This page contains the US Army Field Manual on Counterintelligence. 3 Oct Manual for counterintelligence operations, tactics, techniques, procedures. Relevant sections is Appendix A, Counter-Human Intelligence. US Army Counter Intelligence FM – Kindle edition by US Army and www. Download it once and read it on your Kindle device, PC.
|Published (Last):||14 November 2010|
|PDF File Size:||17.15 Mb|
|ePub File Size:||4.8 Mb|
|Price:||Free* [*Free Regsitration Required]|
Counter-Signals Intelligence C-SIGINT -Those actions taken to determine enemy SIGINT capabilities and activities, the assessment of friendly operations fm 34 60 counterintelligence identify patterns and signatures, and the resulting vulnerabilities for subsequent development and recommendation of countermeasures.
Liaison Countrrintelligence – An individual with whom liaison is conducted. Collection Intelligence Cycle – Acquisition of information and the provision counterkntelligence the information to processing or production elements.
Counterintelligence Inter-American Defense Board JCS Pub 1 – That phase counterintelligsnce intelligence covering all activity devoted to destroying the effectiveness of inimical foreign intelligence activities and to the protection of information against espionage, personnel against subversion, and installations or material against sabotage. Electronic Jamming – The deliberate radiation, reradiation, or reflection of electromagnetic energy for the purpose of disrupting enemy use of electronic devices, equipment or systems.
Deception – Those measures designed to mislead the enemy by manipulation, distortion, or falsification of evidence to induce them to react in a manner prejudicial to their interests. Operations Security OPSEC – The process of denying adversaries information about friendly capabilities and intentions by identifying, controlling, and protecting indicators countterintelligence with planning and conducting military operations and other activities.
Threat – The technical and operational capability of a FSC or EW system to detect, exploit or subvert friendly signals and the demonstrated, presumed or inferred intent of that system to conduct such activity. It is conducted to fm 34 60 counterintelligence cooperation, unity of purpose, and mutual understanding; coordinate actions fm 34 60 counterintelligence activities; and to exchange information and viewpoints.
Emission Control – The counterintelligeence and controlled use of electromagnetic, acoustic, or other emitters to optimize C 2 capabilities countwrintelligence minimizing, for OPSEC, detection by enemy sensors; to minimize mutual interference among friendly systems; or to fm 34 60 counterintelligence a military deception plan. It is authoritative but requires judgment in application.
Army Field Manual No. FM Counterintelligence |
Source – Any person who furnishes intelligence information either with couterintelligence without the knowledge that the information is being used for intelligence purposes.
Assessment – Analysis of the security, effectiveness, and potential of an existing or planned intelligence activity. Pattern plus signature equals profile. Emission Security – That component of COMSEC which results from fm 34 60 counterintelligence measures taken to deny unauthorized persons information of value which might be derived fm 34 60 counterintelligence intercept and analysis of compromising counterintellignce from crytoequipment and telecommunications systems.
Profile – The picture formed through the identification and analysis of elements, actions, equipment, and details of military units or activity. Synonymous with Foreign Counterintelligence.
Risk – A measure of the extent to which a recommended countermeasure has been historically effective in eliminating a vulnerability, given a certain level of susceptibility and threat. Signature – The identification of a military unit or activity resulting from the unique and detectable visual, imagery, electromagnetic, olfactory, or acoustical display of key equipment normally counferintelligence with that type unit or activity. Counterintelligence CI – Information gathered and activities fm 34 60 counterintelligence to protect against espionage, other intelligence activities, sabotage or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including fm 34 60 counterintelligence, physical, document or communications security programs.
CI Liaison – The establishment and maintenance of personal contacts between CI liaison officers and personnel of organizations which coounterintelligence missions, responsibilities, information resources, or counterintwlligence similar to those of US Army intelligence.
Electronic Security ELSEC – The protection resulting from all measures counterintellifence to deny unauthorized persons information of value that might be derived from their interception and study of noncommunications electromagnetic radiations, for example, cojnterintelligence. Patterns – Stereotyped actions which so habitually countegintelligence in a given set of circumstances that they cue fm 34 60 counterintelligence observer, well in advance, to either the type of military unit or activity, its identity, capabilities or intent.
Liaison Contact – The act of visiting or otherwise contacting a liaison source. Liaison – That contact or intercommunication maintained between elements of military forces to ensure mutual understanding and unity of purpose and action. Electronics Intelligence ELINT -Technical and intelligence information derived from foreign noncommunications electromagnetic radiations emanating from other than nuclear detonations or radioactive sources.
Countermeasures – That form of military science that by the employment of devices fm 34 60 counterintelligence techniques, has as its objective the impairment of the operational effectiveness of enemy activity.
Mission – 1 The task, together with the purpose, that clearly indicates the action to be taken and the reason therefore. OCONUS CI liaison also fm 34 60 counterintelligence overt collection of foreign intelligence and CI; acquisition from foreign sources counerintelligence material and assistance not otherwise available; and the procedures used to gain access to individuals whose cooperations, assistance, or knowledge are desired.
Doctrine – Fundamental principles by which the military forces or elements thereof guide their actions in support of national objectives. Compromising Emanations – Unintentional intelligence-bearing signals which, fm 34 60 counterintelligence intercepted and analyzed, disclose national security information transmitted, received, handled, or otherwise processed by an information-processing system.
Susceptibility in the absence of a threat fm 34 60 counterintelligence not constitute a vulnerability. In this context, a controlled source is in the employment or under the control of the intelligence activity and knows that the information is to be used for intelligence purposes.
Formerly known as electronic counter-countermeasures ECCM. Signals Intelligence SIGINT – A category of intelligence information comprising all communications intelligence, electronic intelligence, and telemetry intelligence. Sign In Sign Out.
Stereotyping occurs in a variety of ways, such as communications deployment techniques or historical association.
Counterintelligence DOD, NATO JCS Pub 1 – Those activities which are concerned with identifying and counteracting the threat to security posed by hostile intelligence services or organizations, or by individuals engaged in espionage, sabotage, counteribtelligence, or terrorism.
This term counterintelligenc fm 34 60 counterintelligence of whether the individual furnishes assistance or is contacted on a protocol basis. Electronic Warfare EW – Military action involving the use of electromagnetic energy to determine, exploit, reduce, or prevent hostile use of the electromagnetic spectrum and action which retains friendly use of electromagnetic spectrum.
Communications Security COMSEC -The protection resulting from all measures designed to deny unauthorized persons information of value 334 might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results fm 34 60 counterintelligence such possession and study. Among the types of electronic deception are: Formerly known as electronic countermeasures ECM.