CI TARGETING (FOR ECCIU KESHAV MAZUMDAR ATO)        06/07/15    10:10:42AM
HOW TO DETECT / CATEGORIZE/PRIORITIZE /NOMINATE TARGETS

 

 
INTRODUCTION:
 
In order to identify CI targets, one should follow the intelligence rules. Through the combination of existing black, grey and white lists, a line and block box, intelligence reports and information provided from police agencies, the armed forces as well as other agencies, the basic information about the possible CI targets is acquired. 
 
GENERAL FACTS:
 
     A.    Review the strategy in order to estimate potential hostile threat:
 
           1.   Recognize the threats that present an acute danger to security.
 
           2. Predict future threats.
 
NOTE: The choice of CI target requires a total analysis of its relation to the entire hostile threat.
 
     B. Recognize the specific CI targets in the region:
 
     a. The CI targets present either a clear threat or are of use to the Armed Forces. CI targets can be: 
 
     a. SPECIFIC PEOPLE: these can be either friendly or hostile.
 
     b. FACILITIES: that pose a threat to the security of the nation.
 
     c.    HOSTILE GROUPS AND ORGANIZATIONS: that pose a threat to the security of the nation. These are most likely operating undercover, and therefore not immediately detectable.
 
     d.    MATERIAL AND DOCUMENTS: IF they are of value to the intelligence community.
  
 
     3.    Gather information about possible CI targets in the region:
 
           a.   Find local targets on national CI target lists.
 
           b. Gather information on existing lists (Black ,White , and Grey)
 
           c.   Recover information from the files of the intelligence community, the CI database, etc.
 
           d.   Gather information from:
 
           1)   Civilian Affairs and Psychological Operations 
 
           2) The intelligence units in the region
 
           3)   Police agencies
 
     C.    Group the established CI targets according to their specialty or function. 
For example:
 
     1)    Espionage agents
     2)    Couriers 
     3)    Obstruction specialists
     4)    Bases/camps
     5)    Communications and link routes
 
NOTE:  When grouping targets this way, one must be sure that the information on which the grouping is based comes from the same source that identified them
 
     D.    Prioritize the targets:
 
     1.    Base the priority of every Target on:
 
           a.   Which threat the target presents to the security of the nation.
 
           b.   The importance of time in the neutralization or exploitation of the target. 
 
           c.   Potential reinforcement of the target. 
 
           d.   Strength of personnel that will neutralize or exploit the targets.
 
                               
 
     2.    Give each target a number that represents its priority:
 
           a.   Make sure that the number is written in roman numerals (I, IV, XI).
 
           b.   The number stresses how important or valuable the CI targets are.
 
           c.   The number emphasizes to which degree the target is of interest.
 
NOTE:  Should a target have a higher degree of priority assigned to it than the Command, changing its degree of priority it is not possible at your level. Local CI agents will prioritize the targets that are established in the region.
 
     E.    The personnel responsible for the target’s neutralization or exploitation should be designated with corresponding tasks.
 
1. Ascertain the competence of the personnel to neutralize or exploit tasks taking into account: 
 
     a. The number of units
     b. Equipment at hand
     c. Previous knowledge of the task
 
           2.   Ascertain if support from regular police, military police, pther units, etc. is needed. 
 
NOTE:  Tactical effort will always precede neutralizing and exploiting the targets – only excluding special cases. 
 
     F.    Give the personnel a briefing about their mission.
 
REFERENCES TO CHARTS, MAPS DATE:
 
_________________________________________________________________
 
KEYS TO CHART:
1.   Target
2.   Classification of target 
3.   Prioritization
4.   Localization
5.   Team task
6.   Team mission (Comments)
7.   An authoritative number that is composed sequentially.
8.   The arrangement recognizes the target by sort, name and gives particular information to identify the target.
9.   The prioritization is assigned WITH roman numerals and is allocated based upon the target grouping.
10.  The localization will recognize the spot where you may discover the target or if this is not known, it is distinguished where the target was discovered the last time.
11.  The group's errand of distinguishing the CI team whose mission is to kill the target is situated in the quantity of personnel accessible and could incorporate tactical forces, military police and para-military forces.
12.  This section is utilized to make a rundown of the requirements for coordination, interchanges, particular elements of the mission or other particular essential data so that the group could realize its goal.
 
 
 
 
                              
                    BLACK LISTS
 
THESE CONTAIN THE CHARACTERS AND WHEREABOUTS OF PERSONS WHOSE DETAINMENT IS OF PREEMINENT SIGNIFICANCE TO THE MILITARY:
 
                               EXAMPLES
 
     a.    Hostile agents confirmed for or suspected of espionage subversive activity, involved in politics, and saboteurs
 
     b.    Confirmed or suspected members of hostile para-military guerillas.
 
     c. Politicians confirmed for or suspected of animosity towards the military or the politics of the government.
 
     d.    Leaders of foreign governments confirmed for or suspected of animosity who by being present in the region pose a threat to the security of the nation. 
 
     e.    Hostile sympathizers who by being present in the region pose a threat to the security of the nation. 
 
     f. Hostile citizens or military personnel, confirmed for or suspected of having taken part in the indoctrination of soldiers or citizens, or having interest in the security of the nation, police activities or any other intelligence or counter-intelligence affairs.
 
     g.    Other agents pinpointed by the GSO(Int) to be detained ASAP. Agents of local government, leading police officials, leaders within the local community or leaders of hostile governmental agencies,
 
                     GREY LISTS 
 
CONTAINS CHARACTERS AND WHEREABOUTS OF PERSONS OF WHICH NOTHING IS KNOWN WITH REGARDS TO THEIR DISPOSITION REGARDING THE POLITICAL ESTABLISHMENT – MILITARILY AND OTHERWISE. THEIR DISPOSITION IS NOT OF IMPORTANCE SO LONG AS THEIR INTELLIGENCE AND/OR SKILLSET IS USEFUL TO THE NATIONAL GOVERNMENT. IT DOES NOT CONTAIN ENTITIES THAT ARE NOT YET ESTABLISHED WITH REGARDS TO THEIR POLITICAL INCLINATIONS, AND WOULD NEED FURTHER RESEARCH BEFORE BEING PUT TO USE BY THE GOVERNMENT.
 
                               EXAMPLES
 
     a.    Possible or established defectors from the adversary who have yet to prove their loyalty.
 
     b.    Agents that have (allegedly) been in armed opposition to the adversary government, and are inclined to collaborate with the national military or the government, but are yet to prove their loyalty.
 
 
     c.    Technical personnel, physicists or scientists confirmed for or suspected of unwillingly having been involved in developing nuclear projects either for civil or weapon use for the adversary.
 
 
                      WHITE LISTS
 
CONTAINS CHARACTERS AND WHEREABOUTS OF PERSONS IN REGIONS CONTROLLED BY THE ADVERSARY WHO HAVE BEEN RECOGNIZED AS USEFUL FOR THE INTELLIGENCE COMMUNITIES, AND ARE BELIEVED TO BE ABLE TO INFORM AND/OR ASSIST THE GATHERING OF INTELLIGENCE OR THE EXPLOITATION OF THE REGION/ELEMENTS IN QUESTION. USUALLY THESE CHARACTERS ARE MORE OR LESS IN LINE WITH THE IDEOLOGICAL LINE OF THE NATIONAL GOVERNMENT. THEIR ASSISTANCE IS DERIVED FROM A VOLUNTARY AND COOPERATIVE ATTITUDE. THE CHOICE TO PLACE A CHARACTER ON A WHITE LIST COULD BE INFLUENCED BY THE CIRCUMSTANCES ON THE BATTLEFIELD, THE REQUIREMENT FOR SPECIALISTS IN THE SCIENTIFIC AND/OR INTELLIGENCE COMMUNITY.
 
a.                Former leading politicians of the adversary government that were discharged by adversary politicians.
 
b.                Members of the National Government’s intelligence community.
 
     c.    Citizens in key positions within the scientific and development community, including family members of university faculty, who have proven their loyalty.
 
c.                 Leaders of groupings – religious and/or humanitarian 
 
d.                Other persons who could give critical material backing to political targets, researchers and military work force of the National Government and whose loyalty has been demonstrated.
 
 
                                   FACILITIES
 
1.   COMMAND POSTS.
 
2.   CENTERS OF COMMUNICATION.
 
3.   CENTERS OF RESEARCH, INVESTIGATION AND DEVELOPMENT 
 
4.   FACILITIES THAT ARE OR HAVE BEEN UNDER THE CONTROL OF ADVERSARY POLICE FORCES (THIS ALSO COUNTS FOR PRISONS), AGENCIES OF INTELLIGENCE, OBSTRUCTION, AND INSURGENCY.
 
5.   FACILITIES UNDER THE CONTROL OF ADVERSARY AGENCIES OF SECURITY OR ESPIONAGE 
 
6.   BELLIGERENT DEPOTS.
 
7.   DIPLOMATIC FACILITIES OF HOSTILE GOVERNMENT (EMBASSIES OR CONSULATES).
 
8.   FACILITIES WITH MILITARY PURPOSES 
 
9.   ENCAMPMENTS OF PARA-MILITARY ORGANIZATIONS
 
                               
                        ORGANIZATIONS AND TEAMS
 
     1.    National or regional political groupings that have objectives, convictions or belief systems opposite or contrary to the National Government.
 
     2.    Para-military associations. This also includes associations of current or former military personnel, police employees, students or any adversary to the national government.
 
     3.    Groups or adversary associations whose goal is to ferment dissent or create unrest among the citizens of the area of operations.
 
     4.    The administrative offices of these adversary groupings will be neutralized instantly as indicated by the Commander of the Armed Forces. Characters related WITH these workplaces will be captured and confined.
 
     5.    Groupings that work with covertly and outside the legal framework, as well as their infrastructure.
 
     6.    Intelligence communities.
 
 
 MATERIALS AND DOCUMENTS
 
     1.    Documents found at bases, training facilities – also those of the adversary intelligence community.
 
2.Documents of the executive political administration
3., the police, legal (judicial) documents, and belonging to the prison system.
 
     3.    Documents of the national intelligence community, para-military groupings, and the adversary covert police agencies.
 
     4.    Material that could provide support to the adversary guerrilla if left unguarded.
 
     5.    Extraordinary war materials:
 
     a.    Products for chemical warfare
 
     b.    Previously unseen products for combat (TTP details /Wpn Systems)
 
     c.    Harmful materials
 
     d.    Rockets and rocket control centers
 
     e.    Aircraft
 
     f.    Facilities for maps and charts 
 
     g.    Communication material, including electronic
equipment such as radars and radios.
 
 
 
          
 
NEUTRALATION OF CI TARGETS
 
INTRODUCTION:
 
 
At the point when distinguishing the potential CI target, they are sorted by their corresponding types. It is basic to know not just the character of the target or the group, but also additionally all the conceivable historical data and elements of the target. Encounters have demonstrated to us that a subsequent meet-up with a particular target, the best strategies are traps and capture strategies.
 
GENERAL FACTS:
 
     A.    Decide which Target will be neutralized.
 
 
     B.    Investigate the CI target work sheet to have the capacity to distinguish:
 
     1.    The target that has been alloted to your CI group
 
     2.    The location of the target
 
     3.    The essential necessities for this coordination
 
 
     C.    Decide on a method neutralize characters:
 
 
     1.    Chose the method to neutralize characters:
 
           a.   Put the target’s identity on the lists (black grey and white)
 
NOTE:  Putting the target character in the aforementioned list does not render him to be neutralized or destroyed if the target is "undercover" or "clandestine", however it constitutes the first period of this kind of neutralization and permits the non-adversary forces to confine the target on the off chance that they discover him in the territory of operations.
 
     b.    Do the examination operations as well as methodology and search and review to segregate, identify and detain the target personalities.
     c.    Perform psychological operations on the characters:
 
           1)   Perform the operations of propaganda discrediting the target.
 
NOTE:  These operations must be thoroughly organized and coordinated through the Staff Officer (Civilian Affairs).
 
           2)   Perform operations so as to make the superior of the target distrust him.
 
           3)   Perform operations to make adversary superiors think that agent(s) has been uncovered or detained.
 
e.                Perform conceal/deceit operations. Neutralization through misleading intelligence could work WITH the utilization of false data to make the target confused.
 
f.                  Neutralize the target character through exile, capture or confinement.
 
     g.    Make use of population control and further resources:
 
           1)   Utilize controls to find and capture the target, such as:
 
                a)    Perform searches for everybody in the target's vicinity.
 
                b) Make citizens bear identity badges.
 
                c)    Begin rationing provisions, food, and other resources, and hand out rationing cards to the citizens.
 
NOTE:  Targets of CI interest will have to get around these controls to avoid capture or identification. Anyone without a badge or rationing card will automatically fall under suspicion.
 
           2)   Utilize controls to moderate or limit the target’s maneuverability:
 
                a) Require official documents to pass to particular zones
 
                b)    Install a curfew which will restrict moblity during particular times of the day.
 
                c)    Implement areas of restriction to make sure that the target does not have access to particular activities.
 
           2.   Choose approaches to neutralize groupings. The same approaches that are implemented to neutralize the characters could be implemented for groups. Additionally, one approach could be to infiltrate an agent within the framework of a group to misinform and create false rumors.
 
           3.   Choose an approach to neutralize the facilities:
 
                a.    Carry out method, inquiry and audit operations to:
 
1)     Isolate and contain the persons or groups in the specific establishment or territory.
 
           2)   Investigation, identification, and detention of a CI target.
 
                b.    Perform combat maneuver to:
 
                      1)   Isolate and contain the facilities.
 
                      2)   Hold back the users.
 
                      3)   Destroy the facility.
 
                c.   Perform deception and conceal operations that cause the CI target to change the direction of his intelligence operations and to keep his focus from his principle goal.
 
           3)   Choose approach to neutralize documents:
 
                a.    To neutralize documents, two basic methods are employed:
 
                      1)   Capture
                      2)   Destruction
 
                b.    Both methods are viable in the reviewed operations, investigation and combat specified above to adequately neutralize the documents and thus keep the adversary from utilizing them.
 
 
     D.    Decide on the operational requirements:
 
           1.   Decide the personnel requirements:
 
           a.   Decide on a number of personnel
 
           b.   Decide how your personnel should be qualified to complete your goal (interrogation agents, interpreters, etc.)
 
           c.   Decide which kind of particular support you will require for the mission:
 
1)                            Troop support from nearby forces to enclose the area where the operations will be performed.
 
                2)    Military police to support the conduct of the review operations.
 
                3)    If possible, decide whether the area could be secured with mines or traps (booby traps).
 
                4)    Decide if you are going to need further support.
 
     2.    Decide which requirements the team will have:
 
a.      Specify the weapons that the teams will need under the detention and review missions.
 
           b.   Specify which communication equipment you will make use of.
 
b.      Decide if there will be need for key words or codification of communications.
 
           d.   Specify the supporting modes of transportation.
 
           e.   Specify the mode of transport of the targets, or the evacuation of the area.
 
     3.    Decide on a schedule:
 
           a.   Decide how much time you will need to carry out the
neutralization.
 
           b.   Specify  the ideal moment for the implementation of strike on the target.
 
           c.   Decide if there is need for vigilance and whether there will be time to put this in motion.
 
           d.   Decide on the date on which the mission should reach completion.
 
 
     E.    Prepare the operational plan:
 
     1.    Perform due coordination WITH the appropriate commanders to get personnel for support.
 
     2.    Organize the specialized team.
 
     3.    Obtain funding for the operation through official channels.
 
     4.    Obtain communication equipment.
 
     5.    Make sure to coordinate WITH the commanders of combat personnel in the region regarding the target’s location.
 
           a.   Keep the commander informed of the operation’s timing, location, goal and plan in order to avoid conflicts in your area of responsibility.
 
           b.   Arrange the assistance you may make use of while in the region.
 
 
 
     6.    Give the team an overall guidance regarding the concept of the operation. Verify that every one in the team is mindful of their obligations. 
 
     7.    Secure guidance for the support troops:
 
           a.   Clarify their part in the operation in detail.
 
           b. Indicate their need for weapons or any particular equipment.
 
           c.   Emphasize that the time frame is an important factor.
 
 
     F.    Carrying out the operation:
 
           1.   Maneuver in direction to the target.
 
                a.    Perform a final check, ensuring that everybody understand their part in the mission.
 
 
           b.   If necessary, perform a final coordination.
 
     1.    Secure the target:
 
           a.   Ensure that the troops are in their assigned positions.
 
           b. Perform the review and detention.
 
     2.    Disposing of the target:
 
           a.   Make arrangements for proper transfer of the target personnel and/or the
documents.
 
           b.   Destruction of target facilities /installations/personalities.