Essential elements of information

Last updated
JP 1-02 US Department of Defense Dictionary of Military and Associated Terms.pdf
JP 1-02

Essential elements of information (EEI) is any critical intelligence information required by intelligence consumers to perform their mission. The EEI are specific to a particular event, thing, or other target individual. The EEI are written out in advance as questions by consumers of the EEI information. Then, the EEI questions are used by collectors of the information that may not be in direct contact with the consumer at the time the information is collected. A specific set of EEIs are used by collectors to develop a collection plan to find the answers to the questions in the EEIs. EEIs are also used in non-intelligence fields, such as responders to crisis events or medical emergencies.

Contents

Definitions

The United States Department of Defense defines EEI as follows:

"The most critical information requirements regarding the adversary and the environment needed by the commander by a particular time to relate with other available information and intelligence in order to assist in reaching a logical decision. Also called EEIs." [1]

The United Kingdom Ministry of Defence defines EEI as follows:

"These represent the intelligence consumers’ specific requirements. Expressing complex intelligence requirements as a collection of essential elements of information provides the additional level of guidance needed by intelligence collectors and analysts to achieve the desired effect." [2]

The United States Army eliminated the term EEI from its doctrine in August 2014, though Joint doctrine still uses the term. [3]

Examples

An air force unit might have the following EEI about SA-20 batteries:

A medical crisis manager might have the following EEIs: [5]

Related Research Articles

Electronic warfare (EW) is any action involving the use of the electromagnetic spectrum or directed energy to control the spectrum, attack an enemy, or impede enemy assaults. The purpose of electronic warfare is to deny the opponent the advantage of, and ensure friendly unimpeded access to, the EM spectrum. EW can be applied from air, sea, land, and/or space by manned and unmanned systems, and can target communication, radar, or other assets.

Military doctrine is the expression of how military forces contribute to campaigns, major operations, battles, and engagements.

Military intelligence Information about military opponents

Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination.

Counterintelligence

Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted for or on behalf of foreign powers, organizations or persons.

Military Auxiliary Radio System United States civilian auxiliary service for military support

The Military Auxiliary Radio System (MARS) is a United States Department of Defense sponsored program, established as a separately managed and operated program by the United States Army, and the United States Air Force. The United States Navy-Marine Corps program closed in 2015. The program is a civilian auxiliary consisting primarily of licensed amateur radio operators who are interested in assisting the military with communications on a regional and national level when access to traditional forms of communication may no longer be available. The MARS programs also include active duty, reserve, and National Guard units; and Navy, Marine Corps units.

The traditional Intelligence cycle is the fundamental cycle of intelligence processing in a civilian or military intelligence agency or in law enforcement as a closed path consisting of repeating nodes. The stages of the intelligence cycle include the issuance of requirements by decision makers, collection, processing, analysis, and publication of intelligence. The circuit is completed when decision makers provide feedback and revised requirements. The intelligence cycle is also called the Intelligence Process by the U.S. Department of Defense (DoD) and the uniformed services. The intelligence cycle is an effective way of processing information and turning it into relevant and actionable intelligence.

Operations security counterespionage safety procedures and practices

Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.

Intelligence analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.

Command and control Military exercise of authority by a commanding officer over assigned forces

Command and control (C2) is a "set of organizational and technical attributes and processes ... [that] employs human, physical, and information resources to solve problems and accomplish missions" to achieve the goals of an organization or enterprise, according to a 2015 definition by military scientists Marius Vassiliou, David S. Alberts, and Jonathan R. Agre. The term often refers to a military system.

Intelligence collection management is the process of managing and organizing the collection of intelligence from various sources. The collection department of an intelligence organization may attempt basic validation of what it collects, but is not supposed to analyze its significance. There is debate in U.S. intelligence community on the difference between validation and analysis, where the National Security Agency may try to interpret information when such interpretation is the job of another agency.

Intelligence cycle management refers to the overall activity of guiding the intelligence cycle, which is a set of processes used to provide decision-useful information (intelligence) to leaders. The cycle consists of several processes, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination and integration. The related field of counterintelligence is tasked with impeding the intelligence efforts of others. Intelligence organizations are not infallible but, when properly managed and tasked, can be among the most valuable tools of management and government.

Intelligence Analysis Management is the process of managing and organizing the analytical processing of raw intelligence information. The terms "analysis", "production", and "processing" denote the organization and evaluation of raw information used in a phase informally called "connecting the dots", thus creating an "intelligence mosaic". The information may result in multiple analytic products, each with different security classifications, time scales, and levels of detail. Intelligence analysis goes back to the beginning of history. Sherman Kent is often considered the father of modern intelligence analysis. His writings include a 1947 book, Strategic Intelligence for American World Policy.

It is a maxim of intelligence that intelligence agencies do not make policy, but advise policymakers. Nevertheless, with an increasingly fast pace of operations, intelligence analysts may suggest choices of actions, with some projection of consequences from each. Intelligence consumers and providers still struggle with the balance of what drives information flow. Dissemination is the part of the intelligence cycle that delivers products to consumers, and Intelligence Dissemination Management refers to the process that encompasses organizing the dissemination of the finished intelligence.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

Military Health System

The Military Health System (MHS) is the enterprise within the United States Department of Defense that provides health care to active duty, Reserve component and retired U.S. Military personnel and their dependents.

According to JP 1-02, United States Department of Defense Dictionary of Military and Associated Terms, a military journalist is "A US Service member or Department of Defense civilian employee providing photographic, print, radio, or television command information for military internal audiences. See also command information. "

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. The related term, scientific and technical intelligence, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems.

Center of excellence

A center of excellence (COE) is a team, a shared facility or an entity that provides leadership, best practices, research, support and/or training for a focus area.

Information Operations is a category of direct and indirect support operations for the United States Military. By definition in Joint Publication 3-13, "IO are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own." Information Operations (IO) are actions taken to affect adversary information and information systems while defending one's own information and information systems.

Basic intelligence is fundamental or factual information about a foreign country, organization or issue that is collected and produced in intelligence reports by an intelligence organization. In the U.S. Intelligence Community, the CIA World Factbook is the best known basic intelligence publication. The U.S. Department of Defense uses the term "General Military Intelligence" for military basic intelligence.

References

  1. U.S. Department of Defense (January 2021). Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms (PDF).
  2. UK Ministry of Defence (August 2011). Joint Doctrine Publication 2-00, Understanding Intelligence and Support to Joint Operations (PDF).
  3. Headquarters, Department of the Army (August 2014). Army Techniques Publication 2-01, Plan Requirements and Assess Collection (PDF).
  4. Air Force (January 29, 2015). "Global Integrated Intelligence, Surveillance and Reconnaissance Operations" (PDF).
  5. "Michigan EEI Template, Healthcare response worksheet" (PDF). NACCHOPReparednes.org.