Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

U.S. Army Counterintelligence Handbook
U.S. Army Counterintelligence Handbook
U.S. Army Counterintelligence Handbook
Ebook419 pages5 hours

U.S. Army Counterintelligence Handbook

Rating: 3 out of 5 stars

3/5

()

Read preview

About this ebook

The life of a counterintelligence (CI) operative has been immortalized in film and novels as being filled with glamour and excitement. While international travel, heroism, and danger are all part of the job description, the fundamentals of counterintelligence are discipline, skill, and—well—intelligence. CI operations include conducting investigations, offensive and defensive operations, security and vulnerability analyses, and intelligence collection in peace and at all levels of conflict to support command needs. This guide serves to inform commanders, agents, and analysts on how to identify, neutralize, and exploit any foreign attempts to conduct operations against the U.S. Army. 
Find out how CI operatives combat terrorism, create battlefield deception, and inform all echelons of combat of both real and potential threats from the U.S. Army's own guide to counterintelligence. The tactics, techniques, and procedures (TTP) outlined are the same instructions that CI personnel follow in the field. As the world becomes more interconnected and as technological advances continue to be made, proper CI techniques are exceedingly critical to the protection of the U.S. Army. Counterintelligence is not just the subject for an entertaining story, it is how peacekeeping, humanitarian, and counter-drug operations are carried out in this globalized world.
LanguageEnglish
PublisherSkyhorse
Release dateFeb 6, 2013
ISBN9781510720534
U.S. Army Counterintelligence Handbook
Author

U.S. Department of the Army

The  Department of the Army  (DA) is one of the three military departments within the  Department of Defense of the United States of America. Its mission is to fight and win our Nation’ s wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders.

Read more from U.S. Department Of The Army

Related to U.S. Army Counterintelligence Handbook

Related ebooks

Wars & Military For You

View More

Related articles

Reviews for U.S. Army Counterintelligence Handbook

Rating: 3 out of 5 stars
3/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    U.S. Army Counterintelligence Handbook - U.S. Department of the Army

    Cover Page of U.S. Army Counterintelligence HandbookHalf Title of U.S. Army Counterintelligence HandbookTitle Page of U.S. Army Counterintelligence Handbook

    Additional material copyright © 2013 by Skyhorse Publishing, Inc.

    No claim is made to material contained in this work that is derived from government documents. Nevertheless, Skyhorse Publishing claims copyright in all additional content, including, but not limited to, compilation copyright and the copyright in and to any additional material, elements, design, images, or layout of whatever kind included herein.

    All inquiries should be addressed to Skyhorse Publishing, 307 West 36th Street, 11th Floor, New York, NY 10018.

    Skyhorse Publishing books may be purchased in bulk at special discounts for sales promotion, corporate gifts, fund-raising, or educational purposes. Special editions can also be created to specifications. For details, contact the Special Sales Department, Skyhorse Publishing, 307 West 36th Street, 11th Floor, New York, NY 10018 or [email protected].

    Skyhorse® and Skyhorse Publishing® are registered trademarks of Skyhorse Publishing, Inc.®, a Delaware corporation.

    Visit our website at www.skyhorsepublishing.com.

    10 9 8 7 6 5 4 3 2 1

    Library of Congress Cataloging-in-Publication Data is available on file.

    ISBN: 978-1-62087-478-3

    Printed in the United States of America

    Contents—FM 34-60

    PREFACE

    CHAPTER 1 MISSION AND STRUCTURE

    General

    Mission

    CI in Support of Force XXI

    Intelligence Tasks

    CI Tasks

    Army CI as a Function of MI

    Counterreconnaissance

    Other Specialties

    Peace, War, and OOTW

    The CI Structure

    CI Support to US Forces

    Planning

    Tasking and Reporting

    Joint and Combined Operations

    Legal Review

    CHAPTER 2 INVESTIGATIONS

    General

    Types of Investigations

    CHAPTER 3 OPERATIONS AND TECHNIQUES

    General

    Operations

    Techniques

    CHAPTER 4 COUNTERINTELLIGENCE COLLECTION ACTIVITIES

    General

    Control of Source Information

    CI Liaison

    Debriefing

    CI Force Protection Source Operations

    CHAPTER 5 COUNTERINTELLIGENCE ANALYSIS AND PRODUCTION

    General

    CI Analysis

    CI Analysis Target Nominations

    CI Analysis Products

    APPENDIX A COUNTER-HUMAN INTELLIGENCE TECHNIQUES AND PROCEDURES

    Section I. BASIC INVESTIGATIVE TECHNIQUES AND PROCEDURES

    Section II. INVESTIGATIVE LEGAL PRINCIPLES

    Section III. TECHNICAL INVESTIGATIVE TECHNIQUES

    Section IV. SCREENING, CORDON, AND SEARCH OPERATIONS

    Section V. PERSONALITIES, ORGANIZATIONS, AND INSTALLATIONS LIST

    Section VI. COUNTER-HUMAN INTELLIGENCE ANALYSIS

    Section VII. PERSONNEL SECURITY INVESTIGATIONS

    Section VIII. COUNTERINTELLIGENCE INVESTIGATIONS

    APPENDIX B COUNTER-SIGNALS INTELLIGENCE TECHNIQUES AND PROCEDURES

    Section I. DATABASE

    Section II. THREAT ASSESSMENT

    Section III. VULNERABILITY ASSESSMENT

    Section IV. COUNTERMEASURES OPTIONS DEVELOPMENT

    Section V. COUNTERMEASURES EVALUATION

    APPENDIX C COUNTER-IMAGERY INTELLIGENCE TECHNIQUES AND PROCEDURES

    GLOSSARY

    Section I. Abbreviations and Acronyms

    Section II. Terms

    REFERENCES

    Preface

    This field manual (FM) provides guidance to commanders, counterintelligence (CI) agents, and analysts. The first four chapters provide information to the commander and staff while the remainder provides the tactics, techniques, and procedures (TTP) required to aggressively identify, neutralize, and exploit foreign intelligence attempts to conduct operations against the United States (US) Army.

    CI supports Army operations by providing a clear picture of the threat to commands at all echelons and actions required to protect the force from exploitation by foreign intelligence. CI operations include conducting investigations, offensive and defensive operations, security and vulnerability analyses, and intelligence collection in peace and at all levels of conflict to support command needs.

    CI supports the total intelligence process by focusing on foreign intelligence collection efforts. CI is designed to provide commanders the enemy intelligence collection situation and targeting information in order to counter foreign intelligence service (FIS) activities. CI is an integral part of the US Army’s all-source intelligence capability.

    By its nature, CI is a multidiscipline effort that includes counter-human intelligence (C-HUMINT), counter-signals intelligence (C-SIGINT), and counter-imagery intelligence (C-IMINT) designed to counter foreign all-source collection. The CI force in conjunction with other intelligence assets must have the capability to detect all aspects of intelligence collection and related activities that pose a threat to the security of Army operations, personnel, and materiel.

    Through its database (friendly and adversary) and analytical capability, CI provides sound recommendations, which if implemented, will result in the denial of information to the threat.

    It should be noted that any decision regarding the implementation of CI recommendations aimed at denying collection opportunities to the adversary is a command decision. The commander may decide to accept the risk of enemy collection in favor of time, resources, or other higher priority considerations. At that point, the CI mission is considered to be successful because it is a tool of the commander.

    This manual is designed for use by commanders and their staffs; all military intelligence (MI) commanders, their staffs, and trainers; and MI personnel at all echelons. It applies equally to the Active Army, United States Army Reserve (USAR), and Army National Guard (ARNG). It is also intended for commanders and staffs of joint and combined commands, United States Naval and Marine Forces, units of the US Air Force, and the military forces of allied countries.

    Provisions of this manual are subject to international Standardization Agreements (STANAGs) 2363 and 2844 (Edition Two). When amendment, revision, or cancellation of this publication affects or violates the international agreements concerned, the preparing agency will take appropriate reconciliation action through international standardization channels. Chapter 1 implements STANAG 2844 (Edition Two) and Chapter 3 implements STANAG 2363.

    The proponent of this publication is the United States Army Intelligence Center and Fort Huachuca. Send comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to Commander, US Army Intelligence Center and Fort Huachuca, ATTN: ATZS-TDL-D, Fort Huachuca, AZ 85613-6000.

    Unless this publication states otherwise, masculine nouns and pronouns do not refer exclusively to men.

    Chapter 1

    Mission and Structure

    General

    Threat intelligence services have the capability to conduct continuous collection against the US Army during peacetime, operations other than war (OOTW), and during war itself. The intelligence that results from these operations provides a significant advantage to threat forces, and could easily result in increased US casualties on the battlefield. Fortunately, there are many actions we can take to counter threat intelligence efforts and to provide force protection to all US Army units. The most dramatic of these actions are designed to neutralize enemy collection. These actions include

    ■   Using field artillery to destroy ground-based enemy signals intelligence (SIGINT) collectors.

    ■   Conducting sophisticated C-HUMINT operations in a foreign city long before overt hostilities commence.

    ■   Employing direct fire weapon systems to destroy enemy reconnaissance. Brigades conducting defensive operations at the National Training Center often commit a tank-infantry company team to provide counterreconnaissance, intelligence, surveillance, and target acquisition (C-RISTA) protection.

    While not as flashy, routine security procedures provide crucial force protection. These procedures include but are not limited to

    ■   Personnel security, to include background investigations, will ensure all personnel who have access to sensitive or classified information will fully protect it.

    ■   Information security, particularly in regard to handling classified and compartmented information, will be a challenging field in the future considering the ease with which information can be copied and transmitted in an increasingly automated Army.

    ■   Physical security, which ensures physical measures are taken to safeguard personnel, prevents unauthorized access to equipment, installations, materiel, and documents to safeguard them against espionage, sabotage, damage, and theft.

    ■   Operations security (OPSEC), which ensures that all essential elements of friendly information (EEFI), are reasonably concealed from enemy collection assets.

    Another crucial component in the fight against threat collection efforts is CI analysis. These include efforts to identify the general capabilities and specific operations of enemy human intelligence (HUMINT), SIGINT, and imagery intelligence (IMINT) collection. CI analysis also includes the development of profiles that identify friendly vulnerabilities to enemy collection and possible countermeasures.

    Measures such as these provide a crucial force protection shield that is difficult for the FIS to penetrate. More importantly, a comprehensive CI program significantly degrades the threat’s ability to target and conduct combat or terrorist operations against US Forces. Total CI provides the combat commander with a definite advantage on the battlefield.

    AR 381-10, AR 381-12, and AR 381-47 (S) contain policies and procedures governing the conduct of intelligence activities by Department of the Army (DA).

    Mission

    The CI mission is authorized by Executive Order (EO)12333, implemented by AR 381-20. The Army conducts aggressive, comprehensive, and coordinated CI activities worldwide. The purpose is to detect, identify, assess, counter, neutralize, or exploit threat intelligence collection efforts. This mission is accomplished during peacetime and all levels of conflict. Many CI functions, shown in Figure 1-1, are conducted by echelons above corps (EAC); some by echelons corps and below (ECB); and some are conducted by both. Those CI assets found at ECB respond to tactical commanders. EAC assets respond primarily to commanders of intelligence units while supporting all commanders within their theater or area of operations (AO).

    Figure 1-1. Counterintelligence functions.

    The essence of the Army’s CI mission is to support force protection. By its nature, CI is a multidiscipline (C-HUMINT, C-SIGINT, and C-IMINT) function designed to degrade threat intelligence and targeting capabilities. Multidiscipline counterintelligence (MDCI) is an integral and equal part of intelligence and electronic warfare (IEW). MDCI operations support force protection through OPSEC, deception, and rear area operations across the range of military operations. For more information on IEW operations, see FM 34-1.

    CI in Support of Force XXI

    CI must meet the goals and objectives of Force XXI and force projection operations. US Forces will be continental United States (CONUS)-based with a limited forward presence. The Army must be capable of rapidly deploying anywhere in the world; operating in a joint or combined (multinational) environment; and defeating simultaneous regional threats on the battlefield; or conducting OOTW. CI, as part of IEW, is fundamental to effective planning, security, and execution of force projection operations. Successful force projection CI support is based on the same five key principles shown in Figure 1-2 and discussed below. CI, in support of force protection, will be required on the initial deployment of any force projection operation.

    The Commander Drives Intelligence:

    The commander focuses on the intelligence system by clearly designating his priority intelligence requirements (PIR), targeting requirements and priorities. He ensures that the Intelligence Battlefield Operating System (BOS) is fully employed and synchronized with his maneuver and fire support BOSs. He demands that the Intelligence BOS provides the intelligence he needs, when he needs it, and in the form he needs.

    Intelligence Synchronization:

    The J2 or G2 synchronizes intelligence collection, analysis, and dissemination with operations to ensure the commander receives the intelligence he needs, in the form he can use, and in time to influence the decisionmaking process. Intelligence synchronization is a continuous process which keeps IEW operations tied to the commander’s critical decisions and concept of operations. CI collection, analysis, and dissemination, like other intelligence, have to meet the commander’s time requirements to be of any use other than historical.

    Split-Based Operations:

    Split-based operations provide deploying tactical commanders with a portion of their collection assets and augment full employment of organicassets. Split-based intelligence operations employ collection and analysis elements from all echelons, national to tactical, in sanctuaries from which they can operate against the target area.

    Tactical Tailoring:

    In force projection operations, the commander tactically tailors CI, as well as all IEW, support for each contingency based on the mission and availability of resources. He must decide which key CI personnel and equipment to deploy early, and when to phase in his remaining CI assets.

    Broadcast Dissemination:

    Broadcast dissemination of intelligence includes the simultaneous broadcast of near-real time (NRT) CI from collectors and processors at all echelons. It permits commanders at all echelons to simultaneously receive the same intelligence, thereby providing a common picture of the battlefield. It allows commanders to skip echelons and pull CI directly from the echelon broadcasting it.

    Figure 1-2. Principles of force projection IEW operations.

    Intelligence Tasks

    Army military intelligence (MI) accomplishes its mission by performing six primary tasks: providing indications and warnings (I&W); performing intelligence preparation of the battlefield (IPB); performing situation development; supporting target development and targeting; developing force protection intelligence; and performing battle damage assessment (BDA).

    CI Tasks

    The role of CI is to support the commander’s requirements to preserve essential secrecy and to protect the force directly or indirectly. Thus, CI contributes to the commander’s force protection programs. Force protection is a command responsibility to protect personnel, equipment, and facilities. To carry out his force protection responsibilities, a commander requires support from several sources, one of which is the intelligence community. CI support to force protection must be tailored to the sensitivity of the supported organization and its vulnerability to FIS and hostile attack. CI support can be tailored from a combination of activities to include

    ■   Mobilization security, including ports and major records repositories.

    ■   Combatting terrorism.

    ■   Rear operations.

    ■   Civil-military affairs.

    ■   Psychological operations (PSYOP).

    ■   Battlefield deception.

    ■   OPSEC.

    ■   Friendly Communications-Electronics (C-E) (C-SIGINT).

    ■   CI force protection source operations (CFSO).

    Army CI as a Function of MI

    Army CI, as a multidiscipline intelligence function, is an integral part of the Army and Department of Defense (DOD) and national intelligence communities. CI missions are conducted in support of the objectives of these communities.

    Counterreconnaissance

    CI is an integral part of the command counterreconnaissance effort. Human and other intelligence sensors determine adversary reconnaissance, intelligence, surveillance, and target acquisition (RISTA) and other battlefield capabilities, and project resultant data into battle planning and execution. As the adversary worries about our C-RISTA capability, our CI efforts target his RISTA capabilities. CI focuses on the HUMINT threat in the AO and provides analytical support in identifying enemy SIGINT and IMINT capabilities and intentions. CI has a limited neutralization and exploitation capability directed at low-level adversary HUMINT collectors or sympathizers acting in a collection or sabotage capacity. The commander is responsible for security countermeasure programs and training to include personnel, physical, document, information security, crime prevention, and OPSEC.

    Other Specialties

    Army CI is not limited to the activities of a small force of CI agents and technicians; rather, it is the responsibility of all Army personnel to follow common sense security measures to minimize any foreign intelligence threat. Although a major part of the CI mission is to counter or neutralize FIS efforts, this does not mean that only CI personnel take part in these actions. They may require

    ■   Other intelligence specialists such as interrogators.

    ■   Military police (MP).

    ■   Civilian counterparts and authorities.

    ■   Combat forces.

    ■   Civil-military affairs and PSYOP.

    The combined use of C-HUMINT, C-SIGINT, and C-IMINT TTPs provides a multidisciplined approach to denying information to unauthorized persons. This approach limits the threat’s ability to collect against us. Although this FM describes these three operations separately in Chapter 3, they are often conducted simultaneously by the same assets.

    Peace, War, and OOTW

    The Army conducts CI during peacetime and at all levels of conflict to protect the force from foreign exploitation. During peacetime, CI simultaneously supports the commander’s needs and DA policy.

    During war, CI operations are much the same as in peacetime, except the adversary state or nation is well-defined. The commander’s needs are the top priority.

    OOTW may include the direct or indirect support of one or more foreign governments or groups, or international organizations such as the North Atlantic Treaty Organization (NATO). OOTW may be initiated unilaterally in the absence of foreign support. Whether unilateral or multinational, US Forces usually operate in a joint environment. Normally in OOTW, military force is used only as a last resort. OOTW consists of the following operational categories:

    ■   Noncombatant evacuation operations.

    ■   Arms control.

    ■   Support to domestic civil authorities.

    ■   Humanitarian assistance (HA) and disaster relief.

    ■   Security assistance.

    ■   Nation assistance.

    ■   Support to counter-drug operations.

    ■   Combatting terrorism.

    ■   Peacekeeping operations.

    ■   Peace enforcement.

    ■   Show of force.

    ■   Support for insurgencies and counterinsurgencies.

    ■   Attacks and raids.

    The CI Structure

    To accomplish the CI mission at various echelons, specially trained CI personnel are assigned to tactical CI organizations as shown in Figure 1-3. Organizations include

    ■   CI organizations organic to theater Army MI brigades or groups which are United States Army Intelligence and Security Command (INSCOM) organizations.

    ■   Tactical exploitation battalion (TEB) and headquarters (HQ) and operations battalion of the corps MI brigade.

    ■   MI battalion at division.

    ■   MI companies at armored cavalry regiments (ACRs) and separate brigades.

    ■   MI elements at special forces groups.

    At each echelon, CI teams provide command and control (C 2) of CI assets; conduct CI investigations, operations, and collection; perform analysis and produce CI products; and provide security advice and assistance.

    Only CI officers, technicians, agents, or accredited civilian employees control and conduct investigations. Additionally, DA policy identifies CFSO as a CI function as described in Chapter 4. CI personnel are also collectors of information, working individually or in teams with interrogators and technicians when resources permit. At ECB, CI personnel work in CI platoons at division level and CI companies at corps level. At EAC, CI personnel work individually or in groups in field offices, resident offices, or MI detachments or companies.

    Another CI military occupational specialty (MOS) is MDCI analyst 97G. In addition to performing C-SIGINT operations and communications monitoring, these soldiers perform MDCI analysis and produce MDCI products.

    Figure 1-3. Cl organization at echelons corps and below.

    Interrogator and other personnel possessing requisite linguistics capability work with CI teams when conditions and resources permit. Provided these personnel are competent in the foreign language appropriate to the AO and possess the required security clearance, they perform interpreter, translator, liaison officer, and (after appropriate training) source handler duties. CI teams, found in some tactical units, are task organized based on mission, enemy, troops, terrain and weather, and time available (METT-T) factors. CI teams are composed of a CI technician, several CI agents and interrogation personnel, and MDCI analysts. Other CI teams are composed of CI agents and analyst personnel. At EAC, CI personnel work individually or in groups in resident offices, field offices, MI detachments, companies, or regions. Depending on the mission, additional specialists may either be attached or task organized to provide temporary expertise, such as

    ■   Physical security specialists.

    ■   MP.

    ■   Other intelligence personnel trained to accomplish a specific mission.

    CI Support to US Forces

    CI assets are deployed to provide area coverage. Only when driven by PIR should they be given a mission other than area coverage, such as specialized support to a special access program. When assigning missions to CI elements, METT-T must be carefully considered to ensure tasks are prioritized and CI assets are properly utilized.

    Most CI operations develop slowly. Therefore, missions should be assigned for relatively long periods. If a team is investigating a sabotage incident, its mission should be assigned for as long as it takes to complete the mission. If a team is establishing liaison with host nation officials, this mission should remain with the team long enough to turn the liaison over to another team.

    Within corps and divisions, CI assets are given an area coverage role. Based on priorities established by the corps or division commander, or G2, the MI battalion commander controls the CI assets as they execute the mission.

    Although CI operations may change with priorities, CI assets must attempt to ensure commanders get what they need, when they need it, and in a form they can use before changing missions.

    Planning

    For contingency operations, CI elements should have the following procedures firmly in place prior to deployment:

    ■   Updated threat databases.

    ■   Planned CI communications in time to support decisionmaking.

    ■   Approved operations plans (OPLANs) with financial annexes for any

    Enjoying the preview?
    Page 1 of 1