EXERCISE-EXERCISE-EXERCISE Annex B to ADAZI KNIGHT OPORD 01 Time Zone Used Throughout: BRAVO 1. SITUATION. a. Enemy forces. (1) Anti-Afghanistan Forces (AAF) continues to pose the most significant threat to TF ADAZI KNIGHTS mission accomplishment in ADAZI Province (AP). The AAF consists of Taliban (TB), Al Qaeda (AQ), and Criminal Elements (CE). AAF conduct operations in the AP to influence the populace by discrediting the ISAF’s continued presence and destabilizing the Government of the Islamic Republic of Afghanistan (GIRoA) through propaganda, intimidation, coercion, and armed conflict. Decisive to AAF operations is the ability to conduct ambushes in isolated areas that may be supported by Improvised Explosive Device (IED) and Indirect Fire (IDF). Significant to this operation is the AAF’s ability to successfully exert their influence throughout AP and to disrupt ISAF and Afganistan National Security Forces (ANSF) operations using a variety of attacks. All AAF groups are instilled with Islamic extremist ideologies and cooperate with each other in varying ways to achieve the shared objective of forcing foreign military presence out of AP and destroying the current Government of the Islamic Republic of Afghanistan local authorities in province. The objective is to replace it with a government based on Sharia law. (a) TB. TB will attempt to disrupt operations by using Small Arms Fire (SAF), Rocket Propelled Grenades (RPG), IDF, and IED attacks. TB may mass forces and conduct sustained engagements with reinforcements, as warranted by the tactical situation. (b) AQ. AQ will conduct complex attacks, IED combined with mortar attacks, Vehicle Borne Improvised Explosive Devices (VBIED) attacks, and suicide attacks throughout the AP to attrite ISAF and ANSF and use real or spurious reports of these attacks in their Information Operations (IO) campaign. The AQ will engage directly only when they have superior numbers. (c) CE. CE will attempt to deny ISAF influence on criminal operations. The CE will employ illegal Traffic Control Points (TCP), SAF attacks, and IEDs. The CE will conduct standoff attacks and ambushes against targets of opportunity within their operational area to build prestige and influence within the community. (2) Due to the economic state of the country, heavy criminal activity occurs throughout AP. This sometimes is done by civilians attempting to gain money to support their families and clans. Criminal activity closely tied to the AAF includes narcotics and weapons trafficking. b. Friendly forces. Refer to OPORD 01. 2. MISSION. Refer to OPORD 01. 3. EXECUTION. a. TF ADAZI KNIGHTS continues to organize available intelligence assets based on mission, concept of operation, threat to forces, and terrain. According to current TASKORG intelligence in the AOR of TF ADAZI KNIGHTS is gathered by maneuver COYs and assets provided MNTF. These assets are supplemented by pull-down from coalition assets. Additional assets may be provided to support subordinate unit’s missions as required which include Unmanned Aerial System (UAS), Human Intelligence Collection Teams, and Signals Intelligence (SIGINT) assets either attached or in General Support. EXERCISE-EXERCISE-EXERCISE 1-3 EXERCISE-EXERCISE-EXERCISE b. Tasks to subordinate units. All units. (1) Specific Intelligence Requariments according to ICP (appendix 1 to Annex B) (2) Supportt CI screening of Locally Employed Persons (LEPs) as required. (3) Submit SPOT reports as necessary using the SALUTE (Size / Activity / Location / Unit / Time / Equipment) Format. (4) Assist the S2 and S3 in maintaining a current population and infrastructure status overlay and other population related intelligence products by providing changes and updates when noted. (5) Review HUMINT linkage diagrams and association matrices daily, submit recommended changes and updates as required to TF ADAZI KNIGHTS S2. c. Coordinating instructions. (1) Commander’s Critical Information Requirements (CCIR). All personnel and units report the following data: (a) Priority Intelligence Requirements (PIR). Refer to OPORD 01. (b) Friendly Forces Information Requirements (FFIR). Refer to OPORD 01. (c) Essential Elements Of Friendly Information (EEFI). Refer to OPORD 01 (2) Measures for handling detainees, documents, and materiel. (a) Detained persons. Unit within 12 h mast report any detained persons to the TF S2, giving the name of person, location where he / she was detained and describing the reasons for detention. All detained persons after initial questioning should be transferred to local Afghanistan National Security Forces. (b) Captured Documents and Media. Documents and media captured with personnel will be secured and transferred to the TF S2. They should be clearly marked as to the location and circumstances surrounding their capture and any associated detainees by name. Units may exploit for immediate intelligence value if this does not result in an inordinate delay in evacuation. (c) Captured Materiel. 1 Captured weapons will be secured and evaluated for use by the ANSF. Trophies are not allowed. 2 Large items of equipment (such as vehicles) will be secured and evacuated as resources and time allow. In most cases they should be turned over to ANSF to facilitate their operations. They will be destroyed only if necessary. EXERCISE-EXERCISE-EXERCISE 2-3 EXERCISE-EXERCISE-EXERCISE 3 Items of possible intelligence exploitation (such as improvised rocket launchers) will be documented with digital cameras, secured, and reported to the S2 for potential exploitation. 4 Captured computers, communications equipment, and associated items will be evacuated as soon as possble to the TF ADAZI KNIGHTS S2. Do not tamper with electronic systems, regardless of the position they are found in (on or off). Evacuate them as they are found to facilitate exploitation. The same holds true for laptops. If the laptop is on, close the screen and evacuate to higher (allowing it to go into sleep mode). Turning the system on or off could hinder technical exploitation. If desktops are found in the "On" position, notify TF ADAZI KNIGHTS S2 to determine if they want to send a technical team for exploitation. Otherwise, desktops should be powered down prior to evacuation. 5 Captured narcotics stockpiles and production facilities will be secured, contents documented, and destroyed on site. d. Distribution of intelligence products. (1) All units attached to the TF ADAZI KNIGHTS will submit reports to TF ADAZI KNIGHTS S2 according to reporting matrix. (2) TF ADAZI KNIGHTS will disseminate INTSUMS to all attached according to reporting matrix. (3) Additional INTSUMS and other reports may be required and will be updated via orders and FRAGOs. (a) Maps: S2 will identify required coverage and coordinate with National Geospatial-Intelligence Agency (NGA) to rectify shortfalls or coordinate for specialized products. S2/S3 will provide a list of required coverage to the subordinate units. Units will order maps through their normal supply channels. (b) Imagery Products: S2 will provide units with a baseline imagery database via the target folder. S2 will post additional imagery to TF ADAZI KNIGHTS elements when it becomes available. Other imagery and terrain products can be distributed on CD via courier or through coordination between the S2 and subordinate terrain teams. 4. SERVICE SUPPORT. Refer to OPORD 01. 5. COMMAND and CONTROL. Refer to OPORD 01. APPENDICES: 1 – Intelligence Collection Plan 2. – Intelligence Estimate. EXERCISE-EXERCISE-EXERCISE 3-3 EXERCISE-EXERCISE-EXERCISE EXERCISE-EXERCISE-EXERCISE 4-3