. Trends can be depicted in many different formats, to
include graphs, maps (or other geospatial products), and narrative summaries. Ideally, trend analysis
products should be depicted visually and in a report format. A trend analysis is extremely useful for–
z Specific occurrences.
Traffic accidents.
Driving while intoxicated and other alcohol-related incidents.
Juvenile crimes.
Assaults (including simple, aggravated, and domestic incidents).
Sex crimes.
Suicide.
Drug offenses.
Homicide.
Larcenies.
Gang activities.
Security-related incidents (perimeter breaches, unauthorized entry, exclusion area
violations).
z Offenses by specific persons (persons with a criminal history).
z Locations and times of specific offenses.
z Complaints against the police.
z Number and type of citations.
DD Form 1408 (Armed Forces Traffic Ticket).
Other locally used forms.
z Calls for assistance.
z Response times.
z Special-event attendance statistics.
z Traffic flow.
Specific intersections or roadways.
Entry control points and traffic control points.
Traffic peaks (including daily, seasonal, holiday, and special events).
5-35. Comparisons of the recorded historical police and criminal events and associated trends derived
through statistical trend analysis can provide clues to criminal and threat capabilities, modes of operation,
and activities in relation to time and location. Police intelligence derived from trend analysis enables the
redistribution of police assets to address specific policing problems. Trend analysis can also determine
organizational problem areas and facilitate organizational adjustments or changes to improve operations.
5-37. There are numerous tools and techniques that can be used to display data and establish patterns for
analyses. These tools and techniques include–
z Association and activities matrices. These tools are used to determine associations between
persons and activities, organizations, events, addresses, or other variables. Association matrices
establish the existence of known or suspected connections between individuals. An association
matrix may be reflected as an array of numbers or symbols in which information is stored in
columns and rows. Figure 5-1 provides an example of a basic association matrix. Activities
matrices do not develop associations between people.
z Incident maps and overlays. This tool sometimes referred to as a coordinate’s register,
documents cumulative events that have occurred in the AO. This technique focuses on where
specific events occur. Incident maps and overlays are a critical tool in geographic distribution
analysis. GIS tools can be helpful in producing incident maps with overlay data. Figure 5-2, page
5-10, provides an example of a basic incident map.
z Pattern analyses plotting. This tool focuses on identifying patterns based on the time and date
of occurrences.
FLOWCHARTING
5-41. Flowcharting is a series of analytical techniques that describes and isolates the distribution pattern of
a criminal organization, their mode of operation, and the chronology of crime-related activities.
Flowcharting allows an analyst to isolate associations and patterns identified through previous analysis
techniques to depict a specific person, organization, entity association, or activity without the extraneous
information that may have been present in earlier analysis techniques. The flowchart may also show gaps in
time that need to be accounted for. When combined with ventures and link analysis charts, a flow chart can
assist personnel in understanding relationships and where all of the involved associates fit in to the scheme
of the criminal or terrorist enterprise. Some flowcharting techniques include–
z Activity. This technique depicts the key activities and modes of operation of an individual,
organization, or group. Activity flow analysis is used to view criminal actions and identify
modus operandi to determine likely suspects. Most criminals will leave unique indicators when
committing a crime. These indicators are specific details, common to the specific criminal or
organization, and may include details regarding types of weapons, notes, vehicles, targets, or
number of people involved.
z Time event and theme line charts. These tools establish chronological records of activities or
related events. The charts may reflect activities of individuals or groups and depict large-scale
patterns of activity. Figure 5-5 shows an example standard symbology used in time event charts,
while figure 5-6 shows a basic example of a time event chart.
z Commodity. This technique displays a graphic representation of the movement of materials or
products (such as weapons, materials, drugs, money, goods, or services) in a criminal or other
network, enabling an analyst to discern an organization’s hierarchy.
5-46. Many ideological threat groups place great emphasis and importance on symbolism. This is also true
of the gang culture in the United States. Unique characteristics related to specific threat groups should be
included in the working files, to include–
z Important dates.
z Times.
z Symbolism.
z Modi operandi.
z Signatures.
U.S. and friendly multinational presence. Some considerations include the type and size of
the presence and the location, duration, and perception of the local population and threat
elements.
Geopolitical factors, such as war, instability, economic turmoil, status of local government,
or environmental stress.
5-51. Based on the factors of existence, capability, intent, history, targeting, and security environment, the
criminal or terrorist threat can be assigned a level of probability and credibility. The probability of criminal
or terrorist action against U.S. interests is established as –
z High.
Threat elements are operationally active.
There is potential for significant attacks.
The OE favors the criminal or terrorist element.
z Significant.
Criminal or terrorist elements are present in the AO.
There is operational activity.
The elements possess the capability to conduct significant attacks.
The OE does not favor U.S., host nation, or criminal and terrorist elements.
z Moderate.
Criminal or terrorist elements are present in the AO.
There are no current indications of threat activity.
The environment favors U.S. or host nation elements.
z Low.
There are no indications of a threat presence.
No threatening activity is present in the AO.
5-52. Information and information sources used during analyses should be evaluated for reliability and
credibility. Staffs and analysts conducting PIO must conduct continuous evaluations to ensure that
information used in their analyses do not lead to false assumptions and conclusions due to problems with
the initial source or the information itself. Military police and USACIDC staffs and police intelligence
analysts use a source reliability scale to establish the level of reliability of an information source (see table
5-1). Information is further evaluated for credibility using the information credibility scale at table 5-2.
Table 5-1. Source reliability scale
Rating Reliability Criteria
No doubt of authenticity, trustworthiness, or competency;
A = Reliable
history of complete reliability.
Minor doubt about authenticity, trustworthiness, or
B = Usually reliable
competency; history of valid information most of the time.
Doubt of authenticity and trustworthiness; history of
C = Fairly reliable
reliability information some of the time.
Significant doubt about authenticity, trustworthiness, and
D = Not usually reliable
competency; history of occasional reliability.
Lacking in authenticity, trustworthiness, and competency;
E = Unreliable
history of unreliable information.
F = Cannot be judged No basis exists for evaluating the reliability of the source.
resident in the military police and USACIDC force structure. This multifunctional approach ensures a
comprehensive assessment across a wide spectrum of technical specialties and ensures a holistic and
layered approach.
Halt less than one week or 50 percent curtailment in output, production, or service. 6
Halt in more than one week and less than 25 percent curtailment in output, production, or
4
service.
No significant effect. 1
Accessibility:
Standoff weapons can be deployed. 10
Inside perimeter fence, but outdoors. 8
Inside of a building, but on a ground floor. 6
Inside a building, but on the second floor or in basement. Climbing or lowering is required. 4
Not accessible or only accessible with extreme difficulty. 1
Recuperability:
Replacement, repair, or substitution requires 1 month or more. 10
Replacement, repair, or substitution requires 1 week to 1 month. 8
Replacement, repair, or substitution requires 72 hours to 1 week. 6
Replacement, repair, or substitution requires 24 to 72 hours. 4
Same day replacement, repair, or substitution. 1
Vulnerability:
Vulnerable to long-range target designation, small arms, or charges (weighing 5 pounds or less). 10
Vulnerable to light antiarmor weapons fire or charges (weighing 5 to 10 pounds). 8
Vulnerable to medium antiarmor weapons fire, bulk charges (weighing 10 to 30 pounds), or
carefully placed smaller charges.
6
Vulnerable to heavy antiarmor weapons fire, bulk charges (weighing 30 to 50 pounds), or special
weapons.
4
Invulnerable to all but the most extreme targeting measures. 1
Effect (on the population):
Overwhelming positive effects, but no significant negative effects. 10
Moderately positive effects and few significant negative effects. 8
No significant effects and remains neutral. 6
Moderate negative effects and few significant positive effects. 4
Overwhelming negative effects and no significant positive effects. 1
Recognizability:
Clearly recognizable under all conditions and from a distance and requires little or no personnel
10
training for recognition.
Easily recognizable at small-arms range and requires little personnel training for recognition. 8
Difficult to recognize at night during inclement weather or might be confused with other targets or
6
target components. Some personnel training required for recognition.
Difficult to recognize at night or in inclement weather (even in small-arms range). The target can
easily be confused with other targets or components and requires extensive personnel training 4
for recognition.
The target cannot be recognized under any conditions, except by experts. 1
5-62. Police intelligence resulting from crime and criminal target analyses conducted during PIO and fused
into the operations process and COP can provide valuable information to commanders and staffs to enable
effective targeting. Results of police intelligence analyses may contribute to the development of tactical
threat targets for commanders in an expeditionary OE and target criminals and criminal threat systems that
threaten the commander’s mission or the safety and security of installations, personnel, and resources. It
provides information to the commander and PM, with a related situational understanding of the capabilities
and challenges associated with operating within the rule of law in a given AO. This is extremely important
in expeditionary environment transitioning from major combat and instability to supporting a host nation in
establishing a criminal justice system under the rule of law. As the environment transitions, due process
requirements will increase and targeting activities will require a higher level of specificity and probable
cause to justify warrants or other legal mechanisms to authorize targeting on individuals and organizations.
5-63. The ultimate goal of a crime and criminal target analysis as it relates to PIO is to identify criminal
and threat persons, groups, or organizations; identify historic and current crime trends and predict future
trends and activities that enable targeting decisions; develop investigative leads through the identification
of trends, patterns, and associations; and make target recommendations. Crime and criminal target analyses
and subsequent support to operations occur in all environments. PIO supports the targeting process
through–
z Target identification.
Using the criminal information gathered and stored in the data files to identify threats
(crimes, criminals, and other threat elements and activities) and locations of threat activity.
Identifying the organizations involved in the threat activity. This may be criminal
enterprises affecting U.S. interests or irregular threat groups (such as terrorists, insurgents,
or groups engaging in criminal activity that disrupt or endanger U.S. operations, including
threats from corrupt officials or infiltrators internal to host nation organizations).
z Analyses of police, criminal, and threat data. Data analysis can determine trends, patterns, and
associations that might otherwise go unnoticed. Analysis enables ongoing crime and crime trend
tracking in support of force protection and antiterrorism programs.
At locations in the U.S. and its territories, these analyses aid PMs and investigators in
focusing their resources at the appropriate places and times to deter or interdict criminal and
disruptive activity.
In support of full spectrum operations, military police and USACIDC personnel use this
police intelligence to guide their actions and to enhance the commander’s COP. This can be
done as a U.S. operation or in concert with the host nation or multinational forces,
depending on the mission and operational variables.
z Corroboration of source and informant information. Due to their dispersion and presence,
military police and USACIDC personnel are well equipped to obtain corroborating information
for otherwise unsubstantiated source data.
During LE operations conducted in the U.S. and its territories, this corroboration can be
accomplished through data mining, witness interviews, surveillance, or other source
contacts (see FM 19-10).
Similar techniques can also be applied in support of full spectrum operations to corroborate
witness statements or evidence obtained at an incident site. This corroborated information
can then be used in the legal system for prosecution or acted on by the appropriate GCC for
military action, depending on mission and operational variables.
z Information sharing and support to active police investigations.
Ongoing investigations can be solved using information that is collected and documented by
LE officers, regardless of the agency. One LE officer may have an informant who knows the
perpetrator of a burglary that another officer is investigating. Aggressive and proactive
analyses and information sharing can contribute to the resolution of specific investigations
or criminal activity across organizational lines.
In OCONUS OEs, this support can assist commanders and their staffs by identifying key
threat players, organizations, or cells that may be operating across or in unit boundaries or
AOs. Police intelligence may identify weapons caches, facilities for the production of IEDs,
or personnel involved in threat activities that are being conducted in another AO. The fusion
of ongoing police information and intelligence into the operations process and the COP may
provide critical information to commanders and staffs to enable effective targeting.
z Analyses of threat information. The analysis function is the hub of PIO. Analysis converts
information into actionable police intelligence and contributes to other intelligence products.
In LE terms, the data or information collected is analyzed to develop additional leads in
ongoing investigations, provide hypotheses about who committed a crime or how they
committed it, predict future crime patterns, and assess the threat a crime group or activity
might pose to a jurisdiction.
In full spectrum operations, police intelligence resulting from an analysis of threat
information enhances the operations process and aids in the maintenance of a holistic COP.
Police intelligence may identify threat, operational, or logistical networks; individual
operators or sympathizers; and low-level criminals that can disrupt U.S. operations,
including threats from corrupt officials or infiltrators internal to host nation organizations.
Police intelligence is injected into the targeting process for assessment and exploitation.
ability to access to data, from tactical to national sensors, across the intelligence enterprise and facilitates
reach with collaboration capabilities for deployed elements. DCGS–A enables the rapid input of analytical
products, increasing responsiveness to the needs of commanders and staffs.
5-77. DCGS–A facilitates the rapid conduct of operations and synchronization of all warfighting functions.
This enables commanders to operate in the threat’s decision cycle and shape the environment for successful
follow-on operations. The DCGS–A provides the following capabilities–
z Receives and processes select ISR sensor data.
z Facilitates control of selected Army sensor systems.
z Facilitates ISR synchronization and ISR integration.
z Facilitates fusion of information from multiple sensors.
z Enables distribution of friendly, threat, and environmental (weather and terrain) data.
ADDITIONAL ANALYTICAL AND DATABASE CONSIDERATIONS
5-78. There are many commercial database and analytical applications that are useful for police
intelligence analysis and data management. Some of these applications may be costly and require a
significant up-front training investment; these will typically be used by dedicated police intelligence
analysts. Others may be more readily available as standard database applications that can be used for more
low-level analysis and statistical manipulation; these applications may also be used by dedicated police
intelligence analyst but are also readily and easily available to the staff in general.
Automated Databases
5-79. A database is a tool for collecting and organizing information. A database can store information
about people, types of events, or just about anything. Many databases start as a list in a wordprocessing
program or spreadsheet. Without databases, information is difficult or impossible to retrieve quickly,
especially under adverse conditions. Depending on the capability of the individual database software,
databases can support many complex analytical functions and requirements. Military police staff and police
intelligence analysts may use databases to–
z Deconflict and synchronize collection missions.
z Track requests for information (RFIs).
z Track IR.
z Prepare reports and assessments.
z Track threat and friendly events or situations.
z Develop targeting recommendations and priorities.
5-80. Many analytical software applications are compatible with various databases. This enables databases
to interact with other tools to support predictive analysis, prepare graphic analytical products, and provide
situational awareness to the unit commander. These databases can–
z Support time event charts, association matrices, link analysis, and other analytical tools.
z Allow operators, staff, and analysts to–
Compartment (protect) source-sensitive, operational database segments; files; records; and
fields.
Create, update, and maintain databases from locally generated information.
Import complete or partial databases from larger or peer databases.
Export complete or partial databases to peer or larger databases.
Share database information with personnel possessing appropriate access authorization,
such as peers, subordinates, or higher commanders.
z Allow data queries for decisionmaking and operational and analytical support.
z Interact with analytical programs able to correlate data and facilitate information retrieval from
data repositories.
z Allow for information retrieval functions, such as browsing, Boolean functions, key word
searches, concepts, and similar functions.
Note. There are strict legal and regulatory constraints on the storing of information on U.S.
persons. The supporting SJA should be consulted to ensure that data storage is in compliance
with applicable laws and regulations.
classification, immediate actions should be taken to ensure that the classified data or document is properly
stored to prevent unauthorized access or compromise information or intelligence. Coordination with the
local offices responsible for computer network defense and security issues should be maintained to ensure
that security requirements are maintained.
BE-ON-THE-LOOKOUT ALERTS
6-8. Be-on-the-lookout (BOLO) alerts are routinely sent out by Army and civilian LE agencies. BOLO
alerts are used to provide information to, and request assistance from, military and civilian LE
organizations, military units, and, at times, the general public about specific individuals, vehicles, events, or
equipment. These alerts are typically used when the subject matter is time-sensitive and a heightened
awareness by all available personnel is requested to facilitate the appropriate action. BOLO alerts may be
distributed in a printed format, over appropriate information networks, or transmitted over radio nets,
depending on the breadth of distribution, time sensitivity, or other mission and environmental factors.
6-9. BOLO alerts may be general or very specific, but they should contain, when possible, enough
information to prevent numerous “false positive” reports and should provide reporting and disposition
instructions. These instructions should include any known dangers associated with the subject of the BOLO
alert. For example, a BOLO alert for a grey BMW automobile to all military police units operating in
Germany or an orange and white taxi in Iraq would be ineffective and would likely result in an extremely
high number of “sightings.” This type of general information might also be ignored by military police
personnel for the same reason. Additional information about the driver, body damage to the vehicle, or
other specific details would reduce the false positives and increase the value of what is reported. In some
instances, the amount of known information is limited to one or more identifying data points. This is
common in expeditionary environments where a list of names may be the only data available or
immediately following a crime or incident when only rough descriptions of suspects or few witnesses are
available. Figure 6-1 and figure 6-2, page 6-4, show examples of BOLO alerts.
Insert Photo
The FBI has issued a be-on-the-lookout (BOLO) alert for (subject) in connection with possible
threats against the United States. In the BOLO alert, the FBI expresses interest in locating and
questioning (subject) and asks all law enforcement personnel to notify the FBI immediately if he is
located. Subject’s current whereabouts are unknown.
Subject is possibly involved with al-Qaeda terrorist activities and, if true, poses a serious threat to
U.S. citizens worldwide.
Subject is 27 years old and was born in Saudi Arabia. He is approximately 132 pounds (but he may
be heavier today), 5’3” to 5’5” tall, has a Mediterranean complexion, black hair, black eyes, and
occasionally grows a beard. A photograph of this individual is available on the FBI’s Web site, at
<http:www.fbi.gov>.
Subject carries a Guyana passport; however, he may attempt to enter the United States with a
Saudi, Trinidad, or Canadian passport. Subject is also know by the following aliases:
Legend:
BOLO be-on-the-lookout
D.C. District of Columbia
FBI Federal Bureau of Investigation
U.S. United States
Figure 6-1. Example of an FBI BOLO alert
UNCLASSIFIED
For Official Use Only
Be-on-the-Lookout List
Date Individual/Vehicle Threat Summary
4 Sep XX 1970s Chevrolet Impala, Used in transporting explosive materials for IED production
White, host nation Plate and targeting U.S. and host nation police forces.
283AC2
5 Sep XX Late model Mercedes panel Possible transport vehicle used for transiting contraband
truck, dark blue with white weapons, stolen merchandise, and funds used in support of
bumpers, host nation Plate organized criminal networks operating in the AO. Has also
853DJC reportedly used different plates, including GE65ART and
UK19873.
15 Sep XX John Doe Individual wanted for questioning by host nation and U.S.
military police personnel in connection with the murder on
4 Sep XX of a host nation police chief with possible
connections to at least three additional assassinations of host
nation police officials. This individual has been previously
detained and subsequently released; biometric data is
enrolled in Biometrics Automated Toolset and Handheld
Interagency Identity Detection Equipment in the AO.
UNCLASSIFIED
For Official Use Only
Legend:
AO area of operations
IED improvised explosive device
Sep September
U.S. United States
Figure 6-2. Example of a BOLO alert
6-12. A CPS may be initiated by USACIDC or at the request of the supported commander. USACIDC
conducts CPSs and crime and criminal activity threat assessments of facilities, activities, events, and areas
that are under Army control or that directly affect the Army community. The USACIDC may also conduct
CPSs of other DOD facilities and activities when requested (if resources are available). The CPS will
identify situations that are not procedural deficiencies but could, if left unchecked, result in the loss of
Army assets through negligence, systemic weakness, or failures and erosion of established internal
controls. The CPS is provided to the local commander responsible for the AO in question, typically
commanders of posts, camps, stations, or other mature bases. A CPS identifies–
z Criminal activity in a specific location.
z Regulatory deficiencies.
z Economic threats to installations or activities.
z Domestic and international terrorist threats.
z Likely theft, diversion, sabotage, or destruction of U.S. government property or assets.
z Vulnerability of Army automated systems.
1. PURPOSE: This Crime Prevention Flyer addresses the larceny reported on 21 October 20XX,
and the immediate actions recommended to deter future criminal activity and loss of property.
a. The rear door to the unit warehouse did not have a security cover over the area of the
door frame where the locking mechanism was located. This facilitated insertion of a pry
bar to force open the door.
b. The rear floodlights were burned out or missing. Operational floodlights would illuminate
the rear entry, forcing potential criminals to operate in an illuminated area rather than in
darkness.
c. A security camera was present and functional, but not serviced (taping medium was
full); therefore, the security cameras were rendered useless. Interviews revealed that
the camera has not been used during the assignment of any current Soldiers or
civilians.
d. The gate at the rear entrance to the warehouse area was not secured properly, and
security checks on that area were not conducted.
b. Ensuring that security camera tapes or disks are changed in a timely manner and the
camera system is employed.
c. Modifying the rear door of the warehouse to ensure that a security cover is in place.
d. Securing the rear gate entrance to the warehouse area and adding security checks to
existing standing operating procedures.
4. The point of contact for additional information is the undersigned, at (310) 543-0820.
John Q. Agent
Special Agent in Charge
6-23. All supporting documentation, such as blueprints, schematic drawings, still photographs, videos, and
written documents, will be available for review or as attachments to the final PSVA report. The final report
is typically made available to the HRP for review. Due to the nature of these reports, distribution is
normally severely restricted and is provided only to the individual covered in the assessment, their
immediate staff and security team, and USACIDC headquarters. A copy of the final report is kept in the
HRP’s file; a second copy is provided to the USACIDC Crime Records Center, Fort Belvoir, Virginia. The
conduct of PSVAs is directed in AR 10-87, AR 190-58, and AR 525-13.
6-24. The PSVA final report includes–
z The date the HRP briefing was held.
z A list of persons who received the exit briefing.
z The reaction of HRP receiving the briefing.
z A list of noted problem areas and recommended solutions.
z Security recommendations.
POLICE AND PRISON INFRASTRUCTURE, CAPABILITY, AND CAPACITY ASSESSMENTS
6-25. Civil consideration is an important element in military staff analysis, assessment, and planning.
Specific to military police are those civil considerations directly related to police, crime, and criminals in
the form of infrastructure, capability, and capacity assessments. Military police staff and police intelligence
analysts must convert this information and the resulting police intelligence into products usable by
commanders, PMs, their staffs, and LE investigators conducting investigations in the AO. The acronym
POLICE (discussed in chapter 2) provides a format for gathering and organizing police information.
6-26. Police and prison infrastructure, capability, and capacity assessments follow no standardized format.
Product format is driven by many factors, including the–
z Target audience.
z Specific mission.
z Phase of the mission.
z Environmental conditions and status of police and prison organizations and operations.
z Severity and sophistication of criminal activity.
6-27. Police assessments typically contain data about the ability of police forces to conduct their missions,
including patrolling and traffic regulation enforcement, dispatch and internal communications, sustainment
of police organizations, and criminal investigations. Prison assessments may initially focus on the number
of guards and beds available and security concerns affecting operations in the facility; however, over time
they may focus on threat organizations operating in the facility, detainee and prisoner rehabilitative efforts,
and the process for release of detainees and prisoners. These assessments provide police intelligence
regarding a wide range of functional areas necessary for effective police organizations, to include–
z Personnel, such as the numbers of police and prison personnel, management structure, pay
systems, internal investigations and discipline, presence of corruption (political, nepotistic, and
financial).
z Security, such as the vetting of police personnel, control and security of police information,
security concerns in the organization (both internal to the police or prison organization and from
external factors).
z Operations, such as the organizational structure, span of control, centralized versus decentralized
command of police and prison forces, and criminal training standards for police and prison
personnel.
z Logistics, such as supply systems, vehicle and equipment maintenance, funding for maintenance
and supplies, and sources of funding.
z Communications, such as general communications capability, availability of secure
communications, and sufficient communications equipment for all police and prison personnel.
Preparing Office: 11th Military Police (MP) Detachment, Forward Operating Base (FOB) Bulldog,
Remotistan.
1. Subject 1.; Specialist; 555-44-6666; male; white; 6’2”; 180 pounds; brown hair; brown eyes; 345th Messkit
Company, Fort Sunny, California (formerly the 123d Maintenance Battalion, FOB Bulldog, Remotistan).
2. Subject 2; Specialist; 535-33-8888; female; white; 5’4”; 110 pounds; blonde hair; blue eyes; 123d
Maintenance Battalion, FOB Bulldog, Remotistan.
3. Subject 3; Sergeant; 395-65-0909, male; white; 5’8”; 143 pounds; blonde hair; brown eyes; 123d
Maintenance Battalion, FOB Bulldog, Remotistan.
Source of Information: The information contained in this PIA was developed during the referenced MPR and
is considered reliable.
Narrative: At about 2300 hours on 1 May of this year, the 11th MP Detachment, Military Police Investigations
Section, FOB Bulldog, Remotistan, while conducting an investigation of possible larceny of government
property in the 123d Maintenance Battalion supply room, discovered evidence linking Subject 2 and Subject
3 to stolen government property. The stolen property includes bayonets, commercially procured personal
hydration units, and laser sights. During subsequent interviews, Subject 2 admitted that, in addition to being
a friend to Subject 3 and Subject 1, she conspired with them to take government property with intent to mail
the items back to the United States for resale by Subject 1. Several stolen items were later found in the
possession of Subject 3 and recovered. Courts martial actions are being taken against Subject 2 and
Subject 3. Subject 1 has been allegedly quoted by his roommate (not considered a suspect) as saying that
he had a “sweet business deal waiting for him stateside.” The supporting staff judge advocate has reported
there is insufficient evidence to take action against Subject 1. This is a terminal report; no further reports are
contemplated pending receipt of additional police intelligence.
Warning Statement: This document is intended for law enforcement personnel, intelligence analysts, military
personnel, and other officials with a need to know. Further dissemination of this report should be limited to a
minimum, consistent with the purpose for which the record has been furnished (such as the effective
enforcement of civil and criminal law). Additional releases require prior approval from the originator.
Distribution:
Provost Marshal, FOB Bulldog, Remotistan
Commander, 345th Messkit Company, Fort Sunny, California
Provost Marshal, Fort Sunny, California
Source: Information was obtained from a local national informant that has supplied credible and
accurate information in the past; the information is considered reliable.
Credible information has been received that Subject 1, Subject 2, and Subject 3 have been
assembling improvised explosives and hiring third-party individuals to emplace the devices,
targeting U.S. military and host nation convoys throughout Hostile Province.
Subject 1 has been known to use the aliases Alias 1 and Alias 2.
Subject 2 has been known to use the aliases Alias 1 and Alias 2.
Subject 3 has been known to use the aliases Alias 1 and Alias 2.
Police intelligence indicates that Subject 1, Subject 2, and Subject 3 have been manufacturing
improvised explosive devices in a mobile facility, most likely a modified panel van. Police
intelligence further indicates that they consistently use electronic triggers supplied by a foreign
source and that their devices are consistently radio frequency detonated using components from
a single source supplier. When on the move, Subject 3 typically drives, while Subject 1 and
Subject 2 work in the back of the van. Subject 3 is described as 6’6’ tall, weighing more than 300
pounds, with a large, heart-shaped tattoo with “MOM” on his left forearm. There are currently no
descriptions for Subject 1 and Subject 2.
Units operating in the area should be alert for suspicious activity, particularly at vehicle
checkpoints and when involving paneled vans transiting the area of operations. If the suspects
are encountered, detain if possible; however, exercise extreme caution. Additional intelligence
indicates that their van is often “booby-trapped.” If Subject 1, Subject 2, or Subject 3 are
detained, notify the 50th Military Police Brigade as soon as possible to facilitate law enforcement
of the suspects. Incident sites should be searched for remnants of trigger devices and other
material to be collected for forensic evaluation.
The point of contact for this alert is Major Jane Surname, Military Police Operations Officer, 50th
Military Police Brigade, XXX-ZZZ-1234.
This alert is intended for dissemination to all units operating in Hostile Province.
Figure 6-5. Example of a police intelligence alert notice
6-31. The police intelligence alert notice informs the recipients of criminal activity, specific actions
required to interdict or mitigate the stated activity, and specific evidence collection and preservation
priorities. The police intelligence alert notice is an action document, not an informational report. Police
intelligence alert notices produced by USACIDC are referred to as criminal alert notices. Police
intelligence alert notices and criminal alert notices follow the same basic format. They will typically
include–
z The source and reliability of the information.
z Entities involved.
z Any known aliases.
z Known personal identification numbers (such as social security or driver’s license).
z A summary of all pertinent information developed to date on the subject or suspect.
z Actions that the recommending unit wishes to be taken by the activities and agencies receiving
the bulletin (such as detain subject or suspect and notify LE authority).
z Points of contact, including names and contact numbers from the issuing unit.
z Distribution and dissemination instructions and restrictions.
STATISTICAL DATA
6-32. Statistical data can be drawn from diverse sources and can be depicted in numerous manners.
Statistical data may be presented in charts displaying–
z Frequencies (through the use of bar, pie, and Pareto charts).
z Trends (through the use of bar and line charts).
z Distributions (through the use of GIS, trend lines, or other formats).
6-33. Different audiences and types of data require different types of statistical tools to present data in a
manner that is clear and concise. Data placed into a table or other database can be rapidly retrieved and
manipulated into a presentation. The ways in which statistical data can be displayed are numerous. The
next three figures show examples of statistical data in different formats and related to crimes in an AO.
Figure 6-6 displays the number of burglaries, robberies, and larcenies for each quarter of a given year.
Figure 6-7 shows the trend for larceny through the use of a run or line chart. Figure 6-8 displays a pie chart
showing the percentage of occurrences (out of 100 percent) for each crime depicted on the chart.
Figure 6-6. Example of a bar graph showing the rate of select quarterly offenses
Figure 6-8. Example of a pie chart showing crime percentages over a one-year period
Wanted
ARMED AND EXTREMELY DANGEROUS
PHOTO:
NAME: SUBJECT NAME
DOB: NOVEMBER 29, 1985
SEX: MALE
Insert photo (if available)
HEIGHT: 6’ 1”
WEIGHT: 195 POUNDS
HAIR: BROWN
EYES: BROWN
RACE: WHITE
SCARS OR MARKS: BULLET WOUND ON THE LOWER THIGH AND ON THE RIGHT ARM;
SCAR ON RIGHT WRIST, SCAR ON THE LEFT THIGH, AND SCAR ON THE LEFT ANKLE.
ALSO HAS TRACK MARKS ON HIS RIGHT ARM AND BETWEEN HIS TOES.
OCCUPATION: CONSTRUCTION
SSN USED: XXX-XX-XXXX
NATIONALITY: AMERICAN
PLACE OF BIRTH: MIAMI, FLORIDA
IF YOU HAVE ANY INFORMATION CONCERNING THIS CASE, CONTACT YOUR LOCAL
FEDERAL BUREAU OF INVESTIGATION FIELD OFFICE.
REMARKS: SUBJECT HAS BEEN KNOWN TO BE ASSOCIATED WITH THE KLU KLUX KLAN
AND OTHER RACIST GROUPS.
WANTED
BY CID
Information concerning the offense of Larceny of Government Property from the 29th
Sustainment Brigade, Camp Doha, Kuwait APO AE 09090.
On 1 April 1996, the USACIDC initiated an investigation into the Larceny of Government.
Property from the 29th Sustainment Brigade. Between 1800, 29 March 1996 and 0530, 30 March
1996, person(s) unknown stole one M998 HMMWV, bumper number “SVC 4 29TH SB”, serial
number 044308, from the parking lot adjacent to Building 1013A (Headquarters, 29 Sustainment
Brigade), Camp Doha, Kuwait.
IF YOU HAVE ANY INFORMATION ABOUT THIS INCIDENT, PLEASE CONTACT THE CID
OFFICE AT DSN 111-2222/2223, COMMERCIAL 0101-9992222/2223, OR CALL YOUR LOCAL
MP STATION.
Legend:
APO Army Post Office
CID criminal investigation division
DSN Defense Switched Network
HMMWV high-mobility multipurpose wheeled vehicle
MP military police
USACIDC United States Army Criminal Investigation Command
Figure 6-10. Example of a USACIDC wanted poster
FUNCTIONAL CHANNELS
6-41. Functional channels include military police and LE channels and other groups that operate along
functional lines. The LE and intelligence networks are examples of functional channels. Oftentimes, police
intelligence is maintained in LE functional channels. This is done to maintain control over sensitive
information, as mandated by law, and protect information and intelligence critical to ongoing LE
investigations.
Figure 6-12. Typical police intelligence network in support of a post, camp, or station
6-47. Police intelligence network relationships between agencies will fluctuate, based on numerous factors
in the OE. Relationships will also continue to develop as bonds are strengthened through joint ventures and
as agencies expand their own operating networks. Missions and priorities of individual organizations will
greatly affect participation and the level of sharing conducted.
COMMUNICATIONS
6-52. A comprehensive communications system to support the police intelligence network will ensure
uninterrupted contact between elements when necessary. Contact lists for all agencies should be
disseminated throughout the network and routinely checked to validate less-frequent contacts and maintain
personal working relationships. It is desirable that agencies have compatible communications systems for
routine support. Communications systems between network organizations may include–
z Standard communications systems, such as–
Telephones.
Radios.
Facsimile machines.
Commercial e-mail.
Web sites.
Videoconferencing capability.
Computer databases.
z Nonstandard communications systems, such as–
SIPRNET.
Nonsecure Internet Protocol Router Network.
Electronic intelligence interface.
LE specific information exchange networks.
POLICE INTELLIGENCE FUSION CELLS
6-53. Fusion is a collaborative effort between two or more organizations working together and sharing
resources, expertise, and information to enhance the ability of all participating elements to detect,
investigate, and respond to prevent or mitigate crime and criminal activity. It involves the processing of
information from multiple systems, assets, and sources, and translating that information into refined
information and police intelligence products that increase situational understanding and knowledge. Fusion
enables commanders and Army LE to have a significant “observe, orient, decide, and act” advantage over
criminal networks and terrorist groups, cells, and individuals. This effort enables commanders, PMs, and
LE investigators to guide and direct actions that achieve desired effects. The combination of trained and
experienced staff, LE personnel, and police intelligence analysts, coupled with open information-sharing
agreements and advances in technology, allows all elements participating in the fusion process to analyze a
variety of information from different organizations, collection assets, and systems to more effectively
produce actionable police intelligence for personnel making decisions.
6-54. In some cases, a police intelligence fusion cell may be formed to facilitate collaboration, integration,
and fusion of police information and intelligence with other LE and intelligence agencies and
organizations. The primary purpose of a police intelligence fusion cell is the collation, correlation, and
fusion of data from multiple sources, enabling further analysis to produce actionable police intelligence and
increased knowledge concerning police, crime, and criminal activities. This enables the military police and
USACIDC staff and police intelligence analyst to build a coherent picture of the environment to increase
SU and enable informed decisionmaking by commanders, PMs, and LE investigators regarding policing
and investigative activities. Collaboration of LE and MI information and intelligence in a police
intelligence fusion cell enhances the overall police intelligence effort.
6-55. Fusion cells are typically formed to support specific investigations, missions, and operations. They
are also typically more focused and meet more frequently than working groups. These cells may be
required to work continuously to support their assigned mission and purpose. Police intelligence fusion can
provide police information and police intelligence to the operations process and supporting integrating
processes. The CITF is an example of a fusion cell. In the United States, these cells may include local,
county, state, federal, tribal, and all source intelligence agencies operating in or supporting policing and LE
operations in the AO. Outside the United States, this agency interaction and coordination may include other
military units, military and civilian U.S. and multinational organizations, host nation LE elements, and
OGAs. The composition of the fusion cell in any environment is dependent on the specific mission of the
organizations and agencies involved. Table 6-1 shows an example of the composition for a police
intelligence fusion cell.
Information and intelligence regarding individuals and groups operating in the area that
poses threats to U.S. forces and interests.
Specific types of criminal and threat activities identified in the AO.
z Focus areas for observation.
z Specific collection requirements, to include–
Evidence-collection priorities.
Requirements for the handling and disposition of collected documents.
Special requirements for the handling and disposition of captured detainee and enemy
materials.
Specific requirements for use of digital photography.
z Specific personnel, activities, materials, data, or other evidence that should be reported
immediately, such as–
Observed conditions inconsistent with normal events (such as an unusually high amount of
traffic departing an area or a complete lack of activity by the local population).
Indications of an imminent threat to U.S. forces or interests.
Identification of specific persons wanted for specific criminal or threat activity.
Identification of material or information with strategic value or impact.
Time-sensitive information relative to specific criminal activities or investigations.
RESPONSIBILITIES
A-12. The S-3 section or PM section responsibilities include–
z Providing tasking and guidance on specific areas and objectives for police engagement and
tactical questioning, based on unit PIR and specific police IR.
z Synchronizing police intelligence collection requirements with G-2 or S-2 military intelligence
collection requirements.
z Providing relevant background police information, police intelligence, or military intelligence
and information (to include open-source information) to mission elements to improve their
cultural knowledge and situational awareness, thus facilitating effective police engagement,
tactical questioning, and protection efforts.
z Establishing procedures to ensure that all mission elements are debriefed at the end of the
mission.
z Establishing and emphasizing procedures for immediate reporting of information of critical or
time-sensitive tactical value (such as a spot report in the size, activity, location, unit, time, and
equipment format).
z Establishing procedures and disseminating special requirements for proper evidence collection
and handling of captured equipment or media (such as cellular telephones, documents, or
computers).
z Coordinating for any additional assets required to support police information collection
requirements (such as HUMINT collection teams, civil affairs, engineer support, and other
support requirements) and fill military police capability gaps.
z Identifying and briefing units and mission elements (such as multifunctional site exploitation
teams) regarding any expedited reporting requirements for specific critical information or high-
value targets.
A-13. Unit commander responsibilities include–
z Training and integrating specific collection techniques in the planning, preparation, and
execution of military police missions.
z Providing tasking and specific planning guidance to subordinate leaders to ensure adequate
understanding of police IR and collection requirements.
z Reviewing IPB, police intelligence products, and other available data to ensure situational
understanding and situational awareness, and passing information specific to the unit AO to
personnel in the S-3 or PM section (and the G-2 or S-2 when applicable) to improve their
knowledge of the AO.
z Providing full support to unit PIO debriefing activities and compliance with established briefing
and debriefing procedures by all military police elements.
z Reinforcing the importance of the procedures for immediate reporting of information of critical
or time-sensitive value.
A-14. Platoon, squad, section, team, and mission leader responsibilities include–
z Training and integration of specific collection techniques in the planning, preparation, and
execution of military police missions.
z Providing tasking and specific mission guidance to platoons, squads, or sections to ensure
adequate understanding of IR, collection, and other specific mission requirements.
z Reinforcing the importance of the procedures for immediate reporting of information of critical
or time-sensitive value to all personnel.
z Preparing for (and participating in) the unit debriefing activities after all military police
missions. Reporting information based on visual observations and police engagement during the
debriefing or through immediate reporting of critical or time-sensitive information.
z Carefully conducting evidence collection and documentation and compiling written reports
during military police missions.
B-5. This order provides for nonconsensual physical searches in the United States by the FBI and other
LE activities in specific situations, such as “searches by counterintelligence elements of the military
services directed against military personnel in the United States or abroad for intelligence purposes, when
authorized by a military commander empowered to approve physical searches for LE purposes, based upon
a finding of probable cause to believe that such persons are acting as agents of foreign powers” (see
EO 12333).
B-6. National foreign intelligence collected at OCONUS locations is coordinated with the Central
Intelligence Agency (if not otherwise obtainable). Collection procedures performed at CONUS locations
are coordinated with the FBI.
B-7. EO 12333 allows intelligence agencies to–
z Cooperate with appropriate LE agencies for the purpose of protecting employees, information,
property, and facilities of any agency in the intelligence community.
z Participate in LE activities to investigate or prevent clandestine intelligence activities by foreign
powers or international terrorist or narcotics activities, unless otherwise precluded by law or this
order.
z Provide specialized equipment, technical knowledge, or assistance from expert personnel for use
by any department or agency or, when lives are endangered, to support local LE agencies. The
provision of assistance by expert personnel is approved by the general counsel of the providing
agency on a case-by-case basis.
z Render any other assistance and cooperation to LE authorities not precluded by applicable law.
B-11. DOD policy prohibits the collecting, reporting, processing, or storing of information on individuals
or organizations not affiliated with the DOD, except in limited circumstances where such information is
essential to the accomplishment of DOD missions. Information-gathering activities will be under overall
civilian control, with a high level of general supervision and frequent inspections at the field level. Where
collection activities are authorized to meet an essential requirement for information, maximum reliance will
be placed on domestic civilian investigative agencies—federal, state, and local. In applying the criteria for
the acquisition and retention of information established pursuant to DODD 5200.27, due consideration will
be given to the need to protect DOD functions and property in the different circumstances existing in
OCONUS geographic areas. Relevant factors include the–
z Level of disruptive activity against U.S. forces.
z Competence of host nation investigative agencies.
z Degree to which U.S. military and host nation agencies exchange investigative information.
z Absence of other U.S. investigative capabilities (such as in the unique and vulnerable positions
of U.S. forces abroad).
B-12. DODD 5200.27, paragraph 4, authorizes Army LE personnel to gather information to accomplish the
following missions–
z Protection of DOD functions and property. Information may be acquired about activities
threatening defense, military, and civilian personnel and defense activities and installations,
including vessels, aircraft, communications equipment, and supplies. Only the following types of
activities justify the acquisition of information under the authority of this paragraph:
Subversion of loyalty, discipline, or morale of DOD military or civilian personnel by
actively encouraging the violation of law, disobedience of lawful order or regulation, or
disruption of military activities.
Theft of arms, ammunition, or equipment or the destruction or sabotage of facilities,
equipment, or records belonging to DOD units or installations.
Acts jeopardizing the security of DOD elements or operations or compromising classified
defense information by unauthorized disclosure or by espionage.
Unauthorized demonstrations on Regular Army or reserve DOD installations.
Direct threats to DOD military or civilian personnel in connection with their official duties
or to other persons who have been authorized protection by DOD resources.
Activities endangering facilities that have classified defense contracts or that have been
officially designated as key defense facilities.
Crimes for which the DOD has responsibility for investigating or prosecuting.
z Personnel security. Investigations may be conducted in relation to the following categories of
personnel–
Members of the armed forces, including retired personnel, members of the reserve
components, and applicants for commission or enlistment.
DOD civilian personnel and applicants for such status.
Persons having need for access to official information requiring protection in the interest of
national defense under the DOD Industrial Security Program or being considered for
participation in other authorized DOD programs.
z Operations related to civil disturbance. The Attorney General is the chief civilian officer in
charge of coordinating all federal government activities relating to civil disturbances. Upon
specific prior authorization of the Secretary of Defense or his designee, information may be
acquired that is essential to meet operational requirements flowing from the mission assigned to
the DOD to assist civil authorities in dealing with civil disturbances. Such authorization will
only be granted when there is a distinct threat of a civil disturbance exceeding the LE
capabilities of state and local authorities.
B-13. DODD 5200.27 identifies instances in which Army LE personnel are prohibited from collecting
information on individuals and organizations. The prohibitions state that–
z The acquisition of information on individuals or organizations not affiliated with the DOD will
be restricted to what is essential to the accomplishment of assigned DOD missions under this
directive.
z No information will be acquired about a person or organization solely because of lawful
advocacy of measures in opposition to government policy.
z There will be no physical or electronic surveillance of federal, state, or local officials or of
candidates for such offices.
z There will be no electronic surveillance of any individual or organization, except as authorized
by law.
z There will be no covert or otherwise deceptive surveillance or penetration of civilian
organizations unless specifically authorized by the Secretary of Defense or his designee.
z No DOD personnel will be assigned to attend public or private meetings, demonstrations, or
other similar activities for the purpose of acquiring information—the collection of which is
authorized by DODD 5200.27—without specific prior approval by the Secretary of Defense or
his designee. An exception to this policy may be made by the local commander or higher
authority when, in his judgment, the threat is direct and immediate and time precludes obtaining
prior approval. In each case, a report will be made immediately to the Secretary of Defense or
his designee.
z No computerized data banks will be maintained relating to individuals or organizations not
affiliated with DOD unless authorized by the Secretary of Defense or his designee.
B-17. In support of AFDCB mandates, Soldiers, military, or DA civilian police may be required to perform
off-installation operations. These LE personnel must be thoroughly familiar with the applicable agreements
and constraints of 18 USC 1385 and U.S.-host nation agreements. In the U.S or its territories, U.S. military
and/or DA civilian police assigned to off-installation operations have the sole purpose of enforcing
regulations and orders pertaining to persons subject to their jurisdiction. When accompanying civilian LE
officers, these policing forces remain directly responsible to and under the command of their military chain
of command. Military and DA civilian police may come to the aid of civilian LE officers to prevent the
commission of a felony or injury to a civilian LE officer.
B-18. The constraints on the authority of Soldiers and/or DA civilian police to act on off-installation
operations (and the specific scope of off-installation operations) will be clearly delineated in all
authorizations for off-installation support. Off-installation operations will be coordinated with the local
installation commander through the SJA or higher authority and the appropriate civilian LE agencies.
B-19. AR 190-24 establishes the primary objectives of any off-installation operations as–
z Rendering assistance and providing information to service personnel.
z Preserving the safety and security of service personnel.
z Preserving good order and discipline among service personnel and reducing off-installation
incidents and offenses.
z Maintaining effective cooperation with civil authorities and community leaders.
ARMY REGULATION 190-45
B-20. This regulation establishes LE reporting requirements for Army LE organizations. It also establishes
geographic areas of responsibility for reporting incidents involving Army personnel and assets. The
regulation–
z Prescribes policies and procedures for submitting criminal history data (biometric) to the
Criminal Justice Information Systems (CJIS).
z Provides policies and procedures for Army participation in the CJIS, NCIC and supplements
standards and procedures established in the FBI NCIC Operating Manual and the National Law
Enforcement Telecommunications System.
z Mandates the use of COPS and the Military Police Reporting System as the automated reporting
systems to standardize LE reporting throughout the Army.
z Prescribes responsibilities and updates policies and procedures for reporting serious incidents in
DA. The Serious Incident Report System–
Provides early notice to Headquarters, Department of the Army (HQDA) regarding serious
incidents.
Provides the chain of command with timely information enabling an informed response to
queries from DOD, news media, and others.
Meets LE reporting requirements for selected criminal incidents and provides LE personnel,
such as the DHS and Transportation Security Administration, the most current information
available.
B-21. In referring specifically to PIO, AR 190-45 states, in regard to garrison LE operations, that the
purpose of gathering police intelligence is to identify individuals or groups of individuals in an effort to
anticipate, prevent, or monitor possible criminal activity. Police intelligence that is developed and factually
establishes that a criminal offense may have occurred results in initiation of an investigation by military
police and USACIDC or other investigative agencies.
B-22. AR 190-45 affirms the importance of establishing agreements between military LE and civilian LE
counterparts to facilitate improved information sharing, especially concerning investigations, arrests, and
prosecutions involving military personnel. This regulation provides policy guidance regarding the
establishment of formal memoranda of understanding with civilian LE agencies to establish or improve the
flow of information between agencies. The regulation establishes policy regarding the–
z Active exchange of police intelligence between DOD LE; military police; USACIDC; and local,
state, federal, and international LE agencies.
z Transmission of written LE-related documents. Written extracts from local police intelligence
files provided to an authorized investigative agency must have the following statement included
on transmittal documents: THIS DOCUMENT IS PROVIDED FOR INFORMATION AND
USE. COPIES OF THIS DOCUMENT, ENCLOSURES THERETO, AND INFORMATION
THEREFROM, WILL NOT BE FURTHER RELEASED WITHOUT THE PRIOR
APPROVAL OF THE INSTALLATION PM.
z Public dissemination of police intelligence files. Local police intelligence files may be exempt
from certain disclosure requirements, as outlined in AR 25-55 and the Freedom of Information
Act.
B-30. Military police and USACIDC elements hold critical responsibilities due to their LE function and
ability to collect, analyze, disseminate, and manage police intelligence. Specific responsibilities are given
to the Provost Marshal General and USACIDC commander for implementation. The Provost Marshal
General, acting in direct support from the HQDA Deputy Chief of Staff (DCS); G-3; Assistant Chief of
Staff, Civil Affairs (G-5); and information operations staff officer (G-7) in the management and execution
of the Army antiterrorism mission, is responsible for–
z Staffing and providing an antiterrorism branch to serve as the functional proponent and to
establish policy and objectives regarding the antiterrorism program.
z Operating an antiterrorism operations intelligence cell (ATOIC) in close coordination with the
Office of the DCS, G-2 to–
Issue early warning of criminal and terrorist threats to Army commands, Army Service
component commands, direct reporting units, and other senior Army leaders and
organizations.
Coordinate analyses and reporting of terrorist-related intelligence with appropriate
intelligence and LE agencies to provide warnings and maintain visibility of threats to senior
Army leadership; all major commands (Army major commands, Army Service component
commands, and direct reporting units); and threatened installations, activities, facilities, and
personnel.
Fuse criminal and terrorist threat information to form a single threat picture.
Assess terrorist and criminal threats to Army forces and publish an annual comprehensive
DA threat statement and daily DA force protection memorandum to disseminate potential
and future threats, thereby enhancing threat awareness at all levels.
Publish DA antiterrorism travel advisories (as required) to inform commanders of DOD-
designated HIGH or SIGNIFICANT threat level countries, cities with high crime rates, and
travel advisories.
B-31. AR 525-13 also outlines specific responsibilities for the Commander, USACIDC, as the senior
commander responsible for Army criminal investigations. USACIDC is responsible for–
z Ensuring a sufficient USACIDC police intelligence capability to monitor and report on the
activities, intentions, and capabilities of domestic threat groups (according to applicable
regulations and directives).
z Collecting, analyzing, and disseminating police intelligence to affected commands pertaining to
threat activities (in the provisions of applicable statutes and regulations).
z Providing appropriate threat-related police intelligence to HQDA ATOIC, the Intelligence and
Security Command, and Army Counterintelligence Center (ACIC).
z Maintaining a capability to analyze and disseminate collected, time-sensitive information
concerning the criminal threat against Army interests.
z Investigating threat incidents of Army interest and to monitor such investigations when
conducted by civilian, host nation, military, or other police agencies. Providing applicable results
of terrorist-related investigations to ATOIC, ACIC, and CALL.
z Providing trained hostage negotiators to support Army antiterrorism operations worldwide.
z Planning and coordinating the protection of HRP for DOD, DA, and foreign officials as directed
by HQDA.
z Serving as the Army’s primary liaison representative to federal, state, local, and host nation
agencies to exchange police intelligence.
z Establishing procedures to ensure appropriate liaison at all levels between USACIDC, the
Intelligence and Security Command, and PM elements operating in support of the antiterrorism
program.
z Immediately notifying the affected installation PM and HQDA on receipt of time-sensitive threat
information.
z Ensuring that criminal activity threat assessments and personal security vulnerability
assessments are conducted for Army personnel, installations, systems, operations, and other
interests as directed by HQDA and/or based on Army commander’s operational requirements.
z Providing technical personnel support to DCS and designated G-3, G-5, or G-7 assessment
teams, as required.
z Investigating all incidents of suspected terrorism as criminal acts, to include safeguarding
evidence, collection testimony, preparation of investigative reports, and presentations to
appropriate judicial officials. Investigations are conducted jointly with federal, state, local, and
foreign LE agencies, as appropriate.
z Providing appropriate terrorism analyses and threat assessments to the ATOIC in support of
Army requirements and the antiterrorism program.
B-32. The regulation also outlines responsibilities for installation and garrison commanders. These
commanders are required to–
Ensure that LE and intelligence organizations in their command collect and analyze criminal
and terrorist threat information.
Develop a system to monitor, report, collect, analyze and disseminate terrorist threat
information.
Identify a focal point for the integration of operations and local or host nation, intelligence,
criminal investigations, police information, and police intelligence.
Coordinate LE support with their higher headquarters in case organic LE is not available.
Ensure that appropriate connectivity to receive threat-related information from all available
sources (such as ATOIC, FBI, ACIC, USACIDC, PM, local LE, Intelink-S, and Intelink).
Ensure that collection operations are being conducted consistent with the requirements and
restrictions of AR 381-10, AR 381-12, AR 380-13, DODD 5200.27, and other applicable
regulations and directives.
Establish an antiterrorism program supported by all-source intelligence, with PIR, CCIR,
and focused collection, analysis, and dissemination to protect personnel and assets in the
AO.
Ensure that products and analyses are focused and based on their PIR and CCIR. Review
PIR and CCIR for currency and revalidate at least annually to update changing threats
and/or requirements.
Ensure that information and intelligence regarding terrorist activity is developed, collected,
analyzed, and disseminated in a timely manner. Current intelligence will be integrated into
the antiterrorism training program.
Ensure that LE and intelligence organizations in their command collect and analyze criminal
and terrorist threat information.
B-33. In reference to terrorist threat assessments, the regulation specifically addresses the LE and
intelligence community as follows–
z Threat information prepared by the intelligence community, USACIDC, and the Provost
Marshal’s Office will be used when conducting threat assessments and technical information
from information management.
z Threat assessments will serve as a basis and justification for antiterrorism plans, enhancements,
program and budget requests, and the establishment of force protection conditions.
z Threat assessments will be part of a leader’s reconnaissance, in conjunction with deployments
and follow-on threat and vulnerability assessments (as determined by the commander).
z Consolidated MI and police intelligence data identified in threat assessments (on U.S. personnel)
cannot be filed, stored, or maintained as an intelligence product (as directed in AR 381-10).
These assessments must be filed, stored, and maintained in operational channels.
OVERVIEW
C-1. In the civilian police community, there are several definitions and processes describing criminal
intelligence and the criminal intelligence process. Two of the most prevalent variations of the definition of
criminal intelligence are “the product of an analytic process that provides an integrated perspective to
disparate information about crime, crime trends, crime and security threats, and conditions associated with
criminality” (see Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing at the Local,
State, and Federal Levels: Recommendations from the International Association of Chiefs of Police (IACP)
Intelligence Summit) and “information compiled, analyzed, and/or disseminated in an effort to anticipate,
prevent, or monitor criminal activity” (see Law Enforcement Intelligence: A Guide for State, Local, and
Tribal Law Enforcement Agencies). The civilian law enforcement community typically defines the criminal
intelligence process as consisting of six basic steps–
z Planning the gathering of information.
z Gathering the information.
z Processing the information.
z Analyzing the information to produce an intelligence product.
z Disseminating the intelligence product.
z Evaluating the usefulness of the intelligence product.
C-2. The term intelligence-led policing enjoys wide currency among criminal justice researchers and
national policymakers, although there is vigorous debate regarding a definitive description or definition.
Regardless of their positions, most officials agree that intelligence-led policing integrates easily with other
popular policing models, including community policing and problem-oriented policing. Law Enforcement
Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies, a 2004 Community-Oriented
Policing Services publication, describes intelligence-led policing as “the integration of community policing
and LE intelligence.” The report Intelligence-Led Policing: The New Intelligence Architecture, issued by
the Bureau of Justice Assistance and their partners in 2005, calls it “a collaborative enterprise based on
improved intelligence operations and community-oriented policing and problem solving.”
ONEDOJ
C-4. The United States Department of Justice (DOJ) system known as OneDOJ (formerly the Regional
Data Exchange) is a repository for LE information shared with other federal, state, local, and tribal LE
agencies through connections with regional information-sharing partnerships. OneDOJ is used to share LE
information internally across investigative components and provide regional connectivity for authorized
users to conduct searches of OneDOJ information and share LE information. Additional information on
OneDOJ can be accessed at the following Web site: < http://www.justice.gov/jmd/ocio/leisp/onedoj.htm>.
C-5. All DOJ LE components—the Bureau of Alcohol, Tobacco, and Firearms; Bureau of Prisons; Drug
Enforcement Administration; FBI; and the United States Marshal’s Service—participate in OneDOJ.
Criminal information shared includes open- and closed-case documents, investigative reports, witness
interviews, data on criminal events, information on criminal histories and incarcerations, and information
about individual offenders. Outside agencies connect with OneDOJ through regional sharing systems using
a standard secure platform developed through the Law Enforcement Information Sharing Program (LEISP).
The DOJ, through the OneDOJ system, shares information with the Military Criminal Investigative
Services (USACIDC, Naval Criminal Investigative Service, and Air Force Office of Special
Investigations).
C-13. The National Strategy for Information Sharing identifies baseline capabilities requirements for
fusion cells. Defining these operational standards enables federal, state, and local officials to identify and
plan for the resources needed—including financial and technical assistance and human support—to attain
the baseline capacity required for successful information fusion cells. The baseline capability ensures that
fusion cells have the necessary structures, processes, and tools in place to support the gathering, processing,
analysis, and dissemination of police information, to include information and police intelligence in support
specific operational capabilities; suspicious activity reporting; alert, warning, and notification reporting;
risk assessments; and situational understanding reporting.
SECTION II – TERMS
*criminal intelligence
Criminal intelligence is a category of police intelligence derived from the collection, analysis, and
interpretation of all available information concerning known and potential criminal threats and
vulnerabilities of supported organizations.
*police information
Police information is all available information concerning known and potential enemy and criminal
threats and vulnerabilities collected during police activities, operations, and investigations. Analysis of
police information produces police intelligence.
* police intelligence
Police intelligence results from the application of systems, technologies, and processes that analyze
applicable data and information necessary for situational understanding and focusing policing activities
to achieve social order.
FM 6-0. Mission Command: Command and Control of Army Force. 11 August 2003.
FM 6-22. Army Leadership. 12 October 2006.
FM 7-15. The Army Universal Task List. 27 February 2009.
FM 19-10. Military Police Law and Order Operations. 30 September 1987.
FMI 2-01.301. Specific Tactics, Techniques, and Procedures and Applications for Intelligence
Preparation of the Battlefield. 31 March 2009.
TC 2-22.303. The 2X Handbook. 31 July 2006.
TC 2-33.4. Intelligence Analysis. 1 July 2009.
JOINT PUBLICATIONS
JP 1-0. Personnel Support to Join Operations. 16October 2006.
JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 12 April 2001.
JP 2-0. Joint Intelligence. 22 June 2007.
JP 3-0. Joint Operations. 17 September 2006.
JP 3-16. Multinational Operations. 07 March 2007.
JP 3-28. Civil Support. 14 September 2007.
MISCELLANEOUS PUBLICATIONS
DD Form 1408. Armed Forces Traffic Ticket. 1 December 1987.
DOD O-20012.H. DOD Antiterrorism Handbook. 1 February 2004.
DODD 2000.12. DOD Antiterrorism Program. 18 August 2003.
DODD 3025.15. Military Assistance to Civil Authorities. 18 February 1997.
DODD 5200.27. Acquisition of Information Concerning Persons and Organizations Not Affiliated
With the Department of Defense. 7 January 1980.
DODD 5240.1. DOD Intelligence Activities. 27 August 2007.
DODD 5525.5. DOD Cooperation with Civilian Law Enforcement Officials. 15 January 1986.
DOD 5240.1-R. Procedures Governing the Activities of DOD Intelligence Components that Affect
United States Persons. 11 December 1982.
DODI 2000.16. DOD Antiterrorism Standards. 8 December 2006.
EO 12333. United States Intelligence Activities. 4 December 1981.
Freedom of Information Act. 6 September 1966.
USC Title 10. Section 16. Armed Forces.
USC Title 18. Section 1385. Crimes and Criminal Procedure. Use of Army and Air Force as Posse
Comitatus.
USC Title 32. National Guard.
READINGS RECOMMENDED
These sources contain relevant supplemental information.
DHS and DOJ, Global Justice Information Sharing Initiative, DHS/DOJ Fusion Process: Technical
Assistance Program and Services. February 2009.
DOJ, FBI, Protecting America against Terrorist Attacks: A Closer Look at the FBI’s Joint Terrorism
Task Forces, 1 December 2004.
DOJ, Global Justice Information Sharing Initiative, Counterterrorism Training Coordination Working
Group, Minimum Criminal Intelligence Training Standards for Law Enforcement and Other
Criminal Justice Agencies in the United States: Findings and Recommendations, October
2007.
DOJ, Global Justice Information Sharing Initiative, Fusion Center Guidelines: Developing and
Sharing Information and Intelligence in a New Era, August 2005.
DOJ, Global Justice Information Sharing Initiative, Law Enforcement Analyst Certification Standards,
August 2006.
DOJ, Global Justice Information Sharing Initiative, Law Enforcement Analyst Certification Standards,
August 2006.
DOJ, Global Justice Information Sharing Initiative, Privacy, Civil Rights, and Civil Liberties: Policy
Templates for Justice Information, February 2008.
DOJ, Global Justice Information Sharing Initiative, Privacy Policy Development Guide, October 2006,
<http://www.search.org/files/pdf/Privacy_Guide_Final.pdf>, accessed on July 2009.
DOJ, Office of Community Oriented Policing Services, Law Enforcement Intelligence: A Guide for
State, Local, and Tribal Law Enforcement Agencies, November 2004.
DOJ, Office of Justice Programs, Bureau of Justice Assistance, Intelligence-Led Policing: A New
Architecture, in the series New Realities: Law Enforcement in the Post–9/11 Era, by IACP
with the National Sheriffs Association, Major Cities Chiefs Association, Police Foundation,
and National Organization of Black LE Executives, September 2005.
Findings and Recommendations of the Suspicious Activity Report (SAR) Support and Implementation
Project. June 2008.
Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies,
David L. Carter, November 2004.
Crime Analysis: From First Report to Final Arrest Steven Gottlieb, Sheldon Arenberg, and Raj Sing,
1998.
Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing at the Local, State, and
Federal Levels: Recommendations from the IACP Intelligence Summit. August 2002.
LE Intelligence Unit, Criminal Intelligence File Guidelines. March 2002
Part 23, Title 28, Code of Federal Regulations. Criminal Intelligence Systems Operating Policies.
The National Security Act of 1947.
USC Title 50. Section 401a. War and National Defense, Definitions.
DOCUMENTS NEEDED
These documents must be available to the intended users of this publication. Department of the Army (DA)
forms are available on the Army Publishing Directorate (APD) web site (www.apd.army.mil).
policing, 2-1 rule of law, vii, 1-2, 1-6, 1-7, definition, 3-14
definition, 2-1 2-2, 3-20, 4-4, 4-6, 5-6, 5-21, terrain analysis, 5-5
predictive analysis, 5-6 B-1, B-9, B-10
trend analysis, 5-7
principles of policing, 1-7 S
U
R stability operations, 1-10
definition, 1-10 unified action, 3-23
reward poster, 6-14 definition, 3-23
T
W
targeting, 3-14
wanted poster, 6-14
GEORGE W. CASEY
General, United States Army
Chief of Staff
Official:
JOYCE E. MORROW
Administrative Assistant to the
Secretary of the Army
1018203
DISTRIBUTION:
Active Army, Army National Guard, and U.S. Army Reserve: To be distributed in accordance with the
initial distribution number (IDN) 115970, requirements for ATTP 3-39.20 (FM 3-19.50).
PIN: 100124-000