11-3.CI elements are instrumental in contributing to situational awareness in the AOI. CI elements may corroborate other intelligence discipline information as well as cue other intelligence assets through the CI core competencies and through CI technical services. The CI core competencies are collection, investigations of national security crimes within the purview of CI, operations, and analysis and production. CI technical services include computer network operations, technical surveillance countermeasures (TSCM), and polygraph. CI focuses on combating adversary intelligence activities targeting Army personnel, plans, operations, activities, tech-nologies, and other critical information and infrastructure.

COUNTERINTELLIGENCE FUNCTIONS

11-4.CI functions are interrelated, mutually supporting, and can be derived from one another. No single function or technical capability can defeat adversary intelligence efforts to target US interests. CI functions are discussed below.

CI INVESTIGATIONS

Copy clip 2 9 5 – clipboard manager duties. 11-5.Investigative activity is essential to countering the adversary intelligence threat to Army interests. CI places emphasis on investigative activity to support force, infrastructure and technology protection, homeland defense, information assurance, and security programs. CI investigations focus on resolving allegations of known or suspected acts that may constitute National Security Crimes under US law. The primary objective in any CI investigation is the detection, identification, exploitation, and/or neutralization of adversary intelligence threats directed against the US Army. CI investigations are also conducted to identify systemic security problems that may have damaging repercussions to Army operations and national security interests. All CI investigations are conducted within guidelines established in AR 381-10, AR 381-12, AR 381-20, applicable DOD policy and directives, and US laws.

CI OPERATIONS

11-6.CI operations are characterized as those activities that are not solely associated with investigative, collection, analysis, or production functions. CI operations can be either offensive or defensive in nature; they are derived from or transition to a collection or investigative activity depending on the scope, objective, or continued possibility for operational exploitation. CI operations fall into two categories: CI support operations and CI sensitive operations.

CI COLLECTION

11-7.Collection Activities. CI elements conduct collection activities focused on adversary intelligence threats that target US and multinational interests. CI collection is conducted through the use of sources, assets, official contacts, and other human or multimedia sources to obtain information that impacts the supported unit. CI will not be used as a substitute for Army HUMINT collection. These activities are designed to collect specific information or develop leads concerning adversary intelligence collection requirements, capabilities, efforts, operations, structure, personalities, and methods of operation targeting US and multinational interests. CI collection can result from ongoing CI investigations or operations or serve to initiate CI investigations and/or operations.

11-8.Liaison. CI elements conduct liaison with US, multinational, and HN military and civilian agencies, to include NGO, for the purpose of obtaining information of CI interest and coordinating or deconflicting CI activities. Liaison activities are designed to ensure a cooperative operating environment for CI elements and to develop CI leads for further exploitation.

11-9.CI Collection Activities and Source Operations (CASO). CASO is used to collect information on direct threats to US Army installations, organizations, activities, and personnel. The CASO program is not intended to be used as a substitute for tactical HUMINT contact operations. CASO can be used to initiate CI investigations, identify potential leads for offensive operations, or develop additional CASO leads. Only designated units, in accordance with applicable policy, will be authorized to pursue investigative and offensive operational leads from ongoing CASO operations.

11-10.Screening. CI Special Agents work jointly with HUMINT Collectors during screening operations to identify civilians on the battlefield, EPWs, detainees, and other noncombatants who may have information of CI interest or to develop CI leads. CI screening is also conducted during the process of hiring HN citizens for Army and DOD employment. Information obtained during screening operations may be used to initiate CI investigations and operations or to cue other intelligence collection disciplines such as HUMINT, IMINT, SIGINT, and MASINT.

11-11.Debriefing. CI Special Agents conduct debriefings of friendly force, HN, or the local population who may have information of CI interest regarding adversary intelligence collection or targeting efforts focused on US and multinational interests.

11-12.Functional Services. CI elements conduct functional services to assist traditional CI activities of investigations, collection, operations, analysis, and production; they also provide tailored support to US, DOD, and Army protection and security programs for commanders at all echelons. CI elements may use one or several of the functional services simultaneously to provide tailored support to a particular CI mission or supported program. CI functional services consist of:

11-13.CI Technical Services. CI technical services are used to assist the CI functions of investigations, collections, and operations or to support functional services conducted by CI elements. For additional information on CI technical services, refer to AR 381-20 (SECRET/NOFORN) and FM 34-5. CI technical services consist of:

Tek

ANALYSIS

11-14.IPB, all-source, and single-source analysis are used to template adversary intelligence activities. Analysis is also used to make recommendations to the commander on how to counter adversary intelligence efforts and to refine CI activities to potentially neutralize and/or exploit those efforts and to continually focus the efforts of CI teams. CI analysis focuses on the multidiscipline adversary intelligence collection threat targeting infor-mation on US multinational personnel, operations, activities, technology, and intentions. Raw information, open-source material, and finished intelligence products are analyzed in response to local and national requirements. Analysis occurs at all levels from tactical to strategic.

PRODUCTION

11-15.CI products consist of, but are not limited to, target nomination, CI input to TVAs, CI estimates, and investigative and intelligence information reports. Finalized intelligence derived from CI activities are incorporated into joint and national intelligence databases, assessments, and analysis products. CI products are also incorporated into the COP to support battlefield situational awareness. CI production takes place at all levels.

·Operational and tactical production includes tactical alerts, spot reports, and current intelligence; CI threat and/or vulnerability assessments tailored to specific activities, units, installations, programs, or geographic areas; CI studies to support contingency planning and major exercises; studies of adversary intelligence organization, MO, personnel, activities, and intentions that pose a current or potential threat to the supported command.

·Strategic products include assessments supporting national and Army programs including SAPs and acquisition programs; worldwide assessments of the organization, location, funding, training, operations capabilities, and intentions of terrorist organizations; global trends in adversary intelligence MO; after-action studies of individual espionage cases; analyses of the intelligence collection capabilities of international narcotics trafficking organizations; and multimedia threat products to support Army CI awareness programs.

TECHNICAL SERVICES

11-16.CI organizations with technically trained CI Special Agents are chartered with providing unique technical capabilities to augment CI investigations, collection, and operations. These technical capabilities are not used as substitutes for CI activities, but support traditional CI techniques employed to counter and neutralize adversary intelligence activities targeting US interests.

Security Spy 4 2 11 Bolum Tek

11-17.Selected CI Special Agents are trained to identify human deception indicators during the course of investigations, operations, and collection missions. Required training and skills include the use of polygraph and emerging biometric technologies that can recognize indications of deception by human sources, contacts, and subjects of investigations, as well as analysis and reporting of results.

11-18.TSCM CI Special Agents are trained in sophisticated electronic and sensing equipment to identify technical collection activities carried out by adversary intelligence entities. The use of TSCM is critical to ensuring that sensitive and/or restricted areas are clear of any adversary intelligence-placed active or passive electronic sensing, or eavesdropping or collection devices. These areas include SCIF, secure working and planning areas, and C2 facilities.

11-19.CNO consist of computer network attack (CNA), computer network defense (CND), and computer network exploitation (CNE). CI Special Agents are specially trained in the areas of computer operation, network theory and administration, and forensics, along with IO in order to ensure US information dominance. The reliance on networked systems will result in greater emphasis being placed on information assurance. Specially selected CI agents will be trained in CNO in order to assist in protecting US information and information systems while exploiting and/or attacking adversary information and information systems.

11-20.For more information on technical services, refer AR 381-20 and FM 34-5.

OPERATIONAL EMPLOYMENT

11-21.Army CI supports the full spectrum of military operations. The Army requires a well-trained CI force consisting of AC, RC, civilian government employee, and contractor personnel. CI elements are focused on and dedicated to detecting, identifying, neutralizing, and/or exploiting adversary intelligence elements attempting to collect information on US forces. Effective employment of Army CI elements in all phases of operations and at all levels from tactical to strategic is paramount to countering any adversary intelligence threat to US interests and resources. Moreover, Army CI protects special programs that provide R&D, acquisition, and integration of technologies leading to future technological overmatch. CI elements have the capability and authority to conduct complex, nontraditional operations in this Information Age to CE, to both protect critical technologies and satisfy Army, DOD, and national level CI objectives.

LEVELS OF EMPLOYMENT

Strategic and Departmental

11-22.Strategic and departmental operations will be conducted by CI elements supporting national, DOD, and DA required missions (for example, support to NATO and special operations and missions). Strategic and departmental CI will conduct compartmented investigations and operations to affect the knowledge of adversary intelligence regarding CONOPS and defense information. Army CI will execute the full range of CI functions and missions at the strategic and departmental level including CI investigations and operations, CE, technology protection, SAP support, treaty verification, and technical CI services (polygraph, TSCM, and computer forensics). Strategic and departmental CI will also support SOF and special mission units (SMUs) within the scope of applicable national, DOD, and DA security policies and regulations.

Operational

11-23.Operational missions of CI elements will support combatant commanders, generally in geographic AOIR. Operational CI elements will focus on threat identification and countering regional adversary intelligence threats. Operational level CI activities and functions include CI investigations and operations, CE, technology protection, SAP support, treaty verification, and technical CI services (polygraph, TSCM, and computer forensics). CI elements must be capable of quickly transitioning from a peacetime mission to crisis operations to support combatant commander requirements. Theater CI assets will conduct unilateral to multinational operations in designated theaters. Operational elements may also be deployed to support or reinforce tactical forces in CONOPS.

Tactical

11-24.CI teams will conduct operations throughout the battlespace during CONOPS. CONOPS support activities include conduct of CASO, limited CI investigative capability, personnel security investigations, screenings, and debriefings. CI activities in CONOPS focus on countering the adversary intelligence threat and assisting in conducting TVAs. 4k converter 9 2 8. TVAs will be conducted in conjunction with MPs, Engineers, and Medical Service personnel to provide the commander with a comprehensive FP assessment. During peacetime, organic tactical CI teams conduct activities in accordance with approved regulations and command guidance.

SUPPORT TO CONTINGENCY OPERATIONS

11-25.The initial phase of operations from PME to MTW lays the foundation of future team operations. In general, the priority of effort focuses inward on security of operating bases, areas of troop concentration, and C2 nodes to identify the collection threat to US forces that could be used by adversary elements to plan hostile acts against US activities and locations.

11-26.Once security of the operating bases has been established, the operational focus of CI teams shifts outside the operating base to continue to detect, identify, and neutralize the collection threat to US forces as well as to provide I&W of hostile acts targeting US activities. The CI team uses several collection methods, to include CASO, elicitation, and liaison, to answer the supported commander's requirements. This is referred to as the continuation phase. The CI team conducts CI investigations to identify, neutralize, and exploit reported threat intelligence collection efforts.

11-27.A key element to the CI team's success is the opportunity to spot, assess, and develop relationships with potential sources of information. Operating as independent teams, without being tied to ISR or combat assets, enables the CI team's maximum interaction with the local population, thereby maximizing the pool of potential sources of information. Along with the opportunity to spot, assess, and interact with potential sources of information, a second key element of a CI team's success is its approach-ability to the local population. A soft posture enables a CI team to appear as non-threatening as possible. Experience has shown that the local population in general is apprehensive of fully and openly armed patrols and soldiers moving around population centers.

11-28.During some operations, civilian attire or nontactical vehicles may be used to lower the CI team profile. In some special situations, these measures are taken to make the operation less visible to the casual observer. Also, in some cultures, sharing food and beverages among friends is expected; exceptions to restrictions or general orders should be considered to facilitate successful CI team operations, many of which are geared towards developing relationships with potential sources of information.

SUPPORT TO INSTALLATIONS AND OPERATING BASES

11-29.CI teams, as part of a multi-agency team consisting of MPs, CA, medical, and EOD, support the conduct of TVAs of installations and operating bases to identify the intelligence threat to the operating locations. Detailed TVAs identify weaknesses in operational and physical security procedures and recommend countermeasures to mitigate intelligence collection on friendly forces limiting the ability to plan hostile acts on US activities and locations. CI activities supporting installations and operating bases include:

TACTICS, TECHNIQUES, AND PROCEDURES

11-30.At the CI team level, team members conduct mission analysis and planning specific to their AO. Backwards planning and source profiling are used extensively to choose CI targets. To verify adequate area coverage, the CI team may periodically develop and use CI target overlays and other CI analytical tools that illustrate the CI situation, identify CI gaps, and help refocus the collection effort.

11-31.The CI team is also in constant contact with the supported S2 and the other ISR assets (Scouts, PSYOP, CA, and MP) in order to coordinate and deconflict operations and to cross-check collected information. The supported unit S2, with the help of the CI team, regularly and systematically debriefs all ISR assets. App tamer 1 0 8 ubk download free.

11-32.The CI team must be integrated into the supported unit's ISR plan. The CI OMT chief will advise the supported unit on the specific capabilities and requirements of the team to maximize mission success.

OPERATIONAL RISK MITIGATION

11-33.The employment of CI teams includes varying degrees of contact with the local population. As the degree of contact with the population increases, both the quantity and quality of CI collection increases. In many instances, however, there is a risk to the CI team inherent with increased exposure to the local population. The decision at what level to employ a CI team is METT-TC dependent. The risk to the CI assets must be balanced with the need to collect priority information and to protect the force as a whole. ROE, SOFA, direction from higher headquarters, and the overall threat level may also restrict the deployment and use of CI teams. The commander should consider exceptions to the ROE to facilitate CI collection.

11-34.Risks are minimized through the situational awareness of CI team members. They plan and rehearse to readily react to any situation and carry the necessary firepower to disengage from difficult situations. If it becomes necessary to call for assistance, adequate and redundant communications equipment is critical. These scenarios and actions should be trained prior to deployment into a contingency area and rehearsed continuously throughout the deployment.

11-35.A supported unit commander is often tempted to keep the CI team 'inside the wire' when the THREATCON level increases. The supported commander must weigh the risk versus potential information gain when establishing operational parameters of supporting CI teams. This is necessary especially during high THREATCON levels when the supported unit commander needs as complete a picture as possible of the threat arrayed against US and multinational forces.

11-36.When it is not expedient to deploy the CI team independently due to threat levels or other restrictions, the team can be integrated into other ongoing operations. The CI team may be employed as part of a combat, ISR, or MP patrol or used to support CA, PSYOP, engineer, or other operations. This method reduces the risk to the team while allowing a limited ability to collect information. It has the advantage of placing the team in contact with the local population and allowing it to spot, assess, and interact with potential sources of information. However, this deployment method restricts collection by subordinating the team's efforts to the requirements, locations, and timetables of the unit or operation into which it is integrated and does not allow for the conduct of sensitive source operations. This method of employment should be considered a last resort.

COUNTERINTELLIGENCE EQUIPMENT

11-37.Basic C2, transportation, and weapons requirements do not differ significantly from most soldier requirements and are available as unit issue items. However, CI teams have unique communications, collection, process-ing, and mission-specific requirements.

COMMUNICATIONS

11-38.Dedicated and Secure Long-Range Communications. These are keys to the success of the CI team mission. CI team operations require a secure, three-tiered communications architecture consisting of inter/intra-team radios, vehicle-based communications, and a CI and HUMINT base station.

11-39.Communications Network. The CI team must have access to existing communications networks such as the tactical LAN. The CI team must also be equipped with its own COMSEC devices. It is imperative that the CI team acquire access to the public communication system of the HN. This can be in the form of either landlines or cellular telephones. Such access enables the CI team to develop leads which can provide early indicators to US forces.

11-40.Interoperability. Communications systems must be equipped with an open-ended architecture to allow for expansion and compatibility with other service elements, government organizations, NGOs, and multinational elements to effectively communicate during CONOPS. All ISR systems must be vertically and horizontally integrated to be compatible across all BOSs and with Legacy and Interim Force elements.

11-41.SOTM. To provide real-time and NRT information reporting, CI elements must have the capability to transmit voice, data, imagery, and video while on the move. CI teams must be able to transmit while geographically separated from their parent unit while operating remotely. This broadband requirement can only be achieved through a SATCOM capability and must be achievable while mobile.

CI COLLECTION AND PROCESSING SYSTEMS

11-42.The CI team must rely on automation to achieve and maintain information dominance in a given operation. With time, effective collection planning and management at all echelons, the CI team can collect a wealth of information. The sorting and analysis of this information in a timely and efficient manner is crucial to operations. Automation helps the CI team to report, database, analyze, and evaluate the collected information quickly and to provide the supported unit with accurate data in the form of timely, relevant, accurate, and predictive intelligence.

11-43.Automation hardware and software must be user friendly as well as interoperable among different echelons and services. They must interface with the communications equipment of the CI team as well as facilitate the interface of audiovisual devices. Technical support for hardware and software must be available and responsive.

11-44.The demand for accurate and timely CI reporting, DOCEX, and open-source information has grown tremendously. Biometric (physiological, neuro-logical, thermal analysis, facial and fingerprint recognition) technologies will allow rapid identification, coding, and tracking of adversaries and human sources; as well as cataloging of information concerning EPWs, detainees, and civilians of CI interest on the battlefield. Biometrics will also provide secure authentication of individuals seeking network or facility access.

11-45.CI teams work with multinational forces and other foreign nationals and require the ability to communicate in their respective languages. Often CI personnel have little or no training in the target language, and lack of skilled interpreters can hinder CI activities. CI teams require textual and voice translation devices, source verification, and deception detection machines (biometrics) to improve collection capability and accuracy.

11-46.CI teams require dynamic MLT tools that provide both non-linguists and those with limited linguist skills a comprehensive, accurate means to conduct initial CI screenings and basic interviews in a variety of situations. CI elements will focus on in-depth interviews and communications with persons of higher priority. MLT tools minimize reliance on contract linguists and allow soldiers to concentrate on mission accomplishment.

MISSION SPECIFIC

11-47.The CI team may conduct night operations and must be equipped with NVDs for its members, and photographic and weapons systems. The CI team also may operate in urban and rural areas, where the threat level can vary from semi-hostile to hostile. The safety of the CI team can be enhanced with equipment that can detect, locate, suppress, illuminate, and designate hostile optical and E-O devices. In addition, high power, gyro-stabilized binoculars, which can be used from a moving vehicle, increases the survivability of the CI team and also gives the team another surveillance and collection device.

11-48.Some of the CI team missions may require the documentation of incidents. The CI teams can use the following equipment in their open-source collection efforts.

INTEGRATION OF LINGUISTS

11-49.Integrating linguists into the CI team should take place as soon as possible. Security clearances and contractual agreements will help the team determine the level of integration.

11-50.Along with the basic briefing of what is expected of the civilian linguists as interpreters, CI teams should be informed about the civilians' chain of command and the scope of their duties beyond interpreting. The CI team leader must ensure that linguists are trained and capable of completing all tasks expected of them.

BATTLE HAND-OFF

11-51.CI teams are always engaged. A good battle hand-off is critical to smooth transition and mission success. The battle hand-off can directly contribute to mission success or failure of the outgoing team, but especially of the incoming team. The battle hand-off begins the first day the CI team begins to operate in an AO. Regardless of how long the team believes it will operate within the AO, it must ensure there is a seamless transition to an incoming team, other US unit, or agency. The CI team accomplishes this transition by establishing procedures for source administration, database maintenance, and report files.

11-52.Teams must plan and implement a logical and systematic sequence of tasks that enables an incoming team to assume the operations in the AO. Adequate time must be allotted for an effective battle hand-off. In some environments, a few weeks may be necessary to accomplish an effective battle hand-off. Introductions to sources of information, especially CASO sources, are critical, and teams must prioritize their time. During this time the outgoing CI team must familiarize the new CI team with all aspects of the operation, which include past, present, and planned activities within the AO. Area orientation is critical. These include major routes, population centers, potential hot spots, and other points of interest (such as police stations, political centers, and social centers).

ORGANIZATION

11-53.CI activities require a complex C2 relationship to ensure that the requirements of the supported commander are fulfilled while balancing the need for strict integrity and legality of CI operations. This complex relationship balances the role of the SIO as the requirements manager and the 2X as the mission manager with the MI commander as the asset manager.

COMMAND VERSUS CONTROL

11-54.ARFOR will normally deploy as part of a joint, multinational, and/or combined operation. In all cases, commanders at each echelon will exercise command over the forces assigned to their organization. Command includes the authority and responsibility for effectively using resources, planning for and employment of forces, and ensuring that forces accomplish assigned missions. Leaders and staffs exercise control to facilitate mission accomplishment.

11-55.While the MI commander supervises subordinates and produces reports, the *2X synchronizes activities between intelligence units and provides single-source processing and limited analysis. (*2X ' indicates 2X functions at all levels.) While the MI commander takes care of the operators executing missions, the *2X obtains the data and reports from higher echelons required to execute the missions.

Staff Responsibilities and Functions

11-56. The *2X staff is responsible for the integration, correlation, and fusion of all Human Sensor information into the Intelligence BOS within the *2X AOIR. The *2X is also responsible for analyzing adversary intelligence collection, terrorist and sabotage activities, developing countermeasures to defeat threat collection activities, identifying and submitting collection requirements to fill CI collection gaps, and providing input to the all-source picture regarding adversary intelligence activities.

11-57.The *2X Staff Officer provides CI and HUMINT collection expertise. The *2X:

11-58.The ACE and JISE CI analysis team analyzes threat intelligence collection and the intelligence collection efforts of foreign organizations involved in terrorism and sabotage in order to develop countermeasures against them. CI analysis cross-cues IMINT, SIGINT, MASINT, and TECHINT resources in addition to CI-related HUMINT reporting and analysis to counter threat collection capabilities against the deployed force. While the HAC supports the positive collection efforts of the force, the CI analysis team supports the 'defend' aspects of the commander's FP program.

11-59.CI analysis is the analysis of the adversary's HUMINT, IMINT, SIGINT, and MASINT capabilities in support of intelligence collection, terrorism, and sabotage in order to develop countermeasures against them. It involves a reverse IPB process in which the analyst looks at US forces and operations from the threat's perspective. CI analytical products are an important tool in the COA development in the MDMP. This analytical tool supports the commander's FP program and facilitates the nomination of CI targets for neutralization or exploitation. (See FM 2-01.2 (FM 34-60) for more information on CI analysis.) Specifically, CI analysis-

11-60.For intelligence reach operations, CI products are available and disseminated in a variety of forms. It is incumbent on the requestor to ensure the CI product can be transmitted over the available communications systems. This includes verifying the appropriate security level of the communications systems.

CI TEAM STRUCTURE

11-61.OMT. The OMT is a four-person team consisting of a WO, two NCOs, and a junior enlisted soldier. (Civilians may be inserted into this structure as appropriate.) Rank structure and standards of grade for OMTs will vary depending upon the skill sets required and mission focus. CI OMTs will provide operational guidance for 1 to 4 CI teams, depending on mission focus and operational tempo. When two or more CI teams are deployed in a DS role, an OMT is also deployed to provide technical control. The OMT works closely with the supported S2 and ACT to furnish current threat information and to answer the supported commander's PIRs and IRs. OMTs coordinate with the supported 2X and manage subordinate CI teams to:

11-62.CI Team. The CI team is a four-person team consisting of two NCOs and two junior enlisted personnel. Rank structure and standards of grade for CI teams will vary depending upon the skill sets required and mission focus. CI teams are trained to execute the full range of CI functions; however, they may be assigned to mission-focused elements (for example, CE, CI projects). Assignment to a TSCM, polygraph, or information warfare team requires additional, specialized technical training.

Security Spy 4 2 11 Bolum Kanal D


Security Spy 4 2 11 Bolum 1

Join the GlobalSecurity.org mailing list

Security Spy 4 2 11 Bolum Izle