EXERCISE-EXERCISE-EXERCISE Annex B to ADAZI KNIGHT

advertisement
EXERCISE-EXERCISE-EXERCISE
Annex B
to ADAZI KNIGHT OPORD 01
Time Zone Used Throughout: BRAVO
1. SITUATION.
a. Enemy forces.
(1) Anti-Afghanistan Forces (AAF) continues to pose the most significant threat to
TF ADAZI KNIGHTS mission accomplishment in ADAZI Province (AP). The AAF
consists of Taliban (TB), Al Qaeda (AQ), and Criminal Elements (CE). AAF conduct
operations in the AP to influence the populace by discrediting the ISAF’s continued
presence and destabilizing the Government of the Islamic Republic of Afghanistan
(GIRoA) through propaganda, intimidation, coercion, and armed conflict. Decisive to
AAF operations is the ability to conduct ambushes in isolated areas that may be
supported by Improvised Explosive Device (IED) and Indirect Fire (IDF). Significant to
this operation is the AAF’s ability to successfully exert their influence throughout AP and
to disrupt ISAF and Afganistan National Security Forces (ANSF) operations using a
variety of attacks. All AAF groups are instilled with Islamic extremist ideologies and
cooperate with each other in varying ways to achieve the shared objective of forcing
foreign military presence out of AP and destroying the current Government of the
Islamic Republic of Afghanistan local authorities in province. The objective is to replace
it with a government based on Sharia law.
(a) TB. TB will attempt to disrupt operations by using Small Arms Fire (SAF),
Rocket Propelled Grenades (RPG), IDF, and IED attacks. TB may mass forces and
conduct sustained engagements with reinforcements, as warranted by the tactical
situation.
(b) AQ. AQ will conduct complex attacks, IED combined with mortar attacks,
Vehicle Borne Improvised Explosive Devices (VBIED) attacks, and suicide attacks
throughout the AP to attrite ISAF and ANSF and use real or spurious reports of these
attacks in their Information Operations (IO) campaign. The AQ will engage directly only
when they have superior numbers.
(c) CE. CE will attempt to deny ISAF influence on criminal operations. The CE
will employ illegal Traffic Control Points (TCP), SAF attacks, and IEDs. The CE will
conduct standoff attacks and ambushes against targets of opportunity within their
operational area to build prestige and influence within the community.
(2) Due to the economic state of the country, heavy criminal activity occurs
throughout AP. This sometimes is done by civilians attempting to gain money to
support their families and clans. Criminal activity closely tied to the AAF includes
narcotics and weapons trafficking.
b. Friendly forces. Refer to OPORD 01.
2. MISSION. Refer to OPORD 01.
3. EXECUTION.
a. TF ADAZI KNIGHTS continues to organize available intelligence assets based
on mission, concept of operation, threat to forces, and terrain. According to current
TASKORG intelligence in the AOR of TF ADAZI KNIGHTS is gathered by maneuver
COYs and assets provided MNTF. These assets are supplemented by pull-down from
coalition assets. Additional assets may be provided to support subordinate unit’s
missions as required which include Unmanned Aerial System (UAS), Human
Intelligence Collection Teams, and Signals Intelligence (SIGINT) assets either attached
or in General Support.
EXERCISE-EXERCISE-EXERCISE
1-3
EXERCISE-EXERCISE-EXERCISE
b. Tasks to subordinate units. All units.
(1) Specific Intelligence Requariments according to ICP (appendix 1 to Annex B)
(2) Supportt CI screening of Locally Employed Persons (LEPs) as required.
(3) Submit SPOT reports as necessary using the SALUTE (Size / Activity /
Location / Unit / Time / Equipment) Format.
(4) Assist the S2 and S3 in maintaining a current population and infrastructure
status overlay and other population related intelligence products by providing changes
and updates when noted.
(5) Review HUMINT linkage diagrams and association matrices daily, submit
recommended changes and updates as required to TF ADAZI KNIGHTS S2.
c. Coordinating instructions.
(1) Commander’s Critical Information Requirements (CCIR). All personnel and
units report the following data:
(a) Priority Intelligence Requirements (PIR). Refer to OPORD 01.
(b) Friendly Forces Information Requirements (FFIR). Refer to OPORD 01.
(c) Essential Elements Of Friendly Information (EEFI). Refer to OPORD 01
(2) Measures for handling detainees, documents, and materiel.
(a) Detained persons. Unit within 12 h mast report any detained persons
to the TF S2, giving the name of person, location where he / she was detained and
describing the reasons for detention. All detained persons after initial questioning should
be transferred to local Afghanistan National Security Forces.
(b) Captured Documents and Media. Documents and media captured with
personnel will be secured and transferred to the TF S2. They should be clearly marked
as to the location and circumstances surrounding their capture and any associated
detainees by name. Units may exploit for immediate intelligence value if this does not
result in an inordinate delay in evacuation.
(c) Captured Materiel.
1 Captured weapons will be secured and evaluated for use by the ANSF.
Trophies are not allowed.
2 Large items of equipment (such as vehicles) will be secured and
evacuated as resources and time allow. In most cases they should be turned over to
ANSF to facilitate their operations. They will be destroyed only if necessary.
EXERCISE-EXERCISE-EXERCISE
2-3
EXERCISE-EXERCISE-EXERCISE
3 Items of possible intelligence exploitation (such as improvised rocket
launchers) will be documented with digital cameras, secured, and reported to the S2 for
potential exploitation.
4 Captured computers, communications equipment, and associated items
will be evacuated as soon as possble to the TF ADAZI KNIGHTS S2. Do not tamper
with electronic systems, regardless of the position they are found in (on or off).
Evacuate them as they are found to facilitate exploitation. The same holds true for
laptops. If the laptop is on, close the screen and evacuate to higher (allowing it to go
into sleep mode). Turning the system on or off could hinder technical exploitation. If
desktops are found in the "On" position, notify TF ADAZI KNIGHTS S2 to determine if
they want to send a technical team for exploitation. Otherwise, desktops should be
powered down prior to evacuation.
5 Captured narcotics stockpiles and production facilities will be secured,
contents documented, and destroyed on site.
d. Distribution of intelligence products.
(1) All units attached to the TF ADAZI KNIGHTS will submit reports to TF
ADAZI KNIGHTS S2 according to reporting matrix.
(2) TF ADAZI KNIGHTS will disseminate INTSUMS to all attached
according to reporting matrix.
(3) Additional INTSUMS and other reports may be required and will be
updated via orders and FRAGOs.
(a) Maps: S2 will identify required coverage and coordinate with National
Geospatial-Intelligence Agency (NGA) to rectify shortfalls or coordinate for specialized
products. S2/S3 will provide a list of required coverage to the subordinate units. Units
will order maps through their normal supply channels.
(b) Imagery Products: S2 will provide units with a baseline imagery
database via the target folder. S2 will post additional imagery to TF ADAZI KNIGHTS
elements when it becomes available. Other imagery and terrain products can be
distributed on CD via courier or through coordination between the S2 and subordinate
terrain teams.
4. SERVICE SUPPORT. Refer to OPORD 01.
5. COMMAND and CONTROL. Refer to OPORD 01.
APPENDICES:
1 – Intelligence Collection Plan
2. – Intelligence Estimate.
EXERCISE-EXERCISE-EXERCISE
3-3
EXERCISE-EXERCISE-EXERCISE
EXERCISE-EXERCISE-EXERCISE
4-3
Download