Campaign Planning Process. CCIR / PIR / EEFI Working Overview Slides. 08 Feb 2007. UNCLASSIFIED. CCIR & PIR. Commander's Critical Information Requirements (CCIRs):
PowerPoint Slideshow about 'Campaign Planning Process ' - gil
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Essential Elements of Friendly Information (EEFI):
EEFIs are key questions likely to be asked by adversary officials & intelligence systems about specific friendly intentions, capabilities, and activities, to obtain answers critical to their operational effectiveness.
EEFI are critical for operational security (OPSEC), force protection, deception planning, & information operations planning.
While assessing & comparing friendly versus adversary capabilities during the planning process for a specific operation or activity, the commander and staff seek to identify the questions that they believe the adversary will ask about friendly intentions, capabilities, and activities (EEFI).
In OPLANs / OPORDs, the EEFI are listed in Appendix 3 (Counterintelligence) to Annex B (Intelligence). EEFI can also be referred to or listed in the primary sections of the Campaign Plan Directive, Warning Orders, and OPLANs / OPORDs as desired for reinforcement of the criticality of this information.
Is a subset of EEFI. Information that is vitally needed by an adversary.
Identification of critical information is important – it focuses the remainder of the OPSEC process on protecting vital information rather than attempting to protect all classified or sensitive information.
Critical information is listed in the OPSEC portion of an operation plan or order. Some general categories of critical information are provided in Appendix A, "Examples of Critical Information."