ROLE OF ARMY INTELLIGENCE IN FP
SECURITY REQUIREMENTS:
Protecting classified information
Protecting critical resources
Protecting weapons and weaponry systems
Safeguarding visitors to the installation
Protecting dignitaries
Protecting Senior government officials or military senior stafdf visiting the installation or areas outside the installation but falling within military jurisdiction
Sustain mission objectives
Protect information systems
Within the installation thee may be specific person/s,resources,assets,activity,operation or information that if targeted by the enemy can adversely affect the installation operations , mission objectives or any risk dimension—in other words it has ‘’Target value’’ to the adversary. During security planning such entities should be identified(in most cases using red-teaming or counterintelligence support to vulnerability assessment) and secured against enemy actions. Include with this the need to ascertain what adverse effects the local threat can have over the installation as a whole and what missions or contingency plans can be designed to support the installation, and what results is the minimum security requirements in the light of the the threat perceived due to the existence of local threat forces.
Local threat assessment usually provides a threat picture specific to a single
Installation or grouping of installations based on the threat factors mentioned above. This
means that each installation may have specific security requirements tailored to its
Individual assessment.
Using Intelligence for Security and Force Protection
The shifting nature of threat conditions requires an organization’s staff to plan,
prepare, and prioritize countermeasures. Understanding the threat environment at all
three levels of war: strategic, operational, and tactical is critical. Conceptualizing a
picture of global security concerns and threats against domestic interest, threats to the
Army, and threat evolving from the local environment is the first step to developing
countermeasures. Followed by careful consideration of the security resources and
external support available. This leads to selection of the appropriate security task and
implementation of the necessary measures to counter threats against critical resources,
personnel, and information. With a clear understanding of the intent, type, and
capabilities of the threat, an effectively plan can implement countermeasures without
imposing undo burdens on the service provider and customer. Regardless, the value of
the countermeasure must be compared to the benefits gained.
Resource economy is probably the most important factor.
Due to erroneous planning , or improperly defining intelligence requirements or even due to enemy deceptive/denial measures it could very well be thart the Commander deploys his resources, combat power and other combat-related assets in the wrong place and time thus exhausting/wasting them and hence resource economy is of prime consideration during any mission and to this end the value of intelligence cannot be overstated. These false responses can be limited and brought down to a minimum by specific , timely and accurate intelligence. Intelligence helps the commander to prioritize his security options. The commander can direct his efforts towards the most important requirements , such as handling the most serious security risks first, mitigate the threat/s which is of lesser severity and accept the inevitable danger and be prepared for risks which are of least severity. Thus the countermeasures will be more appropriately directed against the enemy without any wastage of resources, manpower or lessening in combat effectiveness. All this proper threat driven intelligence and counterintelligence operations , the term ‘’threat-driven’’ assuming greater significance as it then goads the commander to know the unknown aggressively. It should be emphasized that other security agencies should be consulted and information shared with them , both horizontally and vertically to get a complete picture of the threat.
The Army’s counterintelligence elements will conduct aggressive and coordinated
investigation, operations, collection, analysis and production, and other
counterintelligence services worldwide. The purpose of Army counterintelligence is to
counter foreign intelligence, terrorist, adversary, and entity collection efforts and
activities. Additionally, Army counterintelligence attempts to prevent sabotage,
subversion, sedition, foreign assassination efforts, and other foreign threats. Army counterintelligence conducts these activities to protect soldiers, civilians,
contractors, family members, operations, installations, equipment, information,
technologies, and activities. Counterintelligence agents will plan and execute all
counterintelligence functions in accordance with the authorities listed above. This
mission and the regulations and directives governing counterintelligence activities apply
during peacetime as well as all levels of conflict. The Army counterintelligence force
will concentrate its effort in three primary mission areas: counterintelligence support to
force protection, counterintelligence support to technology protection, and
counterintelligence support to infrastructure protection.