U.S. Army Counterintelligence Handbook

U.S. Army Counterintelligence Handbook

by U.S. Department of the Army
U.S. Army Counterintelligence Handbook

U.S. Army Counterintelligence Handbook

by U.S. Department of the Army

Paperback

$14.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

The life of a counterintelligence (CI) operative has been immortalized in film and novels as being filled with glamour and excitement. While international travel, heroism, and danger are all part of the job description, the fundamentals of counterintelligence are discipline, skill, and—well—intelligence. CI operations include conducting investigations, offensive and defensive operations, security and vulnerability analyses, and intelligence collection in peace and at all levels of conflict to support command needs. This guide serves to inform commanders, agents, and analysts on how to identify, neutralize, and exploit any foreign attempts to conduct operations against the U.S. Army. 
Find out how CI operatives combat terrorism, create battlefield deception, and inform all echelons of combat of both real and potential threats from the U.S. Army's own guide to counterintelligence. The tactics, techniques, and procedures (TTP) outlined are the same instructions that CI personnel follow in the field. As the world becomes more interconnected and as technological advances continue to be made, proper CI techniques are exceedingly critical to the protection of the U.S. Army. Counterintelligence is not just the subject for an entertaining story, it is how peacekeeping, humanitarian, and counter-drug operations are carried out in this globalized world.

Product Details

ISBN-13: 9781620874783
Publisher: Skyhorse
Publication date: 02/06/2013
Series: US Army Survival
Pages: 296
Sales rank: 229,524
Product dimensions: 6.00(w) x 8.90(h) x 1.10(d)

About the Author

The  Department of the Army  (DA) is one of the three military departments within the  Department of Defense of the United States of America. Its mission is to fight and win our Nation’ s wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders.

Read an Excerpt

CHAPTER 1

Mission and Structure

General

Threat intelligence services have the capability to conduct continuous collection against the US Army during peacetime, operations other than war (OOTW), and during war itself. The intelligence that results from these operations provides a significant advantage to threat forces, and could easily result in increased US casualties on the battlefield. Fortunately, there are many actions we can take to counter threat intelligence efforts and to provide force protection to all US Army units. The most dramatic of these actions are designed to neutralize enemy collection. These actions include

[] Using field artillery to destroy ground-based enemy signals intelligence (SIGINT) collectors.

[] Conducting sophisticated C-HUMINT operations in a foreign city long before overt hostilities commence.

[] Employing direct fire weapon systems to destroy enemy reconnaissance. Brigades conducting defensive operations at the National Training Center often commit a tank-infantry company team to provide counterreconnaissance, intelligence, surveillance, and target acquisition (C-RISTA) protection.

While not as flashy, routine security procedures provide crucial force protection. These procedures include but are not limited to

[] Personnel security, to include background investigations, will ensure all personnel who have access to sensitive or classified information will fully protect it.

[] Information security, particularly in regard to handling classified and compartmented information, will be a challenging field in the future considering the ease with which information can be copied and transmitted in an increasingly automated Army.

[] Physical security, which ensures physical measures are taken to safeguard personnel, prevents unauthorized access to equipment, installations, materiel, and documents to safeguard them against espionage, sabotage, damage, and theft.

[] Operations security (OPSEC), which ensures that all essential elements of friendly information (EEFI), are reasonably concealed from enemy collection assets.

Another crucial component in the fight against threat collection efforts is CI analysis. These include efforts to identify the general capabilities and specific operations of enemy human intelligence (HUMINT), SIGINT, and imagery intelligence (IMINT) collection. CI analysis also includes the development of profiles that identify friendly vulnerabilities to enemy collection and possible countermeasures.

Measures such as these provide a crucial force protection shield that is difficult for the FIS to penetrate. More importantly, a comprehensive CI program significantly degrades the threat's ability to target and conduct combat or terrorist operations against US Forces. Total CI provides the combat commander with a definite advantage on the battlefield.

AR 381-10, AR 381-12, and AR 381-47 (S) contain policies and procedures governing the conduct of intelligence activities by Department of the Army (DA).

Mission

The CI mission is authorized by Executive Order (EO)12333, implemented by AR 381-20. The Army conducts aggressive, comprehensive, and coordinated CI activities worldwide. The purpose is to detect, identify, assess, counter, neutralize, or exploit threat intelligence collection efforts. This mission is accomplished during peacetime and all levels of conflict. Many CI functions, shown in Figure 1-1, are conducted by echelons above corps (EAC); some by echelons corps and below (ECB); and some are conducted by both. Those CI assets found at ECB respond to tactical commanders. EAC assets respond primarily to commanders of intelligence units while supporting all commanders within their theater or area of operations (AO).

The essence of the Army's CI mission is to support force protection. By its nature, CI is a multidiscipline (C-HUMINT, C-SIGINT, and CIMINT) function designed to degrade threat intelligence and targeting capabilities. Multidiscipline counterintelligence (MDCI) is an integral and equal part of intelligence and electronic warfare (IEW). MDCI operations support force protection through OPSEC, deception, and rear area operations across the range of military operations. For more information on IEW operations, see FM 34-1.

CI in Support of Force XXI

CI must meet the goals and objectives of Force XXI and force projection operations. US Forces will be continental United States (CONUS)-based with a limited forward presence. The Army must be capable of rapidly deploying anywhere in the world; operating in a joint or combined (multinational) environment; and defeating simultaneous regional threats on the battlefield; or conducting OOTW. CI, as part of IEW, is fundamental to effective planning, security, and execution of force projection operations. Successful force projection CI support is based on the same five key principles shown in Figure 1-2 and discussed below. CI, in support of force protection, will be required on the initial deployment of any force projection operation.

The Commander Drives Intelligence:

The commander focuses on the intelligence system by clearly designating his priority intelligence requirements (PIR), targeting requirements and priorities. He ensures that the Intelligence Battlefield Operating System (BOS) is fully employed and synchronized with his maneuver and fire support BOSs. He demands that the Intelligence BOS provides the intelligence he needs, when he needs it, and in the form he needs.

Intelligence Synchronization:

The J2 or G2 synchronizes intelligence collection, analysis, and dissemination with operations to ensure the commander receives the intelligence he needs, in the form he can use, and in time to influence the decisionmaking process. Intelligence synchronization is a continuous process which keeps IEW operations tied to the commander's critical decisions and concept of operations. CI collection, analysis, and dissemination, like other intelligence, have to meet the commander's time requirements to be of any use other than historical.

Split-Based Operations:

Split-based operations provide deploying tactical commanders with a portion of their collection assets and augment full employment of organicassets. Split-based intelligence operations employ collection and analysis elements from all echelons, national to tactical, in sanctuaries from which they can operate against the target area.

Tactical Tailoring:

In force projection operations, the commander tactically tailors CI, as well as all IEW, support for each contingency based on the mission and availability of resources. He must decide which key CI personnel and equipment to deploy early, and when to phase in his remaining CI assets.

Broadcast Dissemination:

Broadcast dissemination of intelligence includes the simultaneous broadcast of near-real time (NRT) CI from collectors and processors at all echelons. It permits commanders at all echelons to simultaneously receive the same intelligence, thereby providing a common picture of the battlefield. It allows commanders to skip echelons and pull CI directly from the echelon broadcasting it.

Intelligence Tasks

Army military intelligence (MI) accomplishes its mission by performing six primary tasks: providing indications and warnings (I&W); performing intelligence preparation of the battlefield (IPB); performing situation development; supporting target development and targeting; developing force protection intelligence; and performing battle damage assessment (BDA).

CI Tasks

The role of CI is to support the commander's requirements to preserve essential secrecy and to protect the force directly or indirectly. Thus, CI contributes to the commander's force protection programs. Force protection is a command responsibility to protect personnel, equipment, and facilities. To carry out his force protection responsibilities, a commander requires support from several sources, one of which is the intelligence community. CI support to force protection must be tailored to the sensitivity of the supported organization and its vulnerability to FIS and hostile attack. CI support can be tailored from a combination of activities to include

[] Mobilization security, including ports and major records repositories.

[] Combatting terrorism.

[] Rear operations.

[] Civil-military affairs.

[] Psychological operations (PSYOP).

[] Battlefield deception.

[] OPSEC.

[] Friendly Communications-Electronics (C-E) (C-SIGINT).

[] CI force protection source operations (CFSO).

Army CI as a Function of MI

Army CI, as a multidiscipline intelligence function, is an integral part of the Army and Department of Defense (DOD) and national intelligence communities. CI missions are conducted in support of the objectives of these communities.

Counterreconnaissance

CI is an integral part of the command counterreconnaissance effort. Human and other intelligence sensors determine adversary reconnaissance, intelligence, surveillance, and target acquisition (RISTA) and other battlefield capabilities, and project resultant data into battle planning and execution. As the adversary worries about our C-RISTA capability, our CI efforts target his RISTA capabilities. CI focuses on the HUMINT threat in the AO and provides analytical support in identifying enemy SIGINT and IMINT capabilities and intentions. CI has a limited neutralization and exploitation capability directed at low-level adversary HUMINT collectors or sympathizers acting in a collection or sabotage capacity. The commander is responsible for security countermeasure programs and training to include personnel, physical, document, information security, crime prevention, and OPSEC.

Other Specialties

Army CI is not limited to the activities of a small force of CI agents and technicians; rather, it is the responsibility of all Army personnel to follow common sense security measures to minimize any foreign intelligence threat. Although a major part of the CI mission is to counter or neutralize FIS efforts, this does not mean that only CI personnel take part in these actions. They may require

[] Other intelligence specialists such as interrogators.

[] Military police (MP).

[] Civilian counterparts and authorities.

[] Combat forces.

[] Civil-military affairs and PSYOP.

The combined use of C-HUMINT, C-SIGINT, and C-IMINT TTPs provides a multidisciplined approach to denying information to unauthorized persons. This approach limits the threat's ability to collect against us. Although this FM describes these three operations separately in Chapter 3, they are often conducted simultaneously by the same assets.

Peace, War, and OOTW

The Army conducts CI during peacetime and at all levels of conflict to protect the force from foreign exploitation. During peacetime, CI simultaneously supports the commander's needs and DA policy.

During war, CI operations are much the same as in peacetime, except the adversary state or nation is well-defined. The commander's needs are the top priority.

OOTW may include the direct or indirect support of one or more foreign governments or groups, or international organizations such as the North Atlantic Treaty Organization (NATO). OOTW may be initiated unilaterally in the absence of foreign support. Whether unilateral or multinational, US Forces usually operate in a joint environment. Normally in OOTW, military force is used only as a last resort. OOTW consists of the following operational categories:

[] Noncombatant evacuation operations.

[] Arms control.

[] Support to domestic civil authorities.

[] Humanitarian assistance (HA) and disaster relief.

[] Security assistance.

[] Nation assistance.

[] Support to counter-drug operations.

[] Combatting terrorism.

[] Peacekeeping operations.

[] Peace enforcement.

[] Show of force.

[] Support for insurgencies and counterinsurgencies.

[] Attacks and raids.

The CI Structure

To accomplish the CI mission at various echelons, specially trained CI personnel are assigned to tactical CI organizations as shown in Figure 1-3. Organizations include

[] CI organizations organic to theater Army MI brigades or groups which are United States Army Intelligence and Security Command (INSCOM) organizations.

[] Tactical exploitation battalion (TEB) and headquarters (HQ) and operations battalion of the corps MI brigade.

[] MI battalion at division.

[] MI companies at armored cavalry regiments (ACRs) and separate brigades.

[] MI elements at special forces groups.

At each echelon, CI teams provide command and control (C 2) of CI assets; conduct CI investigations, operations, and collection; perform analysis and produce CI products; and provide security advice and assistance.

Only CI officers, technicians, agents, or accredited civilian employees control and conduct investigations. Additionally, DA policy identifies CFSO as a CI function as described in Chapter 4. CI personnel are also collectors of information, working individually or in teams with interrogators and technicians when resources permit. At ECB, CI personnel work in CI platoons at division level and CI companies at corps level. At EAC, CI personnel work individually or in groups in field offices, resident offices, or MI detachments or companies.

Another CI military occupational specialty (MOS) is MDCI analyst 97G. In addition to performing C-SIGINT operations and communications monitoring, these soldiers perform MDCI analysis and produce MDCI products.

Interrogator and other personnel possessing requisite linguistics capability work with CI teams when conditions and resources permit. Provided these personnel are competent in the foreign language appropriate to the AO and possess the required security clearance, they perform interpreter, translator, liaison officer, and (after appropriate training) source handler duties. CI teams, found in some tactical units, are task organized based on mission, enemy, troops, terrain and weather, and time available (METT-T) factors. CI teams are composed of a CI technician, several CI agents and interrogation personnel, and MDCI analysts. Other CI teams are composed of CI agents and analyst personnel. At EAC, CI personnel work individually or in groups in resident offices, field offices, MI detachments, companies, or regions. Depending on the mission, additional specialists may either be attached or task organized to provide temporary expertise, such as

[] Physical security specialists.

[] MP.

[] Other intelligence personnel trained to accomplish a specific mission.

CI Support to US Forces

CI assets are deployed to provide area coverage. Only when driven by PIR should they be given a mission other than area coverage, such as specialized support to a special access program. When assigning missions to CI elements, METT-T must be carefully considered to ensure tasks are prioritized and CI assets are properly utilized.

Most CI operations develop slowly. Therefore, missions should be assigned for relatively long periods. If a team is investigating a sabotage incident, its mission should be assigned for as long as it takes to complete the mission. If a team is establishing liaison with host nation officials, this mission should remain with the team long enough to turn the liaison over to another team.

Within corps and divisions, CI assets are given an area coverage role. Based on priorities established by the corps or division commander, or G2, the MI battalion commander controls the CI assets as they execute the mission.

Although CI operations may change with priorities, CI assets must attempt to ensure commanders get what they need, when they need it, and in a form they can use before changing missions.

Planning

For contingency operations, CI elements should have the following procedures firmly in place prior to deployment:

[] Updated threat databases.

[] Planned CI communications in time to support decisionmaking.

[] Approved operations plans (OPLANs) with financial annexes for any source operations; for example, CFSO and host country liaison.

[] Appropriate and up-to-date country studies.

[] Established intelligence contingency funds (ICF). See AR 381-141.

[] Ongoing contact with theater CI elements to facilitate exchanging information and, where applicable, passing assets after employment.

[] Team reaction time must be rapid since contingencies can occur in locations with no US presence and with little warning. Therefore, the team needs a good working relationship with elements maintaining CI databases. The team should have a generic plan or established standing operating procedures (SOPs) which vary according to the type of OOTW. Teams would not do exactly the same things in peacekeeping, peace enforcement, and CI support to treaty verification, domestic civil disturbances, and natural disaster operations. Generally, the team must consider what is appropriate and feasible.

[] Procedures which tailor intelligence support packages to support planning and contingency operations should refer to the National Ground Intelligence Center (NGIC) and the 902d MI Group CI Analysis Center (CIAC) as a source of data.

Tasking and Reporting

CI teams receive taskings based on requirements from higher echelon. Taskings are normally generated by collection managers based on command needs or information gaps in analytical holdings and provided to the commander of the CI assets. CI teams also request information from organizations (such as HUMINT, SIGINT, or IMINT collectors) in support of CI missions.

(Continues…)


Excerpted from "U.S. Army Counterintelligence Handbook"
by .
Copyright © 2013 Skyhorse Publishing, Inc..
Excerpted by permission of Skyhorse Publishing.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Table of Contents

PREFACE,
CHAPTER 1 MISSION AND STRUCTURE,
CHAPTER 2 INVESTIGATIONS,
CHAPTER 3 OPERATIONS AND TECHNIQUES,
CHAPTER 4 COUNTERINTELLIGENCE COLLECTION ACTIVITIES,
CHAPTER 5 COUNTERINTELLIGENCE ANALYSIS AND PRODUCTION,
APPENDIX A COUNTER-HUMAN INTELLIGENCE TECHNIQUES AND PROCEDURES,
APPENDIX B COUNTER-SIGNALS INTELLIGENCE TECHNIQUES AND PROCEDURES,
APPENDIX C COUNTER-IMAGERY INTELLIGENCE TECHNIQUES AND PROCEDURES,
GLOSSARY,
REFERENCES,

From the B&N Reads Blog

Customer Reviews