COUNTERINTELLIGENCE



Our Force Protection measures fall within the limits of military security and physical security punctuated by SOPs , OPSEC measures but there does not exist a seperate Force Protection Doctrine , nor the collection and management of Force Protection Intelligence -- distinct from Combat Intelligence or any of the other intelligence disciplines.Counterintelligence does not factor in our Force Protection measures whereas it assumes a significant role in the Force Protection Domain.  

  1.        BATTLE HANDOFF
  2.       VULNERABILITY , CRITICALITY , CARVER METHOD
  3.       PERIMITER SECURITY EVOLVING TO ...
  4.        CONCENTRIC CIRCLES METHODOLGY

WARNING
WARNING
(a) WarningOnce actionable intelligence is obtained warning or predictions is disseminated in a timely,unambiguous,specific and accurate manner.Warning is an acknowledgement of the existence ofd a threat and subsequent disseminating.
Warning is of two types:
Defensive warn
Enemy warn
In defensive warn after receiving actionable intelligence about the adversary’s possible attack the installations security is beefed up by incorporating protective measures. The warning may be digital/aural/physical or virtual.
In enemy warn the enemy is communicated the fact through non-lethal measures such as interrogation or challenging an enemy unit/capability that in case of persistent or continued enemy action our course of action/s can take on an increasingly lethal nature with the intent to prevent the enemy from taking further hostile actions and also inflict heavy damages. Thus enemy warn is a method to deter the enemy from carrying out its intent if it hasn’t done so yet or to stop the enemy in its tracks.
It is very important that warning should be unambiguous, accurate and timely/specific. In addition to this it should be actionable. Warning can be graduated; meaning the level 
of warning may assume increasing proportions in keeping with the feedback about the enemy which may indicate that it has ceased its operations/.activities temporarily but is conducting discreet operations/increased intelligence activity masked in the cloak of acceptance of our warning and cessation of open hostilities.
WARNING SYSTEM:
The warning system must have the following features:
It should allow for redundancies in our act capability systems.
It should allow for passive proactive means so as to protect our installations, its critical assets, and command and control nodes, thus overall reducing the vulnerability of the installation/.protected area.
It should provide a system of integrating fires to handle threats and precluding enemy attack on our installation, its C2 and critical assets.
Provide warning of threat intelligence activities.
Provide warning of existing threat C2 nodes
Provide warning of threat capabilities, disposition, strength, order of battle
Provide warning of threat logistic routes.
Provide warning of threat sympathizers.,
Provide warning of threats possible attack COAs
Provide warning of the defense capability of the threat
Provide warning of threats peculiar /preferred TTPs/modus operandi
Provide warning of threats history
Provide warning of threat movements
Provide warning of threat leadership
Provide warning of threat detachments, cells dispersed in and out of the area of operations.
Provide warning of Threat attack /defense operations location parameters.
Provide warning of potential attack/defense methods of threat.
Provide warning of the expected time of attack.
Provide warning of possible locations of Threat listening post/observation posts
Provide warning of possible escape routes of threat forces after an attack or defense scenario Provide warning of possible enemy IED techniques, infiltration routes, emplacement Provide warning of IED detonation methods/means
Provide warning of IED timings
Provide warning of possible routes for IED ex-filtration
Provide warning of Staging areas
Provide warning of Safe houses
Provide warning of weapons and ammunitions storage locations
Provide warning g of the Production facilities for IED and other ammunitions/explosives. Provide warning of supplementary operations threat may resort to
Provide warning of threat indirect fire parameters, key indirect fire 
(b)Active measures will provide at stand-off distances, the capabilities to-
We designate a stand-off area outside the installation/protected area and take active measures to deny unidentified vehicular or personnel movement in that area
Just like we have a C2 system with respect to any mission, similarly we need to have a C2 mission with respect to active or passive defensive measures and these need to be integrated with the C2 itself. Such active/passive measures can be remotely controlledlethal/non-lethal measures.
As for passive measure steps should be taken to deny unidentified/suspect personnel/vehicles movement inside a restricted area/protected area .Areas within buildings,facilities,structures,airfields,ammunition depot,etc can be effectively protected by employing unmanned remotely controlled nonlethal systems at standoff distances. Measures should be taken with priority to deter personnel and vehicles from entering a protected military installation again using remotely activated lethal/nonlethal systems. Physical barriers, both active and passive can be employed for this purpose.
There can be instances of enemy fire directed at critical assets of the installation and hence we need to include modular protection packages, automatic or soldier response teams built up specifically for this purpose. The protection system should be integrated again with the C2 system. It is very important to point out here that all the passive/active measures success depends on a great deal on 
intelligence/counterintelligence/liaison apart from the remotely/manned protection system deployment. For example we need intelligence to apprehend any infiltrations in our camp in the form of security or non security civilian contractors. Or we can effectively liaise with the civil police/intelligence agencies to build up a mapping of probableanti-installation criminal forces operating in the area who could attempt to launch sporadic fires or explosive attacks, such attacks being in keeping with the criminal group’s affiliation with the enemy. Counterintelligence can help in visualizing our vulnerable areas within the installation and then proceed to identify the critical nodes which if damaged can stop the installation operations altogether. This vulnerability assessment coupled with the threat assessment and supported by sound OPSEC practices can give adequate unit protection.