FM 34 60 COUNTERINTELLIGENCE PDF

Ask it above. More Part of our value-added professional format series, the Counterintelligence Field Manual FM provides guidance to commanders, counterintelligence CI agents, and analysts. The first four chapters provide information to the commander and staff while the remainder provides the tactics, techniques, and procedures TTP required to aggressively identify, neutralize, and exploit foreign intelligence attempts to conduct operations against the United States US Army. CI supports Army operations by providing a clear picture of the threat to commands at all echelons and actions required to protect the force from exploitation by foreign intelligence. CI operations include conducting investigations, offensive and defensive operations, security and vulnerability analyses, and intelligence collection in peace and at all levels of conflict to support command needs. CI supports the total intelligence process by focusing on foreign intelligence collection efforts.

Author:Nikorisar Meztikus
Country:Laos
Language:English (Spanish)
Genre:Automotive
Published (Last):10 July 2012
Pages:395
PDF File Size:10.50 Mb
ePub File Size:13.42 Mb
ISBN:575-5-14259-548-4
Downloads:17961
Price:Free* [*Free Regsitration Required]
Uploader:Bragore



This manual provides doctrinal guidance, techniques, and procedures for the employment of counterintelligence CI special agents in the Army. This manual expands upon the information in FM and supersedes FM When published, FM CI focuses on negating, mitigating, or degrading the foreign intelligence and security services FISS and international terrorist organizations ITO collection threat that targets Army interests through the conduct of investigations, operations, collection, analysis, production, and technical services and support.

CI analyzes the threats posed by FISS and the intelligence activities of nonstate actors such as organized crime, terrorist groups, and drug traffickers. CI analysis incorporates all-source information and the results of CI investigations and operations to support a multidiscipline analysis of the force protection threat. Commanders should not use them interchangeably. The mission of Army CI is to conduct aggressive, comprehensive, and coordinated operations, investigations, collection, analysis and production, and technical services.

CE programs use both investigations and collection operations to conduct long-term operations to undermine, mitigate, or negate the ability of FISS and ITO to collect effectively on Army equities. CE programs also affect the adversarial visualization and decisionmaking concerning the plans, intentions, and capabilities of U.

CI support to protection ensures the survivability and mission accomplishment of Army and DOD forces. Support to RTP is focused on preventing the illegal diversion or loss of critical technology essential to the strategic advantage of the U. Cyber CI protects information networks and provides an offensive exploitation capability against adversarial networks to ensure information superiority of U.

CI investigations are essential to counter threat collection efforts targeting Army equities. CI places emphasis on investigative activity to support force and technology protection, homeland defense, information assurance, and security programs.

CI investigations focus on resolving allegations of known or suspected acts that may constitute national security crimes under U. The initial objective of CI investigations is to identify people, organizations, and other entities engaging in national security crimes and to determine the full nature and extent of damage to national security.

The intent is to develop information of sufficient value to permit its use in the appropriate civil or military court. However, investigations should not be limited to the production of evidence. Investigative reports should include all relevant information as it pertains to the person or incident involved in the investigation. CI investigations must conform to applicable U.

CI special agents must report information accurately and completely. They maintain files and records to allow transfer of an investigation without loss of control or efficiency.

Coordination with other CI or law enforcement organizations ensures that investigations are conducted as rapidly as possible. It also reduces duplication and assists in resolving conflicts when jurisdictional lines are unclear or overlap.

CI investigative activity must be discreet, ensuring the rights and privacy of individuals involved, as well as the preservation of all investigative prerogatives. This is required to protect the rights of individuals and to preserve the security of investigative techniques.

CI special agents need to have a thorough understanding of all investigative techniques and planning, approval processes, and legal requirements before requesting and initiating any type of CI investigative activity. A lack of understanding in any one of these areas may potentially invalidate any investigation from a prosecutorial standard and may jeopardize the ability to exploit a threat to the United States.

Army CI has investigative primacy for the national security crimes and incidents of CI interest listed below when they are committed by persons identified as subjects. If either the subject, potential subject, incident, or crime falls outside Army CI jurisdiction, Army CI may still retain joint investigative responsibilities. Not all incidents in this category may meet the threshold for a CI investigation.

However, those that do will often include other indicators of espionage that are identified associated with the incident or when there are acts which are known methods of operations of FISS and ITO entities. Investigations are conducted to ascertain those entities involvement. CI special agents may also act to secure classified material and to determine if the actions of the subject were an act of omission or commission.

The command requirements to report compromises or conduct inquiries as specified in AR , chapter VI, may also apply to these incidents. CI special agents will conduct investigations of the circumstances surrounding the absences of SCA personnel using the guidelines presented in this manual. Such personnel will be debriefed upon return to U. Army CI will also ensure Army equities are articulated and either monitor the status of the agency with primary jurisdiction or coordinate for joint investigative authority.

See AR , chapter 7. DA personnel discovering such a device will not disturb it or discuss the discovery in the area where the device is located. Biometrics as a characteristic is a measurable biological and behavioral characteristic that can be used for automated recognition. Biometrics as a process is an automated method of recognizing a person based on a physiological or behavioral characteristic.

Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.

As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Processing and examining digital media evidence is a tedious and time-consuming process which requires specialized training and equipment. Failure to properly process and examine digital media evidence could corrupt the evidence or yield the evidence inadmissible during future legal proceedings.

Due to the complexities of cyber investigations, computer forensics support to CI investigations will only be conducted by specially trained and qualified personnel assigned to cyber CI elements in each theater. Requests for assistance will include detailed descriptions of the digital media evidence to be seized and examined and will be germane to the approved CI investigative objectives. Every CI special agent is responsible for identifying the need for computer forensics support to their investigations.

Computer forensics examinations involve a methodical process which, depending on the size and complexity of the digital media evidence, may take a significant amount of time to complete.

Computer forensic operations cannot be rushed and therefore investigative time lines may need to be adjusted to accommodate the time required to complete the support.

CI network intrusion investigations involve collecting, processing, and analyzing evidence related to adversarial penetrations of Army information systems. These specialized CI investigations are generally conducted independently of other traditional CI investigations. However, given the jurisdictional issues which involve the Internet, network intrusion investigations may require coordination with other U. Threats to Army information systems can range from exploitation of vulnerabilities in information systems which allow adversaries to penetrate Army computers and collect critical information, to trusted insiders who either willingly or unwittingly enable adversarial forces to exploit these critical infrastructure resources.

Any adversary with the motive, means, opportunity, and intent to do harm poses a potential threat. Threats to Army information resources may include disruption, denial degradation, ex-filtration, destruction, corruption, exploitation, or unauthorized access to computer networks and information systems and data.

Cyber CI units are uniquely qualified to investigate and counter these threats. The trusted insider is the most serious threat to DOD information systems security. Share this:.

LP ILEUS OBSTRUKSI PDF

FM 34 60 Counterintelligence

Mauramar Operations Security OPSEC — The process of denying adversaries information fm 34 60 counterintelligence friendly capabilities and intentions by identifying, controlling, and protecting indicators associated with planning and conducting military operations and other activities. Electronics Intelligence ELINT -Technical and intelligence information derived from foreign noncommunications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources. Army Field Manual No. FM Counterintelligence Counterintelligence Inter-American Defense Board JCS Pub 1 — That phase of intelligence covering all activity devoted to destroying the effectiveness of inimical foreign intelligence fm 34 60 counterintelligence and to the protection of information against espionage, personnel against subversion, and installations or material against sabotage. OCONUS CI liaison also includes overt collection of foreign intelligence and CI; acquisition from foreign sources of material and assistance not otherwise available; and the procedures used to gain access to individuals fm 34 60 counterintelligence cooperations, assistance, or knowledge are desired. Enter Your Email Address. Stereotyping occurs in a variety of ways, such as communications deployment techniques or historical association.

ENGINEERING PHYSICS BY RK GAUR AND SL PDF

US Army Counter Intelligence FM 34-60

.

HUAWEI OPTIX METRO 100 PDF

Looking for: fm

.

ED ROSENTHAL CLOSET CULTIVATOR PDF

FM 34 60 COUNTERINTELLIGENCE DOWNLOAD

.

Related Articles