U.S. Army Counterintelligence Handbook
3/5
()
About this ebook
Find out how CI operatives combat terrorism, create battlefield deception, and inform all echelons of combat of both real and potential threats from the U.S. Army's own guide to counterintelligence. The tactics, techniques, and procedures (TTP) outlined are the same instructions that CI personnel follow in the field. As the world becomes more interconnected and as technological advances continue to be made, proper CI techniques are exceedingly critical to the protection of the U.S. Army. Counterintelligence is not just the subject for an entertaining story, it is how peacekeeping, humanitarian, and counter-drug operations are carried out in this globalized world.
U.S. Department of the Army
The Department of the Army (DA) is one of the three military departments within the Department of Defense of the United States of America. Its mission is to fight and win our Nation’ s wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders.
Read more from U.S. Department Of The Army
The Complete Guide to Edible Wild Plants Rating: 3 out of 5 stars3/5U.S. Army Improvised Munitions Handbook Rating: 3 out of 5 stars3/5U.S. Army Special Forces Guide to Unconventional Warfare: Devices and Techniques for Incendiaries Rating: 3 out of 5 stars3/5The Official U.S. Army Survival Manual Updated Rating: 5 out of 5 stars5/5U.S. Army Guide to Boobytraps Rating: 4 out of 5 stars4/5U.S. Army Hand-to-Hand Combat Rating: 5 out of 5 stars5/5The Complete U.S. Army Survival Guide to Firecraft, Tools, Camouflage, Tracking, Movement, and Combat Rating: 0 out of 5 stars0 ratingsU.S. Army Guide to Map Reading and Navigation Rating: 3 out of 5 stars3/5U.S. Army Special Forces Handbook Rating: 4 out of 5 stars4/5U.S. Army Reconnaissance and Surveillance Handbook Rating: 4 out of 5 stars4/5U.S. Army Leadership Handbook: Skills, Tactics, and Techniques for Leading in Any Situation Rating: 4 out of 5 stars4/5U.S. Army Combat Pistol Training Handbook Rating: 0 out of 5 stars0 ratingsU.S. Army Explosives and Demolitions Handbook Rating: 0 out of 5 stars0 ratingsU.S. Army First Aid Manual Rating: 5 out of 5 stars5/5U.S. Army Guide to Rigging Rating: 4 out of 5 stars4/5The Ultimate Guide to U.S. Army Survival Skills, Tactics, and Techniques Rating: 0 out of 5 stars0 ratingsU.S. Army Guide to Military Mountaineering Rating: 0 out of 5 stars0 ratingsU.S. Army Intelligence and Interrogation Handbook Rating: 5 out of 5 stars5/5U.S. Army Guerrilla Warfare Handbook Rating: 5 out of 5 stars5/5Rifle Marksmanship: A Guide to M16- and M4-Series Weapons Rating: 0 out of 5 stars0 ratingsU.S. Army Counterinsurgency Handbook Rating: 5 out of 5 stars5/5U.S. Army Ranger Handbook Rating: 4 out of 5 stars4/5U.S. Army Survival, Evasion, and Recovery Rating: 0 out of 5 stars0 ratingsU.S. Army Survival Manual Rating: 4 out of 5 stars4/5The Soldier's Guide: The Complete Guide to US Army Traditions, Training, Duties, and Responsibilities Rating: 5 out of 5 stars5/5The Complete U.S. Army Survival Guide to Tropical, Desert, Cold Weather, Mountain Terrain, Sea, and NBC Environments Rating: 0 out of 5 stars0 ratingsU.S. Army Desert Operations Handbook Rating: 0 out of 5 stars0 ratingsU.S. Army Combat Skills Handbook Rating: 0 out of 5 stars0 ratingsU.S. Army Physical Readiness Training Manual Rating: 4 out of 5 stars4/5
Related to U.S. Army Counterintelligence Handbook
Related ebooks
U.S. Army Intelligence and Interrogation Handbook Rating: 5 out of 5 stars5/5U.S. Army Reconnaissance and Surveillance Handbook Rating: 4 out of 5 stars4/5U.S. Army Special Forces Handbook Rating: 4 out of 5 stars4/5U.S. Army Counterinsurgency Handbook Rating: 5 out of 5 stars5/5Hostage Rescue Manual: Tactics of the Counter-Terrorist Professionals, Revised Edition Rating: 5 out of 5 stars5/5U.S. Army Guide to Map Reading and Navigation Rating: 3 out of 5 stars3/5Ultimate Guide to U.S. Special Forces Skills, Tactics, and Techniques Rating: 5 out of 5 stars5/5U.S. Army Weapons Systems 2010-2011 Rating: 0 out of 5 stars0 ratingsHuman Intelligence Collector Operations Rating: 0 out of 5 stars0 ratingsCombat Leader's Field Guide Rating: 4 out of 5 stars4/5Executive's Guide to Personal Security Rating: 5 out of 5 stars5/5Tactical Combat Casualty Care and Wound Treatment Rating: 0 out of 5 stars0 ratingsU.S. Army Weapons Systems 2013-2014 Rating: 0 out of 5 stars0 ratingsU.S. Army Weapons Systems 2009 Rating: 0 out of 5 stars0 ratingsSmall Unit Leaders Operational Planning Guide Rating: 5 out of 5 stars5/5U.S. Army Combat Skills Handbook Rating: 0 out of 5 stars0 ratingsU.S. Army Ranger Handbook Rating: 4 out of 5 stars4/5How to Undertake Surveillance & Reconnaissance: From a Civilian and Military Perspective Rating: 0 out of 5 stars0 ratingsU.S. Army Combat Pistol Training Handbook Rating: 0 out of 5 stars0 ratingsU.S. Army Survival, Evasion, and Recovery Rating: 0 out of 5 stars0 ratingsU.S. Army Guerrilla Warfare Handbook Rating: 5 out of 5 stars5/5U.S. Army Field Manual 7-93 Long-Range Surveillance Unit Operations Rating: 0 out of 5 stars0 ratingsU.S. Army Hand-to-Hand Combat Rating: 5 out of 5 stars5/5The Complete U.S. Army Survival Guide to Firecraft, Tools, Camouflage, Tracking, Movement, and Combat Rating: 0 out of 5 stars0 ratingsCombat Tracking Guide Rating: 5 out of 5 stars5/5Ultimate Guide to U.S. Army Combat Skills, Tactics, and Techniques Rating: 4 out of 5 stars4/5
Wars & Military For You
Sun Tzu's The Art of War: Bilingual Edition Complete Chinese and English Text Rating: 4 out of 5 stars4/5Resistance: The Warsaw Ghetto Uprising Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5Art of War: The Definitive Interpretation of Sun Tzu's Classic Book of Strategy Rating: 4 out of 5 stars4/5The Art of War Rating: 4 out of 5 stars4/5A Daily Creativity Journal Rating: 4 out of 5 stars4/5Masters of the Air: America's Bomber Boys Who Fought the Air War Against Nazi Germany Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5The Rise and Fall of the Third Reich Rating: 4 out of 5 stars4/5The Wager Disaster: Mayem, Mutiny and Murder in the South Seas Rating: 4 out of 5 stars4/5The Art of War & Other Classics of Eastern Philosophy Rating: 4 out of 5 stars4/5The Happiest Man on Earth: The Beautiful Life of an Auschwitz Survivor Rating: 5 out of 5 stars5/5The Faithful Spy: Dietrich Bonhoeffer and the Plot to Kill Hitler Rating: 4 out of 5 stars4/5Twilight of the Shadow Government: How Transparency Will Kill the Deep State Rating: 0 out of 5 stars0 ratingsThe Last Kingdom Rating: 4 out of 5 stars4/5The Ethnic Cleansing of Palestine Rating: 4 out of 5 stars4/5Blitzed: Drugs in the Third Reich Rating: 4 out of 5 stars4/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5The Unabomber Manifesto: Industrial Society and Its Future Rating: 5 out of 5 stars5/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5The Mysterious Case of Rudolf Diesel: Genius, Power, and Deception on the Eve of World War I Rating: 4 out of 5 stars4/5The Rise of the Fourth Reich: The Secret Societies That Threaten to Take Over America Rating: 4 out of 5 stars4/5Nuclear War: A Scenario Rating: 4 out of 5 stars4/5The God Delusion Rating: 4 out of 5 stars4/5The Making of the Atomic Bomb Rating: 5 out of 5 stars5/5The Ruin of Kasch Rating: 4 out of 5 stars4/5Band of Brothers: E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest Rating: 5 out of 5 stars5/5Dr. Seuss Goes to War: The World War II Editorial Cartoons of Theodor Seuss Geisel Rating: 4 out of 5 stars4/5
Reviews for U.S. Army Counterintelligence Handbook
1 rating0 reviews
Book preview
U.S. Army Counterintelligence Handbook - U.S. Department of the Army
Additional material copyright © 2013 by Skyhorse Publishing, Inc.
No claim is made to material contained in this work that is derived from government documents. Nevertheless, Skyhorse Publishing claims copyright in all additional content, including, but not limited to, compilation copyright and the copyright in and to any additional material, elements, design, images, or layout of whatever kind included herein.
All inquiries should be addressed to Skyhorse Publishing, 307 West 36th Street, 11th Floor, New York, NY 10018.
Skyhorse Publishing books may be purchased in bulk at special discounts for sales promotion, corporate gifts, fund-raising, or educational purposes. Special editions can also be created to specifications. For details, contact the Special Sales Department, Skyhorse Publishing, 307 West 36th Street, 11th Floor, New York, NY 10018 or [email protected].
Skyhorse® and Skyhorse Publishing® are registered trademarks of Skyhorse Publishing, Inc.®, a Delaware corporation.
Visit our website at www.skyhorsepublishing.com.
10 9 8 7 6 5 4 3 2 1
Library of Congress Cataloging-in-Publication Data is available on file.
ISBN: 978-1-62087-478-3
Printed in the United States of America
Contents—FM 34-60
PREFACE
CHAPTER 1 MISSION AND STRUCTURE
General
Mission
CI in Support of Force XXI
Intelligence Tasks
CI Tasks
Army CI as a Function of MI
Counterreconnaissance
Other Specialties
Peace, War, and OOTW
The CI Structure
CI Support to US Forces
Planning
Tasking and Reporting
Joint and Combined Operations
Legal Review
CHAPTER 2 INVESTIGATIONS
General
Types of Investigations
CHAPTER 3 OPERATIONS AND TECHNIQUES
General
Operations
Techniques
CHAPTER 4 COUNTERINTELLIGENCE COLLECTION ACTIVITIES
General
Control of Source Information
CI Liaison
Debriefing
CI Force Protection Source Operations
CHAPTER 5 COUNTERINTELLIGENCE ANALYSIS AND PRODUCTION
General
CI Analysis
CI Analysis Target Nominations
CI Analysis Products
APPENDIX A COUNTER-HUMAN INTELLIGENCE TECHNIQUES AND PROCEDURES
Section I. BASIC INVESTIGATIVE TECHNIQUES AND PROCEDURES
Section II. INVESTIGATIVE LEGAL PRINCIPLES
Section III. TECHNICAL INVESTIGATIVE TECHNIQUES
Section IV. SCREENING, CORDON, AND SEARCH OPERATIONS
Section V. PERSONALITIES, ORGANIZATIONS, AND INSTALLATIONS LIST
Section VI. COUNTER-HUMAN INTELLIGENCE ANALYSIS
Section VII. PERSONNEL SECURITY INVESTIGATIONS
Section VIII. COUNTERINTELLIGENCE INVESTIGATIONS
APPENDIX B COUNTER-SIGNALS INTELLIGENCE TECHNIQUES AND PROCEDURES
Section I. DATABASE
Section II. THREAT ASSESSMENT
Section III. VULNERABILITY ASSESSMENT
Section IV. COUNTERMEASURES OPTIONS DEVELOPMENT
Section V. COUNTERMEASURES EVALUATION
APPENDIX C COUNTER-IMAGERY INTELLIGENCE TECHNIQUES AND PROCEDURES
GLOSSARY
Section I. Abbreviations and Acronyms
Section II. Terms
REFERENCES
Preface
This field manual (FM) provides guidance to commanders, counterintelligence (CI) agents, and analysts. The first four chapters provide information to the commander and staff while the remainder provides the tactics, techniques, and procedures (TTP) required to aggressively identify, neutralize, and exploit foreign intelligence attempts to conduct operations against the United States (US) Army.
CI supports Army operations by providing a clear picture of the threat to commands at all echelons and actions required to protect the force from exploitation by foreign intelligence. CI operations include conducting investigations, offensive and defensive operations, security and vulnerability analyses, and intelligence collection in peace and at all levels of conflict to support command needs.
CI supports the total intelligence process by focusing on foreign intelligence collection efforts. CI is designed to provide commanders the enemy intelligence collection situation and targeting information in order to counter foreign intelligence service (FIS) activities. CI is an integral part of the US Army’s all-source intelligence capability.
By its nature, CI is a multidiscipline effort that includes counter-human intelligence (C-HUMINT), counter-signals intelligence (C-SIGINT), and counter-imagery intelligence (C-IMINT) designed to counter foreign all-source collection. The CI force in conjunction with other intelligence assets must have the capability to detect all aspects of intelligence collection and related activities that pose a threat to the security of Army operations, personnel, and materiel.
Through its database (friendly and adversary) and analytical capability, CI provides sound recommendations, which if implemented, will result in the denial of information to the threat.
It should be noted that any decision regarding the implementation of CI recommendations aimed at denying collection opportunities to the adversary is a command decision. The commander may decide to accept the risk of enemy collection in favor of time, resources, or other higher priority considerations. At that point, the CI mission is considered to be successful because it is a tool of the commander.
This manual is designed for use by commanders and their staffs; all military intelligence (MI) commanders, their staffs, and trainers; and MI personnel at all echelons. It applies equally to the Active Army, United States Army Reserve (USAR), and Army National Guard (ARNG). It is also intended for commanders and staffs of joint and combined commands, United States Naval and Marine Forces, units of the US Air Force, and the military forces of allied countries.
Provisions of this manual are subject to international Standardization Agreements (STANAGs) 2363 and 2844 (Edition Two). When amendment, revision, or cancellation of this publication affects or violates the international agreements concerned, the preparing agency will take appropriate reconciliation action through international standardization channels. Chapter 1 implements STANAG 2844 (Edition Two) and Chapter 3 implements STANAG 2363.
The proponent of this publication is the United States Army Intelligence Center and Fort Huachuca. Send comments and recommendations on DA Form 2028 (Recommended Changes to Publications and Blank Forms) directly to Commander, US Army Intelligence Center and Fort Huachuca, ATTN: ATZS-TDL-D, Fort Huachuca, AZ 85613-6000.
Unless this publication states otherwise, masculine nouns and pronouns do not refer exclusively to men.
Chapter 1
Mission and Structure
General
Threat intelligence services have the capability to conduct continuous collection against the US Army during peacetime, operations other than war (OOTW), and during war itself. The intelligence that results from these operations provides a significant advantage to threat forces, and could easily result in increased US casualties on the battlefield. Fortunately, there are many actions we can take to counter threat intelligence efforts and to provide force protection to all US Army units. The most dramatic of these actions are designed to neutralize enemy collection. These actions include
■ Using field artillery to destroy ground-based enemy signals intelligence (SIGINT) collectors.
■ Conducting sophisticated C-HUMINT operations in a foreign city long before overt hostilities commence.
■ Employing direct fire weapon systems to destroy enemy reconnaissance. Brigades conducting defensive operations at the National Training Center often commit a tank-infantry company team to provide counterreconnaissance, intelligence, surveillance, and target acquisition (C-RISTA) protection.
While not as flashy, routine security procedures provide crucial force protection. These procedures include but are not limited to
■ Personnel security, to include background investigations, will ensure all personnel who have access to sensitive or classified information will fully protect it.
■ Information security, particularly in regard to handling classified and compartmented information, will be a challenging field in the future considering the ease with which information can be copied and transmitted in an increasingly automated Army.
■ Physical security, which ensures physical measures are taken to safeguard personnel, prevents unauthorized access to equipment, installations, materiel, and documents to safeguard them against espionage, sabotage, damage, and theft.
■ Operations security (OPSEC), which ensures that all essential elements of friendly information (EEFI), are reasonably concealed from enemy collection assets.
Another crucial component in the fight against threat collection efforts is CI analysis. These include efforts to identify the general capabilities and specific operations of enemy human intelligence (HUMINT), SIGINT, and imagery intelligence (IMINT) collection. CI analysis also includes the development of profiles that identify friendly vulnerabilities to enemy collection and possible countermeasures.
Measures such as these provide a crucial force protection shield that is difficult for the FIS to penetrate. More importantly, a comprehensive CI program significantly degrades the threat’s ability to target and conduct combat or terrorist operations against US Forces. Total CI provides the combat commander with a definite advantage on the battlefield.
AR 381-10, AR 381-12, and AR 381-47 (S) contain policies and procedures governing the conduct of intelligence activities by Department of the Army (DA).
Mission
The CI mission is authorized by Executive Order (EO)12333, implemented by AR 381-20. The Army conducts aggressive, comprehensive, and coordinated CI activities worldwide. The purpose is to detect, identify, assess, counter, neutralize, or exploit threat intelligence collection efforts. This mission is accomplished during peacetime and all levels of conflict. Many CI functions, shown in Figure 1-1, are conducted by echelons above corps (EAC); some by echelons corps and below (ECB); and some are conducted by both. Those CI assets found at ECB respond to tactical commanders. EAC assets respond primarily to commanders of intelligence units while supporting all commanders within their theater or area of operations (AO).
Figure 1-1. Counterintelligence functions.
The essence of the Army’s CI mission is to support force protection. By its nature, CI is a multidiscipline (C-HUMINT, C-SIGINT, and C-IMINT) function designed to degrade threat intelligence and targeting capabilities. Multidiscipline counterintelligence (MDCI) is an integral and equal part of intelligence and electronic warfare (IEW). MDCI operations support force protection through OPSEC, deception, and rear area operations across the range of military operations. For more information on IEW operations, see FM 34-1.
CI in Support of Force XXI
CI must meet the goals and objectives of Force XXI and force projection operations. US Forces will be continental United States (CONUS)-based with a limited forward presence. The Army must be capable of rapidly deploying anywhere in the world; operating in a joint or combined (multinational) environment; and defeating simultaneous regional threats on the battlefield; or conducting OOTW. CI, as part of IEW, is fundamental to effective planning, security, and execution of force projection operations. Successful force projection CI support is based on the same five key principles shown in Figure 1-2 and discussed below. CI, in support of force protection, will be required on the initial deployment of any force projection operation.
The Commander Drives Intelligence:
The commander focuses on the intelligence system by clearly designating his priority intelligence requirements (PIR), targeting requirements and priorities. He ensures that the Intelligence Battlefield Operating System (BOS) is fully employed and synchronized with his maneuver and fire support BOSs. He demands that the Intelligence BOS provides the intelligence he needs, when he needs it, and in the form he needs.
Intelligence Synchronization:
The J2 or G2 synchronizes intelligence collection, analysis, and dissemination with operations to ensure the commander receives the intelligence he needs, in the form he can use, and in time to influence the decisionmaking process. Intelligence synchronization is a continuous process which keeps IEW operations tied to the commander’s critical decisions and concept of operations. CI collection, analysis, and dissemination, like other intelligence, have to meet the commander’s time requirements to be of any use other than historical.
Split-Based Operations:
Split-based operations provide deploying tactical commanders with a portion of their collection assets and augment full employment of organicassets. Split-based intelligence operations employ collection and analysis elements from all echelons, national to tactical, in sanctuaries from which they can operate against the target area.
Tactical Tailoring:
In force projection operations, the commander tactically tailors CI, as well as all IEW, support for each contingency based on the mission and availability of resources. He must decide which key CI personnel and equipment to deploy early, and when to phase in his remaining CI assets.
Broadcast Dissemination:
Broadcast dissemination of intelligence includes the simultaneous broadcast of near-real time (NRT) CI from collectors and processors at all echelons. It permits commanders at all echelons to simultaneously receive the same intelligence, thereby providing a common picture of the battlefield. It allows commanders to skip echelons and pull CI directly from the echelon broadcasting it.
Figure 1-2. Principles of force projection IEW operations.
Intelligence Tasks
Army military intelligence (MI) accomplishes its mission by performing six primary tasks: providing indications and warnings (I&W); performing intelligence preparation of the battlefield (IPB); performing situation development; supporting target development and targeting; developing force protection intelligence; and performing battle damage assessment (BDA).
CI Tasks
The role of CI is to support the commander’s requirements to preserve essential secrecy and to protect the force directly or indirectly. Thus, CI contributes to the commander’s force protection programs. Force protection is a command responsibility to protect personnel, equipment, and facilities. To carry out his force protection responsibilities, a commander requires support from several sources, one of which is the intelligence community. CI support to force protection must be tailored to the sensitivity of the supported organization and its vulnerability to FIS and hostile attack. CI support can be tailored from a combination of activities to include
■ Mobilization security, including ports and major records repositories.
■ Combatting terrorism.
■ Rear operations.
■ Civil-military affairs.
■ Psychological operations (PSYOP).
■ Battlefield deception.
■ OPSEC.
■ Friendly Communications-Electronics (C-E) (C-SIGINT).
■ CI force protection source operations (CFSO).
Army CI as a Function of MI
Army CI, as a multidiscipline intelligence function, is an integral part of the Army and Department of Defense (DOD) and national intelligence communities. CI missions are conducted in support of the objectives of these communities.
Counterreconnaissance
CI is an integral part of the command counterreconnaissance effort. Human and other intelligence sensors determine adversary reconnaissance, intelligence, surveillance, and target acquisition (RISTA) and other battlefield capabilities, and project resultant data into battle planning and execution. As the adversary worries about our C-RISTA capability, our CI efforts target his RISTA capabilities. CI focuses on the HUMINT threat in the AO and provides analytical support in identifying enemy SIGINT and IMINT capabilities and intentions. CI has a limited neutralization and exploitation capability directed at low-level adversary HUMINT collectors or sympathizers acting in a collection or sabotage capacity. The commander is responsible for security countermeasure programs and training to include personnel, physical, document, information security, crime prevention, and OPSEC.
Other Specialties
Army CI is not limited to the activities of a small force of CI agents and technicians; rather, it is the responsibility of all Army personnel to follow common sense security measures to minimize any foreign intelligence threat. Although a major part of the CI mission is to counter or neutralize FIS efforts, this does not mean that only CI personnel take part in these actions. They may require
■ Other intelligence specialists such as interrogators.
■ Military police (MP).
■ Civilian counterparts and authorities.
■ Combat forces.
■ Civil-military affairs and PSYOP.
The combined use of C-HUMINT, C-SIGINT, and C-IMINT TTPs provides a multidisciplined approach to denying information to unauthorized persons. This approach limits the threat’s ability to collect against us. Although this FM describes these three operations separately in Chapter 3, they are often conducted simultaneously by the same assets.
Peace, War, and OOTW
The Army conducts CI during peacetime and at all levels of conflict to protect the force from foreign exploitation. During peacetime, CI simultaneously supports the commander’s needs and DA policy.
During war, CI operations are much the same as in peacetime, except the adversary state or nation is well-defined. The commander’s needs are the top priority.
OOTW may include the direct or indirect support of one or more foreign governments or groups, or international organizations such as the North Atlantic Treaty Organization (NATO). OOTW may be initiated unilaterally in the absence of foreign support. Whether unilateral or multinational, US Forces usually operate in a joint environment. Normally in OOTW, military force is used only as a last resort. OOTW consists of the following operational categories:
■ Noncombatant evacuation operations.
■ Arms control.
■ Support to domestic civil authorities.
■ Humanitarian assistance (HA) and disaster relief.
■ Security assistance.
■ Nation assistance.
■ Support to counter-drug operations.
■ Combatting terrorism.
■ Peacekeeping operations.
■ Peace enforcement.
■ Show of force.
■ Support for insurgencies and counterinsurgencies.
■ Attacks and raids.
The CI Structure
To accomplish the CI mission at various echelons, specially trained CI personnel are assigned to tactical CI organizations as shown in Figure 1-3. Organizations include
■ CI organizations organic to theater Army MI brigades or groups which are United States Army Intelligence and Security Command (INSCOM) organizations.
■ Tactical exploitation battalion (TEB) and headquarters (HQ) and operations battalion of the corps MI brigade.
■ MI battalion at division.
■ MI companies at armored cavalry regiments (ACRs) and separate brigades.
■ MI elements at special forces groups.
At each echelon, CI teams provide command and control (C 2) of CI assets; conduct CI investigations, operations, and collection; perform analysis and produce CI products; and provide security advice and assistance.
Only CI officers, technicians, agents, or accredited civilian employees control and conduct investigations. Additionally, DA policy identifies CFSO as a CI function as described in Chapter 4. CI personnel are also collectors of information, working individually or in teams with interrogators and technicians when resources permit. At ECB, CI personnel work in CI platoons at division level and CI companies at corps level. At EAC, CI personnel work individually or in groups in field offices, resident offices, or MI detachments or companies.
Another CI military occupational specialty (MOS) is MDCI analyst 97G. In addition to performing C-SIGINT operations and communications monitoring, these soldiers perform MDCI analysis and produce MDCI products.
Figure 1-3. Cl organization at echelons corps and below.
Interrogator and other personnel possessing requisite linguistics capability work with CI teams when conditions and resources permit. Provided these personnel are competent in the foreign language appropriate to the AO and possess the required security clearance, they perform interpreter, translator, liaison officer, and (after appropriate training) source handler duties. CI teams, found in some tactical units, are task organized based on mission, enemy, troops, terrain and weather, and time available (METT-T) factors. CI teams are composed of a CI technician, several CI agents and interrogation personnel, and MDCI analysts. Other CI teams are composed of CI agents and analyst personnel. At EAC, CI personnel work individually or in groups in resident offices, field offices, MI detachments, companies, or regions. Depending on the mission, additional specialists may either be attached or task organized to provide temporary expertise, such as
■ Physical security specialists.
■ MP.
■ Other intelligence personnel trained to accomplish a specific mission.
CI Support to US Forces
CI assets are deployed to provide area coverage. Only when driven by PIR should they be given a mission other than area coverage, such as specialized support to a special access program. When assigning missions to CI elements, METT-T must be carefully considered to ensure tasks are prioritized and CI assets are properly utilized.
Most CI operations develop slowly. Therefore, missions should be assigned for relatively long periods. If a team is investigating a sabotage incident, its mission should be assigned for as long as it takes to complete the mission. If a team is establishing liaison with host nation officials, this mission should remain with the team long enough to turn the liaison over to another team.
Within corps and divisions, CI assets are given an area coverage role. Based on priorities established by the corps or division commander, or G2, the MI battalion commander controls the CI assets as they execute the mission.
Although CI operations may change with priorities, CI assets must attempt to ensure commanders get what they need, when they need it, and in a form they can use before changing missions.
Planning
For contingency operations, CI elements should have the following procedures firmly in place prior to deployment:
■ Updated threat databases.
■ Planned CI communications in time to support decisionmaking.
■ Approved operations plans (OPLANs) with financial annexes for any