Atp3 39 20
Atp3 39 20
20
MAY 2019
ATP 3-39.20 i
Contents
Figures
Figure 1-1. Crime triangle .............................................................................................................. 1-2
Figure 1-2. Crime and criminal activity across time ....................................................................... 1-3
Figure 1-3. Individuals with multiple identities and affiliations ....................................................... 1-9
Figure 1-4. Threat network convergence ....................................................................................... 1-9
Figure 1-5 PIO framework............................................................................................................ 1-18
Figure 1-6. PIO and the intelligence process............................................................................... 1-20
Figure 1-7. Military police employment of the scanning, analysis, response, and assessment
model ........................................................................................................................ 1-22
Figure 1-8. Information sharing across strategic depth ............................................................... 1-29
Figure 2-1. Plan and direct police intelligence operations ............................................................. 2-1
Figure 2-2. Information requirements ............................................................................................ 2-2
Figure 2-3. Requirements development ........................................................................................ 2-3
Figure 2-4. Military police contributions to requirements planning ................................................ 2-5
Figure 2-5. Example of an information collection plan for a military police unit........................... 2-11
Figure 2-6. Example of an information collection matrix for a military police company ............... 2-12
Figure 2-7. Example of a mission briefing ................................................................................... 2-14
Figure 3-1. Collect and process police information ....................................................................... 3-4
Figure 3-2. Example of a police intelligence operations debriefing report ................................... 3-26
Figure 4-1. Produce police intelligence products ........................................................................... 4-2
Figure 4-2. Examples of graphic representations of statistical data .............................................. 4-5
Figure 4-3. Personal identities and social links............................................................................ 4-12
Figure 4-4. Example of a link diagram and symbology................................................................ 4-13
Figure 4-5. Example of an association matrix.............................................................................. 4-14
Figure 4-6. Network organization and structures ......................................................................... 4-15
Figure 4-7. Example of a timeline flowchart................................................................................. 4-18
Figure 4-8. Example of a crime map............................................................................................ 4-26
Figure 4-9. Understanding crime hotspots and forming a response............................................ 4-27
Figure 4-10. Example of a geographic distribution of crime hotspots ......................................... 4-29
Figure 4-11. Example of a pattern analysis plot sheet depicting crime patterns ......................... 4-31
Figure 4-12. Organizational-level focuses based on the complexity of crime problems ............. 4-33
Figure 4-13. Crime analysis and criminal intelligence focus........................................................ 4-38
Figure 4-14. Example hierarchy of police intelligence products .................................................. 4-39
Figure 4-15. Criminal intelligence and crime analysis focuses .................................................... 4-46
Figure 5-1. General information briefing format ............................................................................. 5-3
Figure 5-2. Examples of reports generated by ALERTS ............................................................... 5-5
Figure 5-3. Typical police intelligence network in support of a base or base camp....................... 5-8
Figure 5-4. Typical police intelligence network in a deployed operational environment ................ 5-9
Figure 5-5. Example of liaison duties ........................................................................................... 5-10
Figure 5-6. The operations process ............................................................................................. 5-26
Figure 5-7. Activities of assessment............................................................................................. 5-27
Figure 5-8. Intelligence preparation of the battlefield steps ......................................................... 5-29
Figure 5-9. Decide, detect, deliver, and assess methodology cycle ............................................ 5-31
Figure 5-10. Risk management process ...................................................................................... 5-36
Figure B-1. Example of a criminal intelligence report.....................................................................B-1
Figure B-2. Example of a criminal alert notice ...............................................................................B-2
Figure B-3. Example of a Federal Bureau of Investigations be-on-the-lookout alert .....................B-3
Figure B-4. Example of an Army BOLO alert .................................................................................B-4
Figure B-5. Example of a Federal Bureau of Investigations wanted poster ...................................B-5
Figure B-6. Example of a United States Criminal Investigation Command wanted poster ............B-6
Figure B-7. Example of a reward poster ........................................................................................B-6
Figure B-8. Example of a communication (toll) analysis chart .......................................................B-7
Figure B-9. Example of a link analysis product ..............................................................................B-8
Figure B-10. Example of a timeline and theme line flow chart .......................................................B-9
Figure B-11. Example of a commodity flow chart.........................................................................B-10
Figure B-12. Example of a combined chart ..................................................................................B-11
Figure B-13. Example of a crime (or incident) map......................................................................B-12
Figure B-14. Example of a histogram and heat matrix .................................................................B-13
Figure B-15. Example of an incident map that uses geospatial technology ................................B-14
Figure B-16. Example of a crime prevention flyer ........................................................................B-15
Figure C-1. Example of a police intelligence operations team organization and tasks................. C-2
Figure C-2. Potential products for police intelligence operations team displays ........................... C-3
Figure C-3. Integration of police intelligence operations and military police operations ............... C-4
Figure C-4. Threat networks across the levels of warfare ............................................................ C-8
Tables
Table 1-1. Criminal methods and tactics ........................................................................................ 1-6
Table 3-1. Regulation, policy, and laws relevant to police information collection .......................... 3-2
Table 3-2. Information source reliability scale .............................................................................. 3-27
Table 3-3. Information credibility scale ......................................................................................... 3-28
Table 4-1. Forensic exploitation team capabilities ....................................................................... 4-10
Table 4-2. Opportunity theories .................................................................................................... 4-23
Table 4-3. Social disorganization theories ................................................................................... 4-24
Table 4-4. Analysis of variables influencing crime environments ................................................ 4-34
Table 5-1. Example of a police intelligence fusion cell composition ............................................ 5-11
This publication is organized into five chapters and three appendixes that provide additional details on
selected topics. The following is a brief description of each chapter and appendix:
Chapter 1 describes crime and criminal threats that exist within complex operational
environments, establishes the revised PIO framework, discusses roles and responsibilities, and
describes how PIO contributes to unified land operations.
Chapter 2 introduces the first step in PIO of planning and directing information collection.
Chapter 3 provides detailed guidance for the collection of police information and its subsequent
processing and reporting.
Chapter 4 describes the integrated criminal and crime analysis processes that produce police
intelligence. This chapter discusses the critical thinking and predictive analysis techniques applied
by trained police intelligence analysts to support understanding of crime and criminal activity.
Chapter 5 demonstrates how police intelligence products are disseminated to influence military
police operations, support homeland operations, and support the Army operations process through
the integrating processes. This chapter highlights the importance of collaboration and fusion with
relevant stakeholders to ensure that police intelligence is delivered in a manner that supports
decision making and produces desired outcomes.
Appendix A addresses the applicable laws, regulations, and directives that are most relevant to
PIO.
Appendix B provides examples of different types of police intelligence products.
Appendix C discusses employment considerations at various echelons to help practitioners
operationalize PIO.
Throughout this publication, military police (31-series military occupational specialty) analysts are referred
to as police intelligence analysts, while analysts assigned specifically to USACIDC organizations are often
called investigative analysts due to their heavy focus on criminal intelligence support to the USACIDC
investigative mission. Police intelligence analyst is an overarching term used to describe those analysts who
have completed the Crime and Criminal Intelligence Analyst Course at the USAMPS and are assigned to
military police organizations to perform criminal and crime analysis as part of PIO.
Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men.
FM 3-39 discusses the foundations of military police operations based on the three
military police disciplines. PIO remains an integral part of conducting effective
military police operations in its role as an integrated task. This chapter discusses the
context for PIO in complex operational environments, provides a framework for
military police forces conducting PIO, evaluates roles and responsibilities for PIO, and
describes the contributions of PIO to the Army and unified action partners.
Note. USACIDC and military police planners must integrate with each of the supported commands
and interagency partners to effectively integrate PIO with the supported command targeting
process. Typically, special operations forces and the Department of State have primacy and are
the focus to prevent and shape operations during unified land operations. Conventional forces
surge efforts during large-scale ground combat operations and the consolidation of gains. All of
the aforementioned stakeholders may be active throughout the entire operation, but the unique
capabilities of each are relied on at different times, depending on the desired effect.
Crime exists in every part of the world and in every society. There is no standard definition or
categorization of crime because varying societies and governments possess different norms and laws that
regulate human conduct. Crime is influenced by several factors. Understanding the core elements of crime
allows police intelligence analysts to isolate relevant factors and evaluate the root causes of crime problems
to produce a holistic understanding of crime and criminal activity.
Crime varies across operational environments based on the interplay of criminal offender motivations
to commit crime, the presence of victims vulnerable to crime, and the environmental conditions that make a
place conducive to crime, such as an exposed vulnerability and the absence of a capability to protect that
vulnerability. Military police seek to understand these three basic elements of crime by using the crime
triangle depicted in figure 1-1, page 1-2.
Note. People who commit crimes are described by three common terms in this publication,
depending on the specific meaning that is intended. Offender refers to a person who commits a
specific criminal offense, whether or not they are detected, investigated, or convicted. Subject may
be used when referring to a person who is suspected of committing a crime, whether or not they
have actually committed it (see ATP 3-39.12 for details on law enforcement investigations of those
suspected of committing crimes). Criminal is used in the broadest sense for persons engaged in
ongoing criminal activities, with or without direct reference to a specific criminal act.
When a potential offender and victim converge in space and time, an opportunity exists for a crime to
occur. However, crime does not occur in a vacuum. Crime occurs across time in three phases: before the
crime, the crime (also called criminal incident), and the second- and third-order effects that occur as a result
of the crime. Understanding crime as an isolated act and in relation to the conditions and actions that happen
before and after a crime incident helps military police and USACIDC special agents understand the totality
of a criminal act. This allows insights into the motivation and intent influencing an offender’s decision to
commit a crime and into the situational circumstances and conditions that created a crime opportunity.
Figure 1-2 demonstrates the three stages of crime that, when combined together, are collectively described
as criminal activity.
Note. For this publication, the terms space and place are similar but are used in different contexts
to refer to the spatial dimensions of crime. Space denotes a broader application, referring to a
broad area without distinct boundaries, including virtual spaces such as cyberspace. Place refers
to a specific location that may be analyzed based on specific geographic factors.
CRIMINAL THREATS
Criminals exist in all operational environments, but the level of threat that criminals pose to U.S. forces
varies across time and space. A threat is any combination of actors, entities, or forces that have the capability
and intent to harm U.S. forces, U.S. national interests, or the homeland (ADRP 3-0). Criminal threats are
typically distinguishable from other threats in the motive for profit or power, as opposed to political, religious,
or ideological motives. As such, criminals may be neutral, armed or unarmed noncombatants, or combatants
based on their affiliation with other threats or their demonstrated capability and intention to harm U.S.
interests. Criminals operate as individuals, networks, and organizations that vary based on size, level of
concentration or dispersion, degree of hierarchy, scale of criminal activities, and relative power or influence.
While small-scale crime may not present a significant threat to large-scale ground combat operations,
the cumulative impact of crime may threaten the ability to consolidate gains by creating perceptions of
instability and undermining the legitimacy of a civil governing authority. Crime creates a sense of fear and
disorder among populations and erodes the confidence and trust people have in the government and in the
capabilities and capacities of security forces to provide security, order, and justice. Regardless of its accuracy
to reality, the widespread fear of crime can undermine the sense of social cohesion and normalcy necessary
for civil authorities to govern effectively. High volumes of crime, especially violent crime and corruption,
contribute to narratives about government illegitimacy or incapacity and undermine friendly force ability to
stabilize the operational environment and consolidate gains.
Beyond individuals and co-offenders, criminals often work on a broader basis in criminal networks
and organizations that may span local, state, or regional boundaries. Criminal networks and organizations
capable of large-scale crime may threaten civil order within states and across region, influence or corrupt
political institutions, and challenge governance through paramilitary-like forces. Criminal organizations
include—
Gangs (local or networked street criminals).
Large-scale criminal networks (networked individuals across multiple localities, states, or
regions).
Transnational criminal organizations (international cartels, paramilitary criminal organizations,
mafia-style crime syndicates).
Assessing the presence, potential impacts, and possible affiliations of criminals within the operational
area or area of operations is an integral aspect of joint intelligence preparation of the environment and
intelligence preparation of the battlefield (IPB). (See ATP 2-01.3 and JP 2-01.3.) PIO contributes to these
integrating processes by leveraging police knowledge, skills, and experience in identifying, investigating,
and controlling criminal populations. The deliberate focus of PIO on criminal activity assists military
intelligence activities by identifying criminal elements that may combine into hybrid threats.
Hybrid Threats
When criminal elements combine with other threat forces, a hybrid threat is established. A hybrid
threat is the diverse and dynamic combination of regular forces, irregular forces, terrorist forces, or criminal
elements unified to achieve mutually benefitting threat effects (ADRP 3-0). Hybrid threats combine
traditional forces governed by law, military tradition, and custom with unregulated forces that act with no
restrictions on violence or target selection. These may involve nation-state actors, possibly using proxy forces
to coerce and intimidate, or nonstate actors (such as criminal and terrorist organizations) that employ
protracted forms of warfare using operational concepts and high-end capabilities traditionally associated with
states. Such varied forces and capabilities enable hybrid threats to capitalize on perceived vulnerabilities,
making them particularly effective. Hybrid threats exist across multiple operational environments and reveal
the multiplicity of actors involved and the increasing complexity blurring traditional elements of conflict.
This often results in the ambiguity or anonymity for threat actors that prevents the identification and defeat
of threats through traditional methods alone. See TC 7-100 for additional information of hybrid threats.
A hybrid threat is a composite of different threat forces working toward a common goal. The simple
existence of many diverse threats in an operational environment does not automatically comprise a hybrid
threat. To be considered a threat, an actor (criminal or otherwise) must have the capability and intent to
challenge the United States or its partners. Two or more threat forces possessing such capability and intention
must cooperate or coordinate threat effects toward a common objective to be considered a hybrid threat.
Working together often results in affiliation, which is when two organizations cooperate toward a common
goal despite having no formal command or organizational relationship. Any two or more of the following
forces working in affiliation may constitute a hybrid threat:
Regular or traditional military forces (uniformed nation-state military).
Nation-state controlled paramilitary forces (internal security forces, police, or border guards).
Irregular military forces (insurgent groups, guerilla units, or nonstate paramilitary forces).
Criminal organizations (gangs, drug cartels, trafficking or hacker networks).
Criminals may affiliate with nation-state or nonstate actors when interests coincide. These shared
interests may include shared cultural identities and values; common religious or ideological beliefs; financial
incentives or the potential for profit; or the potential to increase power, prestige, and influence over rivals or
governing authorities. When interests naturally coincide, uncoordinated criminal activity may appear to
support adversary narratives or objectives without actual coordination or agreement. When criminals do
cooperate with external forces, they may act in unison toward common goals or follow the deliberate plans
and directives of a nation-state or nonstate actor to help them achieve their tactical, operational, or strategic
objectives. Criminals may contribute to other forces by—
Providing financial means and financial networks for nonstate or terrorist actors.
Providing information, intelligence, or reconnaissance from their location within local societies.
Influencing local politicians through bribery or extortion using violence or the threat of violence.
Influencing local populations by professing allegiance or ideological affiliation to advance
external actor narratives.
Providing a proxy force for nation-state or nonstate actors to achieve political or military
objectives without deploying identifiable or attributable forces.
Nation-states seeking political or military gains without detection or attribution may seek criminals to
serve their purpose. In such cases, criminals carry out actions according to the direction or interests of an
external nation-state as a result of promises or assurances of increased wealth and power or based on common
identities and values that cause interests to coincide. The use of criminals as a proxy force to achieve a
nation-state creates ambiguity, prevents attribution, and allows a nation-state to pursue its objectives covertly
to avoid international sanction or military action. Nation-states may employ covert forms of regular military
forces and/or special-purpose forces to coordinate and direct local criminals. This type of hybrid threat tactic
was effectively employed by Russia during conflicts in Georgia in 2008 and the Ukraine in 2014.
Nonstate actors may also seek to gain the assistance of criminals—or resort to criminal activity
themselves—to finance or equip their operations. Several terrorist networks threaten transregional security
and order in the Middle East, North Africa, and beyond through coordination with and co-opting of local
criminal elements. While such groups are focused on achieving the political objectives of advancing their
ideology, these networks often overlap with and mimic criminal networks operating across the same regions.
Both participate in illicit activities, leverage corruption to achieve their ends, and use similar criminal
methods and violence that undermine regional security and stability.
Humans are members of multiple networks based on the diversity of individual identities and multiple
types of social roles, connections, and relationships. People may simultaneously identify with and participate
in threat, neutral, and friendly networks that comprise their daily social interactions. Examples of possible
networks of people include insurgent, terrorist, criminal, social, political, professional, familial, tribal,
religious, ethnic, or demographic. Criminal networks often leverage their connections within legal networks
to achieve their illegal purposes. This allows criminals to mask illicit activities behind the appearance of
legitimate enterprises to protect their criminal activity from detection, disruption, or interdiction. Given the
abundance of human networks within a society, the challenge for commanders and staffs is to discover which
networks pose a threat and identify the critical people who overlap between threat networks. These
individuals typically serve as the critical nodes of power, influence, or importance who empower the
network’s critical capabilities and functions. Figure 1-3 shows the different connections with criminal and
terrorist networks that an individual may possess given different identities and affiliations.
Threat Diffusion
In addition to threat overlap, criminal threats increasingly possess the capability and capacity to operate
across multiple domains. Threat diffusion across multiple domains means that threats do not only operate
solely in one domain or another, but they may also operate in or threaten multiple domains simultaneously.
Examples of criminal activities that cross multiple domains requiring information sharing and collaboration
among unified action partners include—
Smuggling (illegal goods or services) or trafficking (drugs, humans, arms) across the land, air, and
maritime domains from production bases to markets and consumers.
Hijacking and hostage-taking carried out from sanctuaries in the land domain against vulnerable
targets in sea or air domains.
Criminal interdiction and theft of military equipment transiting global logistics supply lines in
transit to and from the home station and theater via land, air, and maritime domains.
Cyberspace crimes committed through land-based information network connections for the
conduct of financial crimes (money laundering, identify theft, fraud) or for more nefarious
purposes related to national security, such as cyberspace espionage and cyberspace attacks.
Criminal activity across multiple domains presents significant challenges to identifying, attributing,
and countering criminal threats. Criminal activity that crosses through or impacts other domains typically
emanates from the land domain and requires a land-based police and investigative capability and capacity to
identify, monitor, and apprehend criminal subjects for investigation and prosecution.
In the cyberspace domain, threats may initially be identified, reported, and investigated as criminal
acts. In such instances, a criminal investigation (typically conducted by the USACIDC Computer Crimes
Investigation Unit) may reveal connections to broader threat networks that threaten operational missions or
national security. The domain linkages of criminal and other threats require proficient, timely, and legally
sound information and intelligence sharing. PIO supports this by leveraging established information-sharing
networks that enable criminal intelligence to be shared with relevant stakeholders according to the restrictions
and limitations established by U.S. law and policy. Police intelligence networks that exist before crimes occur
are crucial to identifying the complex overlap of hybrid threats that do not organize along clearly
distinguishable force categories or domain boundaries. Cyberspace crimes that may reveal connections to
broader criminal or irregular threat networks may include—
Extortion, theft, or fraud facilitated by phishing, spearphishing, or whaling attacks used to gain
information, blackmail, or compromise Soldiers or Civilians supporting U.S. forces.
Financial crimes (money laundering, racketeering, fraud) that reveal connections to terrorist or
irregular threat finance networks.
Child pornography investigations by digital forensics examiners that may provide connections or
information related to human trafficking networks.
Cyberspace intrusions that result in the theft of personally identifiable information to enable
identity fraud, sensitive or classified information for national security crimes (such as espionage
or sabotage), or technological trade secrets that enhance the proliferation of military-related
technology to adversary nation-state and nonstate actors.
Although hybrid threats pose a significant threat when they are unified, their destruction and
disintegration does not eliminate the threat that they pose. As military forces successfully destroy hybrid
threat capabilities and linkages, criminal elements will likely not be eliminated completely and criminal
activity may even accelerate. Hybrid threats use their organizational structure to control and direct the use of
criminal activity for distinct political or ideological purposes; however, the destruction of that structure is
often replaced by a multitude of uncontrolled and decentralized criminal actors. In such disintegration,
criminality is likely to increase, although in a less centralized manner and through smaller and more loosely
associated networks. There are several examples of an increase in criminality and proliferation of crime
following the defeat or deterioration of a nation-state, nonstate actors, or criminal organizations that may be
components of hybrid threats. Examples include—
Nation-state collapse or defeat. When a nation-state is defeated or collapses, there is often an
immediate power vacuum that may destabilize society and undermine civil order. This results in
an atmosphere that is conducive to widespread crime because of the general absence of legitimate
and capable law enforcement, security, and justice institutions. This occurred in 2003 following
the rapid military defeat of Saddam Hussein’s Ba’athist regime in Iraq, which was followed by a
power vacuum that presented widespread opportunities for crime. The result was rampant looting
and other spontaneous criminal activity that significantly undermined the transition from large-
scale ground combat operations to stability and order.
Centralized to decentralized networks. Terrorist organizations may also display a trend toward
decentralization and dispersion following the defeat of centrally organized structures. Al Qaeda
gained notoriety as the preeminent global terrorist organization following the attacks on the World
Trade Center and the Pentagon on September 11, 2001. Since that time, U.S. military operations
have degraded the capability, capacity, and effectiveness of Al Qaeda but have not succeeded in
destroying the threat of violent extremist organizations fueled by radical ideologies. As Al Qaeda’s
organized structure was degraded in the decade following 2001, decentralized branches evolved
independently into more dispersed networks, such as the evolution of Al Qaeda in Iraq into the
Islamic State in Iraq and Syria, who eventually vied for the allegiance of radical Islamists around
the world.
Drug cartel proliferation. Counterdrug operations in the late 1980s led to success in countering
Colombian drug cartels using Caribbean networks to smuggle cocaine but did not end drug
trafficking into the United States. Rather, success was largely offset by the rise of Mexican drug
cartels. Efforts in the last decade to counter large-scale drug cartels have likewise been successful
in countering such criminal organizations as Sinaloa and capturing its chief kingpin, Joaquin
(El Chapo) Guzman. Rather than decreasing drug trafficking, this has resulted in a further
diffusion from large-scale centralized networks to dozens of small- to medium-scale drug
trafficking networks, leading to a proliferation of crime, increases in unconstrained coercive
violence, and rampant corruption of local governing institutions.
As hybrid threats face defeat, criminal elements generally disperse within the population. The diversity
and density of the population provides criminals the concealment necessary to resume the pursuit of purely
criminal endeavors without being defeated in conjunction with other hybrid threat forces. This diffusion into
the population may result in more loosely coordinated actions between hybrid threat components or the
complete severing of affiliation and cooperation. When hybrid threats disintegrate and disperse into the local
population, the ability of U.S. forces and unified action partners to understand, target, and defeat those
persistent threats is significantly degraded despite success on the military battlefield.
Hybrid threats facing imminent defeat no longer possess an interest in maintaining social cohesion,
order, and control; they may release masses of incarcerated prisoners to create further chaos, disorder, and
dispersion of criminal threats within the population to undermine U.S. efforts to stabilize society and
consolidate gains. The problem of criminal dispersion into populations following hybrid threat disintegration
is greatly increased given the trend toward urbanization of the world population into complex, densely
populated urban environments.
While the concentration of people does not automatically signal increased crime relative to population size,
several aspects of complex urban environments bear on the decisions of criminals and should be considered
during criminal and crime analysis. See TC 2-91.4 for military intelligence techniques and considerations in
urban environments.
population with essential social, economic, or security services that the government is incapable or unwilling
to provide. Informal social patronage and economic welfare systems often challenge formal governing
authorities responsible for providing such services and may undermine U.S. efforts to stabilize environments
and enable civil authority.
Consolidating gains is not a quick process and may require sustained effort and engagement with
populations over a significant period of time. As U.S. forces transition from large-scale ground combat
operations to the consolidation of gains, emphasis shifts from actions to defeat conventional threat forces to
stability tasks that address the needs of urban populations, manage public perceptions, and transition
responsibility from U.S. forces to the HN or other organizations.
This period of transition often increases risk. Crimes generally increase in unstable and transitional
environments as criminals seize opportunities to commit crimes due to limited or unclear governance
authority and gaps in civil security and civil order. Commanders and staffs should anticipate increased crime
and criminal activity during transitions and ensure that planning efforts focus on the security, stability, and
enforcement mechanisms necessary to ensure a smooth transition from large-scale ground combat to the
consolidation of gains.
GOVERNANCE CHALLENGES
Governance is the state’s ability to serve the citizens through the rules, processes, and behavior by
which interests are articulated, resources are managed, and power is exercised in a society (JP 3-24).
Instability undermines governance and contributes to security environments that may necessitate military
operations or assistance. Crime and criminal threats may contribute to instability by weakening governance;
replacing legitimate government structures with those of a criminal organization; or corrupting political,
judicial, or police institutions. The effects of instability within states and across regions undermine the ability
of stable states to govern effectively and participate peacefully with other states.
Stable states are those states capable of—
Protecting their populations from external and internal threats (for example, providing civil
security) through a monopoly on the legitimate use of violence.
Upholding civil order and rule of law through legal frameworks, public order, accountability to
the law, and access to justice.
Governing according to the rule of law by peacefully resolving political differences and settling
political grievances through dispute resolution institutions (court of law).
Weak Governance
A fragile state suffers from institutional weaknesses serious enough to threaten the stability of its
central government. Fragile states include failing states, failed states, and recovering states. A failed state
may only have remnants of a government due to collapse or regime change or it may have a government that
exerts weak governance in all or large portions of its territory (ungoverned areas). A failing state is still
viable, but it has a reduced capability and capacity to protect and govern the population. A recovering state
is moving toward normalcy, but it may have an imperfect level of viability. States within the fragile state
framework are susceptible to significant criminal activity due to the limited capacity of government and law
enforcement institutions. In such conditions, criminals often contribute significantly to disorder that
perpetuates instability to prevent disruption to their illicit activities. See ADRP 3-07 and JP 3-07 for
additional information on the fragile state framework.
Weak governance in fragile states provides lucrative environments in which crime can flourish. The
perpetual lack of governance and law enforcement in these places undermines the ability to protect people
and property. In such places, crime opportunities are rampant due to the lack of guardianship over vulnerable
targets and to the ability of criminals to perpetrate crimes with relative impunity. This is especially apparent
in ungoverned areas.
governance functions, regardless of whether or not they are actually capable of doing so. Governance
functions may be carried out by a variety of actors in an operational area with considerable local variation.
Formal governance structures may include central, regional, and local governments. Informal governance
structures may include tribal and clan structures, religious and spiritual leaders, clubs and associations, and
criminal or insurgent organizations. When informal governance structure surpasses or replaces formal
governance structure in the fulfillment of governance functions, it is commonly called an alternative
governance structure.
While ungoverned areas explain those situations for which there is no governing authority capable of
providing security and order (such as anarchy), in reality, areas most often considered ungoverned are
actually governed through alternative governance structures. Alternative governance structures fill the
vacuum created by the lack of a capable government. Alternative governance structures may include nonstate
or criminal organizations that fulfill the traditional functions of the state. They often possess the capability
and capacity to provide internal security and control, justice to settle grievances or violations of norms, and
economic or social services to the population.
Places that appear ungoverned from a Western perspective are often governed by alternative
governance structures that are seen as illegitimate or unacceptable because they violate international laws
and norms or the basic human rights of their citizens.
within a society. PIO provides police information and police intelligence focused on crime
environments, organized criminal activity, and the operational effectiveness of two critical parts of the
criminal justice system—police and corrections. PIO enhances the understanding of governance challenges
by—
Providing police information gathered during police engagement, HN police training, and regular
interactions with the local police force that may provide indicators of local or ministerial
corruption in police, law enforcement, or justice institutions.
Policing to restore and maintain order and to provide information collection focused on crime,
criminal activities, fear of crime within a population, and other destabilizing factors that
undermine civil order.
Continuously feeding the intelligence process with police information and police intelligence
related to HN police and corrections efforts to effectively prevent, control, and reduce crime and
criminal threats.
Military police and USACIDC personnel develop PIO skills and knowledge while supporting police
operations on Army installations. This enables military police to leverage these skills across all military
police disciplines—police operations, detention operations, and security and mobility support—in support of
decisive action. Key definitions that provide the framework and understanding for PIO include the following:
Police information is information collected during military police operations concerning crime,
disorder, criminal activity, and criminal threats (FM 3-39). Police information includes, but is not
limited to, a variety of data and information about crime, law enforcement, police institutions and
their effectiveness, and other general information in the operational environment that is collected
for analysis through a policing lens to solve crime and disorder problems. Police information is
analyzed to produce police intelligence.
Crime analysis is the systematic examination and interpretation of police information to determine
when, where, and why crime, disorder, fear of crime, and other destabilizing events occur in
specific places (FM 3-39). It may be specifically categorized as administrative, tactical, or
strategic crime analysis based on the focus of analysis and the purpose it is intended to serve.
Criminal intelligence is police information compiled, analyzed, and disseminated in an effort to
anticipate, prevent, or monitor criminal activity (FM 3-39). It may be specifically categorized as
tactical or strategic criminal intelligence based on the direction given to analysis and the purpose
it is meant to serve.
Police intelligence is the product resulting from the collection, processing, analysis, and
integration of criminal intelligence and crime analysis about crime, disorder, criminal activity, and
criminal threats (FM 3-39). Police intelligence provides commanders and military police with an
in-depth picture of the criminal environment.
PIO is conducted in four deliberate steps. First, military police commanders and staffs plan and direct
PIO by establishing the information collection plan and tasking collection assets. Second, military police
collection assets collect and process police information. Third, police intelligence analysts produce police
intelligence products through continuous and deliberate criminal and crime analysis processes that generate
the knowledge products of criminal intelligence and crime analysis. Fourth, military police personnel
disseminate police information and police intelligence to military police, Army organizations, and authorized
unified action partners to influence current and future operations.
Figure 1-5, page 1-18, provides the framework for conducting PIO in support of military police
operations and the operations process. This framework depicts the steps as sequential and independent;
however, there is often significant overlap. Simultaneous actions occur across the steps based on different
roles, and there are iterative cycles of activity during which collected information may produce additional
information requirements that drive additional collection while other information is routed for analysis or
immediate dissemination.
police commanders, staffs, and police intelligence analysts conducting PIO may perform similar tasks as
traditional military intelligence personnel, but they may differ significantly in the focus, authority, and
functional role of PIO.
Note. Military intelligence personnel may collect information from U.S. citizens only when it is
necessary to fulfill an assigned function and when it falls within one of several categories. (See
DODD 5240.01.) Military intelligence personnel will not direct military police or USACIDC
elements to conduct such collection activities (see AR 381-10).
PIO differs from traditional military intelligence in several distinct ways. First, PIO focuses on the
collection of information relating to crime, criminal activity, policing, detention, and investigations in a
particular area of operations. This information is critical to provide commanders and provost marshals a more
complete understanding of criminal threats and to prevent, monitor, and address criminal activities and crime-
conducive conditions during decisive action. Second, PIO is applied by military police and USACIDC
personnel operating in a law enforcement capacity. This authorization is based on the presence of criminal
predicate and allows for information collection serving criminal investigations and law enforcement
purposes. It is not restricted in the same manner as the intelligence community (non-law enforcement) when
collecting information against U.S. personnel. Third, PIO is not an intelligence discipline; it is a policing task
conducted in the operations section and by operational military police elements.
Note. Reasonable suspicion or criminal predicate is established when information exists that
establishes sufficient facts to give a trained law enforcement or criminal investigative agency
officer, investigator, or employee a basis to believe that there is a reasonable possibility that an
individual or organization is involved in a definable criminal activity or enterprise
(see 28 Code of Federal Regulations [CFR] 23).
Military police staffs and police intelligence analysts coordinate with and synchronize their activities
to share police information and police intelligence with military intelligence personnel consistent with
mission and legal constraints. PIO parallels the intelligence process to develop a mutual understanding based
on common terminology, enable collaboration and authorized information sharing at each step in the process,
and simplify the ability of military police commanders and staffs to integrate police information and police
intelligence into the intelligence process at any stage. Figure 1-6, page 1-20, shows the tasks, outputs,
dissemination channels, and responsibilities that enable effective collaboration between PIO and the
intelligence process.
PIO differs from intelligence operations in focus, authority, and functional role; however, PIO also
differs in manner and purpose of collection. Similar to intelligence operations, PIO may be guided and
directed to fill specific information gaps related to crime and criminal threats through the formal process of
planning and directing collection assets for deliberate collection. This is not the only, or even the primary,
method for collecting police information. Most police information used for analysis, production, and
dissemination originates from routine policing, corrections, and investigative activities that collect, process,
and report police information for the primary purpose of fulfilling law enforcement and investigative
reporting and storage requirements. Police information collected and reported as part of routine policing,
corrections, and investigations is stored in law enforcement databases that serve as a critical source of resident
data to produce police intelligence products.
operations, the Army design methodology supports organizational learning through reframing—a maturing
of understanding that leads to a new perspective on problems or resolutions. PIO is a continuous and iterative
process; it continually supports and provides commanders and staffs valuable police information and police
intelligence that can assist in framing and reframing the operational environment, problems, and potential
solutions throughout execution. See ATP 5-0.1 for greater details on the Army design methodology.
Framing Problems
Identifying and understanding problems are essential for solving problems. As the commander and
planning team gain an initial understanding of an operational environment, they shift their efforts to
identifying and understanding those issues impeding progress toward achieving the desired end state.
Through critical thinking and dialogue, the planning team frames problems by examining the differences
between the current state of an operational environment and the desired end state. They also examine the
differences between the natural tendency of an operational environment and desired future states of relevant
actors with the desired end state. These differences are tensions (frictions, conflicts, competitions) between
relevant actors, including geographic, demographic, economic, religious, and resource consumption trends.
Combined, these tensions represent a set of interrelated problems (a system of problems) that requires
resolution. Crime and criminal networks are often woven into the fabric of a given system. Whether criminal
networks facilitate other irregular threat networks through illicit financing or they control populations directly
themselves, they often contribute significantly to the overall problems that the commander and staff seek to
solve.
Framing Solutions
With an understanding of the operational environment and its associated problems, including crime
and the criminal aspects of those problems, the commander and planning team consider an operational
approach—the broad, general actions and means to solve or manage identified problems. The commander
and planning team use elements of operational art to visualize and describe the operational approach. In
developing the operational approach, the commander and planning team consider the resources to support
the operational approach and the associated risk. The team describes the operational approach in a visual
model with supporting text. The operational approach forms the basis for the commander’s planning guidance
used to develop an operations order or operations plan during the military decisionmaking process. Given an
adequate understanding of the crime aspects of the operational environment and problems, commanders are
supported by the contributions of military police staff and police intelligence analysts who can help
incorporate crime considerations into the overall adopted operational approach.
Reframing
Assessment precedes and guides the other activities (plan, prepare, and execute) of the operations
process. Assessment involves comparing forecasted outcomes with events to determine the effectiveness of
force employment. Assessment helps the commander determine progress toward attaining the desired end
state, achieving objectives, and performing tasks. It involves monitoring and evaluating the operational
environment to determine what changes affect operations; however, operations may not proceed as visualized
during planning. Commanders reframe after assessing that desired conditions have changed or are
unattainable by executing the current plan (including associated branches and sequels). Reframing includes
revisiting early hypotheses, conclusions, and the operational approach that underpins the current plan. In
reframing, the commander and staff revise their understanding of the operational environment and problem.
If required, they develop a new operational approach to overcome the challenges or opportunities that
precipitated the need to reframe. PIO supports the Army design methodology by continuously assessing and
contributing to the commander and staff understanding of crime and criminal threats.
Note. Criminal intelligence and information concerning criminal activity shared with other law
enforcement agencies are released according to the provisions of AR 195-2 and see AR 380-5 for
classified information.
USACIDC elements are critical in supporting Army crime prevention programs. In this capacity,
USACIDC leverages unique skills in crime analysis to provide support beyond simply investigating and
apprehending offenders. The tools and techniques of crime analysis (such as crime pattern analysis, crime
sprees and series, linkages among crimes, and crime trends or trajectories) enable USACIDC personnel to
evaluate crime environments, assess unit or specific target location vulnerabilities, and produce police
intelligence products, such as crime prevention surveys, crime prevention flyers, and threats and vulnerability
assessments. Such products are crucial to prevent crimes within an area of operations and to support Army
commanders responsible for protecting their personnel, property, and readiness against potential crime and
criminal threats. See AR 190-13 for details on the Army crime prevention program.
Provost Marshal
While military police and USACIDC commanders are responsible for PIO for their assigned missions,
jurisdictions, or area of operations, provost marshals are responsible for PIO in support of law enforcement
on bases and base camps. Typically, the provost marshal office or police station responsible for law
enforcement on installations falls under the directorate of emergency services and reports to the garrison
commander and/or the senior installation commander.
The provost marshal staff may have a trained Soldier or DA Civilian police intelligence analyst
assigned or attached to perform PIO as part of the operations section. These PIO analysts provide the provost
marshal with the capability to fulfill senior commander information and intelligence requirements related to
crime and to produce crime analysis products to support crime prevention, community awareness, and police
engagement. Provost marshal staffs, in conjunction with USACIDC personnel, use PIO to help commanders
identify indicators of potential crimes and criminal threats against Army operations, property, and personnel.
In brigade combat teams and echelons above brigade, PIO is conducted and managed by the provost
marshal operating as part of the S-3/G-3. In these organizations, the provost marshal ensures that the PIO
process is synchronized with other staff processes. The continuous flow of collected police information and
police intelligence enables a fused intelligence picture and provides constant input to the operations process
and its integrating processes. The contributions of PIO help develop a more comprehensive common
operational picture for the commander through a dedicated focus and understanding of crime and disorder
and through destabilizing criminal activities threatening the commander’s physical assets, readiness and
discipline, and ability to accomplish the assigned mission.
Regardless of the environment, police intelligence analysts conduct criminal and crime analysis of
police information to produce police intelligence to support commanders, provost marshals, and
investigators. The ultimate goal for police intelligence analysts and staffs performing PIO is to develop
useable police intelligence products. The trained police intelligence analyst provides the following
capabilities to the unit commander, provost marshal, or law enforcement investigator:
The development of initial background data and knowledge relative to police operations and the
crime environment for a specific area of operations or law enforcement investigation.
The compilation of collected police information for analysis or immediate dissemination.
Police information and police intelligence that identify crime and criminal trends, patterns,
associations, and other police-related statistics and information that increase the understanding
of—
Offenders, groups, and criminal networks.
Criminal funding sources.
Specific individual and group (supporter, financier, corrupt official, supplier, trafficker,
smuggler, recruiter) activities.
Geographic relationships of crime and criminals.
The population from the perspective of policing and the criminal dimension.
The identification of police information gaps and recommendations of information requirements
and collection strategies.
The identification of systemic issues in police organizations.
The predictive analyses of crime and criminal activity.
Recommendations regarding policing and investigative strategies to address crime and criminal
threat trends.
Liaison and information exchange with other military police, law enforcement, Civilian, and
military elements operating in the area of operations.
Analysis and police intelligence products tailored to specific missions or audiences.
Support to the targeting process.
Creating police intelligence products.
Giving recommendations for targeting strategies.
Support to law enforcement and law enforcement investigators in case developments.
The identification of background information and criminal history.
The identification of gaps in information relevant to specific investigations.
Recommendations for additional law enforcement and investigation efforts.
Commanders at all levels are responsible for the good order and discipline of their formations.
Military police and USACIDC support commanders in fulfilling this responsibility by providing law
enforcement, corrections, and investigations to prevent, deter, control, investigate, and reduce crime and
criminal threats on bases and base camps and within military formations. PIO enables military police to
produce policing, corrections, and investigative effects for commanders by enhancing understanding of crime
environments; analyzing crime places, patterns, and problems; and supporting criminal investigations with
focused crime analysis. The situational understanding that PIO delivers to commanders and provost marshals
enables them to reduce and mitigate the effects of criminal activity to Army personnel, equipment, and
facilities. In addition, PIO develops criminal intelligence for in-transit security and focuses the development
and implementation of threat countermeasures to safeguard Army personnel, material, and information going
to and returning from operational theaters.
Despite the clear distinction between home station activities and decisive-action tasks conducted in
overseas operational environments, criminal threats to military operations are often not as equally clear-cut.
Criminal activities threaten to disrupt military discipline, readiness, and operations at home station, in transit
to and from operational theaters, and while executing decisive-action tasks in overseas joint operations areas.
Because of the dynamic and ever-present threat of crime throughout the strategic depth of Army formations,
PIO provides a capability that bridges the gap that traditional military intelligence cannot cross. PIO supports
the commander’s protection efforts to preserve the force at home station and protect against the disruption of
combat power by criminal threats across globally extended lines of communication. See AR 525-2 for
additional information on the Army Protection Program.
In support of unified land operations outside the United States or its territories, military police and
USACIDC personnel conducting PIO coordinate closely with the S-2/G-2 to ensure that PIO is synchronized
and integrated with the intelligence process. During offensive and defensive operations, PIO plays a
secondary but complementary role to traditional military intelligence operations. In this role, PIO enables the
staff to identify criminal organizations and networks in the area of operations that provide indications of
disruptive activities and criminal threats that may produce a significant negative effect on military operations.
As operations transition from offensive and defensive focuses to stability operations and the consolidation of
gains, PIO plays a larger role in identifying and evaluating crime and disorder problems, patterns of criminal
activity, enduring criminal threats, and HN police and corrections capabilities and effectiveness in
establishing civil security and civil control, protecting communities from criminal threats, and restoring
legitimate governance and civil order according to the rule of law. Figure 1-8 demonstrates the contributions
of various participants from strategic to tactical levels that contribute to holistic situational awareness across
strategic depths based on unique jurisdictions and authorities.
Legend:
CRIMINT criminal intelligence
DOD Department of Defense
HN host nation
LE law enforcement
OBJ objective
Note. Figure 1-8 does not use official symbology to demonstrate the contributions of various
participants from strategic to tactical levels that contribute to holistic situational awareness across
strategic depths based on unique jurisdictions and authorities.
enforcement sources. PIO uses this information and employs crime analysis techniques to identify crime
places, patterns, and problems that may negatively impact the good order and discipline of Army formations.
Additionally, PIO provides commanders and provost marshals with the timely criminal intelligence required
to disrupt threats posed by criminal offenders, networks, and organizations operating on, near, or against
military installations and base camps to preserve readiness and protect the force.
In support of decisive action, military police personnel may be tasked as the primary collectors of
information on enemy forces operating—
Along extended lines of communication.
Along main supply routes.
In support or consolidation areas.
In support of a movement corridor. (See FM 3-81.)
This chapter describes step one of the PIO framework: plan and direct. PIO is a
requirements-driven process that focuses on answering information and intelligence
requirements. Planning originates with the commander’s visualization and is
developed by the staff to achieve the commander’s intent, guidance, and desired end
state. The information collection plan involves several factors that need consideration
before directing collection assets to execute the information collection plan in support
of military police or Army operations.
REQUIREMENTS DRIVEN
PIO is an iterative process that begins and ends with the continuous assessment of crime environments,
criminal threats, and police effectiveness to determine the information required to prevent, investigate,
control, and reduce crime. Military police constantly scan the environment for crime, disorder, fear of crime,
and other destabilizing effects that disrupt good order and discipline, threaten the readiness of the force, and
undermine stability. Military police use their presence and situational awareness to identify criminal threats
and crime problems that require police prevention and response. The information necessary to effectively
police and protect military installations, bases, formations, and populations combines with information and
intelligence requirements to drive the planning process and the direction of police information collection.
Figure 2-1 illustrates the first step of PIO.
Legend:
CCIR commander’s critical information requirement
FFIR friendly forces information requirement
PIR priority intelligence requirement
reachback, research, or other means to establish a baseline of knowledge. Information not available may be
designated as an information requirement. See FM 3-39 for additional information on military police and the
military decisionmaking process.
An information requirement is any information element the commander and staff require to
successfully conduct operations (ADRP 6-0). It includes all elements necessary to address the mission
variables (mission, enemy, terrain and weather, troops and support available, time available, and civil
considerations). Military police planners consider the operational variables when planning information
requirements. In particular, PIO contributes significant information to the commander’s understanding of
social, economic, and political variables, where crime is often a leading driver of instability, disorder, social
conflict, illicit activities, markets that disrupt economic growth and prosperity, and corruption or coercive
violence that undermines political authority and sovereignty. Prioritized information requirements are used
to develop the information collection plan. The information collection plan provides focus and direction to
collection efforts by documenting, prioritizing, and assigning collection assets against specific information
requirements to enhance the situational understanding of crime within the operational environment.
See FM 3-39 for an additional discussion of military police considerations of the operational variables.
Commanders designate the most important, time-sensitive information needed for the CCIR; PIO
anticipates and responds to the CCIR. A commander’s critical information requirement is an information
requirement identified by the commander as being critical to facilitating timely decision making (JP 3-0).
The commander is supported in determining the CCIR by his staff, including intelligence, provost marshal,
and other staff sections and subordinate units. The staff recommends information requirements for the
commander to designate as CCIR. They also recommend changes to CCIR based on the continuous
assessment of ongoing operations. CCIR is composed of two categories: friendly force information
requirement (FFIR) and PIR. Figure 2-2 depicts the relationship of CCIR, PIR, and FFIR.
Legend:
CCIR commander’s critical information requirement
FFIR friendly force information requirement
PIR priority intelligence requirement
Figure 2-2. Information requirements
A friendly force information requirement is information the commander and staff need to understand
the status of friendly force and supporting capabilities (JP 3-0). FFIRs identify the information the
commander considers as most important regarding the mission, troops and support available, and time
available for friendly forces. The S-3/G-3 manages FFIR for the commander. PIO produces significant
amounts of information regarding friendly forces through internally focused law enforcement, corrections,
and criminal investigations that support the commander’s readiness and ability to uphold good order and
discipline. PIO also supports the commander’s understanding of the friendly force protection status through
a deliberate focus on assessing friendly force vulnerabilities to criminal and other irregular threats (terrorists,
insurgents, guerrillas, insider threats).
An intelligence requirement is a requirement for intelligence to fill a gap in the command’s knowledge
or understanding of the operational environment or threat forces (JP 2-0). Intelligence requirements are filled
through a number of methods and capabilities. The information collection plan addresses intelligence
requirements that, when answered, fill gaps in knowledge and understanding. Military police direct the
information collection plan (or contribute to the supported commander’s information collection plan) by
focusing military police collection assets on the crime, criminal activity, disorder, fear of crime, and other
destabilizing events occurring throughout an area of operations. Information collection to fulfill intelligence
requirements may result from military police sources and methods discussed in chapter 3 and through
coordination and liaison with other military units (U.S. and multinational), including civil affairs, elements
conducting reconnaissance, sustainment units, other policing and law enforcement agencies, and
nongovernmental organizations.
Those intelligence requirements deemed as the most critical to mission success are prioritized for
collection. A priority intelligence requirement is an intelligence requirement that the commander and staff
need to understand the threat and other aspects of the operational environment (JP 2-01). The intelligence
staff manages PIRs for the commander; however, the commander must limit the number of PIRs to focus the
efforts and limit collection assets. Military police personnel—notably provost marshals, military police
commanders, and police intelligence analysts—monitor the PIR and other intelligence requirements to
influence collection planning and maintain awareness of those intelligence requirements that require
immediate dissemination of collected police information to support timely decision making.
Figure 2-3 depicts the requirements development process.
Legend:
COA course of action RFI request for information
MDMP military decisionmaking process SIR specific information requirement
PIR priority intelligence requirement
RDSP rapid decision making and
synchronization process
Requirements related to police and prison systems, policing activities, and crime environments are of
specific interest to military police, USACIDC commanders and staff, and police intelligence analysts. A PIR
of interest to police intelligence analysts may include the identification of previously unknown criminal or
other irregular threat networks, such as networks or methods and routes used for the concealment and
movement of contraband (weapons, money, drugs). Also of specific concern and focus for military police
and USACIDC personnel are the capability and capacity of HN police, prison systems, and infrastructure;
the determination and impact of criminal activity in the area of operations; and the functionality of the
criminal justice system.
Before tasking military police to collect police information, commanders and staffs employ police
intelligence analysts to perform activities that generate knowledge and information about the crime
environment or to fulfill the information requirement without requesting the employment of collection assets.
These activities include—
Performing searches and queries of police or detention databases (the Army Law Enforcement
Reporting and Tracking System [ALERTS], Army Corrections Information System, or Detainee
Reporting System).
Data mining police databases with analytical software to generate initial statistical or other data
that directly answers information requirements without requiring further analysis.
Coordinating and providing liaison activities with other military units (U.S. and multinational),
including civil affairs, special operations forces, and elements conducting reconnaissance and
security operations.
Employing military intelligence personnel (when authorized) to leverage organic Distributed
Common Ground System–Army (DCGS-A) capabilities for the query of intelligence databases
and the integration of information from intelligence sources.
Sharing information and collaborating with unified action partners (local law enforcement
organizations, federal law enforcement agencies, partner nation law enforcement personnel).
At times, information may be specific enough to be recognized as having immediate value to answer
the PIR. Other times, information may fulfill other intelligence requirements that fill in a piece of the puzzle.
Military police and police intelligence analysts must distinguish between information that must be
disseminated immediately to inform the commander, protect U.S. forces, or accomplish the mission or
information that may be used during criminal and crime analysis to deduce patterns, make inferences, and
generate the police intelligence necessary to fill gaps in knowledge related to crime and criminal activity.
Military police staff use the commander’s inputs to develop the information collection plan or support
the development of the overall information collection plan. Within military police and USACIDC formations,
the S-2/G-2 works closely to develop the information collection plan that puts the commander’s intent,
guidance, and requirements into action through tasking orders to organic or attached military police collection
assets. Planning information collection tasks helps to leverage unique military police or USACIDC collection
capabilities, skills, and knowledge to achieve an understanding of crime environments and organized criminal
activity relevant to current and future military police operations.
Military police staff who plan law enforcement, investigation, and detention operations on bases and
base camps use similar planning processes to shape patrol distribution, investigative priorities, and detention
guard force employment. Planning often focuses on local prioritization, direction, and mission briefings from
direct leadership where formal staffs do not exist. The following are examples of planning efforts within
various military police formations:
Installation provost marshal/police station. The provost marshal and operations staff oversee
the management of information and intelligence priorities to meet the installation commander’s
intent, fulfill CCIRs, and determine the requirements necessary to provide a safe and secure
installation. Police station direct leadership (watch commanders, the operations officer, and patrol
supervisors) plan patrol distribution, information collection priorities, and specify collection tasks
through regular guard mount mission briefs.
Criminal investigation division element. The special agent in charge of a USACIDC office
supporting an installation prioritizes investigative missions and the associated information and
intelligence requirements. Through direction and mission briefings, the special agent in charge
communicates priorities to individual USACIDC special agents to execute information collection
to influence investigative priorities or meet installation and USACIDC commander CCIRs.
Detention facility staff. The detention facility staff manages the detention facility commander’s
CCIR focused on PIR about the detained population (U.S. military prisoners or detainees) and
FFIR focused on the guard force and detention staff. Daily guard force briefings provide direction
and priorities for passive information collection in the course of routine detention tasks.
During decisive action, the brigade combat team (or higher) S-3/G-3 integrates the efforts of the staff
to develop the overall information collection plan. The provost marshal must work closely with the S-3/G-3
and S-2/G-2 to synchronize and integrate information collection planning requirements and priorities into the
coordinated information collection plan. In doing so, the provost marshal may recommend requirements for
attached or supporting military police collection assets or prioritize information from other sources vital to
generating the understanding of crime and criminal effects necessary to achieve the commander’s desired
end state (see figure 2-4). The provost marshal provides input into staff requirements planning by
continuously feeding crime and police-focused—
Running estimates.
Requirements.
Requests for information.
Legend:
CCIR commander’s critical information requirement
POLICE INFORMATION
Police information is an overarching term referring to various forms of data and information collected
or integrated by military police to influence PIO and generate an understanding of crime, and criminal
activity, and police effectiveness in countering those activities. Data is unprocessed signals communicated
between any nodes in an information system, or sensing from the environment detected by a collector of any
kind (human, mechanical, or electronic) (ADRP 6-0). Data can be quantified, stored, and organized in files
and databases; however, data only becomes useful when it is processed into information. Information is the
meaning that a human assigns to data by means of known conventions used in their representation. The types
of data and information that may comprise police information include an array of different types, including—
Crime data. Crime data is data regarding crime that is stored in databases and files that may be
processed and analyzed. Crime data may be collected and processed across operational
environments and may be stored in various types of databases, depending on the setting and the
authorities involved in collection. During overseas decisive action, databases used may include
law enforcement, detention, or intelligence-focused databases. Crime data may include reports of
crimes, crime statistics, and military police data entries directly related to a criminal incident (time,
date, location, complainant, witness, subject, type of offense, characteristics of subject).
Law enforcement data. Law enforcement data is data related to law enforcement activities,
operations, and programs focused on enforcing the law. Calls for service, patrol response times,
police manning, and patrol distribution are examples of law enforcement data that may be analyzed
to generate understanding of police effectiveness in preventing, deterring, and reducing crime and
disorder.
Criminal information. Criminal information (sometimes called investigative information) is
information pertaining directly to a criminal offender or subject. Criminal information regarding
U.S. citizens must adhere to strict policy and regulations regarding use, storage, and sharing. (See
AR 190-45 and AR 195-2.) Criminal information regarding foreign threat personnel in overseas
operational areas is less constrained.
Biometric data. Biometric data is computer data about and individual created by biometric
systems during an enrollment, verification, or identification process (ATP 2-22.82). The
categories of biometric data are called modalities. A biometric modality is a type or class of
biometric sample originating from a person. Commonly collected modalities include facial or iris
images, fingerprints, voice wave files, and palm prints. Some emerging modalities that may be
collected in the future are vascular mapping, retina images, gait (manner of walking), hand
geometry, and handwriting. See ATP 2.22.82 and ATP 2-22.85 for additional details on biometrics
and biometrics-enabled intelligence.
Forensic information. Forensic information results from materials collected at a crime scene or
incident site linked to threat operations or personnel. Analysis of forensic materials establishes
facts that prove or disprove links to people or events. Examples of forensic materials are
fingerprints, deoxyribonucleic acid (DNA), blood, tool markings, electronics, electronic media,
explosive materiel, explosive residue, weapons, manuals, documents, illicit drugs, currency, or
footprints. See ATP 3-39.12 and ATP 3-90.15 for more details on evidence, forensic material
collection at crime scenes and site exploitation.
Geospatial information. Geospatial information is information that identifies the geographic
location and characteristics of natural or constructed features and boundaries on the Earth,
including: statistical data and information derived from, among other things, remote sensing,
mapping, and surveying technologies; and mapping, charting, geodetic data and related products
(JP 2-03).
Criminal justice data. Criminal justice data is information related to the criminal justice system
that can be used to measure police and detention effectiveness in preventing and reducing crime
and holding offenders accountable for criminal activity. This may include data related to criminal
apprehensions, prosecutions, detention, and release from the criminal justice system, including
arrest rates, prosecution outcomes, sentencing data, and recidivism rates.
Other types of data. Demographic, population, historical, and other relevant data may be
integrated from diverse sources, depending on the situation and the crime problem being solved.
The root causes of crime often result from factors beyond the immediate control of military police
organizations. Understanding crime problems requires consideration of all relevant factors
influencing crime environments, crime problems, and criminal activity.
Other information obtained through military police patrols and police engagement. The most
common sources of police information are the personal observations of military police and
USACIDC personnel and the information provided directly by relevant populations during the
conduct of military police operations. Military police integrate information collection
considerations into the performance of all tasks and missions by employing active and passive
methods of collection. While passive collection occurs continuously during the performance of all
military police operations, active collection is driven by deliberate and planned collection
objectives and collection asset tasking. See chapter 3 for an additional discussion of the methods
and sources of information collection.
Note. The Army’s primary information collection tasks are reconnaissance, surveillance, security
operations, and intelligence operations. This manual refers to collection tasks performed by
individual military police patrols and formations. They are employed to perform aspects of the
primary collection tasks through policing means and other tasks not inherent in the primary tasks
that military police routinely perform that enable them to passively collect police information.
organic or attached military police patrols, but they may include other specialty military police personnel,
such as USACIDC special agents, detention specialists, or military working dog (MWD) teams. After a
thorough evaluation of the availability, capability, and disposition of the potential collection resources, the
information collection plan is implemented through the execution of asset tasking. The tasking process
provides the selected collection assets with prioritized requirements and directs their employment to
accomplish the desired results.
Using the information collection plan as a guide, the staff must complete several important activities
to achieve a fully synchronized, efficient, and effective plan. Updating information collection throughout
execution is crucial to successful information collection. As military police and USACIDC leaders assign
collection tasks to assets, they provide details that clearly define the collection requirements. The
requirements include—
What to collect (information requirements).
Where to collect it (named area of interest or targeted area of interest).
When and how long to collect (specific times, if required).
Why to collect (answer a CCIR, intelligence requirement, or request for information).
A part of collection planning and direction includes coordination with all stakeholders before initiating
collection activities. Possible stakeholders, beyond military police and USACIDC assets, include the
supporting judge advocate and other law enforcement agencies operating in the area of operations. This
coordination helps eliminate the duplication of effort, interference with an ongoing effort, or the violation of
legal limitations. In a deployed operational environment, coordination and synchronization is conducted with
the S-2/G-2. The unit in charge of the area of operations must be notified of activities in their area of
operations to ensure appropriate responses to emergencies and to reduce the likelihood of fratricide.
Notification also increases the likelihood of receiving information that may be critical to the collection effort.
RESPONSIBILITIES
The S-3 or provost marshal section responsibilities include—
Providing tasking and guidance on specific areas and objectives for police engagement and tactical
questioning based on unit PIR and specific intelligence requirements.
Synchronizing military police collection efforts with the S-2/G-2 to meet intelligence
requirements.
Providing relevant background police information, police intelligence, or military intelligence to
military police mission elements to improve situational awareness and cultural understanding and
to facilitate effective police engagement, tactical questioning, and protection efforts.
Establishing procedures to ensure that mission elements are debriefed at the end of the mission.
Establishing and emphasizing procedures for the immediate reporting of information of critical or
time-sensitive tactical value (such as a spot report in the size, activity, location, unit, time, and
equipment format).
Establishing procedures and disseminating special requirements for the proper evidence collection
and handling of captured equipment or media (cellular telephones, documents, computers).
Coordinating for additional assets required to support information collection requirements (human
intelligence [HUMINT] collection teams, civil affairs, engineer support, other support
requirements) and to fill military police capability gaps.
Identifying and briefing units and mission elements (such as site exploitation teams) regarding
expedited reporting requirements for specific critical information or high-value targets.
Unit commander responsibilities include—
Training and integrating specific collection techniques in the planning, preparation, and execution
of military police missions.
Providing tasking and specific planning guidance to subordinate leaders to ensure adequate
understanding of information collection requirements.
Reviewing IPB, police intelligence products, and other available information to ensure situational
understanding and situational awareness and to relay information specific to the unit area of
operations to personnel in the S-3/G-3 provost marshal section and, when applicable, the S-2/G-2
to increase knowledge of the area of operations.
Providing full support to unit PIO collection and debriefing activities and ensuring compliance
with established briefing and debriefing procedures by military police elements.
Reinforcing the importance of the procedures for immediate reporting of information of critical or
time-sensitive value.
Platoon, squad, section, team, and mission leader responsibilities include—
Training and integrating specific collection techniques in the planning, preparation, and execution
of military police missions.
Providing tasking and specific mission guidance to platoons, squads, or sections to ensure
adequate understanding of intelligence requirements, the information collection plan, and other
specific mission requirements.
Reinforcing the importance of the procedures for the immediate reporting of information of critical
or time-sensitive value to personnel.
Preparing for, and participating in, unit debriefing activities after military police missions.
Reporting information based on visual observations and police engagement during the debriefing
or through the immediate reporting of critical or time-sensitive information.
Conducting evidence collection and processing and carefully compiling written reports during
military police missions.
Legend:
AO area of operations NET no earlier than
IR intelligence requirement NLT no later than
NAI named area of interest PIR priority intelligence
requirement
Figure 2-5. Example of an information collection plan for a military police unit
OPERATIONS ORDER
Annex L of an operations order contains the overall information collection plan to support the concept
of operation. The information collection annex clearly describes how information collection activities support
the conduct of offensive, defensive, and stability or DSCA tasks described in an operations order. It
synchronizes activities in time, space, and purpose to achieve objectives and accomplish the commander’s
intent for reconnaissance, surveillance, and intelligence operations. When military police provide support to
the Army operations process, they contribute to the development of annex L by recommending collection
priorities and describing military police collection asset capabilities and availability for tasking. See
ADRP 5-0 for the operations process and FM 6-0 for details on orders production.
Note. Apart from tracking internal information collection efforts, military police often contribute
to the overall information collection plan of a supported unit. When supporting Army operations,
military police units seek to nest their planning and tracking processes with supported organization
formats and reporting procedures to ensure standardization and synchronization.
Legend:
AO area of operation
HQ headquarters
MP military police
R requests for collection by nonorganic assets (from organic or task organized
headquarters intelligence staff)
UAS unmanned aircraft system
XX-Tasked organic assets tasked to perform collection
Figure 2-6. Example of an information collection matrix for a military police company
MISSION BRIEFINGS
The purpose of a mission briefing is to ensure that personnel conducting missions (where the collection
of police information is likely or directed) are aware of specific information and reporting requirements,
information gaps, and unique mission requirements. Mission briefings include updated intelligence
assessments; a detailed briefing on current mission or investigative information and existing gaps; and
specific information, material, or data that may assist police intelligence analysts and staffs. These briefings
also include a review of collection objectives and methods to be employed.
The mission elements briefed may be restricted to a small number of investigative or law enforcement
personnel supporting a specific investigation provided to law enforcement personnel operating in an area or
include all units operating in an area of operations. In addition, the exact subject matter depends on the nature
of the mission, specific requirements, and the sensitivity or classification of known information and police
intelligence. The specific content and dissemination decisions are based on operational considerations and
classification restrictions that may apply to police information and police intelligence being disseminated.
A mission briefing may be conducted as a separate presentation or, ideally, may be integrated into
planned mission briefings. Briefers may be commanders, staffs, or special representatives. The mission
briefing format is determined by the nature and content of the information being provided, but it typically
follows the operation order format. These briefings are conducted to issue an order; provide detailed
instructions or requirements pertaining to the mission; review key points and considerations relevant to the
specific mission; and ensure understanding of the mission objective, specific roles in the mission, and
potential problems or threats required to overcome or mitigate those problems and threats. See FM 6-0 for
additional information on mission briefings.
Planning for mission briefings requires the consideration of several key elements. Initially, the
identification of the briefing audience is required (consistent with investigative requirements, operational
objectives, and information dissemination restrictions). Identified mission elements operating in the area
should be thoroughly briefed to ensure that the maximum collection capability is leveraged and synchronized
where appropriate. The mission briefing (see figure 2-7, page 2-14) should also provide criteria for reporting
immediate, time-sensitive information; reporting requirements for nonpriority reporting; and reporting the
location and procedures for postmission debriefings.
1. Situation.
• Enemy. Criminal and police situation update.
• Crime environment updates and indicators of criminal activity.
• Threat update (typically focused on criminal or other irregular threats).
Individual criminals, criminal networks, and criminal organizations operating in the area.
Known and potential high-threat areas and specific threats in the area.
Route information and current available information and intelligence.
Specific types of criminal threats, methods of activity, and modes of operation.
• Friendly forces Police situation update, patrol distribution, assessment guidance, troop to task.
2. Mission. Who, what, when, where, and why of the collection effort.
3. Execution. Concept of operations, objectives, methods, techniques, and tasks for police collection
assets. How the commander envisions accomplishing mission with available collection assets.
4. Sustainment. Specific collection sustainment requirements.
5. Command and signal. Chain of command, radio frequencies, special communication instructions
(police codes used), reporting procedures.
Special collection considerations and requirements.
Identification of specific persons wanted for specific criminal or threat activity (BOLO, warrants,
wanted persons, mission persons/ personnel recovery).
Identification of material or information with strategic value or impact.
Evidence collection priorities, handling, custody, and disposition procedures for collected
documents, media, and other material evidence.
Requirements for handling and disposition of detained personnel and captured
material/evidence.
Specific requirements for use of digital photography and documentation of the crime scene or
site exploitation.
Time-sensitive information relative to specific criminal activities or investigations.
Legend:
BOLO be-on-the-lookout
ASSESSING COLLECTION
Before executing police information collection, the staff makes certain that mechanisms are in place
and that subordinates understand reporting procedures to ensure that information obtained through collection
is used effectively to enhance situational awareness or influence decision making. Unclear reporting
procedures, insufficient feedback mechanisms, and a failure to update information collection planning and
direction according to evolving circumstances undermine the effort and risk assumed in executing the
information collection plan.
Reporting Procedures
The commander and staff establish clear reporting procedures to ensure that collected police
information can be evaluated and routed properly. This enables the staff to screen reports and debriefings to
determine if collection tasks have been met and to assess the following:
Relevance. Does the information actually address the collection task? If not, can the staff use this
information to satisfy other requirements?
Completeness. Is essential information missing? Are there elements of information the military
police collection asset must address or tasks that must be repeated?
Timeliness. Was the information received in a timely manner? Was it collected, reported, and
disseminated to appropriate channels in time to influence decisions or shape police operations?
Opportunities for cueing. Can this asset or another asset take advantage of new information to
increase the effectiveness and efficiency of the overall information collection effort? If the report
suggests an opportunity to cue other assets, military police staff immediately cue operations and
intelligence staff for potential adjustments to the overall information collection plan.
Feedback Mechanism
Military police planners ensure that planning and directing police information collection includes a
feedback mechanism to deliver necessary feedback from collection assets to planners. This allows planners
to assess collection effectiveness. When necessary, such feedback may identify ways to modify or improve
the collection effort and determine if collection tasks or objectives must be modified or updated.
Feedback is essential to maintain information collection effectiveness and alert leaders of deficiencies
to correct. By monitoring operations, correlating reports to requirements, screening reports, and providing
feedback, the staff ensures the most effective employment of military police collection assets.
As the operation continues, military police planners track the status of each collection task, analyze
reporting, and satisfy requirements. They pay particular attention to assets not producing required results,
which may trigger adjustments to the information collection plan. The staff assesses the value of the
information from collection assets and develops or refines requirements to satisfy information gaps.
When reporting satisfies a requirement, the staff relieves the collection assets of further responsibility
to collect against information collection tasks related to the satisfied requirement. The operations officer, in
coordination with the staff, provides additional tasks to satisfy emerging requirements. The operations staff
informs—
The collection assets of the partially satisfied requirements to continue collection against, the
collection tasks that remain outstanding, and what remains to be done to fulfill those requirements.
The collection assets that are assigned new tasks designed to exploit opportunities or respond to
changes in the situation.
Each action requires collaboration among the staff. In military police organizations, the operations and
intelligence staff work together to modify the information collection plan. In brigade combat teams and
echelons above brigade, military police staff support the intelligence staff during continuous planning
requirements and assessing the collection of military police collection assets. See ATP 2-01 for further details
on planning requirements and assessing collection.
This chapter describes step two of the PIO framework: collect and process. This step
focuses on providing timely and relevant police information to produce police
intelligence products that influence current and future operations. This chapter begins
by reviewing the roles and authorities of military police to collect police information.
Next, it describes how military police collection assets collect and process police
information by using diverse methods, sources, and techniques.
Table 3-1. Regulation, policy, and laws relevant to police information collection
Legend:
AR Army regulation FM field manual
CFR Code of Federal Regulations MCM Manual for Courts-Martial
DOD Depart of Defense SOFA status-of-forces agreement
DODD Department of Defense directive UCMJ Uniform Code of Military Justice
DODI Department of Defense U.S. United States
instruction USC United States code
EO executive order
Military police Soldiers and USACIDC special agents are the primary collectors of police information.
Military police collect police information while conducting tasks across the three military police disciplines:
Police operations. Military police collect police information while conducting police operations,
which includes—
Law enforcement.
Criminal investigations.
Forensic analysis and biometric identification support.
Customs support.
Support to civil security and civil control.
Traffic management and enforcement.
Civil disturbance control.
Police engagement.
Support to civil law enforcement.
Evidence response team support.
Detention operations. Military police collect police information while conducting detention
operations, which includes—
U.S. military prisoner confinement.
Detainee operations.
Host-nation corrections training and support.
Security and mobility support. Military police collect police information while conducting
security and mobility support, which includes—
Support to mobility.
Area security.
Reconnaissance and surveillance.
Antiterrorism support.
Physical security.
MWD support.
Support to populace.
Resources control.
Logistics security.
Besides police information collected directly through the conduct of military police operations,
military police collection assets also receive information from interaction and coordination with unified
action partners, including—
Higher echelon S-2/G-2 personnel.
Military information support operations units.
Host-nation police.
Domestic law enforcement agencies.
Joint and multinational partners.
The staff judge advocate.
Higher echelon battalion or brigade civil affairs operations staff officer (S-9)/assistant chief of
staff, civil affairs operations (G-9) personnel.
The civil-military operations center.
Civil affairs teams.
Force protection officers.
As necessary, information obtained from unified action partners is assessed for apparent or intuitive
links, connections, or associations with other police information to integrate multiple sources into the
criminal and crime analysis process while adhering to legal and policy guidelines regarding the use of such
information, depending on the operational environment in which military police are operating.
A primary concern of military police and USACIDC personnel collecting police information across
the military police disciplines is abiding by constitutional, legal, and regulatory requirements to protect the
rights and privacy of those subject to criminal investigation, apprehension, or confinement. This emphasis
places significant responsibilities on those authorities overseeing police information collection, storage, and
dissemination to protect privacy and rights and to prevent violations of U.S laws and regulations pertaining
to military intelligence collection against U.S. persons. See appendix A for further details regarding the
authority to collect information against U.S. persons for law enforcement and criminal investigative purposes.
Figure 3-1, page 3-4, depicts the collect and process step of PIO.
Legend:
U.S. United States
population by implementing and maintaining contact; maintaining efforts to clarify and verify information
already obtained through observations or other means; or observing activity, a lack of activity, or other
variations from the norm.
Active or deliberate collection occurs when military police or other Army law enforcement elements
are directed to obtain specific information about an area or target. These requests may be tied to a
commander’s PIR or provost marshal’s intelligence requirements regarding the area of operations, or they
may be linked directly to specific criminal investigations. This required information is generally briefed to
military police forces as part of their patrol or mission briefing before mission execution.
Military police typically do not perform active or passive collection in isolation, but they often perform
concurrent collection that combines active and passive methods. In concurrent collection, military police are
assigned deliberate collection tasks as part of another tactical task to accomplish. Military police perform the
tactical tasks and collect the police information necessary to support and implement into the intelligence
requirements. In addition to those collection tasks specified in a mission order or brief, military police employ
passive collection to gather information that may not be specified but is important to understand, such as
aspects of the crime environment or criminal activity. For instance, a military police patrol is tasked to
establish a traffic control post to control traffic along a main supply route to ensure freedom of movement
for friendly forces. Within the mission order to perform this task, the CCIR provide the military police patrol
PIR and FFIR to deliberately collect while the patrol also pays attention to other indicators within the
operational environment that may be relevant to decision makers or police effectiveness.
Collection is integrated throughout all military police operations. During the conduct of military
operations, military police patrols and specialty military police collection assets are arrayed across the area
of operations to perform a variety of policing, detention, security, and mobility tasks. Military police collect
information as a deliberate collection task or concurrent with the conduct of other military police missions
or tasks. Police information can be collected actively through direct observation and engagement with
targeted personnel or passively by observing and listening to the surrounding environment and the
interactions of people. Due to the methods that military police employ and the policing focus on countering
crime and criminal actors, military police provide a unique collection capability that generates police
information for criminal and crime analysis and for immediate dissemination to relevant unified action
partners to support situational awareness, protection efforts, and decision-making processes.
Police engagement with populations, community leaders, unified action partners, informants, and
law enforcement sources.
Traffic management and enforcement.
Physical security and access control.
MWD support.
Detention operations (confinement of U.S. military prisoners and detainee operations).
Dislocated civilian operations.
Data mining, database queries (law enforcement and intelligence), reachback (such as the Defense
Forensic Science Center), and open-source data reviews.
Military police obtain police information from a myriad of sources during the execution of military
police operations. The versatility of military police and their dispersion across the area of operations enable
them to engage diverse populations to obtain the information needed to answer information and intelligence
requirements related to crime, disorder, fear of crime, destabilizing factors, and police effectiveness in
providing safe and secure environments. These sources of police information are essential to developing a
clear picture of the networks, trends, patterns, and associations that are critical to combating criminal and
other irregular threats. Sources of police information also allow military police to identify and mitigate
organizational, system, and infrastructure shortfalls affecting police, detention, and investigative missions.
Military police and USACIDC special agents collect and analyze information in response to requests
for information, reviews of records and reports, assessments and inspections, complaints, criminal statistics,
incidents, inquiries, biometric data, forensic evidence, and surveys of police and criminal environments.
USACIDC specifically leverages access, networks, and expertise to obtain information from the following
specific sources:
The Combating Terrorism Program, as outlined in AR 525-13.
Law enforcement agencies.
Intelligence agencies.
Personal security vulnerability assessments.
Criminal threat analysis.
Logistics security threat assessments.
Criminal investigations.
Interviews and law enforcement interrogations.
technical means. Reconnaissance is a focused collection effort that employs many tactics, techniques, and
procedures throughout the course of the mission, one of which may include an extended period of
surveillance. See FM 3-90-2 for an additional discussion of reconnaissance in greater detail.
Military police employ reconnaissance, surveillance, and assessment capabilities as the primary means
to perform deliberate information collection. When performing reconnaissance in tactical environments,
military police primarily focus on determining the presence of criminal, terrorist, or other irregular threats in
an area of operations. Reconnaissance tasks are typically completed by military police patrols trained in
combat skills and policing techniques. This form of reconnaissance supports situational awareness of threats
targeting main supply routes, lines of communication, and critical infrastructure in echelon support areas
(bases, base camps, and command posts). Military police patrols also collect information regarding police
and crime throughout an area of operations, specifically, locations of HN police stations, prison facilities,
and general population attitudes toward the police. Military police reconnaissance patrols can satisfy multiple
CCIRs for an area of operations and intelligence requirements specific to police infrastructure or criminal
threats.
Law enforcement reconnaissance and surveillance requires specialized technical training and
experience to navigate legal and policy restrictions, protect rights and privacy concerns, and employ
advanced law enforcement surveillance technology. Law enforcement reconnaissance and surveillance tasks
are typically performed by specially trained personnel (special reaction teams, military police investigators,
USACIDC special agents). Specific types of reconnaissance, surveillance, and assessments that military
police conduct across operational environments include the following:
Reconnaissance: route, zone, and area.
Surveillance: general surveillance, early warning, and law enforcement surveillance.
Assessments: threat and technical.
and where crime or crime patterns occur to support the investigation and prosecution of a specific crime or
enhance crime prevention efforts to reduce the attractiveness of a place to criminal activity.
Early warning employs sensors in positions or locations likely to attract criminal activity or other
threats. These sensors deter crime, monitor criminal activity, and create video evidence for the prosecution
of crimes. The most common places for early warning sensors are checkpoints and entry control points,
critical sites, controlled access facilities, and other places requiring technical physical security measures to
protect critical property or assets. Early warning surveillance is critical to performing military police tasks,
(crime prevention, physical security, antiterrorism, base and base camp defense, critical asset security, the
enablement of timely and effective emergency response).
Law enforcement surveillance involves the employment of sensors, surveillance personnel, and
technology to observe specific criminal or threat targets and to gather required police information. Law
enforcement surveillance may be required to confirm suspected criminal activity, attribute suspected
criminals to a specific time and place, or confirm associations between persons, groups, or entities.
Surveillance may be physical observation of a person or place, visual surveillance by remote video
equipment, or audio surveillance via a myriad of technologies employed to intercept audio evidence. Law
enforcement surveillance is typically associated with specific criminal investigations or the production of
criminal intelligence. However, law enforcement surveillance may also be performed to conduct assessments
(traffic studies, physical security assessments, other security and protection requirements).
See AR 190-53 and ATP 3-39.12 for details on law enforcement surveillance.
In an operational area, military police may be tasked to conduct surveillance of specific populations,
locations, or facilities to satisfy CCIR that have been identified and disseminated through the operations
process. Military police units conduct surveillance to gain information to help guard against unexpected threat
attacks in an area of operations or to gain information critical to understanding, planning, and executing
missions in support of decisive action. When surveillance is required in populated areas, military police
patrols may be more acceptable collection assets because military police are perceived as a law enforcement
organization rather than solely as a combat element.
Commanders and staffs must fully understand the capabilities and limitations of available military
police assets. This prevents collection asset tasking that does not match capability at a particular echelon or
organization. Some reconnaissance and surveillance requirements demand special equipment, training, or
expertise to complete the mission successfully. This may require specific requests for technical capabilities
not present in baseline military police organizations. Understanding the capabilities and limitations of various
military police organizations is critical to planning and requesting the appropriate echelon and type of military
police technical capability to meet mission requirements. See FM 3-39 for additional information on different
military police organizations and their technical capabilities.
Threat assessments integrate criminal threat analysis with criticality and vulnerability assessments
required for the prioritization of assets by commanders and provost marshals to counter threat activities and
associated risks. Vulnerability and criticality information helps police intelligence analysts identify security
weaknesses and potential high-risk targets. Several factors are considered during a criminal threat analysis
to determine the level of threat posed against specific U.S. interests (material, structure, organization,
installation, unit, population). Threats may be direct threats against specific targets and interests or indirect
threats that can disrupt operations. Threat analysis and threat assessments enable commanders and provost
marshals to prioritize their efforts and assets to counter criminal, terrorist, or irregular threats posing the
greatest risks to critical and vulnerable assets.
Technical assessments help leverage the unique professional skills that military police and USACIDC
personnel possess in the core competencies of policing, corrections/investigations. This expert professional
knowledge in two (policing and corrections/investigations) of the three pillars of the criminal justice sector
(judicial being the third) provide commanders and staffs vital collection capabilities to understand police and
prison institutions present in an operational area. Such technical policing, corrections, and investigative-
focused assessments provide expert knowledge while evaluating the crime environment, police and prison
infrastructure, systems, personnel, training, manning, and capabilities and capacities of police and prison
institutions to enforce the law and control criminal populations. See FM 3-39 for a full listing of military
police and USACIDC elements and for additional information on their specific technical capabilities that
may be leveraged to support technical assessments.
Note. Information extracted from electronic devices, photographs, video and audio recordings,
and written or printed (hardcopy) documents related to law enforcement investigations can be
exploited by trained digital forensic examiners assigned to USACIDC formations. If the
information contained within these items does not have applicability to law enforcement
investigations, the items should be forwarded to document and media exploitation teams (if
allowed by appropriate laws and policy) to support intelligence analysis (see ATP 2-91.8).
Hardcopy documents are valuable sources of police information. Fingerprints and DNA can be lifted
from sheets of paper or envelopes. The type of paper or print used may provide clues to the system used or
to the age of the document. Word choices and spelling may provide clues to a person’s background and
education. Handwriting analysis may give investigators another means of identifying a specific individual.
Lists kept near the computer may be valuable because they may contain passwords, Web site addresses,
access codes, e-mail addresses, and aliases. This category of evidence also includes identity papers
(passports, visas, licenses, property ownership documents, shipping documents). An analysis of written and
printed documentation may identify locations that an individual has visited, suppliers used, funding sources,
and associates. See ATP 3-39.12 for additional information on evidence collection.
Biometrics
Biometrics is the process of recognizing an individual based on measurable anatomical, physiological,
and behavioral characteristics (JP 2-0). Biometrics applications measure biological characteristics, which are
stored in databases for future comparisons. In addition to the biological data stored in databases, biographic
data is collected and personal behavioral traits are identified for future comparison.
These characteristics and traits can be useful for tracking individuals, making positive identifications,
establishing security procedures, or detecting deception based on measurable biological responses to
stimulus. Biometrics data can be used for protection and security efforts and as evidence in investigations
and criminal prosecutions. Identification data is combined with claimed biographic data to match an
individual to the DOD databases. During screening, military police compare the claimed identity of a subject
with the database to verify the identity, discover the identity, or enroll it as a new identity. This data includes
biometrics data (fingerprints, voiceprints, facial photographs, iris images, DNA).
Military police, USACIDC personnel, and investigators, and police intelligence analysts can leverage
biometrics data to develop trends, patterns, and associations between individuals. Biometrics data that results
in the identification or confirmation of an individual’s presence at specific times and places, and in the
determination of truthfulness or deception can be extremely useful in building singular associations to linking
groups, cells, or organizations. Linking biometrics data with the forensic analysis of evidence collected at the
scene of a crime or an attack can assist law enforcement personnel in criminal investigations or directly feed
the targeting process for commanders conducting decisive action. Coordinating with the S-2/G-2 to nominate
persons of interest to the biometrics watch lists enables law enforcement personnel to expose persons of
interest to global tracking and enables biometrically equipped unified action partners to positively identify
persons of interest during battlefield encounters.
Note. Biometrics data collected during the course of military police operations can be extremely
useful to military intelligence personnel in the development of biometrics-enabled intelligence.
When not restricted by military police investigations or legal and policy restrictions, every effort
should be made to share this data with military intelligence (see ATP 2-22.85).
Forensics
Forensics is the application of multidisciplinary scientific processes to establish facts. The collection
of forensic material enables the methodical analysis of evidence to establish facts that can be used to identify
connections between persons, objects, or data. It is most commonly associated with evidence collected at
crime scenes or incident sites; but it also includes methodologies for the analysis of computers and networks,
accounting, psychiatry, and other specialized fields. Forensics is typically employed to support legal
proceedings that lead to criminal prosecutions. Additionally, forensic analysis is used to answer CCIRs,
provide situational awareness, influence criminal and crime analysis, and support other mission requirements
as part of decisive action.
USACIDC supports Army forensics requirements through the Defense Forensic Science Center. The
Defense Forensic Science Center facility is stationary due to the nature of the equipment required and other
operational requirements. The Defense Forensic Science Center deploys forensic exploitation teams with
trained examiners to support operational commanders in the field. This expeditionary capability enables
timely forensic analysis across a broad range of forensic capabilities, to include latent fingerprints, toolmarks,
firearms, DNA, digital forensics analysis, and explosive and drug chemistry. USACIDC laboratory
capabilities may be operated in conjunction with forensic laboratory capabilities resident in sister Services,
capitalizing on complementary capabilities to support the operational commander.
Forensic analysis expands the ability of police intelligence analysts to establish trends, patterns, and
associations by providing scientific facts of relationships between persons, objects, or data. Criminals,
terrorists, or other threat actors tend to operate in predictable ways. The analyses and comparisons of
fragments left at the scenes of improvised explosive device bombings or incident sites in an area of operations
can identify similarities in materials used, the construct of the trigger device, and other variables
(see FM 4-30 for additional information on explosive ordnance disposal). This can lead to the development
of patterns in which events can be associated with the same bomb maker. Information derived from the
analyses of materials used, to include the identification of chemical characteristics, can enable police
intelligence analysts to develop associations leading to specific suppliers of those materials. These efforts
can lead investigators to the resolution of criminal investigations and assist operational commanders in
developing targeting strategies.
The proper handling of material from crime scenes or incident sites is critical to the success of forensic
examination by forensic scientists and technicians. Military police are trained to properly identify, preserve,
and collect material, whether in the context of crime scene processing or when collecting material at an
incident site. See ATP 3-39.12 for detailed information on evidence collection and preservation.
several years. Law enforcement investigations fall into two primary categories—criminal investigations and
collision (traffic accident) investigations.
Military police Soldiers are trained to conduct preliminary investigations as the first law enforcement
officer at the scene of a crime or traffic accident. Military police investigate incidents by identifying,
collecting, and preserving potential evidence; observing physical characteristics of locations and items; and
conducting interviews with potential witnesses, victims, suspects, and technical experts. Specially trained
military police investigators and USACIDC special agents conduct most of the formal criminal investigations
in the Army. These investigators are trained in technical investigative techniques, to include evidence
identification, processing, and preservation critical to successful criminal investigations. USACIDC
maintains purview over criminal cases as outlined in AR 195-2.
A collision investigation is the process of the observation, collection, and documentation of evidence
(including physical measurements of objects, markings, and vehicles) and the analysis, preparation, and
preservation of physical and testimonial evidence to determine the cause or causes of a collision or mishap
involving a vehicle. Collision investigations are typically conducted by trained traffic management and
collision investigators; however, any military police patrol may be required to conduct investigations of
minor traffic incidents or to assist in major incidents or complex collision investigations.
Typically, criminal intelligence associated with criminal investigations is law enforcement-sensitive
and remains within law enforcement channels; however, depending on the environment and mission, criminal
intelligence may be directly integrated into the operations process as discussed in chapter 5. PIO can provide
significant, relevant, and timely criminal intelligence derived from U.S. and HN criminal investigative efforts
focused on active criminal, terrorist, and irregular threats against U.S. and HN assets and interests. See
ATP 3-39.12 for additional information on law enforcement investigations.
Note. Law enforcement interrogations are separate from intelligence interrogations. Intelligence
interrogations are covered by FM 2-22.3. Law enforcement interrogations are covered by
AR 190-30, AR 195-2 and ATP 3-39.12.
Police Engagement
Police engagement is the foundation for successful long-term police operations. Successful police
organizations interact and establish trust with the populations they serve. This is true for civilian and military
forces in any operational area and is reflected in the military police motto: Assist. Protect. Defend. Police
engagement occurs formally and informally when military police and USACIDC personnel interact with
residents, HN police and security forces, media personnel, and unified action partners. Routine engagement
with diverse organizations and people allows military police to gain valuable police information about
criminal threats and criminal activity in an area of operations. See ATP 3-39.10 for details on police
engagement.
Police engagement is an activity with several distinct purposes. Police engagement is used to inform
the populace (or other agencies and organizations) of specific data points and themes to persuade the
population to cooperate with civil and military authorities; mitigate present or potential discontent; provide
advanced notification of program, policy, or procedural changes to mitigate potential problems; or gain
support and develop a sense of community involvement. Police engagement is also a means to interact with
and gain valuable police information from the population, other police agencies, or other external
organizations. It is enhanced by regular police contact and the subsequent development of trust based on
ethical, professional, and effective policing.
Police engagement is a specific type of Soldier and leader engagement; it occurs between police
personnel, organizations, or populations to establish trust, maintain social order, and uphold the rule of law.
Military police and USACIDC personnel engage local, HN, and multinational police partners; police and law
enforcement agencies; community leaders; and local populations to obtain critical police information that
may influence military operations or potentially destabilize an area of operations. The goal of police
engagement is to develop a routine and reliable police intelligence network through which police information
can flow to military police and USACIDC personnel and into the operations process. Based on the situation
and information requirements, police engagement can be formal or informal.
Formal. Formal police engagement is generally conducted as part of a deliberate military police
or USACIDC Soldier and leader engagement strategy to gain support or information or to convey
a message. This activity requires preparation, coordination, and proper reporting after a police
engagement activity. Formal police engagement often aligns with deliberate or active police
information collection methods (such as attending town hall meetings or key leader engagements
with local leaders).
Informal. Informal police engagement is widespread and less directive in nature; however, it is
no less important to the overall success of the mission. Every interaction between military police
and personnel outside the military police unit has the potential to be an informal police
engagement. Individual military police Soldiers and teams interacting with the population conduct
the bulk of police engagement activities. Building rapport with the community establishes avenues
for military police forces to obtain valuable police information. Informal police engagement
typically aligns with routine or passive collection methods.
Populations
Police engagement is the primary method through which military police interact with and build trust,
legitimacy, and public support with the populations they are responsible for policing, protecting, and serving.
Trust encompasses several aspects that enable the effective collection of police information. Trust may reflect
the population’s belief that the police enforce laws in an impartial, unbiased, and equal manner that is
untainted by prejudice or corruption. Trust may also reflect the confidence the population has in the capability
and capacity of the police to provide effective protection, enforcement, and civil order. Legitimate police
who cannot uphold the rule of law or protect the population may lose trust and public support based on the
inability to maintain civil order. Trust also reflects the faith people have that reporting information will not
endanger themselves or their families, their privacy will be protected, and the information will be processed
and used to serve the good of the public. When people perceive that reporting information will not contribute
to apprehending criminal offenders, improving the crime environment, or reducing the fear of crime in
society, they are unlikely to accept the risk of potential retribution or social isolation by reporting information
to the police. In these ways, trust is the bedrock of successful police engagement and police information
collection among populations.
Military police and USACIDC personnel can gain a significant amount of police information from
initial complaints or calls for response or assistance due to specific emergencies or incidents. The initial
contact with complainants or individuals at the scene of an incident (witnesses, victims, and potential
suspects) can result in acquiring valuable pieces of information that may not be available with the passage of
time. These circumstances provide the recent memory of an event or a valuable observation. It is important
that this information be captured and documented as quickly, thoroughly, and accurately as possible. The
passage of time results in faded memories; modified recollections based on external inputs; internal
rationalizations and thought patterns; and intentional or unintentional corroboration between witnesses,
victims, and perpetrators. Accurate and timely police information is critical to the development of accurate
assessments and analysis by military police, USACIDC personnel, and police intelligence analysts.
Community Leaders
Community leaders can be valuable sources of police information specific to their areas of influence.
They typically have historic knowledge of persons and activities in their cities, towns, neighborhoods, or
bases. Information received should be confirmed and vetted; however, community leaders can provide
military police and USACIDC personnel with valuable information regarding the criminal history and
variations in their area (persons or groups, new individuals or groups, activities and observations that are out
of the norm). These leaders can also provide insight into the opinions of the population (public perceptions
and levels of trust or hostility) on the police in the area.
Community leaders may include—
Local government officials.
Installation or base commanders and staffs.
School officials.
Business owners or managers.
Neighborhood mayors and watch leaders.
Religious and tribal leaders.
Informal leaders.
Community leaders in another culture may require time and effort by military police and USACIDC
personnel to build a level of trust that results in the sharing of information. Care must be exercised to ensure
that interactions with local leaders are initiated at the appropriate level. Failure to do so may result in
individuals feeling slighted or developing an inflated sense and perception of importance among other
community members. Military police assessments should be made early in an operation to determine the
appropriate level of police engagement required in a particular area of operations.
Informants are informal contacts that are willing to provide information to law enforcement personnel;
there is no formal relationship established between an informant and law enforcement personnel. They can
be repetitive sources of information or they may provide information only once. Law enforcement sources
are managed formally, include strict controls to protect the source, and control contact and information flow.
Army law enforcement sources are registered and managed by USACIDC source managers.
Note. Personnel involved with selecting, recruiting, and managing a registered source normally
coordinates and deconflicts their law enforcement sources with other source managers operating
in the area of operations. This coordination occurs between USACIDC source managers,
HUMINT, and the counterintelligence staff element responsible for counterintelligence and
HUMINT operations in the area of operations.
Individuals may be motivated to serve as informants or law enforcement sources for a variety of
reasons. They may be motivated by money, through the assumed protection of their assets, or through
payments from investigators. Other informants or law enforcement sources may cooperate with U.S. and law
enforcement authorities to prevent prosecution, avoid being targeted, or direct prosecution or attacks against
their rivals. Still, others are motivated by feelings of patriotism or a sense of justice or to support U.S. values
and ideals. Some informants and law enforcement sources are motivated by feelings of revenge toward the
organization they are reporting against. It is important for law enforcement investigators and police
intelligence analysts to understand these motives. At a minimum, this understanding provides insights into
biases and potential areas of informant law enforcement or source unreliability that may make information
suspect or warrant deliberate corroboration.
evidence of criminal activity, and obtain police information to fulfill deliberate collection objectives or
passively as part of routine observations and interactions with persons transiting the checkpoint.
surprise during an attack due to the trafficability of routes and the ability to blend in with routine traffic. They
also present the opportunity for adversarial personnel to attempt to gain access to a base, country, or facility
by concealing their identity or their hostile intentions (for example, insider threats with valid access who are
motivated to violate the law or conduct an attack). The use of biometrics, identification procedures, trained
security guards, and military police often causes access and entry control points to be the first sensors capable
of detecting potential threat reconnaissance and surveillance, indicators of an attack on U.S. forces and bases,
and criminal activity (smuggling, trafficking, illegal substance abuse). This is true whether these tasks are
performed to control access at home station or to control entry to secure facilities or whether they are
deployed in support of decisive action. Information collected through such means should be immediately
assessed to ensure that relevant and time-sensitive information is reported through the proper channels
immediately.
Note. Observations and information related to potential threat activity at home stations should be
immediately reported to counterintelligence personnel.
Detention Operations
Detention involves the detainment of a population or group that poses some level of threat to military
operations. Detention operations are conducted by military police to shelter, sustain, guard, protect, and
account for populations (detainees or U.S. military prisoners) as a result of military or civil conflict or to
facilitate criminal prosecution. Detained persons are frequently sources of information pertaining to other
investigations or prosecutions due to their direct or indirect connections with crime, criminal activity, or other
criminals within or outside a detention facility.
Military police responsible for guarding detained personnel continuously employ passive collection
techniques to gather information about the population of U.S. military corrections and detention facilities in
support of unified land operations. This passive collection stems from observing the activities, routines, and
interactions of detained populations in detention or corrections facilities. Military police personnel
conducting detainee operations use observation and listening techniques to gain and maintain situational
awareness critical to the protection of the guard force and facility population. Passive collection requires
significant attention to detail and continuous attention from military police guard forces. Information
collected by guard personnel is passed through the chain of command to the echelon S-2/G-2 using
established debriefing procedures, when authorized by appropriate laws and policy.
Information collected in a detainee environment assists the staff in determining potential security
issues. Criminal groups may organize and exert their influence or act out in a violent manner, often targeting
detainee facility guard forces or other members of the population. These associations can be critical to law
enforcement investigators as they develop criminal cases for crimes committed external and internal to a
detention facility. Regular debriefings for guard personnel operating in close proximity to the facility
population can provide military police staff and police intelligence analysts with the information necessary
to develop and identify the formation of disruptive trends, patterns, and associations in the facility.
Detained persons in a facility may provide information relevant to criminal or threat activity outside
the facility. This information should be immediately reported to the military police staff for dissemination to
the appropriate external element for action. In detainee facilities, the appropriate external element is the chain
of command; in a deployed operational environment, it is the S-2/G-2. The external element may also require
additional intelligence or law enforcement interrogations or interviews. FM 3-63 contains additional
information concerning detainee operations and associated PIO.
Note. Intelligence interrogations are not law enforcement-related collection activities and,
therefore, are executed only by DOD trained and certified intelligence personnel. Military police
Soldiers are prohibited from conducting or participating in intelligence interrogations of detainees.
Trained law enforcement personnel (usually military police investigators or USACIDC special
agents) may interview or conduct law enforcement interrogations of individuals for specific law
enforcement investigation purposes.
Note. Special care must be given to handling data, information, or intelligence on different systems
and networks. Each network possesses its own classifications and information protection
considerations. Police intelligence analysts must remain cognizant of the classification level and
release criteria of the information they are handling to ensure that privacy-protected or
law-enforcement-sensitive information is not improperly shared outside law enforcement channels
and classified information is not exposed. See AR 25-22 for handling privacy information,
AR 190-45 for handling law enforcement-sensitive information, and AR 380-5 for handling
classified information.
Data Mining
Data mining uses data to discover previously unknown, valid patterns and relationships in large data
sets. Data mining analyzes data from different perspectives and summarizes it into useful information. It
finds correlations or patterns among multiple fields in other large relational databases. Data mining can help
organize the mass of collected data. Data mining consists of more than collecting and managing data; it also
includes analysis and prediction.
Reachback
Reachback is the process of obtaining products, services, and applications, or forces, or equipment,
or material from organizations that are not forward deployed (JP 3-30). Reachback capabilities allow military
police and USACIDC personnel to leverage national-level capabilities to support operations in theater. When
deployed, one of the most important reachback capabilities that military police and USACIDC personnel
have is access to the Defense Forensic Science Center. The Defense Forensic Science Center maintains its
primary forensic laboratory at a stationary location due to the nature of the equipment required. While the
Defense Forensic Science Center provides forward-deployable forensic expeditionary laboratories, advanced
technical forensics analysis may require reachback support from the Defense Forensic Science Center to
provide advanced forensic support in latent fingerprints, tool marks, firearms, DNA, and explosive/drug
chemistry. This combination of an on-site and reachback capability allows the forensic expeditionary
laboratory to prioritize in-theater capabilities while ensuring comprehensive forensic analysis support
through reachback.
Military police and USACIDC personnel may gain valuable information from contractors.
Contractors perform functions throughout an area of operations and may witness events firsthand or through
interaction with the HN, U.S. military, multinational, intergovernmental, or nongovernmental personnel.
Military police and USACIDC personnel should not overlook contractors as a possible source of information.
Note. Due to the restrictions placed on information gathered on U.S. persons, police intelligence
must be provided to the provost marshal operations section or military police unit S-3 for further
action when operating in the United States and its territories.
POSTMISSION DEBRIEFINGS
The police intelligence debriefing is a process of collecting information of potential value by
questioning military police elements returning from missions. The purpose of a debriefing is to identify and
record data and information collected by the military police collection asset. This information may serve to
identify collection tasks, additional information, and observations in the area of operations or to properly
identify and record evidence gathered during the conduct of the mission.
understanding and fill gaps in current knowledge. Missions should not be considered complete and personnel
should not be released until reports and debriefings are complete. When conducting debriefings, all mission
elements should be debriefed, including—
Leaders returning from operational liaison positions or meetings.
Military police and other law enforcement personnel at the conclusion of all missions.
Functional and multifunctional assessment teams following missions in the area of operations.
Other personnel exposed to persons or environments where they may have obtained information
of police intelligence value.
The immediate assessment of collected information may lead to the determination that the
information has completely or partially answered an intelligence requirement or a PIR. This information
should be reported to the appropriate staff, commander, investigator, or provost marshal. Investigators, staffs,
and analysts must monitor the CCIR of their higher, subordinate, and adjacent units to support the immediate
recognition of CCIR. Time-sensitive information identified as exceptional should be immediately reported
for action through the appropriate staff and command channels. The S-2/G-2, S-3/G-3, provost marshal
section, or police intelligence analysts should—
Debrief personnel or provide specific guidance for unit debriefs, to include reporting criteria.
Collect, collate, and format reports, as required.
Report police information through prescribed reporting channels.
Debriefing Considerations
The debriefing typically follows the mission briefing format. By maintaining a standard format, the
exclusion of critical aspects of the mission is prevented. If possible, reports generated during the mission
should be reviewed by the personnel conducting the debriefing activities beforehand to provide a measure of
situational awareness and help develop follow-on questions. A review of generated reports before conducting
a debriefing of an element enables debriefing personnel to concentrate on filling in gaps and following up on
the reported information. If the mission element used digital cameras or other recording devices, it is helpful
to use the photographs during the debriefing. A detailed sketch or map may also be useful for facilitating
discussion and ensuring understanding by all parties.
During the debriefing, avoid yes or no questions or questions framed in a way that leads the
respondent to a particular answer. The goal of the debriefing is to gain information from the military police
collection asset that is not currently available or that corroborates existing information. Debriefing personnel
should also ask questions that may extract information from observations or provide other input that the
mission element may deem as unimportant but, in fact, may provide police intelligence analysts, staffs, and
investigators with critical pieces of information. For example, debriefing personnel should—
Ask the mission element, “What did you see (hear, learn)?” rather than, “Did you encounter any
criminal or threat activity?”
Avoid asking questions only for the published police intelligence requirements. This may limit
answers obtained from mission personnel, causing valuable information to be missed.
Use follow-up questions to get complete information before leaving a specific discussion point.
“What else?”
“Is there anything else you remember?”
Refrain from focusing only on visual observation; ask questions relating to all senses.
“Were there any smells that were particularly noticeable or out of the normal?”
“Were there any unusual sounds or lack of sounds?”
At the conclusion of the debriefing, document collected observation and material evidence. A PIO
debriefing report should be completed. Include, at a minimum, the items listed in figure 3-2, page 3-26.
Timeliness. Is the information tied to a specific event or decision point or required in a hard time
frame? New information is processed as it is received, but the staff must be aware of time
considerations.
Corroboration. Ideally, two independent sources are used to corroborate information. Failure to
corroborate information can produce a flawed product. Normally, uncorroborated information is
suspect and of limited usefulness. However, uncorroborated information may be useful when
balanced against contextual and historical factors. An example may be information received from
a confidential source that has a history of reliable and credible reporting.
Legality. Illegally collected information will risk tainting all work and expended resources. An
analyst must ensure that information is obtained within legal guidelines.
important to provide contact information so that the receiving element can ask further questions and possibly
receive additional information.
access to most data in ALERTS. ALERTS helps analysts and investigators by providing a common reporting
and storage database for police information. This allows stored police information to be retrieved, collated,
and used for criminal and crime analysis across law enforcement and investigative organizations.
(See chapter 4 for a discussion of ALERTS support to analysis.) ALERTS also allows for the rapid query of
police information to meet immediate information requirements, inform key decision makers, or share with
relevant and authorized stakeholders. (See chapter 5 for a discussion of ALERTS support to dissemination.)
In deployed environments, military police may report police information and police intelligence
through S-2/G-2 channels using DCGS-A to meet information and intelligence requirements, support
situational awareness, and influence and assist in establishing a common operational picture. When
conducting law enforcement and criminal investigations, military police and USACIDC do not populate
police information and police intelligence into DCGS-A to avoid violations of legal and policy restrictions.
By maintaining separate law enforcement and investigation reporting and storage systems, military police
prevent the sharing of police information and police intelligence that cannot be shared outside of law
enforcement channels. When supporting decisive action overseas, military police and USACIDC personnel
may report and store police information not related to U.S. citizens through DCGS-A to allow intelligence
personnel to fuse that information with other information and intelligence to enhance situational awareness
of threats to U.S. forces and operations.
Note. It is critical that the police intelligence reports that reside on DCGS-A are compliant with
the legal and regulatory restrictions placed on the collection of information against U.S. persons
by intelligence personnel. See appendix A for a discussion of legal authorities and restrictions.
This chapter describes step three of the PIO framework: produce. This step focuses on
producing police intelligence products through the criminal and crime analysis
processes. Police intelligence is categorized as administrative crime analysis, tactical
crime analysis, strategic crime analysis, tactical criminal intelligence, or strategic
criminal intelligence. Additionally, there are many types of products that may be
produced and grouped for different dissemination purposes.
The analysis of police information varies based on intelligence requirements and the purposes for
which the analysis is meant to serve—such as identifying and apprehending a criminal offender, informing
the public or population, or shaping crime prevention strategies to prevent and deter criminal activity. Police
intelligence analysts use common analytical techniques and integrate criminal intelligence and crime analysis
to answer requirements specific to policing organizations, the crime environment, and criminal investigative
gaps and considerations.
Analysis requires manipulating and organizing data into categories that facilitate further study.
Patterns, connections, anomalies, and information gaps are assessed during the analysis of police information.
The initial hypothesis and data comparison are accomplished by—
Observing similarities or regularities.
Asking what is significant.
Categorizing relationships.
Ascertaining the meaning of relationships or lack of correlation.
Identifying requests for information and the need for additional subject matter expert analyses.
Making recommendations for additional collections, to include locations and time constraints.
Automation increases the capability to correlate large volumes of data and information from many
sources and assists in the analysis process. The interpretation of information requires an analyst to develop
search and file parameters. Analysis continues to be a human function—cognitive functions that manifest in
reflective thinking. Police information is converted into police intelligence through a structured series of
actions that, although set out sequentially, may also take place concurrently. Production includes the
integration, evaluation, analysis, and interpretation of information in response to known or anticipated
intelligence requirements.
Access to local, theater, DOD, non-DOD, and commercial databases allows analysts to leverage stored
knowledge on topics ranging from basic demographics to criminal threat characteristics. Access to military
police databases, such as ALERTS, is typically granted when military police, USACIDC personnel, or police
intelligence analysts are assigned to a position that requires access to perform assigned duties and
responsibilities. A validated Defense Intelligence Agency customer number (acquired by the intelligence
directorate of an echelon intelligence staff section S-2/G-2), in combination with SECRET Internet Protocol
Router Network (SIPRNET) and Joint Worldwide Intelligence Communication System connectivity, can
establish access to most intelligence databases.
The challenge for an analyst is to gain an understanding of the structure, contents, strengths, and
weaknesses of a police database, regardless of the database type. These challenges require extensive training
and familiarity with police databases. Additionally, the procedures are often difficult for extracting portions
of data or downloading and transferring data to unit automated information systems. Commanders
and staffs should consider allowing appropriate time, resources, and training to the analysts to ensure that
they remain capable and proficient in navigating and leveraging available resources to maximize their
potential.
STATISTICAL ANALYSIS
Statistical data is raw data that may be organized, packaged, and disseminated for an array of purposes,
such as identifying crime frequencies, trends, and distributions. Statistical data can be drawn from diverse
sources and depicted in numerous manners, but the data also has limitations. Police intelligence analysts and
statistical data users must be aware of the limitations and resist the desire to infer more than the presented
data can accurately portray. Statistical data is often presented in charts to display—
Frequencies using bar, pie, and Pareto charts. (A Pareto chart is a type of chart that contains both
bars and a line graph, where individual values are represented in descending order by bars, and
the cumulative total is represented by the line.)
Trends using bar and line charts.
Distributions using geographic information system, trend lines, or other formats.
Data requires different types of statistical tools to present effective information in a clear and
understandable manner. For example, military police staff and police intelligence analysts may depict larceny
offenses over the course of a year to identify seasonal variations in a particular crime. A pie chart may help
show a commander the types of crimes that are most prevalent within their formation. The staff or analyst
may depict these statistics on a frequency chart in bar graph format to depict multiple crimes occurring during
each quarter of a fiscal year. However, if a police intelligence analyst wants to portray how long this activity
has been occurring or the trajectory information, they may depict aggregate annual crime data by using a
trend line. The data presented in graphic form should also be tabulated so that the information is readily
available to reinforce the chart and show how the data was tabulated. Supporting geospatial products may
further enhance the presentation of statistical data. Figure 4-2 provides several different examples of
graphical formats for displaying statistical data.
TREND ANALYSIS
Trend analysis refers to the gathering, sorting, prioritizing, and plotting of historical information. It
provides analysts and supported commanders, provost marshals, and investigators with a view of how events,
elements, and conditions have affected police operations and criminal activity in the past. Trend analysis uses
statistical data to predict future actions or occurrences. This historical perspective provides continuous
insights for developing coherent possible or probable courses of action for a criminal threat and for fostering
the ability to predict specific occurrences. Trend analysis uses data collected from police reports, raw data
files, and other assembled historical data to generate useable maps, geospatial products, charts, or graphs that
indicate crime trends. This information must be maintained and updated to be effective.
Comparisons of recorded historical police and criminal incidents and the associated trends derived
through trend analysis can provide clues to criminal and threat capabilities, modes of operation, and activities
in relation to time and space. Police intelligence derived from trend analysis enables the redistribution of
police assets to address specific crime problems. Trend analysis can also determine organizational problem
areas and facilitate organizational adjustments or changes to improve police operations. Trend analysis is
useful for establishing a baseline for police intelligence analysts and units to use as a statistical point of
reference for future analyses. Trends can be depicted in many different formats, including—
Graphs.
Maps (or other geospatial products).
Narrative summaries.
Ideally, trend analysis should be depicted visually and in a report format. Trend analysis is extremely
useful for depicting changes over time in—
Specific occurrences of the types of crimes and safety issues (traffic collisions, driving under the
influence of alcohol or illegal substances, juvenile crimes, assaults [simple, aggravated, domestic
incidents], sex crimes, suicide, drug offenses, homicide, larcenies, gang activities, and security-
related incidents [perimeter breaches, unauthorized entry, exclusion area violations]).
Offenses by specific persons (persons with a criminal history).
Locations and times of specific offenses.
Traffic flow (specific intersections or roadways, entry control points and traffic control posts,
traffic peaks [daily, seasonal, holiday, special events]).
Numbers and types of citations (DD Form 1408 [Armed Forces Traffic Ticket], the Central
Violation Bureau form, other locally used forms).
Calls for service, assistance, or complaints against the police.
Patrol response times.
Special-event attendance statistics.
PREDICTIVE ANALYSIS
Predictive analysis employs multiple analytical techniques to analyze current and historical police
information and police intelligence to predict future activities, behaviors, trends, or events. It captures
statistical and historical data and, through the analyses of previous and current associations, uses patterns and
trends to enable the analyst to predict potential incidents or activities. Predictive analysis is not guessing; it
is based on reasoning, deliberate analysis, and appropriate analytical tools and methodologies. It may focus
on specific criminal or disruptive individuals, groups, or organizations to determine their capabilities,
vulnerabilities, intent, and probable courses of action. Predictive analysis can be valuable in identifying crime
trends to project future potential trajectories. The value in predictive analysis lies in enabling commanders
and provost marshals to make informed decisions regarding criminal threat mitigation and interdiction. It
enables commanders and provost marshals to make adjustments in task organization and asset distribution to
counter crime-conducive conditions and factors contributing to instability and disorder.
Through analysis, police information becomes police intelligence. Analysis is based on critical
examinations of available and relevant information to determine capabilities and trends and to develop
predictive analysis for crime environments and criminal threats. Police intelligence supports predictive
analysis to—
Determine the identity of individual criminals, criminal groups, and applicable associations.
Determine the course of action that a specific criminal threat is likely to take, enabling
commanders, provost marshals, and investigators to identify possible friendly courses of action to
counter the threat.
Predict crime trends in an area of operations, based on the extrapolation of statistical crime data,
enabling adjustments to patrol and distribution to counter criminal activity.
Determine the presence, capability, and likely actions of organized criminal elements in the area
of operations.
Determine the status and capability of police organizations, infrastructure, and systems.
Identify the probable trends and effectiveness pertaining to police organizations, based on the
analyses of current and historical performance, equipment, and personnel data.
Identify likely areas of corruption and public distrust of policing systems, based on current and
historical data and information.
Determine patterns in criminal activity and law enforcement in the area of operations that can
assist in identifying crime-conducive conditions.
Determine the construct, capability, and functionality of HN legal systems, focusing on the police
and prisons.
Identify locations and contributing factors generating crime opportunities and crime-conducive
conditions.
Criminological Perspective
Conducting criminal analysis through a criminological perspective allows police intelligence analysts
to understand the characteristics of criminal offenders and the nature and characteristics associated with
criminal activities.
Characteristics of Offenders
Military police, USACIDC personnel, and police intelligence analysts gain a basic understanding of
criminal psychology, behavior, and characteristics through years of experience in dealing with criminals.
They provide a unique policing perspective that allows analysis of the elements of crime (offender, victim,
and place) from a criminal’s perspective to understand criminal motivations and intentions. The cumulative
knowledge, skills, and perspective generated from the daily engagement with criminal subjects or convicted
prisoners give military police a unique understanding of the characteristics common to criminal offenders
and of the nature of criminal activities.
People
The primary focus of criminal analysis is on the people who are responsible for committing crimes and
are participating in organized criminal activity. The goal is to understand their capability, capacity, and intent
to commit criminal acts or harm U.S. forces. This approach stems from using several different perspectives
to scrutinize individuals who commit crimes so that holistic understanding of criminal offenders and criminal
organizations is gained. These perspectives include examination through the lens of the criminal and the
threat they pose to U.S. forces and interests; the psychological, behavioral, and cognitive characteristics of
offenders; the connections and linkages among co-offending networks and organizations of criminals; and
the way in which exposed vulnerabilities provide the crime opportunities upon which criminals act.
Communication Analysis
Communication analysis (also referred to as toll analysis) reviews telephone records, to include the
analytical review of records reflecting communications (telephone, e-mail, pager, text messaging) among
entities that may be reflective of criminal associations or activity. It may result in the identification of the
steps required to continue or expand the investigation or study. While communication analysis has been a
key element in law enforcement investigations, advances in technology have elevated the importance,
capability, and scope of tracking communications activities of individuals and organizations during
investigations. Communications analysis allows police intelligence analysts to document incoming and
outgoing calls, telephone locations (GPS tracking), dates and times of calls, call durations, and other
communications data. This facilitates the identification of communication patterns and associations relative
to specific communications equipment.
Communication analysis may be charted by using manual methods or advanced analytical software.
The ability of information technology to improve the efficiency and effectiveness of analysis is readily
evident in complicated career fields and data-intensive research techniques, such as communication analysis.
Using advanced analytical software, police intelligence analysts can analyze large amounts of data related to
communications and produce graphical charts that simplify the data and depict associations, directionality,
and the volume of communications taking place within a given communication network. The greatest
advantage of using information technology is the ability to filter and vary the amount of data depicted based
on the level of detail a particular audience requires. A law enforcement investigator may require extremely
comprehensive details, but high-level decision makers may be more interested in the broader patterns and
connections such analysis may reveal. Communication analysis can be combined with other analysis
techniques, such as geospatial analysis, to target communication networks on the understanding of the people
using communication devices combined with the physical infrastructure that supports such communications.
Appendix B provides an example communication or toll analysis product.
fraud), bribery, embezzlement, theft (deception, product substitution), racketeering, and other economic
crimes.
Criminal market analysis is used to examine beyond the financial crimes being committed within an
area of operations so that an understanding of the markets and associated incentives for illicit goods is
achieved. Understanding criminal markets is essential to not only stopping current criminal offenders but
also for preventing future financial crimes by removing the mechanisms that give individuals incentives or
facilitate their illicit financial crimes. When analyzing criminal markets, police intelligence analysts may use
commodity flow charts. Commodity flow charts depict the directional flow of commodities (money, stolen
property, or illicit drugs) between entities or within criminal networks. Commodity flow charts also provide
basic association and contextual information as it pertains to the flow of commodities. Commodity flow
charts can show details as precise as individual transactions or depict the totality of transactional events.
Appendix B provides an example commodity flow chart.
blue attacks on U.S. and coalition forces, and identify known or suspected terrorists attempting to enter the
United States.
DFBA collaborates continuously with interagency and intelligence community partners. Three key
partners are DHS, FBI, and the Terrorist Screening Center. An example of DFBA interagency and
intelligence community collaboration is the file sharing between DHS, FBI and Terrorist Screening Center
databases, which supports a whole-of-government approach for identifying terrorists. Another example is
DOD assisting DHS refugee vetting missions with analytic support to the biometric screening of applications.
The primary capability performing forensic analysis is the Defense Forensic Science Center. The
Defense Forensic Science Center mission is to provide full-service forensic support (traditional,
expeditionary, and reachback) to Army and DOD entities worldwide, provide specialized forensic training
and research capabilities, serve as the executive agent for the DOD Convicted Offender DNA Databasing
Program, and provide forensic support to other federal departments and agencies, when appropriate. The
Defense Forensic Science Center is the DOD premier forensic center. Its subordinate units include the U.S.
Army Criminal Investigation Laboratory, the Office of the Chief Scientist, the Forensic Exploitation
Directorate, and the Office of Quality Initiatives and Training.
When USACIDC special agents require forensic analysis of evidence to support criminal
investigations, they use the capabilities of the Defense Forensic Science Center to analyze forensic materials,
access interagency databases (FBI Combined DNA Index System database for DNA profiles), and provide
forensic analysis results and reports to USACIDC special agents to generate investigative leads, make
conclusions regarding subject innocence or guilt, or provide evidence for prosecution. The Defense Forensic
Science Center also provides forensic analysis support to deployed warfighters. In operational areas, Defense
Forensic Science Center deploys the Forensic Exploitation Teams to provide in-theater forensic analysis
support to operational and tactical commanders.
The forensic exploitation team is a deployable laboratory with adaptive forensic capabilities that
enhances the exploitation of captured enemy materiel and evidence gathered supporting protection, targeting,
sourcing, criminal prosecution, and mission success. Forensic exploitation teams provide a standardized
exploitation process by integrating weapons technical exploitation capabilities, including explosive
exploitation and electronic reengineering, with the teams inherent forensic disciplines of serology, DNA,
chemistry, latent prints, and firearms/tool marks. Forensic exploitation teams support combatant commanders
based on operational priorities. Forensic exploitation teams have on-site capabilities and the ability to obtain
institutional support from the Defense Forensic Science Center through reachback. This combination of on-
site and reachback capability allows the forensic exploitation team to prioritize in-theater capabilities while
ensuring full forensic analysis support. Table 4-1 shows forensic exploitation team capabilities.
Table 4-1. Forensic exploitation team capabilities
Latent Prints DNA
• Provide latent print exploitation. • Is able to process samples and report results in
• Research unknown-latent-print-to-known- 72 hours.
record comparison/identification. • Follows FBI Quality Assurance Standards.
• Administer record-to-record comparison • Conducts known and questioned sample
(identification confirmation). processing, to include Touch DNA.
• Prepare latent-to-latent comparison. • Is involved with advancing DNA technology
• Rapidly deploy latent print experts with (Rapid DNA, Next Generation Sequencing).
forensic disciplines at FXD. • Is capable of submitting DNA results for
• May work in unclassified or classified prosecution by local governments.
environments (support prosecution or • Supports intelligence and LE communities.
intelligence).
Link Analysis
Link analysis is a technique used to depict relationships or associations between two or more entities
of interest graphically. These relationships or associations may be between persons, contacts, associations,
events, activities, locations, organizations, or networks. Link analysis is sometimes referred to as an
association or network analysis. Police intelligence analysts use link analysis to find and filter data that
locates people; identifies the ownership of assets; and determines who is involved, how they are involved,
and the significance of their association. Link analysis can be especially valuable to active, complex
investigations. It provides avenues for further investigation by highlighting associations with known or
unknown suspects. Link analysis is normally tailored to a specific investigation; therefore, dissemination is
generally restricted to other law enforcement or military personnel acting as part of the same investigation.
See ATP 2-33.4 for additional information on link analysis.
Link analysis is made possible by the diverse identities and social connections humans possess. A
person may simultaneously identify and maintain connections with legitimate or criminal networks based on
a particular part of their identity and values. While one part a person’s identity and values may draw them
toward legitimate enterprises, another part of their identity and values may draw them toward criminal
enterprises. For example, one individual may possess moderate political and social values but associate with
or facilitate criminal or terrorist networks based on financial incentives or interests. On the contrary, another
individual may perform a similar task but have stronger ideological or religious beliefs that connect them to
a criminal or terrorist organization on a much deeper level. Understanding the motivating factors behind
various connections, links, or affiliations with irregular threat networks is crucial to determine the strength
of connections between individuals and networks. Figure 4-3, page 4-12, demonstrates the diverse identities
and social links of individuals.
Case files.
Surveillance reports.
Financial reports.
Public records.
Local or regional databases.
Other agency reports.
Intelligence reports (open source intelligence, HUMINT, electronic intelligence, imagery
intelligence).
Determining the type of diagram or matrix to be used. A link diagram graphically displays
connections between individuals, organizations, and activities. Link diagrams can clarify what is
known and what may be missing about the network being charted. To remain relevant and
effective, link diagrams must be continually updated to include relevant reported information.
Association Matrix
Association matrices establish the existence of known or suspected connections between individuals.
An association matrix may be reflected as an array of numbers or symbols in which information is stored in
columns and rows. Figure 4-5 provides an example of a basic association matrix. Activity matrices are used
to determine connections between an individual and organizations, events, locations, or activities (excluding
other individuals). The appropriate association or activity matrices reveal who knows whom, who
participated in what, who went where, and who belongs to what group. This graphic may depict associations
(such as weak or unconfirmed, strong or confirmed, or a significant member of an entity or group).
Network Analysis
Network analysis is an analytical technique used to exam dynamic, multilink human networks
characterized by varying degrees of centrality, scale, and complexity. Unlike conventional military
hierarchies, criminal organizations (and other irregular threat organizations) often operate through relatively
decentralized networks that are cellular and distributed across time and space. Part of the challenge in
countering these types of organizations is their constant evolution and adaptation to gain a relative advantage.
Central to overcoming this challenge is understanding how criminal organizations are organized, how they
carry out operations, and what factors are critical to holding the organization together.
Police intelligence analysts must understand the linkage or connection between components of a
system or group performing identical, similar, related, or complementary activities or functions. Viewed as
a system, a network is an interconnected or interrelated group or chain—a functionally, physically, and/or
behaviorally related group of regularly interacting or interdependent elements—that forms a unified whole.
Network analysis involves evaluating the various components of a network to identify critical nodes or
vulnerable points to influence, target, or exploit the vulnerabilities of networked organizations.
A network consists of individuals (or other elements) and the connections between them. Individuals
in a network are called nodes. A node may also be a nonperson point at which subsidiary parts of the system
originate or center (such as the command node of a terrorist cell). A critical node is an element, position, or
command and control entity whose disruption or destruction immediately degrades the ability of a force to
command, control, or effectively conduct operations. Network analysis evaluates how nodes of a designated
system function in relation to one another. It can help commanders identify systems or networks, the system’s
subsystems or components, and critical nodes of a subsystem for potential targeting.
Network analysis enhances understanding of criminal networks to help commanders determine the best
approach to counter the network. Network analysis focuses on identifying individuals, groups, and subgroups
or cells that comprise the network’s structure. Police intelligence analysts analyze the criminal network
structure to determine the existence and strength of relationships (links or ties) between people, groups, or
organizations (nodes or actors). They evaluate key nodes in a criminal network by using network diagrams
to assess varying types of centrality (degree, closeness, betweenness, and eigenvector). Figure 4-6 depicts a
networked organization with various types of structures. While baseline network diagrams are an essential
starting point to determine the importance of the various components of a network based on physical
attributes (number of links, position of nodes), assessing the social aspects of a network (human motivations
and criminal motives behind various actor behaviors) adds significant qualitative value to network analysis
that can enhance the ability to counter criminal networks. See ATP 2-33.4 for additional information on
network analysis.
Criminals may use social media as a tool to facilitate many different types of crimes. Besides enabling
communications between individuals in criminal networks, social media may be used to facilitate cyberspace
crimes, financial crimes, or other types of criminal activity. Social media analysis helps unveil those crimes
that are facilitated by social media technology and it complements other analysis techniques discussed in this
chapter, such as financial crimes analysis, criminal market analysis, or functional analysis.
Functional Analysis
Functional analysis is focused on assessing a threat disposition and action for a particular type of
operation. Functional analysis is based on the concept that certain operations or tasks are explicitly unique
and certain actions or functions must be implicitly performed to accomplish those operations or tasks.
Functional analysis provides a framework for understanding how specific threats make use of their
capabilities. Functional analysis is applicable, regardless of how the threat is characterized. Specific
knowledge and training enables police intelligence analysts to apply the functional analysis process, which
effectively addresses specific threat types. (See ATP 2-01.3 for additional information on the functional
analysis.) Functional analysis graphically depicts the threat use of each capability and typically determines
the—
Threat objective.
Functions to be performed to accomplish the identified threat objective.
Capabilities available to perform each function.
Flowcharting
Flowcharting is a series of analytical techniques that describes and isolates the distribution pattern of
a criminal organization, their method of operation, and the chronology of criminal activities. Flowcharting
allows a police intelligence analyst to isolate associations and patterns identified through previous analysis
techniques to depict a specific person, organization, entity, association, or activity without extraneous
information. The flowchart may also show accountable gaps in time. When combined with other analysis
(link analysis or communications analysis), a flow chart can assist an analyst in understanding relationships
and where involved associates fit into the scheme of a criminal enterprise.
Some flowcharting techniques include—
Activity. This technique depicts the key activities and modes of operation of an individual,
organization, or group. Activity flow analysis is used to view criminal actions and identify
methods of operations to determine likely suspects. Most criminals leave unique indicators when
committing a crime. These indicators are specific details, common to the specific criminal or
organization, and may include details regarding weapons, notes, vehicles, targets, or the number
of people involved.
Timelines (time-event) and theme lines. These techniques are used to depict sequences of events
in chronological order (timeline), or chronologically depict events as they pertain to a specific
entity (theme line). Timelines and theme lines are used individually to assess the actions of a given
entity or they can be used in conjunction with additional timelines or theme lines to conduct
comparative analysis of relationships to given events. These tools establish chronological records
of activities or related events. The charts may reflect activities of individuals or groups and depict
large-scale patterns of activity. Figure 4-7, page 4-18, shows an example of a basic time-event
flowchart and symbology. See appendix B for more advanced and complicated examples
generated by using automated analytical software.
Commodity. This technique displays a graphic representation of the movement of materials or
products (weapons, materials, drugs, money, goods, services) in a criminal or other network,
enabling an analyst to discern the organization hierarchy. See appendix B for an example.
Case Linkages
The connections revealed through different criminal analysis techniques (link, association, network
analysis) allow military police, USACIDC special agents, and police intelligence analysts to make linkages
between criminal investigations and cases. This expands the understanding of criminal threats from
individual criminal offenders to broader criminal networks and organizations. The linkages among criminal
cases allow for broadening the focus from individual criminal incidents to broader patterns of criminal
activity. This technique is critical for connecting criminal incidents to determine if patterns of criminal
activity are part of broader networks and organizations that constitute a criminal threat. See appendix B for
a combined chart that leverages multiple types of analysis using automated information technology to greatly
enhance the ability to understand diverse and overlapping relationships between people, places, things, and
organizations.
Based on the factors evaluated during criminal threat analysis and criticality and vulnerability
assessments, criminal or terrorist threats can be assigned a level of probability and credibility. The probability
of criminal or terrorist action against U.S. interests is established as—
High.
Threat elements are operationally active.
There is potential for significant attacks.
The operational environment favors the criminal or terrorist element.
Significant.
Criminal or terrorist elements are present in the area of operations.
There is operational activity.
The elements possess the capability to conduct significant attacks.
The operational environment does not favor U.S., HN, or criminal and terrorist elements.
Moderate.
Criminal or terrorist elements are present in the area of operations.
There are no current indications of threat activity.
The environment favors U.S. or HN elements.
Low.
There are no indications of a threat presence.
There is no threatening activity present in the area of operations.
Opportunity Theories
Opportunity theories approach crime from the perspective of understanding the situational conditions
and factors influencing individuals to commit crimes. To understand crime, this broad approach relies on
several different types of opportunity theories within the field of environmental criminology. Descriptions
of several of these theories are provided in table 4-2. Despite different focuses, these opportunity theories
rely on two common assumptions: crime is driven by individual perceptions and choices that satisfy a
person’s needs without being caught, and offender perceptions are highly dependent on situational factors
and conditions within their social and physical environment.
Table 4-2. Opportunity theories
Theory/Perspective Description
Those who use the Rational Choice Theory view crime as a result of rational
Rational Choice Theory choices made by potential criminals based on available information in their social
(Derek Cornish and and physical environment. This theory suggests that criminals make decisions to
Ronald Clarke) engage in criminal acts based on assessing the expected gains against the risks
of being caught and the severity of the ensuing punishment.
Those who use the Routine Activities Theory view crime as an extension of
Routine Activities regular human activities that follow distinct patterns in time and space. As people
Theory go about their daily lives, they gain spatial awareness of vulnerable victims or
property that may fulfill their needs and desires. This theory evaluates how the
(Lawrence Cohen and routine patterns of daily life impact and contribute to crime when a potential
Richard Felson) offender and suitable victim/target converge at a place and time absent a
guardian.
Those who use the Crime Pattern Theory combine elements of rational choice
and routine activities by viewing the patterns criminal offenders display as they
Crime Pattern Theory move through time and space during their daily lives. This theory includes such
(Paul and Patricia concepts as awareness, space, action space, and cognitive maps. This theory
Brantingham) suggests that crime occurs where suitable victims/targets intersect with a potential
offender’s awareness space and provides the person a rational choice to commit
a crime.
Crime concentration The 80/20 rule of crime concentration is the principle derived from the statistical
• Repeat offending analysis of crime data across multiple focus areas that finds distinct concentration
patterns related to crime. Research suggests that approximately 5% of offenders
• Repeat victimization account for 50% of crime, 4% of victims account for 40% of victimization, 5% of
• Hot spots, products, locations account for 50% of crime incidents, and some products or facilities show
and facilities exponential crime rates compared to other products or facilities.
Places
Places provide the setting and context for legal and illegal actions. Police intelligence analysts, when
given a broader understanding that is enhanced by an environmental criminology perspective, can better
analyze crime by considering the setting and context in which crime occurs and by understanding the factors
that contribute to crime, the environmental vulnerabilities that produce opportunities for crime, and the
common features of places that may be changed to reduce crime-conducive conditions. Closely related to the
idea that crimes must occur at places (and may extend from physical places into virtual spaces such as
cyberspace) is the idea that crime also occurs in time. Evaluating crime through an analysis of the spatial and
temporal aspects of crime settings allows police intelligence analysts to identify situational factors relevant
to solving criminal investigations and addressing crime-conducive conditions.
Spatial-Temporal Analysis
Spatial-temporal analysis uses spatial concentrations (hotspots) and temporal concentrations (hot
times) to evaluate patterns in space and time that enable the prediction of crime. Spatial-temporal analysis
relies on effective crime mapping and the subsequent identification of hotspots, hot times, and hot routes.
These foundational techniques allow police intelligence analysts to translate raw crime data into useable
depictions of crime in space and time that are essential to deriving meaning from crime patterns, drawing
conclusions, and making recommendations. Given the concentrations of crime at places and times, this type
of crime analysis can help focus police deterrence efforts and assist in the prioritization of limited police
capabilities.
The following is an example of spatial-temporal analysis: Spatial analysis shows a neighborhood that
is adjacent to a school and has a concentration of housebreaking offenses. Temporal analysis shows that these
housebreakings are concentrated on weekdays during a one-hour period immediately following the release
of students from that school. Spatial-temporal analysis puts the two analysis techniques together to draw the
likely conclusion that students are released from school and, while on their way home, are discovering
opportunities to break into unguarded and unobserved houses along the route. This conclusion informs police
and influences police responses by recommending that a concentration of law enforcement patrols be placed
in the neighborhoods around the school during the time period that students walk home to deter potential
offenders from committing crimes.
Crime Mapping
Crime mapping uses location data (address, X-Y coordinates) to graphically depict crimes or other
incidents on a map. Crime maps document cumulative crime incidents that have occurred in the area of
operations. Crime maps are critical tools in geographic distribution analysis and crime pattern analysis
because the visual depiction of crimes and their uneven distribution results in identifiable patterns that police
intelligence analysts can use to deduce meaning. Crime mapping has been around since the early twentieth
century and was often conducted using paper maps and pushpins until the advent of information systems that
are capable of generating crime maps. Geographic information system tools greatly assist criminal and crime
analysis by producing crime maps with advanced layering or filtering features. Crime maps may also be
called incident maps, coordinate maps, or pushpin maps—depending on what type of data it is depicting or
by what means. Figure 4-8, page 4-26, displays an example of a crime map.
Note. Several information systems and software programs support the techniques of crime
mapping. The following example reflects software applications being fielded at various Army
installations, appendix B provides examples built with i2Analyst Notebook™, and DCGS-A
includes ArcGIG© software that is also capable of performing crime mapping and other spatial-
temporal analysis techniques.
Hotspots
When crime is mapped, the distribution of crimes often results in identifiable patterns and
concentrations at or surrounding specific places. The places at which crimes concentrate are known as crime
hotspots. When crime mapping reveals crime hotspots, police intelligence analysts can begin to understand
the factors contributing to crime across a particular area of operations by seeking to understand the conditions,
situational circumstances, and environmental factors of those hotspots to determine why crime is occurring
at those places but not at others. Understanding the specific factors that generate crimes, attract potential
criminal offenders, or facilitate the ability of offenders to commit crimes at a specific place is an essential
precondition to developing effective policing strategies and responses to prevent and reduce crime.
Crime hotspots often result from different types of factors that influence criminal perceptions and shape
decisions to commit crimes (see figure 4-9 for additional information on crime hotspots). These factors (or
facilitators) include—
Crime generators. Crime generators are places at which large numbers of people go without
intending (or without being initially motivated) to commit crimes. Because of the scale of human
interactions and the large number of potential victims, these places generate opportunities for
potential offenders to commit crimes where they converge in time and space with many potential
victims. Examples of these places include large shopping areas, markets, transportation hubs,
festivals, or sporting events.
Crime attractors. Crime attractors are places that offer many crime opportunities and are
attractive to potential offenders who deliberately seek to engage in criminal activity. These areas
attract similar persons who may be motivated to engage in similar types of criminal activity.
Examples may include areas in which individuals are known to engage in crimes, such as drug use
or prostitution.
Crime enablers (or facilitators). Crime enablers are places where the lack of management,
regulation, or enforcement enables or facilitates criminal activities. These places may include
areas where property owners allow crimes to occur without intervention; locations where there are
no effective guardians present to control potential offenders; or areas where guardians are present,
but lack the capability, capacity, or will to enforce the law. Examples may include bars or
nightclubs that do not control or suppress excessive alcohol consumption, drug use, or other
criminal activity on their property.
Hotspot Type Cause Questions to Answer Potential Reponses
What vulnerabilities exist at this
place? Reduce place
Many unprotected
Crime Generator What actions can be done to reduce vulnerabilities or increase
people
vulnerabilities of people and property protection
at this place?
What is attracting offenders?
Eliminate the conditions
Crime Attractor Attracts offenders What can be changed to reduce the that are attracting
attractiveness of this place to those offenders
offenders?
Who is responsible for controlling
behavior at the place? Restore proper
Crime Enabler Erosion of controls management and
Why are they unwilling or unable to guardianship over place
prevent crimes there?
Hot Times
Crime concentrates at specific places during certain times. The patterns of routine activities that shape
daily life often impact patterns of criminal activity. Hot times frequently vary by different types of crimes
based on the type of environment that is conducive to that particular crime. For instance, daytime
housebreaking may occur while residents are at work because there is an absence of guardianship over the
property, while assaults or driving under the influence offenses may occur most frequently in the late evening
hours after potential offenders are intoxicated and bars are overcrowded. Crime analysis of hot times
combined with an understanding of hotspots assists military police not only by isolating the places at which
to concentrate prevention and enforcement efforts, but also by suggesting the times during which to do so to
be the most effective.
Police intelligence analysts use several techniques to analyze temporal aspects of crime to determine
hot times that enable the focusing of limited policing resources and operational capacity. Two prominent
techniques are histograms and heat matrices. Appendix B provides an example histogram and heat matrix.
Histograms. Histograms are used to depict a type of event, such as a type of crime or incidents,
based on its occurrence during a given interval of time. Histograms assist in assessing when crime
is taking place and are effective tools for managing manpower and resources to prevent and deter
crime.
Heat Matrices. Heat matrices are used to depict the frequency of an event, such as a type of crime
or incident, based on its occurrence during a specified interval of time. Each period of time is
assigned a color based on the number of incidents that occur during that time. The higher the
number of incidents, the brighter the color. This type of matrix provides an easy tool for visually
assessing historical incidents of crime and reviewing when they took place to provide focus to
police operations.
Hot Routes
Hot routes are another variation of crime concentration. While hotspots focus on geographic areas or
points at which crime concentrates, crime often does not evenly distribute only to specific areas or points.
For certain crimes, especially those that involve trafficking or smuggling, crime concentrations may extend
over broad areas but concentrate along certain routes called hot routes. In these situations, rather than
attempting to graphically represent the concentration of crime across all areas it crosses, a police intelligence
analyst can identify the hot routes across which crime concentrates and visually depict movement, smuggling,
or distribution patterns. For example, drug trafficking into the United States often originates from places in
Mexico or beyond but follows certain hot routes into and throughout the United States to transport and
distribute drugs from production centers to dealers and users.
Identifying the hot routes criminals rely on to move personnel or distribute illicit materials influences
potential prevention and response approaches that decision makers can adopt. To enforce the rule of law and
apprehend criminals offenders for prosecution, some situations may necessitate that deliberate checkpoints
be established along hot routes to interdict offenders participating in criminal trafficking or smuggling. Other
situations may use the understanding of multiple hot routes to determine the common origins or distribution
points at which multiple hot routes converge. This type of approach may allow for a more significant
disruption to a criminal network’s distribution and smuggling activities than that of the simple interdiction
of individual criminal elements. These examples demonstrate approaches and solutions that various crime
analysis techniques can influence. They are linked to, and depend on, the purpose of the analysis and its end
state, which is why the analysis was created. In these examples, if the objective is to portray to the community
that the police are actively enforcing the law and aggressively reducing the number of criminal offenses, the
first approach (concentrated enforcement along a hot route) may be the appropriate choice. However, if the
intent is to disrupt and defeat a criminal network, the latter approach may be a better alternative.
Geospatial technology can greatly enhance the ability of police intelligence analysts to perform crime
mapping. Leveraging such techniques allows for a clear and comprehensive depiction of crimes or other
incidents by location, time, type, modus operandi, or other geospatial-enabled information such as physical
infrastructure, political characteristics, or ethnic distributions. The programs used for geospatial analysis vary
greatly in their ability to map, measure, compare, and analyze geospatial and temporal information; however,
most rely on traditional geographic measures to provide map incidents, such as addresses, global positioning
system coordinates, decimal-degree coordinates, or military grid reference system coordinates. Appendix B
provides an example police intelligence product generated by using geospatial technology.
Patterns
As humans interact through the routine activities of life, they establish patterns of behaviors, activities,
and associations. Police intelligence analysts seek to understand the patterns of human activity that relate to
or impact crime and criminal activity. They use several analytical techniques to achieve this understanding.
These techniques are not used as singular methods, but they are often used concurrently with other techniques
to complement and enhance each other. These techniques rely on qualitative and quantitative data. Qualitative
data refers to nonnumerical data that lends itself to content analysis and the identification of patterns and
associations. Quantitative data is typically numerical and statistical in nature and facilitates trend analysis.
The techniques used by police intelligence analysts to understand patterns of human activity that impact
crime and criminal activity include pattern analysis, crime pattern analysis, and understanding high-profile
crimes, repeat incidents, crime series, and crime sprees.
Pattern Analysis
Pattern analysis is the process of identifying patterns of activities, associations, and events. A basic
premise of pattern analysis is that these activities, associations, and events develop identifiable characteristics
that can be used to produce meaning through analysis. A thorough analysis of seemingly random events can
result in the identification of certain characteristic patterns. Pattern recognition defines the ability of an
analyst to detect and impose patterns on random events, allowing for the separation of relevant information
from irrelevant information. Pattern recognition can enable an analyst to make assumptions and predictions
based on previous historical patterns of activity. Pattern analysis helps an analyst identify indicators of threat
activity. See ATP 2-33.4 for additional information on pattern analysis.
Figure 4-11. Example of a pattern analysis plot sheet depicting crime patterns
High-Profile Crimes
High-profile crimes often have their own defining characteristics that make them stand out from other
crimes. High-profile crimes may include murder, active-shooter events, or terrorism. These types of events
attract significant media attention and may be perpetrated specifically for the perceived notoriety gained from
such a crime or to advance a political or ideological narrative. Typically, high-profile crimes exhibit their
own forms of patterns associated with their deliberate design to elicit media coverage or public attention.
Because of the media attention given to high-profile crimes, they may inspire other offenders to imitate the
crime for their own notoriety. Analysis of patterns of high-profile crimes can assist military police and
USACIDC personnel in predicting what types of places or victims criminals may seek to target based on their
ability to garnish high visibility or media attention, or they may seek to symbolically attack friendly
vulnerabilities. Focusing crime analysis on these types of crimes can enhance vulnerability assessments and
influence crime prevention, antiterrorism, and physical security efforts aimed at protecting vulnerable
populations or hardening symbolically valuable targets.
Repeat Incidents
Repeat incidents occur when the same people, places, or activities occur that are nearly
indistinguishable from each other. When an offender uses the same methods (or modus operandi), targets the
same place, or victimizes the same person in multiple criminal incidents, the similarities in method, place, or
victim may be analyzed to identify potential subjects or to protect the place or person being repeatedly
targeted. For instance, crime analysis of multiple larceny offenses in an area may reveal patterns in the
characteristics of places targeted (motorpools with poor lighting, no personnel present, and an abundance of
landscaping offering concealment around access points) as opposed to the characteristics of those places not
targeted (abundant lighting, rotational guards or staff duty personnel inspections, and no landscaping
obscuring observation near access points) and show a common modus operandi (such as a lock on a gate cut
with bolt cutters). Such specific patterns established across multiple separate criminal incidents suggest
linkages and may result in the identification and apprehension of a subject or provide specific
recommendations to the commander responsible for the place to enhance the crime prevention program.
Crime Series
A crime series occurs when two or more similar crimes are committed by the same individual (or group
of co-offenders) against various victims or targets. Criminal offenders who succeed in a criminal act without
being caught or punished are often emboldened to continue committing that crime. While a crime series may
result from an offender’s ongoing perception of the risk of being caught versus the reward of the crime, the
patterns that emerge offer police intelligence analysts the opportunity to alter the situation by using crime
analysis. For example, an offender may perpetrate a sexual assault by intoxicating a victim with the help of
a group of accomplices. Given the fear, embarrassment, or reluctance of the victim to report the crime, the
offender or co-offender may deem the effort successful and employ the same methods to commit a series of
similar offenses. Analyzing the patterns associated with the crime series, such as similar places, methods, or
victims, assists military police and USACIDC personnel in preventing and investigating such crimes.
Crime Sprees
A crime spree is a specific type of crime series that is characterized by such a high frequency of
criminal incidents or activity that it appears almost continuous. It involves the same offender and usually
occurs over a short period of time, but it may extend over a longer period of time when not addressed. Crime
sprees typically occur in close proximity to a specific place and time and use similar methods that suggest
that one offender is responsible for committing a series of crimes due to the similarity in location and
techniques. An example of a crime spree may be when one offender commits multiple armed robberies across
a small area that uses the same method (armed with semiautomatic pistol) and appears to be following a
distinct pattern or route, suggesting the movement of an individual committing multiple crimes. When
responding to a highly dynamic and unfolding crime spree, such as an active-shooter event, military police
are often required to collect, process, and analyze incoming information intuitively to stop the perpetrator as
rapidly as possible. Police intelligence analysts capable of rapidly analyzing and disseminating information
to responding law enforcement patrols can greatly assist by shifting the cognitive burden of analysis in an
ambiguous and time-constrained environment.
Problems
Crime analysis includes looking at crime through all possible stakeholder perspectives to understand
the nature and causes of crime from the most holistic perspective possible. As part of this, crime analysis
complements criminal analysis by integrating an analysis of all potential factors that may be creating crime
problems, including population or societal problems, lack of policing capability or capacity to enforce the
law or maintain order, and competing interests of relevant actors. The ability to generate crime analysis
products to support problem solving greatly enhances the ability of military police commanders and staffs to
solve crime problems through policing approaches and strategies, such as problem-oriented policing.
See ATP 3-39.10 for a discussion of problem-oriented policing.
Crime problems may manifest themselves from simple to complex; therefore, organizational
responses to crime problems are often dictated by the complexity of the crime problem at hand. At its most
basic level, a single crime incident may involve relatively little complexity and be solvable by responding
military police patrol, direct leadership (patrol supervisor, desk sergeant, watch commander), or law
enforcement investigator (military police investigators, traffic management and collision investigator, or
USACIDC special agent) based on purview. This level is the most direct and relies on professional techniques
and procedures to collect evidence, conduct interviews and law enforcement interrogations, and derives
conclusions based on specific evidence and information related directly to the criminal case.
At the next level, repeat incidents or multiple crimes across time and space may begin to exhibit
patterns or connections that increase the complexity of solving the crime problem. The level of complexity
within this space may range from connecting and linking multiple crimes by a single or multiple co-offenders
to solve specific criminal cases, or it may extend across broader time and space horizons to indicate broader
patterns of criminal activity. The range and scope determine the likely response. For multiple linked criminal
incidents or repeat offenses, military police investigators or USACIDC special agents are the primary
organizational levels solving the criminal incidents. However, as the scope and scale of crime patterns
increase in time and space, the planning of military police and provost marshal staffs and the analysis of
crime by police intelligence analysts become more critical. Crime pattern analysis uses aggregated data and
pattern analysis techniques to make conclusions that address the factors influencing broader crime patterns.
The most complex aspects of solving crime problems are understanding and engaging to solve the
underlying causes that produce or contribute to a crime incident and patterns. The fundamental root of crime
problems is often impacted by factors outside the direct control of military police organizations. Therefore,
as more complex factors contribute to problems, the commander or provost marshal (supported by staffs and
police intelligence analysts) plays a more critical role in police engagement to coordinate police responses
with external organizations and individuals to address the root causes of a crime problem. For instance, when
crime continues to occur within an Army formation, issues internal to that organization (leadership, morale,
discipline, the implementation of military justice) are crucial contributions to those crime problems. Military
police commanders and provost marshals cannot solve these problems for an organization; however, they
can contribute to the commander’s awareness and understanding of the problem to help supported
commanders address the drivers of crime within their organization. Furthermore, crime problems often
extend beyond the reach of military authorities entirely when the problem is generated by factors within
civilian communities or in areas under civilian jurisdiction (inside or outside the United States). When this is
the case, the requirement to engage, synchronize, or integrate the efforts of various unified action partners
greatly increases the complexity of the problem and requires increased involvement by key organizational
leaders and decision makers. See figure 4-12.
Are there Does the Is the criminal What Who are What political
ungoverned government justice system organizations influential events have
areas where fulfill legitimate and have the ability to actors with the potential
criminals governance effective? influence crime in control or for attracting
operate with functions, or How much the area of influence in the criminal
impunity? are informal or power or operations? criminal justice activities?
What political criminal power influence are Are they capable system? Are political
factors limit or structures criminals able and willing to Are they protest or
Political predominant?
constrain police to exert over enforce criminal performing their rallies
enforcement in What structure political laws? duties generally
these areas? exist for processes? Have politicians or according to peaceful or
upholding the political the rule of law? violent in
rule of law? institutions been nature?
corrupted by
criminal
organizations?
What military Have criminal Do criminals Do criminal Are there What military
assets are most elements possess organizations in overlaps in events or
vulnerable or infiltrated or military-like the area of personnel operations
exposed to co-opted capabilities, operations between are
criminal elements of such as crew- actively cooperate military and threatened or
activity? the armed served or affiliate with criminal vulnerable to
Do military forces? weapons or military forces? organizations? criminal
bases in the Are there explosives? Are criminal Do high-ranking activities?
Military
area provide military-like Do criminals organizations military leaders Are there
criminals criminal have capable of have gaps or
sanctuary? structures in connections to organizing into connections seams during
the area of security forces para-military units with criminal military
operations? that enhance similar in size to elements? transitions
their military forces? that are
capabilities? exploited by
criminals?
Are there areas Who is Will alterations How do criminal Do populations Do people who
with degraded responsible to the physical organizations feel safe and coordinate
environmental for the places environment perceive the secure in their events account
conditions that experiencing impact or physical environment, or for crime
signal to crime across reduce the environment? do they fear prevention
criminals and the the area of level of crime Do they find it crime due to considerations?
population that operations? in an area conducive to environmental Are criminals
laws are not Are business such as their criminal cues? able to easily
enforced there? owners or improving activities, Who has control access
Physical What and why other place physical offering or influence over vulnerable
environment are some areas managers security or maximum making populations
targeted for actively hardening benefits with improvements to gathered for an
crimes versus controlling facilities? minimal risks of the physical event?
other areas? crime on their Can crime being caught? environment?
properties? prevention Or do they
through perceive
environmental significant risks
design to overcome?
principle be
implemented?
How are criminal How is time How do time How do criminal Do people follow
areas impacted understood considerations organizations predictable
by time and leveraged enhance or organize their patterns in time
When are major
considerations? in local limit criminal functions and that expose
events that may
Do criminals culture and opportunities? activities in them to criminal
generate
only operate society? Do short time? activity?
criminal activity
within certain Do different intervals of Do they operate Are daily activity occurring?
distances from understanding exposure mostly during patterns well
Time sanctuaries or Do these events
or ways of reduce daytime or known to
safe havens to provide
relating to opportunities nighttime? criminals who
accommodate temporal
time impact and increase Do their may seize a
rapid escape? insights into
criminal risk, or are activities vary by crime
when and where
activities? assets weekly or opportunity while
to expect
exposed for seasonal property is
criminal activity?
long durations, patterns? unguarded?
lowering risks
to criminals?
Understanding crime environments not only means understanding criminal threats but also
understanding friendly or allied forces that can counter the threat. Before seeking to solve crime problems
within a jurisdiction or area of operations, it is essential to properly understand the police force that is
responsible for conducting police operations. When supporting HN police training, misunderstanding HN
police capabilities, cultural paradigms, approaches to policing, taboos and internal bias, and information
related to the nature of the police force may result in solutions that make sense from a U.S. perspective but
fail because they are incompatible to the force responsible for action.
Note. The term law enforcement-sensitive is used to identify information or intelligence that is
obtained for, processed through, or managed by law enforcement organizations. It is essential that
the information is restricted to law enforcement channels unless otherwise directed by a competent
authority.
Police intelligence products generated by military police, USACIDC personnel, and police
intelligence analysts are sometimes in standardized formats to ensure consistency in reporting and content.
Most products are dependent on the target audience; the mission; and the specifics of the event, material,
person, or organization that is the subject of the product. At the tactical level, the level of detail and type of
police intelligence required are very different from the operational or strategic level. The staff and analyst
must fully understand the information and intelligence requirements and the specific needs of the target
audience to deliver a product that enables decision making appropriate to the level of the recipient.
The criminal and crime analysis processes result in distinct but related knowledge and understanding
about different aspects of crime. The criminal analysis process focuses on criminal offenders and organized
criminal activity to produce tactical and strategic criminal intelligence that enable military police to anticipate
and predict criminal behavior and activity. This predictive focus enables military police to implement
policing strategies to anticipate, prevent, or monitor criminal activity to reduce the capability or impact of
criminal threats. From this perspective, criminal intelligence may be used to monitor, investigate, and
apprehend criminal offenders or disrupt criminal networks responsible for criminal activity.
The crime analysis process results in tactical and strategic crime analysis products that focus
attention on understanding crime incidents and environments based on the analysis of information and data
obtained after crimes have occurred to understand the factors generating crime opportunities and the root
causes of crime problems. This understanding enables military police to focus resources to solve criminal
incidents and crime problems and addresses the underlying causes of crime, disorder, and fear of crime within
an area of operations. Crime analysis also produces the administrative crime analysis products that military
police staffs and police intelligence analysts use to inform audiences, communicate to relevant stakeholders,
and facilitate police engagement. Figure 4-14 provides an example of various police intelligence products
that may be packaged into the categories of police intelligence, depending on their purpose and desired end
state.
Legend:
BOLO be-on-the-lookout
CRIMINT criminal intelligence
PIO police intelligence operations
effort to prevent victimization by an identified criminal threat. See appendix B for an example criminal alert
notice.
The criminal alert notice informs the recipients of criminal activity, the specific actions required to
interdict or mitigate the stated activity, and specific evidence collection and preservation priorities. The
criminal alert notice is an action document, not an informational report. It is therefore considered a criminal
intelligence product rather than simply administrative crime analysis produced to inform the public. Criminal
alert notices follow the same basic format that typically includes the—
Source and reliability of the information.
Entities involved.
Known aliases.
Known personal identification numbers (social security number, driver’s license number).
An up-to-date summary of pertinent information developed on the subject or suspect.
Actions that the recommending unit wishes to be taken by the activities and agencies receiving
the bulletin (detain subject or suspect, notify law enforcement authority).
Points of contact, to include names and contact numbers from the issuing unit.
Distribution and dissemination instructions and restrictions.
Be-On-The-Lookout Alert
A BOLO alert is routinely sent out by Army and civilian law enforcement agencies. It is used to
provide information to, and request assistance from, military and civilian law enforcement organizations,
military units and, at times, the public about specific individuals, vehicles, events, or equipment. Typically,
these alerts are used when the subject matter is time-sensitive and a heightened awareness by all available
personnel is requested to facilitate the appropriate action. A BOLO alert may be distributed in a printed
format, distributed over appropriate information networks, or transmitted over radio nets depending on the
breadth of distribution, time sensitivity, or other mission and environmental factors.
A BOLO alert may be general or very specific; however, it should contain, when possible, enough
information to prevent numerous false positive reports and should provide reporting and disposition
instructions. These instructions should include any known dangers associated with the subject of the BOLO
alert. For example, issuing a BOLO alert for a grey sedan automobile to all military police units operating in
Germany or for an orange and white taxi in Iraq would be ineffective and would likely result in an extremely
high number of sightings. This type of general information might also be ignored by military police personnel
for the same reason. Additional information about the driver or body damage to the vehicle or other specific
details would reduce the false positives and increase the value of what is reported. In some instances, the
amount of known information is limited to one or more identifying data points. This is common in
expeditionary environments where a list of names may be the only data available or immediately following
a crime or incident when only rough descriptions of suspects or few witnesses are available. See appendix B
for example BOLO alerts.
Wanted Posters
Wanted posters are clearly intended for public distribution and viewing. Formats typically vary
depending on the amount of information known, the specific information sought, and the law enforcement
agency producing the wanted poster. Wanted posters are posted by local, state, and federal agencies (to
include Army law enforcement). The law enforcement agency or military unit that has the investigative lead
for the incident should be the final approval on the wanted poster. This allows the lead investigative agency
an opportunity to review the poster to ensure that information about an individual or crime that police are
withholding for investigative purposes is not inadvertently released.
Wanted posters may contain the names, descriptions, and pictures of one or more individuals known
to law enforcement. A picture can be an artist’s sketch (a rendering of the suspect through the eyes of a
witness) or a photograph. The photograph should be as recent as possible. Typically, there is a short
description and brief history of the criminal listed below the sketch or photograph. The wanted poster may
include the following information:
Age, date of birth, and place of birth.
Sex, height, weight, and hair and eye color.
Known identifying scars or marks.
Occupation.
Nationality.
Known aliases.
In some cases, little is known about the individual being sought. In these cases, the wanted poster
may simply provide information about a specific crime or an unknown perpetrator and may have a point of
contact if additional information is known. Wanted posters may contain instructions on what to do when an
individual observes the wanted person. If a reward is offered, the wanted poster should state the reward
offered and the individual or agency providing the reward. Wanted posters also provide points of contact for
persons with potential information.
Wanted posters used in support of decisive action in environments outside the continental United
States or in areas within the United States where English is not the primary language must have the
information released and the translation carefully screened. It is important to have a native speaker review
the wanted poster for the accuracy of the translation and the cultural context of the wanted poster for
unintended word use or messages. See appendix B for examples of wanted posters.
Reward Posters
Reward posters are generated to notify the public that a reward may be available for information
specific to a crime or criminal. They are a variant of the wanted poster. Similar to wanted poster, reward
posters are used to solicit information from the public, but they may also include a tangible incentive in return
for information that is provided under specified conditions. (See appendix B for an example of a reward
poster.) Reward posters typically contain specific details, to include—
Reward amounts.
Specifics about the crime or criminal for which information is sought.
Pictures (if available) that are pertinent to the crime or criminal.
Specific requirements that must be met (such as information leading to recovery or prosecution).
A point of contact for the reward.
A confidentiality statement from the provider referencing the information received.
Any applicable expirations of the reward offer.
linkages. The use of automated analytical systems can greatly enhance the ability of police intelligence
analysts to use filtering tools to tailor products easily and rapidly for the appropriate audiences.
report is kept in the high-risk person’s file; a second copy is provided to the USACIDC Crime Records
Center. The conduct of a personal security vulnerability assessment is directed in AR 10-87, AR 190-58, and
AR 525-13.
The personal security vulnerability assessment final report includes—
The date the high-risk personnel briefing was held.
A list of personnel who received the exit briefing.
The reaction of high-risk personnel receiving the briefing.
A list of noted problem areas and recommended solutions.
A list of security recommendations.
information or intelligence requirements or influence decisions regarding crime problems and crime
environments. Many crime analysis products are generated through the conduct of the crime analysis process
versus deliberately prepared reports following analysis. These types of crime analysis products are discussed
earlier in this chapter. This section discusses additional crime analysis products that may be produced from
the understanding and knowledge generated through crime analysis.
Crime Maps
Although crime mapping is an analysis technique, the resulting product is a crime map. Crime maps
provide visual depictions of crime and criminal incidents in geographic space. These products may include
crime incident pin maps, geospatial displays of crime concentrations, crime density or hotspot maps showing
the path to and from a crime scene that a criminal offender used to commit a criminal act. See figure 4-8 and
figure 4-10 for example crime maps.
Crime Forecast
Crime forecasting relies heavily on trend and pattern analysis. Trend analysis may depict historical
trends to predict future events or trajectories in crime rates and criminal activity. For instance, crime data
may show that crime trends are increasing or decreasing in a certain area. This information may be used to
project continued trends in a particular manner or direction. Similarly, pattern analysis may also be used to
anticipate a particular crime condition or outcome based on patterns of activity and crime data from previous
similar conditions. For instance, crime data may reflect that previous redeployments have increased crime
incidents on an installation and may be able to identify patterns of locations or problems that seem to show
patterns during similar conditions. In response to this analysis, military police and USACIDC personnel may
present anticipated crime forecasts to unit commanders to enable mitigation efforts to prevent those same
crime patterns from occurring (limiting alcohol consumption for a period of days during the initial
reintegration and assessment of current crime problem locations that show patterns of alcohol-related
offenses). Figure 4-15 shows the different temporal focuses of criminal intelligence and crime analysis.
Legend:
AO area of operations
WARNING INTELLIGENCE
Warning intelligence are those intelligence activities intended to detect and report time-sensitive
intelligence information on foreign developments that forewarn of hostile actions or intention against U.S.
entities, partners, or interests (JP 2-0). The S-2/G-2 has primary staff responsibility for producing warning
intelligence; however, all functional elements contribute to warning intelligence through awareness of the
CCIR and by reporting related information. PIO is planned and executed by the S-3 in functional units and
by the provost marshal staff in multifunctional units; police intelligence that may contribute to warning
intelligence is immediately coordinated with the S-2/G-2 to ensure timely dissemination.
Military police and USACIDC elements, by virtue of their mission and their dispersion across the
area of operations, are often the first to see indications of an imminent threat. When this information is
reported through normal reporting channels, it is disseminated rapidly to alert affected organizations and
units. Military police provide police information or analyzed police intelligence for timely notification that a
possible criminal threat or terrorist attack on U.S. interests has been identified and is imminent.
The nature of a threat indicator generally dictates the distribution list and the method used. The
speed, positive acknowledgement, and sensitivity of the information may be critical. At a minimum, military
police, other security forces, the S-2/G-2, and the commander are normally notified of incoming warning
intelligence. As with other police intelligence products, a decision must be made concerning how much
information should be released and whether sources of information must be protected in the warning.
Automated Databases
A database is a tool for organizing and storing data and information. A database can store
information about people, types of events, or any other information. Many databases start as a list in a word-
processing program or spreadsheet. Without databases, information is difficult or impossible to retrieve
quickly, especially under adverse conditions. Depending on the capability of the individual database
software, databases can support many complex analytical functions and requirements.
Many analytical software applications are compatible with various databases. This enables databases
to interact with other tools to support predictive analysis, prepare graphic analytical products, and provide
situational awareness to the unit commander. These databases can—
Support time-event charts, association matrices, link analysis, and other analytical tools.
Allow operators, staff, and analysts to—
Protect source-sensitive, operational database segments, files, records, and fields.
Create, update, and maintain databases from locally generated information.
Import complete or partial databases from larger or peer databases.
Export complete or partial databases to peer or larger databases.
Share database information with personnel possessing appropriate access authorization
(peers, subordinates, higher commanders).
Allow data queries for decision making and operational and analytical support.
Interact with analytical programs able to correlate data and facilitate information retrieval from
data repositories.
Allow for information retrieval functions (browsing, key word searches).
Army, the gaps that previously existed between military police and USACIDC data storage systems have
largely been eliminated.
Note. There are strict legal and regulatory constraints on the collection, storing, and dissemination
of information on U.S. persons. The supporting judge advocate should be consulted to ensure that
data storage complies with applicable laws and regulations.
perform these analysis processes. Military police organizations such as USACIDC are equipped with the
i2 Analyst Notebook on a limited scale. While this is a current solution that is being employed across the
military police force, there are several other tools that are available to perform the same criminal and crime
analysis techniques across federal and local police and law enforcement agencies. See appendix B for several
examples of police intelligence products generated using the i2 Analyst Notebook.
This chapter describes step four of the PIO framework: disseminate. This step focuses
on sharing police information and police intelligence with relevant stakeholders to
enhance situational awareness and influence decision making. Dissemination serves
several purposes. The primary purpose of police intelligence dissemination is to shape
military police operations conducted to prevent, mitigate, and respond to crime and
criminal activity. Disseminating police intelligence also supports the Army operations
process through the integrating processes to support situational awareness, contribute
to the common operational picture, and affect decision making.
Police intelligence is often maintained in law enforcement functional channels. Functional channels
include military police, law enforcement channels, and other groups that operate along functional lines. The
law enforcement and intelligence networks are examples of functional channels. Functional channels are
established to maintain control over sensitive information (as mandated by law) and to protect police
information and police intelligence critical to ongoing law enforcement investigations and operations.
In support of decisive action, PIO allows command and staff channels to ensure timely and accurate
reporting of police information and police intelligence that answers intelligence requirements, CCIRs, or
information identified by the staff or commander that is unanticipated but of immediate value to the
command. Command and staff channels are also likely used to distribute other products (wanted posters, spot
reports, BOLOs). This is typically the most efficient method to provide information to every member of a
unit or organization. Products disseminated through command and staff channels should clearly articulate the
purpose for distributing the product and the action required or requested.
Within a deployed operational environment, military police leaders continuously collect, organize, and
analyze police information. Military police units constantly update internal tracking systems and report police
information and police intelligence to higher, lower, and other relevant units to facilitate the operations
process. This information (and subsequent analysis) is also used by military police during the IPB process to
continuously assess criminal threats and other crime-related aspects of the operational environment. Police
intelligence analysts—
Update previous police/criminal estimates provided to the S-2/G-2.
Identify new or potential irregular threats (criminal, terrorist, and insurgents), networks, and trends
in the area of operations.
Recommend protection-level changes to the supported commander.
Notify adjacent units of the potential irregular threats (criminal, terrorist, and insurgents),
networks, or trends that may affect their forces.
Reprioritize military police operations and support to the identified threat area.
Share the information with HN/local police and other agencies as appropriate.
DISSEMINATION CONSIDERATIONS
Military police and USACIDC personnel responsible for police intelligence must identify the
appropriate and authorized users of police intelligence products before a mission to ensure that the right
products get to the right people at the right time. Typically, police intelligence users are the personnel or
organizations that initiate the requirement and need the products to perform law enforcement in the United
States and its territories. Identified law enforcement-sensitive police information and police intelligence are
retained in law enforcement channels. When supporting operations in an operational environment outside the
United States and its territories, the recipients of police information and police intelligence are typically more
broadly defined and are not limited to law enforcement.
Note. Before the release of police information and police intelligence, it is important to ensure that
the release is according to U.S. laws and Army regulations. Sharing information about U.S.
persons is generally subject to more restrictions than sharing information about non-U.S. persons.
Additionally, individuals detained outside the U.S. during military operations typically have fewer
protections than those detained within U.S. territories during law enforcement activities. It is very
important to coordinate with the supporting judge advocate or higher headquarters regarding legal
restrictions on the release of information.
The producers and recipients of disseminated police information or police intelligence must understand
distribution restrictions. At times, products may contain data drawn from multiple unclassified sources. These
police intelligence products may—
Remain unclassified.
Receive a distribution caveat of law enforcement-sensitive or sensitive but unclassified.
Receive a classified restriction when the results of the analyses warrant a new classification.
The classification of a document or data may be required to protect an informant or law enforcement
source; a monitoring capability; a tactics, techniques or procedure for gathering police information. It may
be possible to prevent the creation of a classified product simply by protecting the manner in which the
information is collected or processed. If a product requires classification, immediate action should be taken
to ensure that the classified data or document is properly stored to prevent unauthorized access or the
compromise of information or intelligence. Coordination with the local offices responsible for computer
network defense and security issues should be managed to ensure that security requirements are maintained.
Military police and USACIDC personnel must also determine which method will be used to
disseminate police intelligence products. Dissemination may be conducted through verbal, written,
interactive, or graphic formats and systems. The type of information, the time allocated, and the directives of
the commander, unit, or agency requiring police information and police intelligence influence the information
format. Regardless of the method used, military police and USACIDC personnel must ensure that products
are delivered to the appropriate users when, where, and in the proper format needed. Frequently, when police
intelligence products are delivered, additional information requirements are identified for collection.
Note. Local police intelligence files may be exempt from certain disclosure requirements by
AR 25-55 and the Freedom of Information Act. When a written extract from local police
intelligence files is provided to an authorized investigative agency, the following statement below
must be included on the transmittal documents: THIS DOCUMENT IS PROVIDED FOR
INFORMATION AND USE. COPIES OF THIS DOCUMENT, ENCLOSURES THERETO,
AND INFORMATION THEREFROM WILL NOT BE FURTHER RELEASED WITHOUT
THE APPROVAL OF THE INSTALLATION PROVOST MARSHAL.
Note. The laws governing the sharing of police information and police intelligence between the
law enforcement and intelligence systems are very specific and restrictive. Generally, intelligence
agencies cannot collect, gather, or store information from law enforcement agencies. For
exceptions to this requirement, see Executive Order (EO) 12333. Appendix A contains
information on the legal aspects of intelligence collection and sharing.
(availability of agencies in the local area of operations, varied personalities of organizational leaders, cultural
or operational differences between agencies) may influence membership participation and team dynamics.
For example, military police and USACIDC personnel may not have a local FBI or Bureau of Alcohol,
Tobacco, and Firearms field office in their immediate area of operations, or the United Nations civilian police
may be operating in the immediate area of operations while the headquarters and support elements are
hundreds or thousands of miles away. Despite local variations, general guidelines for developing, managing,
and participating in police intelligence networks can be established.
Network Participants
A police intelligence network should be tailored to meet the requirements of the operational
environment and the specific area of operations. Participation is influenced by threat assessments,
intelligence requirements, and the specific needs of participating agencies. Police intelligence collaboration
and networking can occur in predetermined working groups with a relatively set membership, structure, and
function or in ad hoc methods created for a specific mission or event.
A police intelligence network typically consists of agencies located in the immediate area of
operations; however, with the expansion of communications and internet technology, participation from
outside the immediate area of operations is possible. This allows participation and sharing to occur between
agencies located across the state, country, region, or the globe. Such arrangements may fill essential
capability gaps in the police intelligence network. If particular agencies are not represented in the local
environment (FBI, Drug Enforcement Administration field offices, military intelligence, HN law
enforcement), military police and USACIDC personnel can add them to their network by leveraging another
police intelligence network or making direct contact with the agency using Web-based services.
Legend:
ACS Army community service MP military police
DA Department of the Army USACIDC United States
DPW Directorate of Public Works Army Criminal Investigation
Command
Figure 5-3. Typical police intelligence network in support of a base or base camp
Police intelligence network relationships between agencies fluctuate based on numerous factors in the
operational environment. Relationships also continue to develop as bonds are strengthened through joint
ventures and as agencies expand their own operating networks. Missions and priorities of individual
organizations greatly affect participation and the level of sharing conducted.
Legend:
DA Department of the Army U.S. United States
G-2 assistant chief of staff, intelligence USACIDC United States
MP military police Army Criminal Investigation
S-2 battalion or brigade intelligence Command
staff officer
The employment of police intelligence fusion cells is applicable across the range of military operations.
Fusion cells work well for analyzing complex criminal organizations and establishing trends, patterns, and
associations from information gathered across a large area of operations and multiple organizational areas
and jurisdictions. These cells enable participating elements to eliminate unnecessary duplications of
collection and analysis activities. The effective application of fusion cells can facilitate the coordination and
synchronization of local, state, national, international, service intelligence, and private sector organization
capabilities while simultaneously enhancing the commander’s common operational picture.
POLICE OPERATIONS
PIO is most commonly associated with police operations—specifically law enforcement and criminal
investigations. The skill sets and capabilities required for PIO are honed during the conduct of police
operations. Military police support commanders, Soldiers, family members, and visitors on bases or base
camps through comprehensive and preventative policing. Law enforcement is normally the most visible
aspect of this support, while military and DA Civilian police forces provide for a safe and secure environment
on installations and in training areas. PIO, when properly resourced and employed, also provides critical
support to personnel on and near installations. PIO helps shape police operations and provides strategic crime
analysis that helps shape the focus of police management, such as—
Police policy, planning, and management decisions.
Resource procurement, prioritization, and allocation.
Crime prevention, reduction, and disruption strategies.
Broad policing strategies and general deterrence approaches.
PIO is critical to evaluating the effectiveness of policing strategies that are applied through the conduct
of police operations. Police information and police intelligence can lead a commander or provost marshal to
increase or decrease military police presence or to modify the techniques used in particular areas. PIO
corresponds to the first two steps in the scanning, analysis, response, and assessment model, which enables
military police to solve crime problems through intelligence-led, proactive police operations. The policing
strategies and tasks that military police perform based on PIO outputs comprise the Response and Assessment
steps in the scanning, analysis, response, and assessment model. See ATP 3-39.10 for details on police
operations.
Law Enforcement
Law enforcement includes those activities performed by personnel authorized by legal authority to
compel compliance with, and investigate violations of, laws, directives, and punitive regulations. Law
enforcement occurs in direct support of governance and the rule of law; however, for law enforcement to
occur, a legal system must exist. Typically, law enforcement is performed by personnel trained as police
officers. They are held directly accountable to the governmental source of their authority.
PIO supports the efficient and effective planning, execution, and assessment of law enforcement by
providing police intelligence that depicts crime hotspots, crime trends, patterns, and associations. It also
evaluates police effectiveness in addressing criminal offenders, networks, organizations, and environmental
conditions that create opportunities for crime. This enables commanders, provost marshals, and military
police staffs to plan and make decisions regarding patrol distribution, resource requirements, and areas
requiring increased police engagement and focus. Interagency cooperation and coordination provide critical
information that can be further analyzed and fused by military police, USACIDC personnel, and police
intelligence analysts in support of Army law enforcement efforts.
Patrol Distribution
Military police distribute law enforcement assets across the area of operations or jurisdiction in the
most effective and focused manner. There are several ways to direct patrol distribution (see ATP 3-39.10 for
various law enforcement patrol strategies). Regardless of the approach adopted, law enforcement patrols seek
the most effective means to prevent, deter, and reduce crime and the fear of crime among populations.
Preventative and proactive policing requires police intelligence to ensure that military police patrols are
distributed and focused in a manner that most effectively prevents crime through the deterrent effects of
concentrated patrol activity at places and times where crime concentrates.
Patrol distribution places military police assets in positions that allow the most impactful employment
of resources for the purposes of crime prevention, mitigation, and response. Despite having a proactive
policing presence when crimes do occur, patrol distribution at the most likely locations for crime to occur
enables rapid responsiveness to investigate reported criminal activity, the ability to quickly engage or
apprehend active criminal subjects, and the delivery of critical emergency services and assistance. PIO shapes
patrol distribution by providing tactical criminal intelligence and crime analysis regarding known criminal
offender locations, crime hotspots, patterns of criminal activity, and places vulnerable or repeatedly targeted
by criminals.
Police Engagement
Police engagement provides an effective means for military police to collect police information and
serves as a tool to provide important information to relevant audiences, populations, stakeholders, and
decision makers. The relationship between police and the population is critical in the ability to interact with
and operate among dense populations. Adequate, timely, and accurate police information sharing with
populations is critical to sustaining public trust and confidence. Without revealing the details of sensitive law
enforcement activities, military police and USACIDC organizations keep populations informed to gain their
understanding, respect, and voluntary compliance to the law. This information sharing may include—
Sharing BOLOs, criminal alert notices, and other public safety messages so people can take
appropriate measures to protect themselves and their property from criminal threats.
Publicizing administrative changes so that the public is aware of local policy, procedure, and
enforcement changes to mitigate unintentional criminal offences due to lack of awareness and
allow populations to adjust their behavior to comply with modified policy.
Offering rewards or compensation for information regarding wanted criminal subjects.
Just as mistrust and a weak social order can enable criminals and terrorists, a strong relationship
between the population, police, and security forces enhances collective efficacy in the population. Key
elements to assist investigations are understanding the social order, defeating criminal networks, and ensuring
continuous access to sources of police information. By disseminating timely and relevant police information
to populations, military police and USACIDC personnel greatly enhance the population’s trust, confidence,
and support of police organizations.
Crime Prevention
PIO is critical to effective crime prevention efforts. PIO is one of the primary tools of crime prevention
and supports the crime prevention survey. The crime prevention survey formally records the assessment,
review, and analysis of existing conditions within a specified facility, activity, or area for the purpose of
detecting crime, identifying conditions or procedures conducive to criminal activity, and minimizing or
eliminating the opportunity to commit a criminal offense or engage in criminal activity. It determines the
nature, extent, and underlying causes of crime and provides the commander with information for use in the
Crime Prevention Program. While there are several different types of crime prevention strategies
(see ATP 3-39.10), the following are those approaches to crime prevention that are most reliant on police
intelligence:
Relies heavily on criminal intelligence products.
Specific (or focused) deterrence.
Situational crime prevention.
Relies heavily on crime analysis products.
Crime prevention through environmental design.
Disorder policing.
Criminal Investigations
PIO directly supports criminal investigations. Law enforcement investigators generate the police
intelligence requirements needed for situational understanding and decision making regarding criminal
investigations, the disruption of criminal activity, and investigative focus. Criminal analysis generates
criminal intelligence that identifies the critical linkages, associations, and patterns necessary to conduct law
enforcement investigations, disrupt criminal networks, and solve criminal cases.
enforcement data related to traffic to produce crime analysis products that support traffic management. PIO
helps identify potential environmental conditions that military police must address to increase effective traffic
flow, such as poor sign locations or obstructive landscaping that hinder the ability to see traffic signs.
Techniques such as pattern analysis are critical to performing effective traffic studies to determine the causes
of traffic problems and to help develop potential solutions. Besides supporting traffic enforcement, PIO also
supports risk management by identifying traffic hazards, providing potential risk mitigation control measures
based on empirical data, and informing decision making assets to implement and supervise traffic
management to provide public safety. See ATP 3-39.10 for additional details on traffic studies.
2006-2007. Within three years of their training, they collected over one million biometric collections that
were accessible to U.S. analysts. Military police and USACIDC personnel who conduct HN police training
and support train HN police and security forces to conduct PIO and place them in an advantageous position
to gain further police information about the HN police force, criminal environment, and the population among
whom the HN police operate.
The ability of HN police to conduct PIO may be limited by education, training, available resources,
societal norms, legal systems, and tactical environments. For example, taking a photograph of a person is not
accepted in some societies. These populations may resist being photographed or having iris images captured.
In other areas and societies, many of the modalities of biometrics and forensic analysis may not be understood
and, therefore, will not be accepted. However, when acceptable, these capabilities can be invaluable to the
HN police intelligence capability. Deliberate police engagements with prospective leaders of emerging police
forces are vital in establishing and prioritizing the development of police intelligence capabilities.
is applied within these legal constraints. PIO enables effective police engagement with civil law enforcement
partners to share releasable police information and police intelligence related to police procedures or policy
changes affecting local residential populations (such as expected traffic delays), criminal threats affecting
domestic populations and resources, or capabilities authorized for use or employment to support civil law
enforcement.
Nonfederalized National Guard support to civil law enforcement is conducted under the authority of
the state governor in-state active-duty or Title 32 status and is not restricted by the Posse Comitatus Act.
Military Police support for these missions includes support tasks and direct law enforcement for civil
disturbances, natural disasters, special security events, and other situations. PIO support for these situations
typically includes criminal threat analysis.
DETENTION OPERATIONS
PIO enables the ability of military police, USACIDC personnel, and police intelligence analysts to
connect persons to other individuals, organizations, objects, and events relevant to the criminal threats and
conditions. Associations may be relevant to incidents inside a detention facility; however, they may also
associate individuals with persons outside the facility or with events that may have occurred before detention.
These associations can be especially relevant during counterinsurgency operations. For example, military
police in one area may obtain evidence from a crime scene that implicates a detainee at a U.S. or HN detention
facility. This information would be documented, secured, and passed through the chain of command to the
appropriate supporting military intelligence unit and law enforcement element for additional action and
investigation.
Note. Police information and police intelligence that indicates the need for the additional
interrogation of detainees requires military police to immediately coordinate with supporting
military intelligence personnel to conduct interrogations. Military police never participate in
interrogations of detainees or in setting conditions for detainee interrogations. See FM 3-63 for
roles and responsibilities of military police and military intelligence in detainee operations.
Police information and police intelligence may identify the need for criminal investigations focused
on crimes within a detention facility. Commanders may direct criminal investigations concerning events in a
facility when serious criminal infractions occur, such as attacks on other detainees or U.S. personnel,
contraband smuggling, and escape attempts. In situations potentially involving a criminal investigation,
special care must be taken to recognize, preserve, collect, and process materials with potential evidentiary
value. PIO can also link detainees or U.S. military prisoners in a detention facility to crimes, criminals, and
activities outside the facility.
Police information and police intelligence which suggest that criminal activity, associations, or
organizations exist within a detention facility may require law enforcement surveillance or criminal
investigations into the suspected criminal activity. Identifying and documenting criminal behavior, criminal
offenses, and individual criminal perpetrators allow the detention facility commander and military police
staff to identify criminal networks and organizations forming within a facility. Armed with this information,
commanders may direct action or take steps necessary to interdict these groups before serious breaches of
security occur.
When detainees or U.S. military prisoners perceive that they may benefit from a breakdown of good
order and discipline in facilities, they may take steps to facilitate that process. To limit or prevent cooperation
with U.S. authorities, detainees may attempt escapes, form organizations and associations to control the
internal workings of a facility, or intimidate other detainees or prisoners.
Police intelligence is critical to maintaining good order and discipline in detention facilities. Detention
operations are inherently risky due to the potentially high number of U.S. military prisoners or detainees and
the relatively low number of guard personnel. Military police commanders and staffs responsible for these
facilities must continuously determine intelligence requirements and conduct ongoing criminal and crime
analysis to identify and counter criminal and disruptive activities and the associated risks to order and
discipline. PIO supports the commander’s risk management efforts in detention environments.
See ATP 5-19 for risk management.
Detainee Operations
PIO supports detainee operations by identifying criminal threats and crime-conducive conditions
within a detention facility. Military police efforts to maintain good order and discipline in a detention facility
require cooperation across functional lines. Police intelligence analysts do not solely analyze police
information collected by military police forces; they also leverage police intelligence networks and integrate
the information and intelligence obtained from other sources to form a holistic understanding that contributes
to the commander’s situational understanding and enables decision making. The following are other sources
of information that PIO can integrate and share with the commander and staff:
Coordination and information sharing with military intelligence HUMINT teams can provide
critical information regarding criminal activities and threats within the facility.
Medical personnel who treat injured and sick detainees can provide observations regarding
detainee behavior, interaction, or spontaneous statements.
Engineers performing repairs on damaged facilities may note changes in environmental
characteristics that may be generating crime-conducive conditions that present crime opportunities
to detainees.
HN and U.S. interpreters are in a position to hear detainee conversations, read graffiti, and screen
inbound and outbound mail.
Note. When conducting detainee operations, the general distinction between police intelligence
roles and military intelligence roles is that police intelligence focuses on specific crimes and
criminal activity occurring or impacting good order and discipline within a facility while military
intelligence focuses on the actions of detainees outside the facility that resulted in their detention.
Military intelligence also focuses on detainee connections to threat networks outside a facility that
pose a threat to U.S. forces or missions and on the knowledge that detainees may have of the
locations, organizations, personnel, or tactics of targeted threat networks. See FM 3-63 for details
on the roles and responsibilities of military police and military intelligence during the conduct of
detainee operations.
Support to Mobility
Military police units use traffic control posts, checkpoints, roadblocks, and other traffic control
measures to control the movement of vehicles, personnel, and materiel and to prevent illegal actions that may
aid the enemy. These control measures serve as deterrents to criminals, terrorists, saboteurs, and other threats.
Military police tasked to provide support to mobility operations use the understanding gained by PIO to plan
and direct military police mobility support tasks, such as main supply route regulation and enforcement,
traffic control, or support to combined arms mobility operations (clearing, breaching, gap crossing).
PIO shapes military police tasks to support mobility and provides military police commanders and
staffs relevant and timely knowledge of criminal actors, activities, or effects that threaten friendly force routes
and convoys transiting lines of communication to preserve the freedom of movement and maneuver. Apart
from threats, environmental hazards may also negatively impact friendly force mobility. By embracing an
integrated threat and environmental-focused approach, PIO enables commanders to understand and
appreciate the full array of threats and hazards facing the friendly force to best protect the force and preserve
the freedom of movement and maneuver. See ATP 3-39.30 for military police support to mobility and
ATP 3-90.4 for combined arms mobility operations.
Area Security
PIO supports military police conducting area security throughout support and consolidation areas. Area
security is a security task conducted to protect friendly forces, installations, routes, and actions within a
specific area (ADP 3-90). While maneuver forces conduct large-scale ground combat operations in the close
area, units assigned to the consolidation area or support area must also contend with a diversity of hybrid
threat components, including criminal elements. As the situation evolves from a focus on offensive and
defensive tasks to more stability tasks and as U.S. forces seek to consolidate gains, police intelligence
complements traditional military intelligence by providing products specifically focused on the crime and
criminal aspects of the operational environment. PIO contributes to the commander’s understanding of threats
and vulnerabilities related to bases and base camps, port area and pier security, critical assets (facilities,
infrastructure, personnel), and civilian population centers and transit routes.
Because human populations are a critical component of the land domain, securing the land domain
requires an adequate level of security for populations to restore civil order, maintain stability, and create an
enduring peace. PIO influences efforts to secure areas and populations by focusing on building an
understanding of those elements most committed to disrupting stability and order. As criminals and other
irregular threats seek to take advantage of the chaos, disorder, and instability resulting from armed conflict,
efforts to counter them require dedicated focus. PIO enables the commander to gain situational awareness
and make informed decisions, focusing on targeting criminal and irregular threats to the population and
improving the environmental conditions creating opportunities for crime. The combination of criminal
intelligence to target criminal threats and crime analysis to understand the drivers of instability and the root
causes of crime greatly enhances the commander’s efforts to consolidate gains by providing a secure
environment.
Area security includes securing those assets most critical to the friendly force (command posts or
sustainment facilities) and those local civilian facilities and infrastructure most critical to the successful
consolidation of gains following large-scale ground combat (government facilities, HN police and corrections
infrastructure, economic infrastructure). PIO contributes to critical asset security through the continuous
assessment of criminal and irregular threats and of the friendly vulnerabilities to those threats. PIO
contributes to the military police assessments of criminal threats against vulnerable friendly assets (personnel,
facilities, missions) to ensure adequate protection.
Physical Security
Physical security is that part of security concerned with physical measures designed to safeguard
personnel; to prevent unauthorized access to equipment, installations, material, and documents; and to
safeguard them against espionage, sabotage, damage, and theft (JP 3-0). The security of property, equipment,
facilities, and personnel is the responsibility of each military and civilian leader throughout the Department
of Defense. Commanders protect personnel, information, and critical resources in all locations and situations
against a wide range of threats through the development and implementation of effective physical security
programs, policies, and procedures. PIO supports physical security through the assessment of physical
security requirements and criminal and crime analysis that supports physical security designs to reduce
vulnerability and deter potential criminals based on known or anticipated criminal threats. See ATP 3-39.32.
Antiterorrism
Antiterrorism is the defensive measures used to reduce the vulnerability of individuals and property to
terrorist acts, to include rapid containment by local military and civilian forces (JP 3-07.2). Antiterrorism
which is the Army defensive program to protect against terrorism, is a consideration of forces during military
operations. Army antiterrorism, at a minimum, focuses on risk management, planning (including the
antiterrorism plan), training, exercises, resource generation, and comprehensive program review.
Antiterrorism planning coordinates specific antiterrorism security requirements with the efforts of other
security enhancement programs (intelligence support to antiterrorism, law enforcement, physical security,
operations security, information security). Effective antiterrorism programs synchronize intelligence, risk
management, and existing security programs to provide a holistic approach to defend against terrorist threats.
PIO provides critical police intelligence related to specific criminal threats and vulnerabilities to crime that
supports the prevention, mitigation, and response to terrorist threats and attacks.
Logistics Security
Logistics security is concerned with the integrity of the logistics system through the prevention,
identification, and investigation of criminal acts committed by terrorists, criminal elements, or insider threats
that range from U.S. Army logistics provided to the military ground force on the ground. USACIDC
personnel are assigned the responsibility of conducting logistics security. PIO directly supports this effort by
providing criminal threat analysis, vulnerability assessments, economic crime threat assessments, logistics
security threat assessments, and other types of criminal intelligence that identify and assess criminal threats
that may impact logistics security. Police intelligence analysts produce reports that identify theft or
interdiction efforts, suspicious behavior, or other questionable acts that can cause USACIDC personnel to
focus efforts on the apprehension of criminal elements and the reduction of vulnerabilities to the logistics
enterprise.
The PIO framework follows the four steps derived from the Army’s established intelligence process
while still maintaining a close resemblance to common civilian law enforcement or criminal intelligence
processes. While the individual steps are divided or labeled differently, the overall process and the tasks
performed throughout the process are essentially the same. Keeping in mind the commonalities between
processes, it is important for military police and USACIDC personnel to be aware of the different processes
or labels unique to individual partner law enforcement agencies. Understanding the commonalities and
differences between the processes enhances the overall basis for dialogue, collaboration, and mutual
understanding.
Note. During DSCA, information collection is limited and categorized as information awareness
and assessment. The distinction between information collection, information awareness, and
assessment emphasizes that during DSCA, neither Army forces, nor any DOD component may
collect information on U.S. persons for intelligence purposes. Information awareness and
assessment leverages traditional DOD and other government information capabilities in support
of homeland operations while assuring strict adherence to applicable legal frameworks.
Information awareness and assessment supports the purposes of DSCA: to save lives, alleviate
suffering, and protect property. Information awareness and assessment addresses the limited
information collection activities permitted in the homeland in support of these purposes.
Information awareness and assessment processes consolidate information and provide analysis of
the physical environment; weather impacts; terrorist threats; and chemical, biological, radiological
and nuclear hazards; and other operational or mission variables.
There are several other terms used throughout the law enforcement community that are important to
know to enhance common understanding among unified action partners. These terms include
intelligence-led policing, community policing, and problem-oriented policing. While these terms all rely (to
some degree) on the products of PIO, they are more appropriately viewed as overall policing approaches,
models, or strategies and are discussed in ATP 3-39.10.
information exchanges. The Law Enforcement Exchange Specification is the basis for the OneDOJ regional
law enforcement information-sharing partnerships. Additional information can be found on the Justice
Information Sharing Web site.
CONTINUOUS ASSESSMENT
Assessment is a continuous process that precedes and concludes the operations process, scanning,
analysis, response, and assessment policing model and is integral to modifying and adjusting the focus and
direction of PIO. Figure 5-7 shows the activities of assessment, which includes—
Monitoring the current situation to collect relevant information.
Evaluating progress toward attaining end state conditions, achieving objectives, and performing
tasks.
Recommending or directing action for improvement.
During military police operations, the effectiveness of policing strategies is continuously assessed
by monitoring crime trends, patterns, and other insights gained from crime analysis. Effective policing
strategies should lead to lower crime rates and reduced criminal activity in the area of operations. Monitoring
is continuous observation of those conditions relevant to the current operation (ADRP 5-0). Monitoring
allows military police commanders and staffs to collect information about the current crime situation to
determine if current policing strategies and approaches are successfully achieving the commander’s intent
and concept of operations or if they require modification. Progress cannot be judged—and effective decisions
cannot be made—without an accurate understanding of the current situation.
Staffs analyze relevant information collected through monitoring to evaluate the operation’s
progress. Evaluating is using criteria to judge progress toward desired conditions and determining why the
current degree of progress exists (ADRP 5-0). Evaluation is at the center of the assessment process where
most of the analysis occurs. Evaluation helps commanders determine what is and what is not working, and it
helps them gain insights into how to better accomplish the mission.
Criteria in the forms of measures of effectiveness (MOEs) and measures of performance (MOPs)
aid in determining the progress toward attaining end state conditions, achieving objectives, and performing
tasks. MOEs help determine if a task is achieving its intended results. MOPs help determine if a task is
completed properly. MOEs and MOPs are simply criteria—they do not represent the assessment itself. MOEs
and MOPs require relevant information in the form of indicators for evaluation (see table 5-2, page 5-28).
Measures the purpose Measures the task Measures raw data inputs to
accomplishment. completion. influence MOEs and MOPs.
Measures why in the mission Measures what in the mission The information used to make
statement. statement. measuring what or why possible.
Often formally tracked in formal Often formally tracked in Often formally tracked in formal
assessment plans. execution matrixes. assessment plans.
Typically challenging to choose the Typically simple to choose the Typically as challenging to select
correct ones. correct ones. correctly as the supported MOE or
MOP.
Legend:
MOE measures of effectiveness
MOP measures of performance
Based on the evaluation of progress and effectiveness, the staff brainstorms possible improvements
to the plan and makes preliminary judgments about the relative merit of those changes. Staff members
identify those changes possessing sufficient merit and provide them as recommendations to the commander
or make adjustments within their delegated authority. Commanders integrate recommendations from the
staff, subordinate commanders, and other mission partners with their personal assessments. Using those
recommendations, they decide if and how the operation should be modified to better accomplish the mission.
In decisive action, recommendations to the commander range from continuing the operation as
planned, executing a branch, or making unanticipated adjustments. Making adjustments includes assigning
new tasks to subordinates, reprioritizing support, adjusting information collection assets, and significantly
modifying the course of action. During law enforcement and investigations on bases and base camps,
recommendations may suggest adjustments to police management, patrol distribution, or investigative
focuses.
Measuring the performance and effectiveness of policing and crime prevention efforts to shape
future policing strategies and methods is an integral aspect of policing models such as CompStat. CompStat
uses statistics, crime analysis, and other police intelligence products to evaluate police effectiveness through
regular meetings and by holding subordinates accountable for criminal activity in an assigned jurisdiction or
area of operations. CompStat allows military police commanders and staffs to evaluate police operations
against empirical data to ensure the effective and efficient allocation of limited military police resources.
Police operations that are ineffective or fail to achieve desired objectives may be modified or redirected to
produce desired outcomes or effects. See ATP 3-39.10 for a discussion of the policing models.
PIO is a continuous and iterative process. As such, an assessment may conclude a cycle of PIO,
provide direction for another cycle that modifies focus areas, introduce new aspects of crime problems that
were not previously observed, or adjust information and intelligence requirements to drive police information
collection. Police information collection may fully satisfy information or intelligence requirements; however,
criminal and crime analysis often reveals other knowledge gaps related to crime environments and organized
criminal activity that must be filled. When this happens, the assessment process provides critical feedback to
guide future PIO planning and direction.
Military police planners use several tools to assist in framing and understanding the complexity of
the operational environments in which military forces operate. Military police can provide relevant
information to the analysis of the operational environment by using the operational variables of political,
military, economic, social, information, infrastructure, physical environment, and time analyzed and viewed
from a policing perspective. See FM 3-39 for additional information on the operational variables analysis
with a policing focus and on the military police commander and staff roles and responsibilities in supporting
IPB.
Military police use the POLICE assessment tool for assessing crime environments, criminal activity,
and police effectiveness in reducing crime and disorder in the operational environment. This assessment tool
helps shape military police planning and the execution of military police operations. Military police and
USACIDC personnel identify existing HN police and corrections organizations and assess police structures
and current police capability and capacity, to include the existence or lack of a functioning legal system.
Military police conduct criminal and crime analysis to assess the crime environment for crime-conducive
conditions. They also assess the existence and activities of criminal networks and organizations. The POLICE
assessment tool is used to determine—
Police and prison structures. What police and prison structures exist? This factor may answer
information requirements.
Does a functional police or security force exist?
What police infrastructure is available? Is it in operational condition? What is needed?
Is the indigenous police force corrupt?
How does the community receive the police force?
Can the indigenous police force be relied on as an asset to assist the U.S. and joint forces?
Is the equipment, communications systems, and other capabilities the indigenous police force
have reliable? What equipment and capabilities are needed?
Does the police force have adequate systems (administrative, training, logistic, and
investigative systems) in place to operate effectively?
How many prison structures exist in the area of operations? What are the prison structure
types and capacities? Are they operational?
Are jurisdictional boundaries established? What is the historical reason for the establishment
of jurisdictional boundaries?
Organized criminal elements. Is organized criminal activity present? If so, what are the—
Indications of organized crime?
Motivations for organized criminal activity—financial or facilitating insurgent activity?
Specific criminal activities identified?
Public attitudes toward organized criminal activities?
People, organizations, or businesses targeted by organized criminal elements?
Legal systems. What is the composition of the legal system?
Is there a law-enforcing mechanism? If so, what is it?
Is there an adjudicating body?
Does the legal system operate based on the rule of law? If not, what is the basis?
Are all three elements of the criminal justice system (police, prisons, and judiciary) present,
functional, and synchronized?
Are appropriate administrative record systems in place to support the legal system?
Investigations and interviews. Are adequate criminal investigative systems functioning and
enforced?
Do adequate investigative capabilities exist to perform police and administrative
investigations (criminal, traffic, internal affairs, administrative functions)?
Are adequate administrative and database systems in place to support investigations,
including PIO?
How are internal and external investigations, inquiries, and assessments initiated, managed,
tracked, and reported? Are records appropriately transparent to the public? Are they
consistently applied?
Are police and criminal investigative capabilities leveraged to support site exploitation and
targeting?
Crime-conducive conditions. What conditions exist that contribute to the initiation,
development, and expansion of crime?
What specific resources or commodities are available and attractive to criminals?
What locations are vulnerable to criminals?
What security gaps exist that could create vulnerabilities to criminal behavior (systems,
procedures, physical security measures)?
Enforcement gaps and mechanisms. What enforcement gaps are present and what assets are
available? Are enforcement gaps present or imminent due to the movement or elimination of an
asset or capability? Do these enforcement mechanisms include—
Local security, guards, or police forces?
Response forces (special response teams, civilian police special weapons units, military and
paramilitary response forces)?
Informal religious, ethnic, or family structures and influence?
Organized criminal elements?
Multinational or interagency organizations?
Informal social authorities?
TARGETING
Targeting is the process of selecting and prioritizing targets and matching the appropriate response
to them, considering operational requirements and capabilities (JP 3-0). Targeting means can range from
lethal engagements to nonlethal weapons to informational engagements. Targeting begins in the planning
process and continues throughout the operation. The Army targeting process is described in the framework
of decide, detect, deliver, and assess (see figure 5-9). This targeting methodology facilitates the engagement
of the right target, at the right time, and with the most appropriate assets (lethal or nonlethal), based on the
commander’s targeting guidance, objectives, and desired effect.
activity on military operations and properly distinguishing that activity from other threat or environmental
factors can be essential to effective targeting and mission success.
PIO contributes to the targeting process by providing timely, relevant, and accurate police
information and police intelligence regarding criminal threats in the area of operations. Military police
personnel, USACIDC personnel, and police intelligence analysts must understand their role in the targeting
process and how PIO supports the targeting process. PIO supports the targeting process by providing several
unique policing skills and perspectives focused on the crime and criminal aspects of the operational
environment. Military police leverage policing skills and knowledge using the PIO process to support the
targeting process through—
Target identification.
Uses the information gathered and stored in raw data files to identify threats (crimes,
criminals, and other threat elements and activities) and locations of threat activity.
Identifies the organizations involved in the threat activity. This may be criminal enterprises
affecting U.S. interests, or it may be irregular threat groups (terrorists, insurgents, or groups
engaging in criminal activity that disrupts or endangers U.S. operations, including threats
from corrupt officials or infiltrators internal to HN organizations).
Analysis of threat information. Criminal and crime analysis is central to PIO. Analysis
converts police information into police intelligence and contributes to other intelligence products
(within mission, regulatory, and policy constraints).
In law enforcement terms, the data or information collected is analyzed to develop additional
leads in ongoing investigations, provide hypotheses about who committed a crime or how
they committed it, predict future crime patterns, and assess the threat that a crime group or
activity might pose to a jurisdiction.
In unified land operations, police intelligence resulting from an analysis of threat information
enhances the operations process and aids in the maintenance of a holistic common operational
picture. Police intelligence may identify threat, operational, or logistic networks; individual
operators or sympathizers; and low-level criminals that can disrupt U.S. operations, including
threats from corrupt officials or infiltrators internal to HN organizations. Police intelligence
is also used to assess and clarify targets during the targeting process.
Corroboration of source and informant information. Due to their dispersion and presence,
military police and USACIDC personnel are well-equipped to obtain corroborating information
for otherwise unsubstantiated source data.
During law enforcement operations conducted in the United States and its territories, this
corroboration can be accomplished through data mining, witness interviews, law enforcement
surveillance, or other law enforcement source contacts.
In support of decisive action, similar techniques can also be applied to corroborate witness
statements or evidence obtained at an incident site. This corroborated information can then be
used in the legal system for prosecution, or it can be acted on by the appropriate geographic
combatant commander for military action.
Information sharing and support to active investigations.
Regardless of the agency, ongoing investigations can be solved by using information that is
collected and documented by military police and USACIDC personnel. One law
enforcement officer may have an informant who knows the perpetrator of a burglary that
another officer is investigating. Aggressive and proactive analysis and information sharing
can contribute to the resolution of specific investigations or criminal activity across
organizational lines.
In operational environments outside the U.S., this support can assist commanders and staffs
by identifying key threat actors, organizations, or cells that may be operating across or within
unit boundaries or areas of operations. Police intelligence may identify weapons caches,
facilities for the production of improvised explosive devices, or personnel involved in threat
activities that are being conducted in another area of operations. The fusion of ongoing police
information and police intelligence into the operations process and the common operational
picture may provide critical information to commanders and staffs to enable effective
targeting.
Military police, USACIDC personnel, and police intelligence analysts integrate police information
and police intelligence into the targeting process. The activities that support the operations process are
integrated into the targeting process during the military decisionmaking process, targeting meetings,
coordination with the fires cell, and other staff functions. The decide, detect, deliver, and assess methodology
provides the structure for staffs to integrate analysis, monitor operations, and make recommendations
enabling commanders to make informed targeting decisions. Table 5-3 illustrates decide, detect, deliver, and
assess key activities and shows how military police and USACIDC personnel who conduct PIO integrate
with the overall targeting process. See ATP 3-60 for additional information on the targeting process.
Table 5-3. Military police support to targeting
D3A Activities PIO Support to Targeting
Perform continuous activity based on • Develop intelligence requirements pertinent to military
the mission, commander’s intent, police operations.
concept of the operation, and planning • Develop the information collection plan.
guidance to produce or determine—
• Ensure that police-related intelligence requirements
• Intelligence requirements.
and the collection plan are integrated and
• Priorities of reconnaissance, synchronized with the overall information collection
surveillance, target acquisition, plan.
sensor allocation, and
• Identify change indicators relevant to the criminal
employment.
environment.
• Target acquisition taskings.
• Identify military police, USACIDC, or other collection
Decide which • High-payoff target lists. assets capable of collecting against specific
targets to intelligence requirements.
• Target selection standards.
engage.
• Assessment criteria. • Nominate police-related intelligence requirements as
priority intelligence requirements (as required).
• Prioritization of the targets.
• Nominate criminal or police-related targets as high-
• Measures of performance and payoff targets (as required).
effectiveness.
• Make recommendations regarding engagement
• Attack guidance matrix. (Enables means.
the commander or leader to make
a decision on who, what, when, • Assess probable effects of recommended
where, and how to engage.) engagements.
• Task appropriate military police or USACIDC collection
assets (if applicable).
• Produce an information collection • Participate in information collection synchronization to
synchronization matrix. ensure that military police information collection efforts
• Dedicate assets to collect are synchronized with maneuver and other collection
information. elements.
• Update information requirements as • Gather reports, evidence, and other pertinent police
they are answered. information.
In brigade combat teams and echelons above brigade, the provost marshal is responsible for
providing understanding of the crime environment, developing linkages between criminal actors, establishing
correlations in time and space, and identifying trends and patterns in criminal activity that contributes to the
targeting process by enabling selection and prioritizing crime and criminal targets. Provost marshals duties
related to targeting include the following:
Develop police intelligence products that enable targeting.
Fuse police intelligence with the S-2/G-2 (within mission, regulatory, and policy constraints).
Participate in targeting boards and provide recommendations for criminal targets or crime
conditions or locations to concentrate effects.
Identify high-payoff criminal targets and timelines for recommended engagement.
Identify military police and USACIDC personnel for participation in targeting actions (lethal or
nonlethal).
Developments in biometrics technology, evidence collection and examination at incident sites, site
exploitation in operational areas, and corresponding forensic analysis capabilities have proven the
effectiveness and relevance of PIO and its ability to provide timely and accurate police intelligence products
to maneuver commanders and support the geographic combatant commander. The technical capabilities and
knowledge of complex criminal organizations and activities leveraged by military police and USACIDC
personnel provide methods and reachback that increase the commander’s ability to identify criminal and
other irregular threats within an operational area and across combatant command areas of responsibility.
The Army targeting construct is typically understood as an activity executed in military operations
abroad against a foreign threat. The identification and targeting of criminal threats in the context of the
policing and protection of U.S. personnel and infrastructure follow the same basic methodology. Police
intelligence, integrated into police operations on bases and base camps, is critical to enable effective,
proactive, and responsive policing to target criminal offenders and crime-conducive conditions. Leveraging
the targeting methodology is valuable in narrowing the scope of policing activities and investigations so that
persons of interest can be identified and interviewed, locations or material can be identified for examination
and collection for evidentiary value, and criminal threats can be appropriately targeted for apprehension.
Targeting the people who commit crimes and the places and problems that present opportunities for crime
are essential components to achieving comprehensive and effective policing outcomes that reduce crime and
the fear of crime among a population and provide a safe and secure environment.
RISK MANAGEMENT
Risk—the exposure of someone or something valued to danger, harm, or loss—is inherent in all
operations. Risk management is the process to identify, assess, and control risks and make decisions that
balance risk cost with mission benefits (JP 3-0). The Army uses risk management to help maintain combat
power while ensuring mission accomplishment in current and future operations. Throughout the operations
process, commanders and staffs use risk management to identify and mitigate risks associated with hazards
that have the potential to injure or kill friendly and civilian personnel, damage or destroy equipment, or
otherwise impact mission effectiveness. (See figure 5-10, page 5-36). As with targeting, risk management
begins in planning and continues through preparation and execution. Risk management consists of the
following steps:
Step 1. Identify the hazards.
Step 2. Assess the hazards.
Step 3. Develop controls and make risk decisions.
Step 4. Implement controls.
Step 5. Supervise and evaluate.
The number of agencies involved in PIO and the array of applicable laws, regulations,
and directives can make navigating various authorities and restrictions complex.
Military police and USACIDC personnel leverage the expertise and advice of a judge
advocate to ensure compliance with all legal parameters in which military police and
USACIDC personnel must operate. This is especially true when planning and
conducting PIO in support of domestic antiterrorism, DSCA, and homeland defense
programs or foreign stability operations where the rule of law is established and
enforced. Military police, DOD police, and USACIDC personnel collect, manage,
analyze, produce, and disseminate police information and police intelligence under the
legal instruments of national and international laws, federal statutes, DOD and DA
directives and regulations, and SOFAs. Military law enforcement personnel are
governed by information acquisition regulations (most notably DODD 5200.27) not by
intelligence regulations. This appendix addresses those documents most relevant to the
PIO collection efforts. A summary of each document (with respect to its relevancy and
applicability to PIO) and its restrictions and provisions to Army law enforcement
conducting PIO are discussed in this appendix.
A-5. This order provides for nonconsensual physical searches in the United States by the Federal Bureau of
Investigation and for other law enforcement activities in specific situations, such as searches by
counterintelligence elements of the military services directed against military personnel in the United States
or abroad for intelligence purposes. Nonconsensual physical searches are authorized by a military
commander empowered to approve physical searches for law enforcement purposes based on a probable
cause finding—such as the belief that a person is acting as an agent of foreign powers. (See EO 12333.)
A-6. National foreign intelligence collected at locations outside the continental United States is coordinated
with the Central Intelligence Agency (if not otherwise obtainable). Collection procedures performed in the
continental United States are coordinated with the FBI. EO 12333 allows intelligence agencies to—
Cooperate with appropriate law enforcement agencies for protecting employees, information,
property, and facilities of any agency in the intelligence community.
Participate in law enforcement activities to investigate or prevent clandestine intelligence
activities by foreign powers or international terrorist or narcotics activities, unless otherwise
precluded by law or EO 12333.
Provide specialized equipment, technical knowledge, or assistance from expert personnel for use
by any department or agency or, when lives are endangered, to support local law enforcement
agencies. The provision of assistance by expert personnel is approved by the general counsel of
the providing agency on a case-by-case basis.
Render any other assistance and cooperation to law enforcement authorities not precluded by
applicable law.
and retention of information established pursuant to DODD 5200.27, due consideration is given to protect
DOD functions and property in the different circumstances that exist in the geographic areas outside the
continental United States. Relevant factors include the—
Level of disruptive activity against U.S. forces.
Competence of HN investigative agencies.
Degree to which U.S. military and HN agencies exchange investigative information.
Absence of other U.S. investigative capabilities (such as in the unique and vulnerable positions of
U.S. forces abroad).
A-11. The DODD 5200.27 authorizes Army law enforcement personnel to gather information to accomplish
the following missions:
Protection of DOD functions and property. Information may be acquired about activities
threatening military and civilian personnel, activities, and installations, to include vessels, aircraft,
communications equipment, and supplies. Only the following types of activities justify the
acquisition of information under the authority of this paragraph:
Subversion of loyalty, discipline, or morale of DOD military or civilian personnel by actively
encouraging the violation of law, disobedience of a lawful order or regulation, or disruption
of military activities.
Theft of arms, ammunition, or equipment or the destruction or sabotage of facilities,
equipment, or records belonging to DOD units or installations.
Acts jeopardizing the security of DOD elements or operations or compromising classified
defense information by unauthorized disclosure or espionage.
Unauthorized demonstrations on DOD installations.
Direct threats to military or civilian personnel in connection with their official duties or to
other persons who have been authorized protection by DOD resources.
Activities endangering facilities that have classified defense contracts or that have been
officially designated as key defense facilities.
Crimes for which the DOD has responsibility for investigating or prosecuting.
Personnel security. Investigations may be conducted in relation to the following categories of
personnel:
Members of the armed forces, including retired personnel, members of the reserve
components, and applicants for commission or enlistment.
DOD Civilian personnel and applicants for such status.
Persons having a need for access to official information requiring protection in the interest of
national defense under the DOD Industrial Security Program or persons being considered for
participation in other authorized DOD programs.
Civil disturbance control. The Attorney General is the chief civilian officer in charge of
coordinating federal government activities relating to civil disturbances. Upon specific
authorization of the Secretary of Defense or their designee, information may be acquired that is
essential to meet operational requirements flowing from the mission assigned to DOD to assist
civil authorities in dealing with civil disturbances. Such authorization is granted only when there
is a distinct threat of a civil disturbance exceeding the law enforcement capabilities of state and
local authorities.
A-12. DODD 5200.27 identifies instances in which Army law enforcement personnel are prohibited from
collecting information on individuals and organizations in the United States and its territories or on U.S.
citizens abroad, but it does not restrict the collection of information against non-U.S. belligerents outside the
United States. The prohibitions state that—
The acquisition of information on individuals or organizations not affiliated with DOD will be
restricted to what is essential to the accomplishment of assigned DOD missions under this
directive.
No information will be acquired about a person or organization solely because of lawful advocacy
of measures in opposition to government policy.
Note. On an armed forces disciplinary control board where an Army installation is the senior
service, the provost marshal typically serves as the senior representative.
A-16. Civil agencies or individuals may be invited to board meetings as observers or witnesses or to provide
assistance where they possess knowledge or information pertaining to problem areas in the jurisdiction of the
board. Typically, local law enforcement agencies regularly participate in armed forces disciplinary control
board proceedings.
A-17. In support of armed forces disciplinary control board mandates, Soldiers and military or DA Civilian
police may be required to perform off-installation operations. These law enforcement personnel must be
thoroughly familiar with the constraints of Section 1385, Title 18, United States Code (18 USC 1385) and
with applicable agreements between the United States and HNs. In the United States or its territories, U.S.
military and/or DA Civilian police assigned to off-installation operations have the sole purpose of enforcing
regulations and orders pertaining to persons subject to their jurisdiction. When accompanying civilian law
enforcement officers, these policing forces remain directly responsible to, and under the command of, their
military chain of command. Military and DA Civilian police may come to the aid of civilian law enforcement
officers to prevent the commission of a felony or injury to a civilian law enforcement officer.
A-18. The constraints on the authority of Soldiers and DA Civilian police to act on off-installation operations
(and the specific scope of off-installation operations) are clearly delineated in all authorizations for off-
installation support. Off-installation operations are coordinated with the local installation commander
through the staff judge advocate or higher authority and appropriate civilian law enforcement agencies.
AR 190-24 establishes the primary objectives of off-installation operations as—
Rendering assistance and providing information to service personnel.
Preserving the safety and security of service personnel.
Preserving good order and discipline among service personnel and reducing off-installation
incidents and offenses.
Maintaining effective cooperation with civil authorities and community leaders.
military police, USAICDC, or other investigative agency will be initiated if police intelligence is developed
to the point at which it factually establishes a criminal offense. Furthermore, it specifies that police
intelligence will be actively exchanged between DOD law enforcement agencies; military police; USACIDC;
and local, state, federal, and international law enforcement agencies.
A-20. This regulation discusses the development of a tool (called the Joint Protection Enterprise Network)
created for DOD for sharing police intelligence. The Joint Protection Enterprise Network provides users with
the ability to post, retrieve, filter, and analyze real-world events based on seven reporting criteria:
Nonspecific threats.
Surveillance.
Elicitation.
Tests of security.
Repetitive activities.
Bomb threats/incidents.
Suspicious activities/incidents.
A-28. Agencies within the military intelligence community are authorized to—
Cooperate with law enforcement agencies for protecting the employees, information, property,
and facilities of any agency in the intelligence community.
Participate in law enforcement activities to investigate or prevent clandestine intelligence
activities on foreign equipment or technical knowledge, provide assistance from expert personnel
for use by any department or agency, or support local law enforcement agencies when lives are
endangered (unless otherwise precluded by law or AR 381-10). The provision of assistance by
expert personnel is approved by general counsel of the providing agency on a case-by-case basis.
Render other assistance and cooperation (not precluded by applicable law) with law enforcement
authorities.
A-29. Army law enforcement personnel can expect cooperation (consistent with DODI 3025.21) from the
military intelligence community for the purpose of—
Investigating or preventing clandestine intelligence activities by foreign powers, international
narcotics activities, or international terrorist activities.
Protecting DOD employees, information, property, and facilities.
Preventing, detecting, or investigating other violations of law.
A-30. The term collection, as defined in AR 381-10, is different from the everyday, common definition of
assemble or gather. The AR 381-10 definition includes the intent to use or retain information received from
cooperating sources.
A-32. Military police and USACIDC elements hold critical responsibilities due to their law enforcement
missions and ability to collect, analyze, disseminate, and manage police intelligence. Specific responsibilities
are given to the Provost Marshal General and USACIDC commander for implementation. The Provost
Marshal General, acting in direct support to Headquarters, DA; Assistant chief of staff for operations (G-3)
for the management and execution of the Army antiterrorism mission, are responsible for—
Staffing and providing an antiterrorism branch to serve as the functional proponent and for
establishing policy and objectives regarding the antiterrorism program.
Operating the Army Threat Integration Center in close coordination with Headquarters, DA,
Office of the Deputy Chief of Staff and the G-2, to—
Issue early warning of criminal and terrorist threats to Army commands, Army Service
component commands, direct reporting units, and other senior Army leaders and
organizations.
Coordinate the analyses and reporting of terrorist-related intelligence with appropriate
intelligence and law enforcement agencies to provide warnings and maintain visibility of
threats to senior Army leadership; major commands (Army major commands, Army Service
component commands, and direct reporting units); and threatened installations, activities,
facilities, and personnel.
Fuse criminal and terrorist threat information to form a single threat picture.
Assess terrorist and criminal threats to Army forces and publish an annual comprehensive DA
threat statement and daily DA force protection memorandum to disseminate potential and
future threats, thereby enhancing threat awareness at all levels.
A-33. AR 525-13 also outlines specific responsibilities for the commander, USACIDC, as the senior
commander responsible for Army criminal investigations. USACIDC is responsible for—
Ensuring a sufficient USACIDC police intelligence capability to monitor and report on the
activities, intentions, and capabilities of domestic threat groups (according to applicable
regulations and directives).
Collecting, analyzing, and disseminating police intelligence to affected commands pertaining to
threat activities (in the provisions of applicable statutes and regulations).
Providing appropriate threat-related police intelligence to Headquarters, DA; the Army Threat
Integration Center; the Intelligence and Security Command; and the Army Counterintelligence
Center.
Maintaining a capability to analyze and disseminate collected, time-sensitive information
concerning the criminal threat against Army interests.
Investigating threat incidents of Army interest; monitoring the investigations when conducted by
civilian, HN, military, or other police agencies; and providing applicable results of terrorist-related
investigations to the Army Counterintelligence Center, Army Threat Integration Center, and
Center for Army Lessons Learned.
Providing trained hostage negotiators to support Army antiterrorism operations worldwide.
Planning and coordinating the protection of high-risk personnel for DOD, DA, and foreign
officials as directed by Headquarters, DA.
Serving as the Army primary liaison representative to federal, state, local, and HN agencies to
exchange police intelligence.
Establishing procedures to ensure appropriate liaison at all levels between USACIDC, the
Intelligence and Security Command, and provost marshal elements operating in support of the
antiterrorism program.
Notifying the affected installation provost marshal and Headquarters, DA, upon receipt of time-
sensitive threat information immediately.
Ensuring that criminal activity, threat assessments, and personal security vulnerability assessments
are conducted for Army personnel, installations, systems, operations, and other interests as
directed by Headquarters, DA, or based on the Army commander’s operational requirements.
Providing technical personnel support to the Headquarters, DA, Deputy Chief of Staff and
designated G-3 assessment teams, as required.
Investigating incidents of suspected terrorism as criminal acts, to include safeguarding evidence
and collection testimony and preparing investigative reports and presentations for the appropriate
judicial officials. Investigations are conducted jointly with federal, state, local, and foreign law
enforcement agencies, as appropriate.
Providing appropriate terrorism analyses and threat assessments to the Army Threat Integration
Center in support of Army requirements and the antiterrorism program.
A-34. The regulation also outlines responsibilities for installation and garrison commanders. These
commanders are required to—
Ensure that law enforcement and intelligence organizations in their command collect and analyze
criminal and terrorist threat information.
Develop a system to monitor, report, collect, analyze, and disseminate terrorist threat information.
Identify a focal point for the integration of operations with local or HN intelligence, criminal
investigations, police information, and police intelligence.
Coordinate law enforcement support with higher headquarters if organic law enforcement is not
available.
Ensure that the command has appropriate connectivity to receive threat-related information and
intelligence from classified and unclassified networks, to include products and information from
provost marshal offices; local, state, and federal law enforcement; and intelligence organizations
and fusion centers (Army Threat Integration Center, Federal Bureau of Investigation, USACIDC,
Army Counterintelligence Center, Intelink-S, Intelink).
Ensure that collection operations are being conducted consistent with the requirements and
restrictions of AR 380-13, AR 381-10, AR 381-12, DODD 5200.27, and other applicable
regulations and directives.
Establish an antiterrorism program supported by all-source intelligence with PIR; CCIR; and
focused collection, analysis, and dissemination to protect personnel and assets in the area of
operations.
Ensure that products and analyses are focused and based on their PIR and CCIR. Review PIR and
CCIR for currency, and revalidate them at least annually to update changing threats or
requirements.
Ensure that information and intelligence regarding terrorist activity is developed, collected,
analyzed, and disseminated in a timely manner. Current intelligence is integrated into the
antiterrorism training program.
A-35. In reference to terrorist threat assessments, AR 535-13 specifically addresses the law enforcement and
intelligence community as follows:
Threat information prepared by the intelligence community, USACIDC, and the provost marshal’s
office is used when conducting threat assessments and collecting technical information from
information management.
Threat assessments serve as the basis and justification for antiterrorism plans, enhancements,
program and budget requests, and the establishment of force protection conditions.
Threat assessments are part of leader reconnaissance, in conjunction with deployments and follow-
on threat and vulnerability assessments (as determined by the commander).
Consolidated military intelligence and police intelligence data identified in threat assessments (on
U.S. personnel) cannot be filed, stored, or maintained as an intelligence product (as directed in
AR 381-10). These assessments must be filed, stored, and maintained in operational channels.
STATUS-OF-FORCES AGREEMENT
A-36. Ordinarily a SOFA is established when a long-term U.S. presence is required or anticipated. While this
is common, some areas of operations in which U.S. forces operate do not have established SOFA agreements
between the United States and the HN. This is common in an area of operations experiencing major combat
operations or significant instability. As the theater matures and a stable HN government establishes control,
a SOFA is typically developed if an enduring U.S. presence is required.
A-37. A SOFA plays a vital role in preserving command authority and the protecting military personnel. The
purpose of a SOFA is to set forth rights and responsibilities between the U.S. government and an HN
government on matters such as criminal and civil jurisdictions, uniforms, arms possession, tax and customs
relief, entry and exit procedures of personnel and property, and resolutions to damage claims. A SOFA
defines the legal status of U.S. personnel and property in the territory of another nation.
A-38. All SOFAs are unique and reflect specific considerations based on the countries entering into the
agreement. A SOFA establishes guidelines for civil and criminal jurisdiction. This process is critical to ensure
that the United States and DOD can protect, to the maximum extent possible, the rights of U.S. personnel
who may be subject to criminal trials by foreign courts and imprisonment in foreign prisons. Typically, a
SOFA recognizes the right of an HN government to primary jurisdiction, allowing jurisdiction for cases in
which U.S. military personnel violate HN laws. Most SOFAs provide two exceptions for which the United
States may retain primary jurisdiction. These exceptions are for offenses committed—
By U.S. personnel against U.S. personnel.
In the performance of official duties.
A-39. In some areas of operations, agreements between the United States and HN countries may establish
legal parameters regarding U.S. authority over HN personnel. The HN typically retains jurisdiction over its
citizens; however, in some cases, the HN government may be nonfunctioning or incapable of maintaining
security and control over the population. These environments may require U.S. military forces to establish
and maintain control over the population until the HN can assume authority and control. This may be
particularly true as operations transition from major combat operations to stability operations and the
operational environment becomes stable enough for the HN to implement the rule of law in dealing with the
population and maintaining order. The operational environment that immediately follows a major disaster
(natural or man-made) may also cause conditions in which U.S. military forces are required to restore order
and maintain control over an HN population.
A-40. As the operational environment becomes stable and the HN begins to reestablish the rule of law, U.S.
military forces may still be necessary to assist the HN in policing activities. This is only done pending the
full assumption of control by the HN. During the interim, legal agreements between the HN and the United
States may be established to ensure that the U.S. military and its Soldiers act within the rule of law established
by the HN and that the rights of the local population are maintained.
[CLASSIFICATION]
CRIMINAL INTELLIGENCE REPORT
2. Subject 2; Specialist; [social security number]; female; white; 5'4"; 110 pounds; blonde hair; blue eyes;
123d Maintenance Battalion, FOB Bulldog, Country.
3. Subject 3; Sergeant; [social security number], male; white; 5'8"; 143 pounds; blonde hair; brown eyes;
123d Maintenance Battalion, FOB Bulldog, Country.
Offense: Wrongful appropriation/larceny of government property.
Reference is made to this office MPR 0443-09-MPR992.
Source of Information: The information contained in this PIA was developed during the referenced MPR
and is considered reliable.
Source of Information: The information contained in this PIA was developed during the referenced
MPR and is considered reliable.
Narrative: At about 2300 hours on 1 May 20XX, the 11th MP Detachment, MP Investigations Section,
FOB Bulldog, Country, while conducting an investigation of possible larceny of government property in
the 123d Maintenance Battalion supply room, discovered evidence linking Subject 2 and Subject 3 to
stolen government property. The stolen property includes bayonets, commercially procured personal
hydration units, and laser sights. During subsequent interviews, Subject 2 admitted that, in addition to
being a friend to Subject 3 and Subject 1, she conspired with them to take government property with
intent to mail the items back to the United States for resale by Subject 1. Several stolen items were
later found in the possession of Subject 3 and recovered. Court-martial actions are being taken
against Subject 2 and Subject 3. Subject 1 has been allegedly quoted by his roommate (not
considered a suspect) as saying that he had a “sweet business deal waiting for him stateside.” The
supporting judge advocate has reported that there is insufficient evidence to take action against
Subject 1. This is a terminal report; no further reports are contemplated pending receipt of additional
police intelligence.
Warning Statement: This document is intended for law enforcement personnel, police intelligence
analysts, military personnel, and other officials with a need to know. Further dissemination of this report
should be limited to a minimum, consistent with the purpose for which the record has been furnished
(such as the effective enforcement of civil and criminal law). Additional release requires approval from
the originator.
Distribution:
Provost Marshal, FOB Bulldog, Country
Commander, 345th Maintenance Company, Fort Sunny, California
Provost Marshal, Fort Sunny, California
[CLASSIFICATION]
Legend:
FOB forward operating base MPR military police report
MP military police PIA police intelligence advisory
Source: Information was obtained from a local national informant that has supplied credible and
accurate information in the past; the information is considered reliable.
Credible information has been received that Subject 1, Subject 2, and Subject 3 have been assembling
improvised explosive devices and hiring third-party individuals to emplace the devices, targeting U.S.
military and host-nation convoys throughout Hostile Province.
Subject 1 has been known to use the aliases Alias 1 and Alias 2.
Subject 2 has been known to use the aliases Alias 1 and Alias 2.
Subject 3 has been known to use the aliases Alias 1 and Alias 2.
Criminal intelligence indicates that Subject 1, Subject 2, and Subject 3 have been manufacturing
improvised explosive devices in a mobile facility, most likely a modified panel van. Criminal intelligence
further indicates that they consistently use electronic triggers supplied by a foreign source and that their
devices are consistently radio frequency-detonated using components from a single source supplier.
When on the move, Subject 3 typically drives while Subject 1 and Subject 2 work in the back of the van.
Subject 3 is described as 6'6" tall, weighing more than 300 pounds, with a large, heart-shaped tattoo
with the word “MOM” on his left forearm. There are currently no descriptions for Subject 1 and Subject
2.
Units operating in the area should be alert for suspicious activity, particularly at vehicle checkpoints and
when involving paneled vans transiting the area of operations. If the suspects are encountered, detain
them if possible. However, exercise extreme caution. Additional intelligence indicates that the van is
often booby-trapped. If Subject 1, Subject 2, or Subject 3 are detained, notify the 50th Military Police
Brigade as soon as possible to facilitate law enforcement apprehension of the suspects. Incident sites
should be searched for remnants of trigger devices and other material to be collected for forensic
evaluation.
The point of contact for this alert is Major Jane Doe, Military Police Operations Officer, 50th Military
Police Brigade, [telephone number], [e-mail].
This alert is intended for dissemination to all units operating in Hostile Province.
Legend:
U.S. United States
BE-ON-THE-LOOKOUT ALERT
B-4. Figure B-3 and figure B-4, page B-4, provide two examples of BOLO alerts in FBI and Army formats.
The FBI has issued a BOLO alert for (subject) in connection with possible threats against the United
States. In the BOLO alert, the FBI expresses interest in locating and questioning (subject) and asks law
enforcement personnel to notify the FBI immediately if the subject is located. The subject’s current
whereabouts are unknown.
The subject is possibly involved with al-Qaeda terrorist activities and, if true, poses a serious threat to U.S.
citizens worldwide.
The subject is 27 years old, and he was born in Saudi Arabia. He is approximately 132 pounds (but may be
heavier) and 5'3" to 5'5" tall; he has a Mediterranean complexion, black hair, brown eyes, and occasionally
grows a beard. A photograph of this individual is available on the [Link]
The subject carries a Guyana passport; however, he may attempt to enter the United States with a Saudi Arabia,
Trinidad, or Canadian passport. The subject is also known by the following aliases:
Legend:
BOLO be-on-the-lookout POC point of contact
DSN Defense Switched NetworkU.S. United States
DOD Department of Defense VIN vehicle identification number
WANTED POSTERS
B-5. Figure B-5 and figure B-6, page B6, provides examples of a wanted posters.
WANTED
BY CID
Information concerning the offense of larceny of government property from the 29th Sustainment Brigade,
Camp Bulldog, Country, APO AE 09090.
On 1 April XXXX, the USACIDC initiated an investigation into the larceny of government property from
the 29th Sustainment Brigade. Between 1800, 29 March XXXX and 0530, 30 March XXXX, person(s)
unknown stole one M998 HMMWV, bumper number SVC 4 29TH SB, serial number 044308, from the
parking lot adjacent to Building 1013A (Headquarters, 29th Sustainment Brigade), Camp Bulldog,
Country.
If you have information about this incident, please contact the CID office at DSN [telephone number] or
commercial [telephone number] or call the local military police station.
Legend: HMMWV high-mobility, multipurpose,
APO Army post office wheeled vehicle
CID criminal investigation division USACIDC United States Army Criminal
DSN Defense Switched Network Investigation Command
Figure B-6. Example of a United States Criminal Investigation Command wanted poster
REWARD POSTERS
B-6. Figure B-7 provides an example of a reward poster.
For information leading to the recovery of a 5-ton wrecker (M936WW), stolen at 1217, 6 March XXXX
from the 50th Military Police motor pool, Forward Operating Base Bulldog. All information provided is kept
confidential. If you have information, contact your local military police at DSN [telephone number] or
commercial [telephone number] or the Criminal Investigation Division element at DSN [telephone number]
or commercial [telephone number].
Legend:
DSN Defense Switched Network
Legend:
CA California USAG United States Army Garrison
EFT electronic funds transfer U.S. United States
SSG staff sergeant
COMBINED CHARTS
B-11. Figure B-12 depicts a chart that combines several different analysis techniques and types of
information to depict connections across time, space, people, places, and things that can greatly enhance the
understanding of criminal networks and activities in dynamic, multifaceted, and complex relationships.
Legend:
DUI driving under the influence MO Missouri
FLW Fort Leonard Wood
GEOSPATIAL MAPPING
B-15. Figure B-15, page B-14, displays an example incident map that uses geospatial mapping technology.
Legend:
DOD department of defense UXO unexploded ordinance
FOB forward operating base VBIED vehicle-borne improvised
IED improvised explosive explosive device
device VPC vehicle collection point
MSR main supply route
1. PURPOSE: This crime prevention flyer addresses the larceny reported on 21 October 20XX and the
immediate actions recommended to deter future criminal activity and loss of property.
2. BACKGROUND: Investigators have expended a significant amount of resources investigating the stated
crime that occurred on 21 October 20XX. Due to the conditions outlined below, the investigation has produced
negative results. Losses to date have been valued at about $8,200. During the investigation, several conditions
were discovered that produce conditions conducive to criminal activity. Most of these conditions are basic
physical security deficiencies. Actions that correct the identified deficiencies can contribute to making the 10th
Sustainment Command and associated warehouse areas a hard target for thieves and deter
future break-ins. The investigation into this incident is not complete; however, the items shown below are of
time-sensitive interest:
a. The rear door to the unit warehouse did not have a security cover over the doorframe area where the
locking mechanism was located. This facilitated the insertion of a pry bar to force open the door.
b. The rear floodlights were burned out or missing. Operational floodlights would illuminate the rear entry,
forcing potential criminals to operate in an illuminated area rather than in darkness.
c. A security camera was present and functional, but not serviced (taping medium was full); therefore,
the security cameras were rendered useless. Interviews revealed that the camera has not been used
during the assignment of any current Soldier or Civilian.
d. The gate at the rear entrance to the warehouse area was not properly secured, and security checks
on that area were not conducted.
4. The point of contact for additional information is the undersigned, at [telephone number] or [e-mail address].
John Q. Agent
Special Agent in Charge
Mission
The mission of the PIO team is to describe the effects of crime environments, criminal threats, and
police and detention organizations to assist efforts to prevent, monitor, and reduce crime, criminal activity,
disorder, and fear of crime amongst relevant populations. The PIO team provides criminal and crime analysis,
production, and dissemination capability to the military police company commander to support situational
awareness, support protection efforts, and shape crime and criminal environments through effective and
efficient police prevention and response efforts. This support also enables military police commanders to—
Assist commanders and provost marshals in preventing, investigating, and reducing crime within
formations, on bases and base camps, and across an area of operation.
Enhance commander crime prevention and protection programs and efforts.
Feed the Army operations process and its integrating activities with timely, relevant, and accurate
police information and intelligence related to crime, criminal activity, disorder, and fear of crime
amongst relevant populations.
Figure C-1. Example of a police intelligence operations team organization and tasks
Legend:
ECTA economic crime threat assessment OE operational environment
LSTA logistics security threat assessment OIC officer in charge
MP military police PIO police intelligence operations
NCOIC noncommissioned officer in charge
Figure C-1. Example of police intelligence operations team organization and tasks (continued)
Training
Training a PIO team begins with the certification of basic criminal and crime analysis skills by
attending the Crime and Criminal Intelligence Analyst course administered by USAMPS. This initial training
provides police intelligence analysts with the foundational skills upon which to build analytical capability
and knowledge of crime and criminality. (See chapter 1 for greater details on selecting and training police
intelligence analysts.)
Products
At the company level, there are several immediate and relevant products for which the PIO team may
be responsible for producing or disseminating. These products may include—
Mission trackers, AO maps, graphical overlays, significant activity trackers, and other relevant
operational trackers.
Criminal intelligence product displays (high value target lists, BOLOs, link diagrams, time-event
charts, commodity flow charts).
Crime analysis product displays (crime or incident maps, POLICE assessments, geospatial
analysis products, spatial-temporal analysis, histograms and heat matrices).
In addition to generating these products, the PIO team must visually display and update these products
to support situational awareness and contribute to the commander’s common operational picture.
Figure C-2 provides an example PIO team product display that depicts some techniques that units have
adopted to facilitate common understanding. See chapter 4 and appendix B for additional police intelligence
products and examples of what the PIO team can generate and display as part of the common operational
picture.
Figure C-2. Potential products for police intelligence operations team displays
Legend:
BOLO be-on-the-lookout IPB intelligence preparation of the
CCIR commander’s critical information battlefield
requirement PIR priority intelligence
HVT high value target requirement
SIGACTS significant activities
Figure C-2. Potential products for police intelligence operations team displays (continued)
Integration
The military police company does not have formal staffs with functional and integrating cells.
Integration of intelligence and operations processes at the company level is the responsibility of the
commander. While battalion and higher echelons follow deliberate planning processes, military police at the
company level and below follow the troop leading procedures. In time-constrained and highly dynamic
tactical situations, the commander must seek to rapidly and seamlessly integrate the efforts of company
operations personnel and the PIO team. Figure C-3 demonstrates the integration of military police operations
and police intelligence at the company level with PIO team support.
Figure C-3. Integration of police intelligence operations and military police operations
based on local circumstances and the crime situation; however, some factors that military police commanders
and staffs may consider include—
Training, certifying, and developing police intelligence analysts (Military Occupational Specialty
31 series) by their attendance at the USAMPS Crime and Criminal Intelligence Analysis Course
and by unit-based professional development.
Creating PIO fusion cells by integrating military intelligence personnel, police intelligence
analysts, and military police operational personnel.
Establishing police intelligence networks with supported maneuver units and intelligence staffs to
maintain situational awareness of threats and share police information and police intelligence, as
authorized.
Establishing police intelligence networks with local, state, and federal law enforcement and
community agencies to share police information and police intelligence, as authorized.
Leveraging battalion PIO capabilities to support situational understanding and influence military
police operations performed on installations (law enforcement, criminal investigations,
antiterrorism and physical security measure implementation).
Leveraging battalion PIO capabilities to support situational understanding and influence military
police operations performed in support of decisive action (physical security, base defense, critical
site security, logistics security, area security).
Military police Criminal Investigation Division battalions and groups focus more exclusively than
other military police units on investigating serious crimes and organized criminal activity. Because of this
investigative focus, USACIDC organizations often possess more robust PIO capabilities and focus the
majority of those PIO capabilities on developing criminal intelligence. In addition to providing organic
criminal investigative analysts, USACIDC also bears responsibility for providing advanced technical
capabilities to produce unique investigative or police intelligence products. These specialty areas include the
Defense Forensic Science Center (and its deployable forensic expeditionary teams) and the 701st Criminal
Investigation Division Group, which provides unique investigative capabilities focused on investigating and
generating reports on technical areas such as computer crimes, financial crimes, and major procurement
fraud. The contributions of military police Criminal Investigation Division battalions and groups and their
unique technical reachback capabilities allow USACIDC organizations to provide police information and
police intelligence to supported organizations (when authorized) from the tactical through the strategic levels
of warfare.
maneuver formations and long-range fires capability), PIO provides additional capabilities that focus on
criminal and irregular threats. Inattention to irregular threats operating in the support area may cause early
culmination due to disrupted lines of communication or it may limit the reach and endurance of maneuver
forces due to the requirement of additional forces to secure the support area. As large-scale ground combat
concludes and the security situation stabilizes, brigade combat teams begin to conduct stability tasks to
consolidate gains. Unaddressed criminal and irregular threats can threaten long-term success by generating
disorder, instability, and a sense of distrust and fear in the population that makes consolidation of gains more
difficult.
PIO provides commanders with capabilities that complement military intelligence while maintaining
a deliberate focus and attention on criminal and irregular threats throughout all phases of a joint operation.
As commanders require the attention of military intelligence to focus on the most capable threats, military
police can fulfill an economy of force role by continuing to collect information on crimes, criminal networks,
and police and corrections organizations that will eventually be responsible for stability and order in the
consolidation area. This complementary capability allows the commander to maintain primary focus on near-
term, highly capable threats while also shaping the environment for long-term success by maintaining
situational awareness of potential threats to civil security and civil order following large-scale ground combat.
The most immediate venue for PIO support that complements military intelligence is the provost
marshal staff organic to the brigade combat team, who focuses on crime, criminal activity, and HN police
and corrections organizations capable of countering criminal and irregular threats. The provost marshal
provides technical oversight and advises the commander regarding military police operations and
capabilities. (See FM 3-96 for details of provost marshal responsibilities and capabilities within brigade
combat teams.) Provost marshal sections are limited by not having dedicated police intelligence analysts
assigned; however, they possess the capability to organize and train the ad hoc police intelligence analytical
capability by attending the Crime and Criminal Intelligence Analyst course and by training organic personnel
to perform PIO tasks. Due to the manning constraints with the provost marshal section, this analytical
capability will remain significantly limited and will remain limited in the ability to employ or task military
police collection assets. To augment this constraint, brigade combat teams may be supported by a military
police company that can perform information collection tasks focused on crime, criminal activities, and
police or correction organizations.
Brigade combat teams are typically supported by a military police company based on the mission and
required military police capabilities. (See FM 3-39 for additional information on military police organization;
capabilities; and recommended force tailoring, task organization, and employment considerations.) When
military police companies are task-organized to support a brigade combat team, they bring with them the
ability to collect information during the conduct of military police operations among populations and often
provide PIO capabilities in the form of a PIO team that may complement military intelligence sources of
information. Military police companies provide police information and police intelligence focused on crime,
criminal threats, and HN police and corrections organizations that may be fused with other information and
intelligence to drive the operations process and influence the common operational picture.
intelligence products regarding crime trends and patterns, crime prevention support, detention statistics, and
high-profile criminal investigations. Based on the operational environment, some of the organizations and
support that the provost marshal may leverage to support the commander’s overall situational understanding
include the following, based on the operational environment:
Supporting installation provost marshal/police station. At home station, corps and divisions
are supported by the installation’s Directorate of Emergency Services infrastructure that typically
includes an installation provost marshal and/or police station. While the division occupies its home
station and/or operates from its home station command post, the supporting police station may
support the division or corps provost marshal’s efforts to generate police intelligence to improve
the commander’s situational awareness of criminal threats and influence the decision-making
processes aimed at protecting forces, assets, and readiness from the negative impacts of crime
(crime within formations disrupting good order and discipline and undermining unit readiness).
Supporting military police organizations. While the division and corps do not have organic
military police organizations, they are often supported by military police battalions and brigades
at home station and in overseas operational areas. Military police battalions (including detention
battalions) and brigades designated in a command or support relationship with the division or
corps leverage their PIO capabilities in coordination with the provost marshal to support the
commander’s situational awareness of crime within friendly formations and integrate police
intelligence (as authorized) with the supported unit’s operations process through the integrating
processes.
Supporting criminal investigation division organizations. USACIDC organizations maintain a
more direct and insulated command structure reporting through internal USACIDC channels
directly to USACIDC to ensure independent investigative authority. USACIDC elements that are
co-located with divisions and corps can provide police intelligence products that support the
commander’s internal judicial processes and leverage formal criminal intelligence programs to
provide understanding of organized criminal elements that threaten the commander’s personnel,
facilities, and operational readiness.
Fusing police intelligence with information and intelligence to influence theater-level force
protection planning and decision making.
Contributing to geographic combatant commander force tailoring decision making to ensure that
military police capabilities to counter crime and criminal threats are incorporated into operational
planning and requests for forces.
Coordinating and synchronizing the employment and contributions of PIO across assigned,
attached, or supporting military police forces (including military police, detention, and USACIDC
organizations).
Leveraging capabilities from strategic resources (such as the Defense Forensic Science Center) to
provide expeditionary forensic analysis capabilities in theater or to coordinate for reachback
forensics support.
Participating in boards, working groups, and cells to integrate and share relevant police
intelligence (as authorized) to enhance common understanding and awareness across the staff.
Providing briefings, updates, and police intelligence products to the commander and other relevant
stakeholders to increase situational awareness and influence decision making.
The glossary lists acronyms and terms with Army or joint definitions. Where Army and
joint definitions differ, (Army) precedes the definition. Terms for which ATP 3-39.20
is the proponent are marked with an asterisk (*).
SECTION II – TERMS
None.
REQUIRED PUBLICATIONS
These documents must be available to the intended users of this publication.
DOD Dictionary of Military and Associated Terms. February 2019.
ADP 1-02. Terms and Military Symbols. 14 August 2018.
RELATED PUBLICATIONS
These documents contain relevant supplemental information.
28 Code of Federal Regulations part 23. Criminal Intelligence Systems Operating Policies. 1998.
<[Link]
10 USC. Armed Forces. 7 January 2011. <[Link]
title10/pdf/[Link]>.
18 USC. Crimes and Criminal Procedure. 25 June 1948.
<[Link]
e&edition=prelim&granuleId=USC-prelim-title18-front>.
18 USC. 1385. Use of Army and Air Force as posse comitatus. <[Link]
/[Link]?req=(title:18 section:1385 edition:prelim) OR (granuleid:USC-prelim-title18
-section1385)&f=treesort&edition=prelim&num=0&jumpTo=true>.
22 USC. Foreign Relations and Intercourse. 2010 Edition.
<[Link]
32 USC. National Guard. 10 August 1956. <[Link]
title32/pdf/[Link]>.
50 USC. Servicemembers Civil Relief. 1 February 2010. <[Link]
granule/USCODE-2009-title50/USCODE-2009-title50-app-serviceme>.
50 USC 3003. War and National Defense. <[Link]
section:3003 edition:prelim) OR (granuleid:USC-prelim-title50
-section3003)&f=treesort&edition=prelim&num=0&jumpTo=true>.
Geneva Conventions of 12 August 1949.
<[Link]
Convention (I) for the Amelioration of the Condition of the Wounded and Sick in Armed Forces
in the Field. Geneva, 12 August 1949.
Convention (II) for the Amelioration of the Condition of Wounded, Sick and Shipwrecked
Members of Armed Forces at Sea. Geneva, 12 August 1949.
Convention (III) relative to the Treatment of Prisoners of War. Geneva, 12 August 1949.
Convention (IV) relative to the Protection of Civilian Persons in Time of War. Geneva,
12 August 1949.
Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection
of Victims of International Armed Conflict (Protocol I), 8 June 1977.
Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection
of Victims of Non-International Armed Conflicts (Protocol II), 8 June 1977.
JOINT PUBLICATIONS
Most joint publications are available online at <[Link]
JP 1-04. Legal Support to Military Operations. 2 August 2016.
JP 2-0. Joint Intelligence. 22 October 2013.
JP 2-01. Joint and National Intelligence Support to Military Operations. 5 July 2017.
JP 2-01.3. Joint Intelligence Preparation of the Operational Environment. 21 May 2014.
JP 2-03. Geospatial Intelligence in Joint Operations. 5 July 2017.
JP 3-0. Joint Operations. 17 January 2017.
JP 3-07. Stability. 3 August 2016.
JP 3-07.2. Antiterrorism. 14 March 2014.
JP 3-08. Interorganizational Cooperation. 12 October 2016.
JP 3-13.3. Operations Security. 6 January 2016.
JP 3-24. Counterinsurgency. 25 April 2018.
JP 3-25. Countering Threat Networks. 21 December 2016.
JP 3-28. Defense Support of Civil Authorities. 29 October 2018.
JP 3-30. Command and Control of Joint Air Operations. 10 February 2014.
ARMY PUBLICATIONS
Most Army publications are available online at <[Link]
ADP 2-0. Intelligence. 4 September 2018.
ADP 3-28. Defense Support of Civil Authorities. 11 February 2019.
ADP 3-37. Protection. 11 December 2018.
ADP 3-90. Offense and Defense. 13 August 2018.
ADP 5-0. The Operations Process. 17 May 2012.
ADRP 3-0. Operations. 6 October 2017.
ADRP 3-07. Stability. 31 August 2012.
ADRP 5-0. The Operations Process. 17 May 2012.
ADRP 6-0. Mission Command. 17 May 2012.
AR 10-87. Army Commands, Army Service Component Commands, and Direct Reporting Units.
11 December 2017.
AR 25-22. The Army Privacy Program. 22 December 2016.
AR 25-55. The Department of the Army Freedom of Information Act Program. 1 November 1997.
AR 27-10. Military Justice. 11 May 2016.
AR 190-13. The Army Physical Security Program. 25 February 2011.
AR 190-14. Carrying of Firearms and Use of Force for Law Enforcement and Security Duties.
12 March 1993.
AR 190-30. Military Police Investigations. 1 November 2005.
AR 190-45. Law Enforcement Reporting. 27 September 2016.
AR 190-47. The Army Corrections System. 15 June 2006.
AR 190-53. Interception of Wire and Oral Communications for Law Enforcement Purposes.
16 July 2018.
AR 190-58. Designation and Protection of High Risk Personnel. 25 February 2018.
AR 195-2. Criminal Investigation Activities. 9 June 2014.
AR 195-6. Department of the Army Polygraph Activities. 21 April 2016.
MULTI-SERVICE PUBLICATION
AR 190-5/OPNAV 11200.5D/AFI 31-218(I)/MCO 5110.1D/ DLAR 5720.1. Military Police Motor
Vehicle Traffic Supervision. 22 May 2006.
AR 190-24/OPNAVINST 1620.2A/AFI 31-213/MCO 1620.2D/COMDTINST 1620.1E. Armed Forces
Disciplinary Control Boards and Off-Installation Liaison and Operations. 27 July 2006.
ATP 2-22.85/MCRP 3-33.1J/NTTP 3-07.16/AFTTP 3-2.85/CGTTP 3-93.6. Multi-Service Tactics,
Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations.
6 May 2016.
ATP 3-90.4/MCWP 3-17.8. Combined Arms Mobility. 8 March 2016.
ATP 4-10/MCRP 4-11H/NTTP 4-09.1/AFMAN 10-409-O. Multi-Service Tactics, Techniques, and
Procedures for Operational Contract Support. 18 February 2016.
OTHER PUBLICATIONS
Carter, David L., Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law
Enforcement Agencies (2d Edition). Michigan State University. May 2009.
<[Link]
Department of Justice. National Criminal Intelligence Sharing Plan. Version 2.0. October 2013.
<[Link]
EO 12333. United States Intelligence Activities. 4 December 1981. <[Link]
-register/codification/executive-order/[Link]>.
Manual for Courts-Martial United States, 2019 Edition. Web site
<[Link]
f?ver=2019-01-11-115724-610>.
National Disclosure Policy. <[Link]
National Strategy for Information Sharing: Successes and Challenges in Improving Terrorism-Related
Information Sharing. October 2007.
<[Link]
United Nations. World Urbanization Prospects 2018. <[Link]
United States Code of Military Justice Web site <[Link]
United States Agency for International Development. Anticorruption Assessment Handbook.
<[Link] >.
WEB SITES
Army Publishing Directorate Web site. <[Link]
Department of Justice OneDOJ Web site. <[Link]
Federal Bureau of Investigations Web site. <[Link]
Justice Information Sharing Web site. <[Link]
Law Enforcement Information Sharing Initiative Web site. <[Link]
sharing>.
National Crime Information Center database Web site. <[Link]
National Information Exchange Model Web site. <[Link]
Regional Information Sharing Systems (RISS) Web site. <[Link]
U.S. Army Criminal Investigation Command Web site. <[Link]
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate Web site at
<[Link] DD forms are available on the Office of the Secretary of
Defense Web site at <[Link] >. Printed forms are available through
normal forms supply channels.
DA Form 2028. Recommended Changes to Publications and Blank Forms.
DA Form 3881. Rights Warning Procedure/Waiver Certificate.
DD Form 1408. Armed Forces Traffic Ticket.
RECOMMENDED READINGS
5 USC. 552. Freedom of Information Act. 4 July 1966. <[Link]
:5 section:552 edition:prelim) OR (granuleid:USC-prelim-title5-section552)
&f=treesort&edition=prelim&num=0&jumpTo=true>.
ADRP 1. The Army Profession. 14 June 2015.
Bureau of Justice Assistance. Intelligence-Led Policing: The New Intelligence Architecture.
September 2005. <[Link]
Center for Army Lessons Learned. Handbook Number 13-09. CoIST Company Intelligence Support
Team.18 July 2013. <[Link]
Clarke, Ronald and Eck, John. Crime Analysis for Problem Solvers in 60 Small Steps. Department of
Justice. 8 August 2005. <[Link]
Criminal Intelligence Sharing: A National Plan for Intelligence-Led Policing at the Local, State, and
Federal Levels: Recommendations from the International Association of Chiefs of Police
Intelligence Summit. August 2002. <[Link]
-W0418>.
DHS/DOJ. Global Justice Information Sharing Initiative. DHS/DOJ Fusion Process: Technical
Assistance Program and Services. 7th Edition. May 2013.
<[Link]
DOD 5240.1-R. Procedures Governing the Activities of DOD Intelligence Components that affect
United States Persons [Procedures 11-13 remain]. 7 December 1982
<[Link]
DODD 2311.01E. DOD Law of War Program. 9 May 2006.
DODM 5240.01. Procedures Governing the Conduct of DOD Intelligence Activities. 8 August 2016.
<[Link]
184834-887>.
DOJ. Global Justice Information Sharing Initiative. Findings and Recommendations of the Suspicious
Activity Report (SAR) Support and Implementation Project. October 2008.
<[Link] >.
DOJ. Global Justice Information Sharing Initiative. Fusion Center Guidelines: Developing and
Sharing Information and Intelligence in a New Era. August 2006. <[Link]
/documents/fusion_center_executive_summary.pdf>.
DOJ. Global Justice Information Sharing Initiative. Law Enforcement Analytic Standards. 1 May 2012.
<[Link]
DOJ. Global Justice Information Sharing Initiative. Minimum Criminal Intelligence Training
Standards for Law Enforcement and Other Criminal Justice Agencies in the United States:
Findings and Recommendations. October 2007. <[Link]
-Criminal-Intelligence-Training-Standards>.
DOJ. Global Justice Information Sharing Initiative. Privacy and Civil Liberties Policy Development
Guide and Implementation Templates Overview. February 2008.
<[Link]
Felson, Marcus and Eckert, Mary. Crime and Everyday Life (5th Edition). 2016.
FM 3-0. Operations. 6 October 2017.
FM 7-0. Train to Win in a Complex World. 5 October 2016.
Gottlieb, Steven. Crime Analysis: From First Report to Final Arrest. 1994.
Lersch, Kim M. Space, Time, and Crime (2d Edition). 2007.
The National Security Act of 1947. <[Link]
act>.
STANAG 2226 (ATP – 3.7.2). NATO Military Police Guidance and Procedures.
STANAG 2296 (AJP [Link]). Allied Joint Doctrine for Military Police.
Weisburd, David. Place Matters-Criminology for the Twenty-First Century. April 2016.
MARK A. MILLEY
General, United States Army
Chief of Staff
Official:
KATHLEEN S. MILLER
Administrative Assistant
to the Secretary of the Army
1912680
DISTRIBUTION:
Distributed in electronic media only (EMO).
PIN: 105125-000









