P. 1
FM 34-60 Counterintelligence

FM 34-60 Counterintelligence

Ratings: (0)|Views: 167 |Likes:
Published by Jakob Szima-Kotter

More info:

Published by: Jakob Szima-Kotter on Oct 11, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/24/2014

pdf

text

original

 
FM34-60COUNTERINTELLIGENCE
HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTIONRESTRICTION: Appproved for public release; distribution is unlimited.
FIELD MANUAL 34-60 *FM 34-60 NO. 34-60Headquarters Department of the ArmyWashington, DC, 3 October 1995
COUNTERINTELLIGENCETABLE OF CONTENTS
PREFACECHAPTER 1 MISSION AND STRUCTURE
GeneralMissionCI in Support of Force XXIIntelligence TasksArmy CI as a Function of MICounterreconnaissanceOther SpecialtiesPeace, War, and OOTWThe CI StructureCI Support to US ForcesPlanningTasking and ReportingJoint and Combined OperationsLegal Review
 
CHAPTER 2 INVESTIGATIONS
GeneralTypes of Investigations
CHAPTER 3 OPERATIONS AND TECHNIQUES
GeneralOperationsTechniques
CHAPTER 4 COUNTERINTELLIGENCE COLLECTION ACTIVITIES
GeneralControl of Source InformationCI LiaisonDebriefingCI Force Protection Source Operations
CHAPTER 5 COUNTERINTELLIGENCE ANALYSIS ANDPRODUCTION
GeneralCI AnalysisCI Analysis Target NominationsCI Analysis Products
APPENDIX A COUNTER-HUMAN INTELLIGENCETECHNIQUES AND PROCEDURES
Section I. BASIC INVESTIGATIVE TECHNIQUES AND PROCEDURESSection II. INVESTIGATIVE LEGAL PRINCIPLESSection III. TECHNICAL INVESTIGATIVE TECHNIQUESSection IV. SCREENING, CORDON, AND SEARCH OPERATIONSSection V. PERSONALITIES, ORGANIZATIONS, AND INSTALLATIONSLISTSection VI. COUNTER-HUMAN INTELLIGENCE ANALYSISSection VII. PERSONNEL SECURITY INVESTIGATIONSSection VIII. COUNTERINTELLIGENCE INVESTIGATIONS
APPENDIX B COUNTER-SIGNALSINTELLIGENCE TECHNIQUES ANDPROCEDURES
 
Section I. DATABASESection II. THREAT ASSESSMENTSection III. VULNERABILITY ASSESSMENTSection IV. COUNTERMEASURES OPTIONS DEVELOPMENTSection V. COUNTERMEASURES EVALUATION
APPENDIX C COUNTER-IMAGERYINTELLIGENCE TECHNIQUES ANDPROCEDURES
GLOSSARY
Section I. Abbreviations and AcronymsSection II. Terms
REFERENCES
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.*This publication supersedes FM 34-60, 5 February 1990.
PREFACE
This field manual (FM) provides guidance to commanders, counterintelligence (CI) agents, andanalysts. The first four chapters provide information to the commander and staff while theremainder provides the tactics, techniques, and procedures (TTP) required to aggressivelyidentify, neutralize, and exploit foreign intelligence attempts to conduct operations against theUnited States (US) Army.CI supports Army operations by providing a clear picture of the threat to commands at allechelons and actions required to protect the force from exploitation by foreign intelligence. CIoperations include conducting investigations, offensive and defensive operations, security andvulnerability analyses, and intelligence collection in peace and at all levels of conflict to supportcommand needs.CI supports the total intelligence process by focusing on foreign intelligence collection efforts.CI is designed to provide commanders the enemy intelligence collection situation and targetinginformation in order to counter foreign intelligence service (FIS) activities. CI is an integral partof the US Army's all-source intelligence capability.By its nature, CI is a multidiscipline effort that includes counter-human intelligence (C-HUMINT), counter-signals intelligence (C-SIGINT), and counter-imagery intelligence (C-IMINT) designed to counter foreign all-source collection. The CI force in conjunction with other intelligence assets must have the capability to detect all aspects of intelligence collection andrelated activities that pose a threat to the security of Army operations, personnel, and materiel.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->