CI TARGETING (FOR ECCIU KESHAV MAZUMDAR ATO)
 
                           
DETECTING CI TARGETS
 
INTRODUCTION:
 
     The identification of CI targets are done through the intelligence
rules. A data base WITH a line and block box, used in connection WITH existing
black, grey and white lists, intelligence reports and additional information
from the police agencies, army and other agencies, provides us WITH basic
information required to identify the potential CI targets.
 
GENERAL FACTS:
 
     A.    Review the CI estimate to determine the hostile threat:
 
           1.   Identify those threats to security that are of an immediate
nature.
 
           2.   Identify anticipated future threats.
 
NOTE:  The selection of CI targets must be based in an evaluation of a
complete hostile threat.
 
     B.    Identify the specific CI targets of the local area:
 
     a.    The CI targets are of interest due to the threat that they
present, or the usefulness to the Armed Forces. CI targets include:
 
     a.    PERSONALITIES: that could or not be
friendly or hostile.
 
     b.    INSTALLATIONS: that represent a threat to the
national security.
 
     c.    ORGANIZATIONS AND TEAMS : that represent a threat
to the national security. Its threat perhaps is not openly detectable due to
their undercover operation methods.
 
     d.    DOCUMENTS AND MATERIALS: WITH value to the
intelligence or the counter intelligence.
 
NOTE:  Use the CI Work Sheet as the principal paper to assist
in the development of the targets:
 
 
                                
 
     3.    Obtain information about the potential CI targets in the local
area:
 
           a.   Extract the local targets from the CI target lists at
national level.
 
           b.   Extract information from the existing Black ,White , and Grey lists  .
 
           c.   Extract information from the intelligence files, CI data
base, and similar files.
 
           d.   Obtain information from:
 
           1)   Civilian Affairs and Psychological Operations 
 
           2)   Local intelligence units
 
           3)   Police elements
 
     C.    Categorize the CI targets identified by the specialty or function. 
Examples:
 
     1)    Espionage agents
     2)    Sabotage specialists
     3)    Messengers
     4)    Camps or bases
     5)    Communications and link routes
 
NOTE:  To categorize the targets in this manner, it is essential that the
history detailed information is obtained from the same source that was used to
identify them.
 
     D.    Assign priorities to the targets:
 
     1.    Determine the priority of each Target based on:
 
           a.   The threat to the national security that the target
represents.
 
           b.   The urgency or the need to neutralize or exploit the target.
 
           c.   The future capacities that await the target.
 
           d.   The capacities of the units responsible to neutralize or
exploit the targets.
 
                               
 
     2.    Assign a numerical priority to each target:
 
           a.   The numerical designations are always expressed in roman
numerals (I, IV, XI).
 
           b.   The numerical designation emphasizes the relative importance
or the value of the CI targets.
 
           c.   The numerical designation expresses the level of interest of
the target.
 
NOTE:  If a target has been assigned a priority at a level higher than the
Command, you at your level cannot alter this priority designation. The local
CI elements will assign priorities to targets locally developed.
 
     E.    Assign the responsibilities of the units to neutralization or
exploitation of each target:
 
           1.   Determine the capacities of the units to carry out
neutralization or exploitation missions based on:
 
     a.    Amount of personnel
     b.    Equipment available
     c.    Specific experience
 
           2.   Identify the need, if any, to request support from the
military police, infantry, national police, etc.
 
NOTE:  The tactical effort, except in special cases, takes precedence over the
neutralization and exploitation of the targets.
 
     F.    Notify the units of their mission(s).
 
 
REFERENCES TO CHARTS, MAPS DATE:
 
_________________________________________________________________
 
KEYS TO CHART:
1.   Target
2.   Target classification
3.   Priority
4.   Localization
5.   Team task
6.   Team mission (Comments)
7.   An administrative number that is written down in chronological order.
8.   The classification identifies the target by type, name and provides
specific data for identification about the target.
9.   The priority is designated WITH roman numerals and is assigned based
upon the target classification.
10.  The localization will identify the place where you may find the target
or if this is not known, it is identified where the target was found the last
time.
11.  The team's task of identifying the CI team whose mission is to
neutralize the target is based in the number of persons available and could
include tactical forces, military police and para-military forces.
12.  This column is used to make a list of the coordination requirements,
communications, specific details of the mission or other specific information
required so that the team could fulfill its mission.
 
 
 
 
                              
                              BLACK LISTS
 
     THESE CONTAIN THE IDENTITIES AND LOCALIZATIONS OF PERSONS WHOSE CAPTURE
AND DETENTION ARE OF FOREMOST IMPORTANCE TO THE ARMED FORCES:
 
                               EXAMPLES
 
     a.    Enemy agents known or suspects, persons involved in espionage,
sabotage, politics, and subversive persons.
 
     b.    Hostile para-military guerilla team leaders, known or suspects.
 
     c.    Political leaders known or suspected as hostile toward the Armed
Forces or the political interests of the National Government.
 
     d.    Known or suspected leaders of enemy governments whose presence in
the area of operations represent a threat the national security.
 
     e.    Collaborators and sympathizers of the enemy, known or suspects
whose presence in the area of operations represent a threat to the national
security.
 
     f.    Military and civilian enemies, known or suspected of having
participated in intelligence activities, counter-intelligence, security,
police or political indoctrination between the troops or among civilians.
 
     g.    Other personalities identified by the G2 as of immediate
detention. This could include local political personalities, chiefs of police,
and municipal leaders or leaders of the enemy's government departments.
 
                              GREY LISTS 
 
CONTAINS THE IDENTITIES AND LOCALIZATION OF THOSE PERSONALITIES WHOSE
INCLINATIONS AND ACTIVITIES TOWARD THE POLITICAL AND MILITARY OBJECTIVES OF
THE GOVERNMENT ARE OBSCURE (THAT IS, NOTHING IS KNOWN ABOUT THEM). THEIR
INCLINATIONS OR ATTITUDES DOES NOT MATTER, IF THEY HAVE SOME INFORMATION OR
SKILLS THAT ARE OF INTEREST TO THE NATIONAL GOVERNMENT. THOSE PERSONS WHOSE
INCLINATIONS OR POLITICAL MOTIVATIONS REQUIRE MORE EXPLORATION OR EVALUATION
BEFORE THEY COULD BE USED EFFECTIVELY BY THE GOVERNMENT CANNOT BE INCLUDED.
 
                               EXAMPLES
 
     a.    Defectors or potential defectors of the enemy cause whose
motivation or loyalty has not been yet established.
 
     b.    Persons that have resisted or are believed to have resisted the
enemy government and that perhaps are willing to cooperate WITH the Armed
Forces of the National Government, but their motivation or loyalty has not yet
been established.
 
     c.    Nuclear scientists, physicists and technical personnel suspected
of having participated in development of nuclear projects for the enemy, or
nuclear missile programs, against their will.
 
 
 
                              WHITE LISTS
 
CONTAIN THE IDENTITIES AND LOCALIZATION OF PERSONS IN AREAS CONTROLLED BY THE
ENEMY WHO HAVE BEEN IDENTIFIED AS OF INTEREST TO THE INTELLIGENCE OR TO THE
COUNTER INTELLIGENCE, AND IT IS EXPECTED THAT THEY COULD PROVIDE INFORMATION
OR ASSISTANCE IN THE ACCUMULATION OF INTELLIGENCE OR IN THE EXPLOITATION OF
AREAS OF INTEREST. NORMALLY THESE PERSONS AGREE WITH, OR FAVORABLY BEND
TOWARDS THE BELIEFS OF THE NATIONAL GOVERNMENT. THEIR CONTRIBUTIONS ARE BASED
IN A VOLUNTARY AND COOPERATIVE ATTITUDE. THE DECISION TO PLACE A PERSON IN A
WHITE LIST COULD BE AFFECTED BY THE COMBAT SITUATION, THE CRITICAL NEED FOR
SPECIALISTS IN THE SCIENTIFIC FIELDS AND OTHER INTELLIGENCE NEEDS.
 
     a.    Ex-political leaders of a hostile government that were deposed by
the hostile political leaders.
 
     b.    Intelligence agents employed by the National Government.
 
     c.    Key civilians in the scientific development areas could include
members of university faculties, whose loyalty has been established.
 
     d.    Religious team leaders and other humanitarian team leaders.
 
     e.    Other persons who could give significant material support to
political objectives, scientists and military personnel of the National
Government and whose loyalty has been established.
 
 
                             INSTALLATIONS
 
1.   COMMAND POSTS.
 
2.   COMMUNICATION CENTERS.
 
3.   INVESTIGATION AND DEVELOPMENT CENTERS, LABORATORIES.
 
4.   INSTALLATIONS THAT FORMERLY OR AT PRESENT ARE OCCUPIED BY ENEMY
ESPIONAGE AGENCIES, SABOTAGE, AND INSURRECTION, OR ENEMY POLICE ORGANIZATIONS
INCLUDING PRISONS.
 
5.   INSTALLATIONS OCCUPIED BY ENEMY INTELLIGENCE ORGANIZATIONS OR SECURITY.
 
6.   BELLIGERENT DEPOTS.
 
7.   EMBASSIES OR HOSTILE GOVERNMENT CONSULATES.
 
8.   MILITARY INSTALLATIONS.
 
9.   PARA-MILITARY Team CAMPS
 
                               
                        ORGANIZATIONS AND TEAMS
 
     1.    Local or national political party teams, or parties that have
goals, beliefs or ideologies contrary or in opposition to the National
Government.
 
     2.    Para-military organizations including student teams, police,
military and veterans, or ex-fighter teams that are hostile towards the
National Government.
 
     3.    Teams or hostile organizations whose objective is to create
dissention or cause restlessness among the civilian population in the area of
operations.
 
     4.    The central offices of these hostile organizations according to
what the Commander of the Armed Forces says will be immediately neutralized.
Personalities related WITH these offices will be arrested and detained.
 
     5.    Teams that operate undercover or clandestinely and their
infrastructure.
 
     6.    Intelligence networks.
 
 
                        DOCUMENTS AND MATERIALS
 
     1.    Files at bases, training centers and enemy intelligence schools.
 
     2.    Court files (Judicial), prisons, police, and the political
administrative executives.
 
     3.    National intelligence agencies' files, para-military
organizations, and the enemy's secret police agencies.
 
     4.    Products or other materials that, if left unguarded could provide
support to the enemy guerrilla in the area.
 
     5.    Special war materials:
 
     a.    Chemical war products
 
     b.    Harmful materials
 
     c.    New combat products
 
     d.    Rockets and rocket control centers
 
     e.    Airships
 
     f.    Charts and maps warehouses
 
     g.    Communication equipment, including radios, radars and electronic
equipment.
 
 
 
                        
 
 
 
 
NEUTRALIZING CI TARGETS
 
INTRODUCTION:
 
     When identifying the potential CI target, those are categorized by their
corresponding types. It is imperative to know not only the identity of the
target or the team, but also all the possible history information and
functions of the target. Experiences have shown us that a follow-up of a
specific target, the best methods are traps and intercept tactics.
 
 
GENERAL FACTS:
 
     A.    Determine what Target is going to be 
neutralized.
 
 
     B.    Analyze the CI target work sheet to be able to
identify:
 
     1.    The target that has been assigned to your CI team (columns 2 and
5)
 
     2.    The target localization (column 4).
 
     3.    The necessary requirements for this coordination (column 6).
 
 
     C.    Determine the method for neutralization of personalities:
 
 
     1.    Select the method to neutralize personalities:
 
           a.   Place the identity of the target in the black grey and white
lists 
 
NOTE:  Placing the target identity in the above-mentioned lists do not
neutralizes him if the target is "undercover" or "clandestine", but it
constitutes the first phase of this type of neutralization and allows the
friendly forces to detain the target if they find him in the area of
operations.
 
     b.    Carry out the investigation operations and or approach and search
and review to segregate, identify and detain the target personalities.
     c.    Carry out the psychological operations against the personalities:
 
           1)   Carry out the propaganda operations to discredit the target.
 
NOTE:  Operations of this type must be prepared in detail and coordinated
through the G5 (Civilian Affairs).
 
           2)   Carry out operations so as to make the target supervisors
loose trust in him.
 
           3)   Carry out operations so that the enemy believes that his
agent(s) has been uncovered or committed.
 
     d.    Carry out Deceit/conceal operations. Neutralization through
deception could work WITH the use of false information to confuse the target.
 
     e.    Neutralize the personality target through the capture, detention
or the exile.
 
     f.    Use the population control and other resources:
 
           1)   Use controls to locate and capture the target, such as:
 
                a)    Search all persons in the target's area.
 
                b)    Give identity badges to the population.
 
                c)    Impose rationing of resources, such as, provisions,
the food, etc., and give the population rationing cards.
 
NOTE:  The targets that are of CI interest will try to avoid all these
controls so as to avoid been captured or identified. Persons that do not have
the badge in their possession or the rationing card, automatically will become
suspicious.
 
           2)   Use controls to limit or slow down the movements of the
target, such as:
 
                a)    Requiring official passes to access specific areas.
 
                b)    Implement a curfew which will restrict all movement
during specific hours of the day.
 
                c)    Use restricted areas to deny the target to have access
to certain activities.
 
           2.   Select methods to neutralize the teams. The same methods
that are used to neutralize the personalities could be used for the teams. An
additional method is to infiltrate an agent within the infrastructure a team
to spread rumors and false information.
 
           3.   Select a method to neutralize the installations:
 
                a.    Carry out approach, search and review operations to:
 
           1)   Segregate and contain the persons or teams in the particular
installation or area.
 
           2)   Investigation, identification, and detention of a CI target.
 
                b.    Carry out combat operations to:
 
                      1)   Segregate and contain the installations.
 
                      2)   Detain the occupants.
 
                      3)   Destroy the installation.
 
                c.    Carry out deception and conceal operations that cause
the CI target to change the direction of his intelligence collection and to
prevent him to concentrate WITH his main mission.
 
           3)   Select methods to neutralize documents:
 
                a.    The two basic methods to neutralize documents are:
 
                      1)   Capture
                      2)   Destruction
 
                b.    Any of the two methods could be carried out using the
operations of review, investigation and combat mentioned above to effectively
neutralize the documents and so prevent the enemy from using them.
 
 
     D.    Determine the operational requirements:
 
           1.   Determine the personal requirements (How many persons you
need for the operation):
 
           a.   Determine the number of persons
 
           b.   Determine what qualifications and skills will be needed to
fulfill the mission (interrogation agents, interpreters, etc.)
 
           c.   Determine what special support you need for the mission:
 
                1)    Support from the combat troops to close the area where
the search and review operations will take place.
 
                2)    Military police to give support during the review
operations.
 
                3)    Determine (if possible) if the installation area is
mined or if it has traps (booby traps).
 
                4)    Determine what other additional support you may need.
 
     2.    Determine the team requirements:
 
           a.   Identify the arms that the teams will need to carry out the
review and detention.
 
           b.   Identify what type of communications you will use.
 
           c.   Determine if you will need any codes or special key words.
 
           d.   Identify what transport support you will need.
 
           e.   Identify how you will transport the targets, or how you will
evacuate the area.
 
     3.    Determine the time frame:
 
           a.   Determine how much time you will need to carry out the
neutralization.
 
           b.   Identify the ideal time to carry out the attack against the
target.
 
 
           c.   Determine if vigilance is needed and if there is enough time
to carry out the same.
 
           d.   Determine on what date should the mission be completed.
 
 
     E.    Prepare the operational plan:
 
     1.    Coordinate WITH the appropriate commanders to get the support
personnel.
 
     2.    Arrange the procurement of the specialized team.
 
     3.    Procure the official funds for the operation.
 
     4.    Procure the communication equipment.
 
     5.    Coordinate WITH the combat commanders in the area the whereabouts
of the target.
 
           a.   Inform the commander when, where, what and how the operation
will take place to avoid conflicts in your responsibility area.
 
           b.   Make arrangements for any assistance you may need while in
that area.
 
           c.   Coordinate the support of (short and long arms) in case it
would be necessary.
 
     6.    Guide the team over the concept of the operation. Make sure that
all the members of the team are aware of their responsibilities.
 
     7.    Guide the support troops:
 
           a.   Explain in detail the role they will play in the operation.
 
           b.   Indicate if they need arms or specialized equipment.
 
           c.   Emphasize the need to fulfill the time frame requirements.
 
 
     F.    Carry out the operation:
 
           1.   Move towards the target.
 
                a.    Carry out a final check to make sure that all the
participants understand their responsibilities.
 
 
           b.   Carry out a final coordination if necessary.
 
     1.    Safeguard the target:
 
           a.   Make sure that the troops are in their assigned positions.
 
           b.   Carry out the review and detention.
 
     2.    Dispose of the target:
 
           a.   Arrange the transfer of the target personnel and or the
documents.
 
           b.   Destroy the target installations.