FM 34-130/MCRP 2-12A CHAPTER 1 INTRODUCTION TO IPB If I always appear prepared, it is because before entering on an undertaking, I have meditated for long and foreseen what may occur. - Napoleon Bonaparte, 1821 Historically, throughout the spectrum of operations IPB has been a process interwoven into all levels of military decision making and planning (Figure 1-1). The process itself involves thought, knowledge of the enemy, and a certain amount of visual techniques to create and communicate the necessary information to the commander regarding the battlefield and the unit’s mission within the integrated battlespace. STABILITY OPERATIONS 1990-1 Saudi Desert Shield/Storm 1991-? Kuwait Southern Watch 1991-? Iraq Provide Comfort - Show of Force 1992-4 Somalia Restore Hope - Arms Control 1992 Hurricane Andrew Panama 1989-90 1993 U.S. Midwest Floods Lebanon 1983 - Noncombatant Operation 1994 Western U.S. Fires Grenada 1983 1994 Rwanda Support Hope - Nation Assistance Sinai MFO 1982 - ? 1994-? Haiti - Support to Counterinsurgencies Detroit/Chicago 1994-5 Panama Safe Haven 1967 - Combating Terrorism Dominican Republic 1997 Bosnia 1966 - Civil Disturbance 1998-9 Desert Fox Vietnam War 1965-75 1999 Kosovo Joint Guardian - Counterdrug Operations - Peace Operations - Support to Insurgencies SUPPORT OPERATIONS - Humanitarian Operations Future Operations Korean War 1950-53 World War II 1941-45 Range of Military Operations FF O O R RC C E E World War I XXI - Environmental Operations Army 2010 and beyond Figure 1-1. Range of military operations. WHAT IS IPB? IPB is a systematic continuous process to analyzing the weather, terrain, and threat in a specific geographic area for all types of operations. IPB integrates threat doctrine with the weather and terrain as they relate to the mission within a specific battlefield environment. This is done to determine and evaluate threat capabilities, vulnerabilities, and probable courses of action (COAs). This analytical process builds an extensive database for each potential area in which a unit may be required to operate to determine the impact of the threat, environment, and terrain on operations and ultimately presents it in a graphic format. 1-1 FM 34-130/MCRP 2-12A IPB PROCESS The IPB process consists of four steps: STEP STEP STEP STEP 1: 2: 3: 4: Define the battlefield environment. Describe the battlefield’s effects. Evaluate the threat. Determine threat COAs. A particular battlefield may have unique boundaries but regardless of the operation the analysis process is the same. The commander’s initial input into the IPB process is directly proportional to success on the battlefield (Figure 1-2). By providing the commander’s intent and guidance early on into the process, the G2/S2 directs the intelligence cycle allowing the staff to focus on what’s important to the mission. Each staff element and each echelon conducts IPB for its specific functional area. The IPB process helps the commander maximize the unit’s combat power at critical points in time, space, and resources to shape the battlefield by – Determining the threat’s likely COA. Describing the environment your unit is operating within and the effects of the environment on your unit. IPB Initial IPB MDMP RECEIPT OF MISSION Completed Mission Brief to Commander MISSION ANALYSIS Update IPB Products Completed IPB Products Brought to the Wargame COA DEVELOPMENT COA ANALYSIS (WARGAME) Cdr’s initial guidance Warning order 1 Initial IPB products Restated mission Cdr’s Intent & Guidance Warning order 2 Staff products Battlefield framework Preliminary movement COA stmts and sketches Wargame results Task organization Mission to subordinate units CCIR Decision matrix COA COMPARISON Refined IPB Completed Continuous IPB COA APPROVAL ORDERS PRODUCTION Approved COA Refined Cdr’s Intent Specified type of order Specified type of rehearsal HPTL OPLAN/OPORD DENOTES: CDR’s Input 1-2 FM 34-130/MCRP 2-12A Figure 1-2. IPB embedded into the Mititary Decision Making Process (MDMP). The IPB process is continuous. IPB is conducted prior to and during the command’s initial planning for an operation. The analyst continues to perform and refine the IPB products throughout the MDMP. This ensures that – The products of IPB remain complete and valid and create the correct vision for the commander. IPB is the primary means by which the commander develops that vision in mind of how an operation will unfold and how the threat will be depicted throughout the operation. The initial IPB process must be completed before the mission analysis brief to the commander in the MDMP, prior to developing the friendly COA and the development of the staff estimate. This ensures the effective visualization and communication tools necessary to inform the commander. A brief overview of each step of the IPB process follows: STEP 1: DEFINE THE BATTLEFIELD ENVIRONMENT Establishes the limits of the area of operation (AO). Establishes the limits of the area of interest (AOI). Identifies those characteristics of the battlefield that will influence friendly and threat operations. Identifies gaps in current intelligence holdings and information. To focus the remainder of the IPB process, the G2/S2 identifies those battlefield characteristics requiring in-depth evaluation. This may include terrain, weather, logistical infrastructure, demographics, and visualizing the operation in the integrated battlespace of an operation (See Figure 1-3). Generally, the command’s AO is a geographical area assigned to the commander’s responsibility whereas the AOI is usually larger. The AOI includes any threat or characteristics of the battlefield environment that significantly influences the mission of the Maneuver & Fires Traditional Intel Logistics National Nontraditional 1-3 FM 34-130/MCRP 2-12A command. This enables the G2/S2 to focus the IPB effort on a specific area within the operation. Battlespace encompasses the surface, subsurface, endoatmospheric, and exatmospheric spheres of a particular geographic area. It also includes the electromagnetic spectrum, cyberspace, and human psychological aspects of military operations. The dimension of the command’s battlespace is dictated by the mission and the capabilities of any potential threat throughout the operation. Defining the significant characteristics of the battlefield environment also aids in identifying gaps in current intelligence holdings and the specific intelligence required to fill them. Similarly, the G2/S2 identifies gaps in the command's knowledge of the threat and analyzed current threat situation. Once approved by the commander, the specific intelligence required to fill gaps in the command's knowledge of the battlefield environment and threat situation becomes the command's initial intelligence requirements (Figure 1-4). CCIR Information required by the commander that directly affects his decisions and dictates the successful execution of operational or tactical operations. PIR Intelligence requirements that a commander has anticipated and stated priority in the task planning and decision making. EEFI Critical aspects of a friendly operation that, if known by the enemy, would subsequently compromise, lead to failure, or limit success of the operation, and therefore must be protected from enemy detection. FFIR Information the commander and staff need about the friendly forces available for the operation. INFORMATION REQUIRED TO ANSWER CCIR DATA IR Information regarding the enemy and the environment that needs to be collected and processed in order to meet the intelligence requirements of the commander. COLLECTION REQUIREMENTS ISR Plan /Collection Plan of threat information tasked Gathering by: - Specific Intelligence Requirements (SIR) - Specific Orders and Requests (SOR) Gathering of Information regarding threat collection capabilities/ assets to include: - Threat’s IMINT, ELINT, SIGINT, HUMINT, MASINT capabilities and locations. - Threat’s Force Protection & Information Operations Capabilities 1-4 Priority for EEFI INFORMATION Information regarding the threat’s detection collection efforts in order to protect the friendly forces critical aspects of the operation. Tasked for EEFI Information collected and compiled by the staff to provide the commander with current readiness status regarding the friendly force operational data. Unit Status Readiness Information the commander needs to know to protect the friendly force. - Equipment Status - Personnel Status - Logistical Status - Experience and Leadership - Weapon Systems Status FM 34-130/MCRP 2-12A Figure 1-4. Commander’s critical information requirements. As the commander visualizes the operations, one develops the commander's critical intelligence requirements (CCIR) by considering the following questions: What decisions do I need to make? What information about the enemy, terrain, and situation do I need to know to make those decisions? What friendly information must I conceal from the enemy? When, during the operation, do I need this information to support my anticipated decisions? friendly This series of questions then generates the sub-elements of the CCIR: PIR, EEFI and FFRI with related information requirements (IR). Eventually being combined into the information collection requirements tasked out to assets available within the command. STEP 2: DESCRIBE THE BATTLEFIELD’S EFFECTS Step 2 evaluates the effects of weather and terrain for both the friendly and threat environmental conditions. The G2/S2 identifies the limitations and opportunities the Weather Data - Forecasts, Visibility, Illumination, TDAs, IWEDA products…etc. environment offers to Terrain Topographic Products - Terrabase II, DTED, Elevation, Slope, Soils Data. mission planning, Lines of Communication Overlay - Roads, Railroads, Airfields, Related Infrastructures. equipment capabilities, Specialty Products - Population Overlays, Urban City Plans, Imagery & Spectral Products. and maneuver potential for ground assets. This evaluation focuses on the general capabilities for each force until COAs are developed in later steps of the IPB process. This assessment of the environment always includes an analysis of the weather and terrain but can include discussions of the characteristics of detailed geography, demographics, urban city plans, or computer information infrastructure and their effects on friendly and threat operations. Characteristics of geography include general characteristics of the terrain and weather, as well as such factors as politics, civilian press, local population, and demographics. An area's infrastructure consists of the facilities, equipment, and framework needed for the functioning of systems, cities, or regions. Products developed in this step might include, but are not limited to— Population status overlays. Overlays terrain. that depict the military aspects and effects of 1-5 FM 34-130/MCRP 2-12A Weather analysis matrices. Integrated products such as modified combined obstacle overlays (MCOOs). Information Infrastructure templates. Regardless of the subject or means of presentation, the G2/S2 ensures the product’s focus on the effects of the battlefield environment. STEP 3: EVALUATE THE THREAT In step 3, the G2/S2 must identify the threat by evaluating the command's intelligence holdings (i.e., country studies, contingency plans, intelligence readiness files) to determine how the threat normally organizes for combat and conducts operations under similar circumstances. Identifying the intelligence gaps in the available threat holdings allows the time to develop requests for information (RFI) from higher headquarters to include the national agencies. Identification of the threat’s capabilities becomes apparent and the analysis of the broad COAs are discerned by understanding the environment, terrain, and then the patterns of behavior the threat may use as possible COAs to achieve their objectives and intent on the battlefield. The G2/S2's evaluation is portrayed in the creation of threat models which are graphic depictions and narratives that include doctrinal templates, the threat’s Description: • Movement begins as early as 1.5 hours after order. • Movement along previously rehearsed routes. PREFERRED TACTICS, OPTIONS, Failu AND PECULIARITIES • Fix friendly forces for counterattack by reserve of higher HQ. EXAMPLE (DEFENSE): Description of Preferred Tactics, Options, and Peculiarities. DESCRIPTION • Defense in two echelons with a reserve. • Local counterattacks to restore defensive positions. • Tank Battalion counterattacks if defense is compromised. • Detailed and coordinated fire support plan supporting defense and counterattack. • They prefer obstacle systems (usually minefields) that turn enemy forces into their engagement areas. They seldom employ fixing, blocking, or disrupting obstacles. Peculiarities: DOCTRINAL TEMPLATES • Limited to 24 hour sustained operations due to lack of fuel. De sc riptio n : • Mov e me nt b eg ins as e arly as 1 .5 h ou rs a fter o rd er. • Mov e me nt a lo n g p re vio us ly re he ars ed rou te s. • Lea d e lem en ts an d su pp o rting d efe ns es f ix frie nd ly fo rc es w ith fire s. • Main bo d y se ek s fla nk s o f frien d ly fo rce s. XXXXXXXX XXXX F ailu re O ptio n s: IDENTIFICATION OF TYPE HVT’S • F ix frie nd ly fo rc es fo r co u nte ratta ck b y re se rve of h ig he r HQ. P ec u li a rities : • Limite d to 2 4 ho u r su stain ed o pe ratio n s du e to lac k o f fu el. XX XXXX XX XX XX XX XXXX XX XXXXXXXXXX XXXX XX XXX XX XX XX XXXX XXXX XX XX FAILURE OPTIONS • Local counterattacks. • Counterattack by division reserve. • Withdraw. PECULIARITIES • Critical shortages of tank ammunition. • Defenses weak due to lack of engineer spt. Description: • Movement begins as early as 1.5 hours after order. DOCTRINAL TEMPLATES • Organization • Equipment • Battle Positions • Supporting Elements • Echelons • Frontages • Depths • Boundaries • Engagement Areas • Objective Depths • Control Measures • Any Graphic Depiction XXXX 1-6 D I S R U P T D E L A Y L I M I T X X X X X X RELATIVE WORTH TARGET SET C Command centers coordinate move and commitment of reserves. Central FS centers nearby. 3 LOC allow rapid move of reserves and continued resupply. FS MANEUVER Reserve units critical to success of defense. ADA ENGINEER X X RISTA FS masses fires to assist defense and commitment of reserves. REC NUC/CHEMICAL X X Acquire deep targets to disrupt friendly attack. BULK FUELS AMMO MAINT X Stockpiles vulnerable, important for continued anti-armor and FS fires. LIFT/LOC XXXXXXXX XXXX XXXXXXXX XXXXX XXXX XXXXXXXXXX XXXX FM 34-130/MCRP 2-12A preferred tactics, options and peculiarities, and identification of HVTs as shown in Figure 1-5: Figure 1-5. Portions of the threat model. When facing a well-known threat, the G2/S2 relies on databases and threat models readily available. The G2/S2 will use updated information to keep the databases current. It is also entirely possible that one may have to create new threat models by combining doctrinal templates, threat tactics, and available options within the operation. The G2/S2 must take into account the threat's many options by identifying all possible branches and sequels and peculiarities of a specific threat’s behavior into this IPB product termed the threat model. While this detailed analysis is being developed, a direct outcome of this process is the identification of the threat’s high value targets (HVTs). This enables the friendly to begin identifying their assets to target the threat's vulnerabilities and HVTs along with building some broad COAs to consider as threat plans of attack/defend alternatives. There is also the realistic nature of the current threat dilemmas that the G2/S2 may know very little regarding a certain threat. The motives, intentions and agenda may be unpredictable if analyzing a new terrorist faction or key leader whose profile is immature and has no identifiable history of behavior characteristics. Another obstacle to threat determination are the technological threats that are so diverse in options and sophistication. Assuming a database will be available for all threat’s capabilities become inherently impossible when considering the asymmetric and asynchronous types of delivery means and diversification of the threat agendas. *Asymmetric Threat: A threat that uses dissimilar weapons or force (e.g. WMD, small-scale attacks, information attack) to offset a superior military force and technological advantage. *Asynchronous Threat: A threat that doesn’t require the orchestration of timing or simultaneous use of its capabilities to achieve a desired effect. Therefore causing haphazard attacks that result more on circumstance and personality rather then by a well designed operation. (e.g. A terrorist faction that is structured by separate cells branched off for anonymity purposes acting independently of a primary leader of the faction.) (*The above definitions are not yet approved as official doctrine until the final ID THREAT OBJECTIVES draft of FM 34-130) ID FULL SET OF THREAT COAs STEP 4: DETERMINE THREAT COAs *REVERSE IPB* ENEMY PERCEPTION OF FRIENDLY SITUATION Step 4 integrates the IPB products of the previous steps into conclusions that EVALUATE/PRIORITIZE ENEMYCOAs DEVELOP EACH COA WITHIN TIME LIMITS ? ? ? ? ? ? IDENTIFY INITIAL COLLECTION REQUIREMENTS 1-7 FM 34-130/MCRP 2-12A formulate possible COAs. The G2/S2 develops threat COA models depicting the threat's potential COAs. (See Figure 1-6.) Additional IPB products during the final step involve the preparation of event templates, situation templates, and specialized matrices that focus intelligence requirements and collection requirements on identifying the most likely COA the threat will use to meet their objectives on the battlefield. Figure 1-6. Sequence of determining threat. The threat COA models developed in step 4 are the products taken into the MDMP of COA analysis and the wargame process which help develop the planning phase of an operation for the unit. Once the friendly COAs are war gamed separately against each possible threat COA, the commander is briefed on the COAs which meet the requirements of the commander’s guidance and intent of the operation that were successful in the wargame process. (See Figure 1-7.) STEP 1 PRODUCTS REQUIRED MAPS DEFINE THE BATTLEFIELD ENVIRONMENT - Significant characteristics of the environment - Establish the limits of the AO and AOI - Evaluate existing databases and identify intelligence gaps - Collect required materials STEP 2 DESCRIBE THE BATTLEFIELD EFFECTS MCOO TERRAIN PRODUCTS - Analyze the battlefield environment - Terrain analysis (OCOKA) - Weather Analysis (5 aspects) - Describe the battlefield effects on the threat and friendly capabilities - Demographics, politics, legal issues …etc. GEOGRAPHY POPULATION SOCIECONOMIC FACTORS TRANSPORTATION ROE TELECOMMUNICATIONS OBSERVATION & FIELDS OF FIRE COVER & CONCEALMENT OBSTACLES KEY TERRAIN AVENUES OF APPROACH VISIBILITY, WINDS PRECIPITATION CLOUD COVER, HUMIDITY TEMPERATURE STEP 3 EVALUATE THE THREAT DOCTRINAL TEMPLATES - Convert threat doctrine into doctrinal template - Describe the threat’s tactics, options and peculiarities - Identify threat capabilities - Identify high-value targets MANEUVER FIRES NBC (WMD) M/S ADA AIR THREAT C2 LOGISTICS EW RECON SECURITY LEADERSHIP MORALE AIR ASSAULT INFILTRATION REINFORCEMENT UNCONVENTIONAL TACTICS STEP 4 DETERMINE THREAT COURSES OF ACTION SITEMPs EVENT TEMPLATE INTEL REQMTS HVT LIST - Identify the threat’s likely objective Identify a full set of COAs available Evaluate and prioritize each COA Develop each COA in detail Identify collection requirements Figure 1-7. 1-8 ENEMY COA CONSISTS OF: SITEMP which portrays all enemy capabilities DESCRIPTION OF TACTICS AND OPTIONS HIGH-VALUE TARGET LIST Key components of IPB. FM 34-130/MCRP 2-12A The entire staff depends on the G2/S2 to use all the IPB products and analysis tools acquired to portray the threat in the decision making and targeting processes. COAs are compared until the commander approves the friendly COA to meet objectives versus the most likely threat COA. The G2/S2 cannot produce these models, effectively predicting the threat COAs, unless he has— Adequately analyzed the friendly mission throughout the time duration of the operation; identified the physical limits of the AO and AOI; and identified every characteristic of the battlefield environment that might affect the operation (step 1). Identified the opportunities and constraints the battlefield environment offers to threat and friendly forces (step 2). Thoroughly considered the threat capabilities and preferred COA in like situations if all conditions best suited the threat in an unconstrained battlefield environment, using “reverse IPB” to best understand the threat (step 3). In short, the G2/S2 provides the commander with the best visualization of the threat’s capabilities by developing threat COA models that drive the MDMP. These models are valid only if the G2/S2 establishes a good foundation of analysis during the first three steps of the IPB process. HOW IPB INTERELATES TO THE SIX INTELLIGENCE TASKS There are six intelligence tasks that generate products that ultimately synchronize the intelligence efforts in assisting the commander to visualize the battlefield and aid in the MDMP. These six tasks are thought of as the mission-essential task list (METL) for intelligence: provide indications and warning (I&W), perform IPB, perform situation development, perform target development, support force protection, and perform battle damage assessment (BDA). Figure 1-8 illustrates how the G2/S2 tailors intelligence INTELLIGENCE TASKS I&W COMMANDER’s FOCUS Orient on contingencies readiness? COMMANDER’ s DECISIONS Increase intelligence Implement OPLAN? Plan a mission Which COA will I implement? Where is my main effort? Execute and Manage a Plan Are these threat actions expected? Is a FRAGO required now? Target Development Destroy/Suppress/ Neutralize Targets Does destruction of this target accomplish the objective? When to execute this fire mission? Force Protection Secure the Force Enemy? Is the intent obvious to the accomplishment of the mission? BDA Reallocate Intelligence Is the fire/maneuver plan effective? Reprioritze the HVTL. IPB Situation Development 1-9 FM 34-130/MCRP 2-12A to the commander’s needs and how IPB is interrelated to the other five tasks. Figure 1-8. Illustrates how the six intelligence tasks aid the commander in decision making. WHO CONDUCTS IPB? IPB enables all the services to leverage information about the threat’s capabilities and potential centers of gravity, and determine possible COAs across all dimensions of the battlespace. IPB is a proven flexible technique used across the range of conventional operations out to unknown battle environments into the future. On a global scale the IPB process is continuously used in analyzing the ongoing multifaceted conflicts in stability actions and support actions handled daily. As shown in Figure 1-9, the transition of IPB through the history of military operations remains a proven, effective process. A DYNAMIC NEW ERA 1990 - 2010 Decades of Transition 21st Century The Information Age - CLASH OF CIVILIZATIONS - OVERPOPULATION - ECONOMIC STRAINS - POLITICAL REORDERING - WEAPONS PROLIFERATION - NEW TECHNOLOGIES - NEW USES FOR OLD TECH 20th Century The Industrial Age • Turmoil • Crisis • Conflict • War IPB REMAINS A PROVEN AND EFFECTIVE PROCESS WHILE DYNAMIC FORCES ARE RAPIDLY REORDERING THE WORLD. CREATING NEW CHALLENGES IN TECHNOLOGY AND INFORMATION WARFARE ISSUES TO SOLDIERS AND THEIR LEADERS IN THE NEAR FUTURE Figure 1-9. IPB transition. Applications for this predictive analytical approach are employed to handle the new realms of threat encompassing information warfare, worldwide terrorism, and the enormous potential in space operations. The IPB four-step process remains consistent varying only on the focus within the type of operation and the environmental effects. DOCTRINE VERSUS TACTICS, TECHNIQUES, AND PROCEDURES The doctrinal principles of IPB are sound and can be applied to all situations at all levels. The TTP of the applications of IPB may vary according to the mission, enemy, terrain and weather, troops, time and civilians available (METT-TC) in a given situation. (See Figure 1-10.) The doctrinal principles of IPB call for – 1-10 FM 34-130/MCRP 2-12A Evaluating the battlefield’s effects on friendly and threat operations. Determining the threat’s possible COAs and arranging them in order of probability of adoption. Identifying the activities, or lack of, and the locations where they will occur that will identify which COA the threat has adopted. Identifying assets the threat needs to make each COA successful HVTs and where they can be expected to appear on the battlefield target areas of interest (TAIs). MISSION Higher commander’s mission and intent two levels up. Higher commander’s concept of operations. Tasks (implied, specified, and essential). Brigade’s mission. Risk. TROOPS AVAILABLE CCIR. Task organization. Potential for exploiting success. Friendly strength, composition, and disposition. Readiness and condition of subordinate units. ENEMY Morale. Composition, strength and disposition. Training, experience, and leadership. Capabilities. Status of logistics. Likely objective and intentions. Doctrine and known tactics. TIME Likely COAs . Planning and preparation time. Potential vulnerabilities. Critical timing aspects of the mission. METT-TC TERRAIN AND WEATHER OCOKA (terrain); five aspects (weather). Effects on friendly and enemy forces. Advantages and disadvantages. Figure 1-10. CIVILIAN CONSIDERATIONS Attitudes and activities. Anticipated refugee movements. Interagency operations in the AO. METT-TC factors. The decision to use a sketch instead of an overlay to depict the battlefield’s effects or the threat’s available COAs is a matter of TTP. Such a decision can be made only within the context of a given situation. Similarly, the amount of detail that goes into each step of the IPB process, the techniques for depicting areas of RESTRICTED terrain, and other such decisions are also driven by factors of METT-TC and local policies and procedures. PLANNING IN A TIME-CONSTRAINED ENVIRONMENT Although the task is difficult, the commander and staff must be able to produce simple, flexible, and tactically sound plans under severe time constraints. They must develop and issue a 1-11 FM 34-130/MCRP 2-12A plan within one-third of the available preparation time (onefourth is preferred). The commander only hurts his subordinates and jeopardizes mission success by issuing a late order. Having a well-trained staff and standing operating procedures (SOPs) with clear divisions of labor in the staff are essential. The MDMP is adjusted any time there is too little time for its thorough and comprehensive application. The commander decides what techniques to use to save time. The five primary techniques to save time are— The commander increases involvement. Get involved directly to save time. Ranging from participating in the steps of the MDMP with the staff to keep personally available. The staff may need additional guidance and intent without wasting time to get affirmation. The commander issues more directive guidance, limiting the staff’s options. This saves time by focusing the staff on those things of importance. The commander limits the number of COAs developed and analyzed. In extreme cases, direct that only one COA be developed. This option carries great risk especially in military operations on urban operations where there can be up to four potential avenues of approach against a single target. The goal is an acceptable COA that meets mission requirements in the available time. However, the COA must still be flexible enough to succeed against all feasible threat COAs. Maximize parallel planning. Although parallel planning is the norm, maximizing its use in a time-constrained environment is critical. Functional area integration of IPB. Functional areas responsible for specific TTPs regarding the battlefield must forward their critical informational and IPB products to the next echelon for integration into the big picture and MDMP. (For example, air avenues of approach from air assets, engineer obstacle updates, LOC issues from signal and MP support, HUMINT updates on IO issues all should be updated and forwarded to higher on a regular 24-Hour basis to form a collaborative tool to pull information). This saves an enormous amount of time allowing the experts in their functional area to supply up-to-date IPB products into an integrated database. END RESULT OF A STRONG IPB ANALYSIS Once the G2/S2 has provided the initial IPB analysis and continued the process during the MDMP to the point of briefing the commander, the desired outcome should address the following. 1-12 FM 34-130/MCRP 2-12A Place the most critical information regarding the threat up front and early on in the MDMP. Upon receipt of the mission, the higher echelon should identify the threat’s desired intent, possible centers of gravity, and threat’s culmination point. IPB identifies the facts and assumptions about the battlefield and the threat’s capabilities. It provides the basis for intelligence direction and synchronization. Once developed, the collection plan supporting the commander's chosen COA will follow. Wargaming the possible COAs effectively isolates and develops the operations plans (OPPLANs) or operations orders (OPORDs). IPB continues with the execution of the OPORD/OPLAN with actual situational development and updated information from the battlefield. The ultimate goal is to identify the threat’s COA and obtain information superiority (IS) against the adversary. Analyzing the ranges of threats poses an interesting dilemma for the G2/S2. Options range from conventional warfare versus asymmetrical or asynchronous threat with the possible integration within one operation. This can create a diverse spectrum in COA development. Remaining informed of the threat’s actions can be elusive. If the threat is currently unknown (i.e., such as terrorist bombings, computer network attacks, or a biological agent released without ownership), the role of the G2/S2 in developing initial IPB can be frustrating and leads to creative deductive reasoning. Predicting who, what, when, where, and the next move of the adversary becomes the ultimate challenge. Even with the knowledge of the adversary’s capabilities and location, perhaps the terrain is the wildcard. As an example, urban warfare is the modern day “jungle” in which most soldiers are untrained and unprepared to fight. The increased number of mobility corridors (i.e., air, building, intra-building, street, and subterranean levels) available to the threat commander and avenues of approach tend to have an exponential effect on the number of possibilities. Consider the other added dimension, the G2/S2 cannot easily identify the difference between the adversary versus the civilian population. No matter the adversary, environment, nor operation the G2/S2 will provide the best initial IPB assessment. Once the commander receives the mission, the immediate step is extracting all the critical information from higher to be as exact and detailed as possible for analysis. Highlight who, what, when, where, how and why associated to the operation and the threat? If the threat’s intent is clearly defined, it should include possible culmination point and center of gravity issues that will allow the commander’s staff to focus their efforts on specific and tangible threat capabilities. Depending on the type of mission, the culmination point is usually phased. Each phase of an operation will address a friendly and a threat's culmination points. More effort should be made to create an OPORD that depicts as much detail and information to direct the staff and IPB process. 1-13 FM 34-130/MCRP 2-12A The entire unit should then be informed of the mission and execution expectations. The individual soldier then knows his personal impact for mission success, which leads to ownership of the “team of teams” concept. This lends itself to a higher morale of the unit’s effectiveness and ultimate success in battle. 1-14