Counterintelligence
- CDOCTRINE & CI ARCHITECTURE
- AT TACTICAL/OPERATIONAL LEVELS
Question those that Volunteer Information
- As such Source Operations are conducted by the counterintelligence
units and casual or incidental sources such as listed below are
screened and debriefed/interrogated:
- Walk-ins and write-ins (individuals who volunteer information)
unwitting sources (any individual providing useful information to
counterintelligence, who in the process of divulging such information
may not know they are aiding an investigation) defectors and enemy
prisoners of war (EPW) interviewees (individuals contacted in the
course of an investigation) official liaison sources.
Doctrine
- Doctrine guides the employment of military forces, and shapes how
military professionals “think about the use of the military instrument
of national power”. Army doctrine details a basic understanding of the
tactics, techniques and procedures to be employed to support combat
requirements.
- Air Force doctrine provides commanders and their staffs a basic
understanding of how various Air Force organizations can be used to
meet or support combat requirements.
Confusion in Doctrine
- The Army have historically lacked comprehensive CI doctrine.
- This lack of doctrine has resulted in confusion, and hampered the
ability of Force commanders to use CI to improve force protection
efforts.
Threat Driven
- Force protection efforts must be threat driven.
- Vulnerabilities should be identified, the corresponding threats identified and then protective measures are put in place.
- To this end MI and CI play a very important role.
- This should be the basis for the creation of a comprehensive CI doctrine
CI is Systematic Acquisition of Intel
- “CI is the systematic acquisition of information concerning
espionage, sabotage, insurgency, and related foreign activities
conducted for or on behalf of foreign nations, entities, organizations,
or persons and that are directed against or threaten our military
interests.
HUMINT Intel Sources
- To this end a variety of HUMINT sources , like walk ins, casual
sources, defectors, official sources, liaison contacts , recruited
sources are employed by CI elements.
- CI collections and investigations lead to a repository of information on threats.
CI – HUMINT 1st line of Defense
- Thereafter by cueing other intelligence disciplines and using all
source analysis a complete picture of the threat is obtained.Thus we
reach our main objective—the precise warning of hostile attack and we
also identify the probable targets of the attack and the time of
attack.
- In a nutshell CI usage of HUMINT is the first line of defence.
Intel is looking Outward,
CI is looking Inward
- It is true that a multidisciplinary intelligence approach is
effective to thwart enemy collection efforts but CI and force security
measures play key roles.
- To neutralize/destroy enemy intent we need CI to the fullest
capacity.Other intelligence disciplines can be cued but CI is top
priority.
- To identify our vulnerabilities we must resort to counterintelligence.
- Intelligence is looking outward but CI is looking inward.
- Intelligence collection is not concerned with the end result but
counterintelligence is concerned with the ‘’intent’’ of collection.
- CI should always be on an aggressive footing.
- We need a comprehensive CI doctrine detailing all of these and more.
Asymmetric Warfare
- We should bear in mind that this era is not exclusively the era of conventional combat.
- Asymmetric warfare is the order of the day.
- Insurgents take years to plan an operation.
- They conduct extensive pre-operation surveillance, they have their
own counterintelligence networks and this long period justifies the
employment of intelligence and CI .
Type 1,2,3, Threats
- The CI department should tackle the type 1 , 2 and 3 threats.
- CI cells should come into existence and should be staffed with HUMINT, SIGINT and IMINT elements.
- Priority should be on analysis of threat intelligence.
- MI should be particularly in charge of analysis of Type 3 threats.
CI Cells
- Elements from Special task forces, explosive ordnance disposal,
medical, operations and communications should also staff the CI cells.
- The CI elements should fortify their collection and investigation capabilities.
Threat Databases
- They should maintain a threat database which will include the
structure and capabilities of foreign intelligence services, details of
insurgent organizations and timeline of attacks perpetrated by them and
also criminal enterprises because it is well established that
insurgents and criminals share information and resources.
- This database should be continually updated.
Intelligence Database
- The intelligence information contained in this database should be readily available on request.
- Included in this database should be latest physical security
measures, details of explosive ordnance effects—all contributed by
specialists.
- All source intelligence should be further fused in with the intelligence contained in the database.
CI Analytical Cell Should Contain Worldwide Inputs
- The CI analytical cell should not only produce daily threat summaries but also act as an I&W system.
- It should receive worldwide inputs of insurgent developments as well as national cases.
- It should interface with civil intelligence agencies through liaison methodology thus updating threat information.
CI Cells and Major Commands
- The unit CI cells should be extrapolated to the creation of similar
cells at all major commands which will focus on the respective area of
responsibilities.
- These cells would produce threat and vulnerability assessments.
Coordinated Communication
- In addition to these functions these CI cells should be ready to be
deployed to support major exercise and contingency deployments.
- These CI cells will facilitate the formulation of the commanders
information requirements as the dissemination of intelligence products
to the latter will heighten his perception of the situation.
- These cells can communicate two ways with the collectors on the
ground from parallel intelligence units thus achieving coordination
between different intelligence disciplines.
- Investigative leads and operational opportunities result from all these efforts.
Prioritize Intelligence Collection
- We need to have a force protection intelligence doctrine,strengthen
it, define the role of MI in force protection efforts and priortize
collection and analysis of intelligence on force protection threats.
- We need a robust HUMINT capability supported by CI—the optimum
integration of both is the need of the hour. We have the LU, CI and
IFSU but still we lack a viable HUMINT mission.
Must Have Comprehensive
CI Doctrine
- Duplication creates confusion and wastage of resources. We must have a comprehensive CI doctrine.
- The CI units should be staffed with more personnel, both in major cities/foreign areas and in collection activities.
- Analysis of force protection intelligence should be properly
delegated to CI cells and to this end CI Analytical cells should be
dispersed at Army Headquarters and major commands
MI Resources to HUMINT
- Whatever HUMINT we have is afforded by these units directly or
indirectly and we must use this to the fullest potential to counter
force protection threats.
- To improve the HUMINT capabilities MI should assign additional resources.
- Duplication resulting from the efforts of the MI constituents need to be removed and the respective roles clarified
- The Army Head Office (AHO) exercises technicalcontrol, review, coordination and oversight of CI controlled activities.
- Will execute a system of review of CI activities , ensure compliance and proper accounting.
- Will have direct control over an Investigation, task the CI
elements , provide guidance to operational and investigative CI
activities and if necessary refer the CI activity to a sub-office.
Head Office Control
- The Head office assumes full and direct control.
- Monitor the management of case files and other records storage and retrieval system.
- Processing of records and transfer to the repository, insuring to maintain the quality assurance of investigative reports.
- Monitor source ops and CE projects to ensure laision activities
with other agencies are properly conducted with optimum exchange of
information and dissemination of information.
- This information exchange will fall under their purview in a timely manner and approve or disapprove CI case summaries.
Sub Office
- The Sub offices will coordinate technical direction and tasking
from the head office, monitor all CI activities withing its area of
operation and provide feedback to the head office. Sub Office shall
conduct CI investigations tasked to it by the head office as well as
investigation initiated by the Sub Office staff. The exception being
those investigations directly controlled by the head office. The Sub
Office will ensure proper dissemination to end users as well as the
head officeand ensure the accuracy and compliance with CI policy of all
CI reporting. Sub Office shall brief commanders and intelligence
officials. Liasing with external agencies and disseminating information
to them that falls under their purview.
CI Support to Force Protection
- The foreign intelligence service conducts intelligence collection about our forces and hostile attack.
- Herein comes the very important concept of force protection.
- They target defence personnel , resources , activities and critical information.
- CI support to force protection involves actions to prevent or mitigate hostile actions against these entities.
-
Increased Security on Billet Area
- It should be noted that the military police functions are not
adequate to cover the security of these entities –CI support is a must.
- In a deployable situation the enemy targets the vulnerable rear positions and the support elements.
- Hence security is beefed up where troops are housed , dependendants
and other personnel are made aware of the threat—this is where the CI
elements are active.
Hostile Intent
- The military police and allied elements take stock of the situation
in the army area but are less aware of the ground situation ‘’outside
the fence’’. Hence recourse is made to establish contact with civil
intelligence agencies and local police for updates on any threat
intelligence in the proximity of the base. Moreover the military police
have no jurisdiction outside the base. Strengthening the physical
defences is one way to prevent the application of hostile intent but
what is more important is enemy pre-operational surveillance
activities. But the difficulty is that these activities are innocuous.
Scenario
- Lets take an example to illustrate the point. A vehicle approaches the gate of a military camp.
- On being questioned by the guard on duty the driver says he had no intention to turn up there—he had made a wrong turn.
What did the Driver State
- Now this is an acceptabvle excuse and further interrogation may not help.
- The driver is instructed to leave the area.
- It is equally possible he is saying the truth.
Is Driver Conducting Surveillance
- But consider the situation where the the threat index in the area
is high and hence from the force protection perspective the driver who
can equally well be a insurgent has just conducted successfully a
preoperational surveillance.
If Driver is Looking for Information He Will Learn Much From Stop
- From the moment of approaching the perimeter, conversation with the
guard and exiting the area he has quietly observed the perimeter
security setup, the weapons the guards are using, how many guards are
manning the gate, the manner in which the guard accosts a stranger, and
what obstacles there can be in case the car is equipped with a bomb and
has to force in through the gates.
Much Information Will Be Determined
- If the checkpoint is approached by a series of individuals they will be able to determine the extent of the security process.
- This provides them with the information to defeat your defenses.
Threat or Non Threat
- Hence from the force protection perspective the vehicle and the driver constitute a potential threat.
- Now the problem is the guard has no means to determine if this case is innocuous or not.
Information Details and Options
- There are options. The license details of the driver can be jotted
down. The car details and license plate number can be taken.
- Offhand queries can be made. A listing can be made of all ‘’lost motorists’’.
- The information can be shared with the local police.
Additional Surveillance
- If it is found out the same driver has turned up at other
installations with the same story, well we have a case of
pre-operational surveillance and with the jotted information in hand
steps can be taken.
- But still the case is rare as there are several instances of genuine lost motorists.
Everyone is Susceptible to Hostile Attacks and Intel Collection
- Whatever any installation together with its constituent personnel,
their dependants, operations and information is susceptible to hostile
attack and intelligence collection.
- CI elements must shield the installation from such intent by guarding the rear and vulnerable areas.
Anti Counterinsurgency
- CI should lend support to mobilization security, major records
repositories, anti and counterinsurgency operations, rear operations,
psychological operations, battlefield deception , operations security
and C-SIGINT.