Generated by GPT-5-mini| Army G-2 | |
|---|---|
| Unit name | G-2 (Army) |
| Dates | 1863–present |
| Country | United States |
| Branch | United States Army |
| Type | Military intelligence |
| Role | Intelligence and counterintelligence |
| Garrison | The Pentagon |
| Notable commanders | John J. Pershing, George C. Marshall, Omar Bradley |
Army G-2 Army G-2 is the designation for the United States Army staff section responsible for intelligence and counterintelligence at division level and above within the United States Army. It provides assessments, warnings, and collections planning to commanders such as those in U.S. Central Command, U.S. European Command, and U.S. Indo-Pacific Command. G-2 integrates activities across organizations including the Defense Intelligence Agency, Central Intelligence Agency, and National Geospatial-Intelligence Agency to support operations like those in World War I, World War II, the Korean War, and the Global War on Terrorism.
G-2 roots trace to staff functions established during the American Civil War and formalized during the formation of the United States Army Signal Corps and the Office of Naval Intelligence era; officers such as George S. Patton and John J. Pershing influenced early doctrine. The interwar period saw cooperation with institutions like the Federal Bureau of Investigation and developments from the Military Intelligence Service and Army Intelligence Service before expansion in World War II under leaders associated with the War Department. Cold War events including the Berlin Blockade, Korean War, and Vietnam War drove reorganization, integration with the National Security Agency, and doctrinal changes influenced by figures like Dwight D. Eisenhower and William Westmoreland. Post-9/11 operations in Afghanistan, Iraq War (2003–2011), and global counterterrorism partnerships with NATO and Five Eyes members prompted modernization, adoption of systems from the National Reconnaissance Office, and reforms following inquiries similar to commissions such as the 9/11 Commission.
G-2 provides intelligence preparation of the battlefield and delivers assessments to commanders including those of U.S. Army Forces Command, U.S. Army Training and Doctrine Command, and combatant commanders in CENTCOM. Responsibilities encompass threat analysis of actors like Islamic State of Iraq and the Levant, North Korea, and state adversaries such as the People's Republic of China and Russian Federation. G-2 liaises with the Defense Intelligence Agency, Office of Naval Intelligence, and Air Force Intelligence, Surveillance and Reconnaissance Agency to synchronize all-source analysis, geospatial intelligence from the National Geospatial-Intelligence Agency, signals intelligence from the National Security Agency, and human intelligence linked to the Defense Clandestine Service. It supports operations in theaters including Europe, Indo-Pacific, and Africa Command.
At strategic echelons, G-2 functions inside headquarters such as The Pentagon, United States Army Europe, and United States Army Pacific. Divisional and brigade levels maintain G-2 cells that coordinate with units like 75th Ranger Regiment, 101st Airborne Division, and 1st Cavalry Division. Specialized elements include counterintelligence components tied to the Army Counterintelligence Command, signals units connected to United States Army Cyber Command, and imagery analysts interfacing with the National Reconnaissance Office. The structure mirrors staff systems used by allies including British Army intelligence sections and NATO intelligence directorates, and intersects with agencies like the FBI during domestic support and fusion center activities.
G-2 conducts all-source analysis, order of battle studies, battlefield surveillance, and targeting support evident in campaigns from Normandy landings to Operation Enduring Freedom. It manages collection assets including aerial platforms such as MQ-9 Reaper, aerial reconnaissance from U-2, and signals collection interoperable with the ECHELON community. G-2 supports counterintelligence investigations coordinated with the Army Criminal Investigation Division and collaborates on cyber intelligence with United States Cyber Command. It contributes to stability operations, humanitarian missions with partners like United Nations peacekeeping forces, and security cooperation with allies exemplified by exercises such as Bright Star and RIMPAC.
Personnel pipeline includes courses at institutions like the United States Army Intelligence Center of Excellence at Fort Huachuca, professional education at the United States Army War College and Command and General Staff College, and technical training that interfaces with the National Geospatial-Intelligence Agency and National Security Agency programs. Career fields range from Military Intelligence Corps officers and enlisted 35-series MOS personnel to civilian analysts recruited from agencies like the CIA and DIA. Training emphasizes tradecraft taught in syllabi influenced by historical lessons from Battle of Gettysburg, Battle of Midway, and Tet Offensive studies.
G-2-related controversies have included intelligence assessments and failures scrutinized after events such as the Tet Offensive, the Iranian Revolution, and pre-war assessments before the Iraq War (2003–2011), with oversight involving committees like the Senate Select Committee on Intelligence and reports akin to the Downing Street Memo debates. Legal and ethical disputes have arisen around detainee intelligence handling highlighted by inquiries reminiscent of Abu Ghraib and debates over surveillance authorities tied to the Foreign Intelligence Surveillance Act and cooperation with agencies like the NSA. Reforms followed incidents prompting changes in doctrine endorsed by leaders such as Colin Powell and James Mattis.