ROLE OF ARMY INTELLIGENCE IN FP

SECURITY REQUIREMENTS:




Within the installation thee may be specific person/s,resources,assets,activity,operation or information that if targeted by the enemy can adversely affect the installation operations , mission objectives or any risk dimension—in other words it has ‘’Target value’’ to the adversary. During security planning such entities should be identified(in most cases using red-teaming or counterintelligence support to vulnerability assessment) and secured against enemy actions. Include with this the need to ascertain what adverse effects the local threat can have over the installation as a whole and what missions or contingency plans can be designed to support the installation, and what results is the minimum security requirements in the light of the the threat perceived due to the existence of local threat forces.

Local threat assessment usually provides a threat picture specific to a single

Installation or grouping of installations based on the threat factors mentioned above. This

means that each installation may have specific security requirements tailored to its

Individual assessment.




Using Intelligence for Security and Force Protection

The shifting nature of threat conditions requires an organization’s staff to plan,

prepare, and prioritize countermeasures. Understanding the threat environment at all

three levels of war: strategic, operational, and tactical is critical. Conceptualizing a

picture of global security concerns and threats against domestic interest, threats to the

Army, and threat evolving from the local environment is the first step to developing

countermeasures. Followed by careful consideration of the security resources and

external support available. This leads to selection of the appropriate security task and

implementation of the necessary measures to counter threats against critical resources,

personnel, and information. With a clear understanding of the intent, type, and

capabilities of the threat, an effectively plan can implement countermeasures without

imposing undo burdens on the service provider and customer. Regardless, the value of

the countermeasure must be compared to the benefits gained.



Resource economy is probably the most important factor.


Due to erroneous planning , or improperly defining intelligence requirements or even due to enemy deceptive/denial measures it could very well be thart the Commander deploys his resources, combat power and other combat-related assets in the wrong place and time thus exhausting/wasting them and hence resource economy is of prime consideration during any mission and to this end the value of intelligence cannot be overstated. These false responses can be limited and brought down to a minimum by specific , timely and accurate intelligence. Intelligence helps the commander to prioritize his security options. The commander can direct his efforts towards the most important requirements , such as handling the most serious security risks first, mitigate the threat/s which is of lesser severity and accept the inevitable danger and be prepared for risks which are of least severity. Thus the countermeasures will be more appropriately directed against the enemy without any wastage of resources, manpower or lessening in combat effectiveness. All this proper threat driven intelligence and counterintelligence operations , the term ‘’threat-driven’’ assuming greater significance as it then goads the commander to know the unknown aggressively. It should be emphasized that other security agencies should be consulted and information shared with them , both horizontally and vertically to get a complete picture of the threat.



The Army’s counterintelligence elements will conduct aggressive and coordinated

investigation, operations, collection, analysis and production, and other

counterintelligence services worldwide. The purpose of Army counterintelligence is to

counter foreign intelligence, terrorist, adversary, and entity collection efforts and

activities. Additionally, Army counterintelligence attempts to prevent sabotage,

subversion, sedition, foreign assassination efforts, and other foreign threats. Army counterintelligence conducts these activities to protect soldiers, civilians,

contractors, family members, operations, installations, equipment, information,

technologies, and activities. Counterintelligence agents will plan and execute all

counterintelligence functions in accordance with the authorities listed above. This

mission and the regulations and directives governing counterintelligence activities apply

during peacetime as well as all levels of conflict. The Army counterintelligence force

will concentrate its effort in three primary mission areas: counterintelligence support to

force protection, counterintelligence support to technology protection, and

counterintelligence support to infrastructure protection.