PROLOGUE
The purpose of this booklet is to present basic information on the
mission and activities of Counter Intelligence. But, with the understanding
that the primary mission is to support the commanders of the armed forces.
This booklet is dedicated to the concepts of Counter Intelligence in relation
with its functional areas, the application of these functions, and a specific
dedication and instructions on how to apply these functions. The terms
"special agent of Counter Intelligence" (SA) refers to all those persons who
conduct and contribute to the handling and gathering of information of the
multi-disciplinary intelligence of the hostile services. This booklet is
primarily oriented at those persons involved in the control and execution of
the operations of CI. In like manner, this booklet has a very significant
value for other members of the armed forces that function in the areas and
services of security and other departments of intelligence.
LN324-91
CHAPTER 1
INTRODUCTION TO COUNTER INTELLIGENCE
INTRODUCTION
Imagine a circle representing the effort of a total intelligence
conducted by all the agencies of the Armed Forces. Inside this overall field,
we find that counterintelligence is an integral part of the total intelligence
effort.
DEVELOPMENT
DEFINITION OF COUNTERINTELLIGENCE:
Counterintelligence is defined as the activity or activities
collectively organized by an intelligence service dedicated to obstruct the
enemy's source of information by means of concealment, codes, crypto,
censorship and other measures to deceive the enemy by using disinformation,
trickery, etc.
The two measures used by Counterintelligence are DEFENSIVE or OFFENSIVE:
Defensive measures vary normally with the mission of the unit. An
example of these measures are:
Counter-espionage
Counter-sabotage
Counter-subversion
Antiterrorism
Counter-terrorism
Intelligence consists of collection, transmission and dissemination of
military data referring to possible or real enemy and/or to an area of
operations. The military commander uses this intelligence in order to
formulate his possible course of action and to select a course of action in
particular in order to achieve the mission. Thus, the intelligence obtained is
of vital importance to the commander and for the conduct of his mission.
Intelligence is also essential for the enemy as it is for us. The enemy
also uses all sorts of measures at its disposal to become informed about our
capabilities, vulnerabilities and probable cause of action, and also
information about the meteorological conditions of the terrain.
Military Counter Intelligence is that part of Intelligence intended to
deprive the enemy of this knowledge, and in this manner prevent the enemy
activities of espionage, sabotage and subversion, as well as discover possible
5
LN324-91
acts of an adverse nature, treason, or sedition among our own military forces.
Counter Intelligence is a significant aspect in both the strategic
intelligence and combat, and is essential for the favorable application of two
of the nine basic principles of war: security and surprise. The principles of
war are:
Mass
Objective
Security
Surprise
Command
Offensive
Maneuver
Force economy
Simplicity.
Effective Counter Intelligence enhances the security and helps achieve
surprise. Surprise depends not only on the intelligence obtained and the speed
of movement, but also on the effective counter intelligence. Effort to prevent
the enemy from obtaining data, reducing the risk that the command can suffer,
provided it diminishes the enemy's capability of utilizing effectively its
potential of combat against our Armed Forces. Thus, effective counter
intelligence allows security of the unit.
DECEPTION:
Deception in combat is a military operation designed to conceal our
dispositions, capabilities and intentions and deceive the enemy in such a way
that it would be to his disadvantage and to our advantage.
Deception is designed to derail or deceive the enemy through
manipulation, disinformation, or falsifying of evidence in order to induce a
reaction in a way that is detrimental to his own interest.
In order for a deception operation to be successful, the enemy has to
have the capability of collecting information that we would like him to get,
so that we can react according to the information.
The enemy is given the opportunity to obtain information, and thus
creating a deceptive picture. At the same time, counter intelligence goes into
action in order to prevent the enemy from discovering the true purpose of the
operation of deception and to avoid recognition of the true technical
operation or the principle one, which is being supported by the deceptive
operation mainly security.
QUESTION: Why can we consider a soldier as a counter intelligence
agency?
6
LN324-91
ANSWER: An individual solder is an agent of the CI, since he can provide
information on the activities of the intelligence of the enemy, including
subversion. Much of the CI operations depends on the individual soldiers
ability to adequately fulfill the security procedures, camouflage, observation
and information system.
As a prisoner of war, the individual soldier is a soldier of operational
information of the enemy. Therefore, the individual soldier receives training
in the measures of escape and invasion, in case he is taken prisoner or that
he finds himself behind enemy lines. Also he receives training to resist the
interrogations of the enemy and adhere to his rights as a prisoner of war
under the Geneva Convention.
All the units are agents of the CI and they too take measures of CI in
order to deprive the enemy intelligence on our activities, operations and
locations of this positions.
Every officer of the high command and every subordinate command in
effect acts as a Counter Intelligence officer of the Joint High Command. For
example, the transport officer aids the command with the Counter Intelligence
aspects regarding the movement of transport; the health chief accesses the
Counter Intelligence aspect regarding the location of the health
installations.
Some units, such as the units of the censure, have special function of
CI because of the nature of their assigned missions. The CI agent of the Army
has the personal training as specialist in CI and is available for providing
support in all the military operations.
Other government agencies, such as the agencies of intelligence of the
Navy, the Air Force and the Defense Ministry, also use certain functions of CI
that support the CI operations of the Army.
Keep in mind that kind of intelligence is necessary in both times of
peace and war, since espionage, subversion and occasion sabotage are not only
limited to conditions of time of war. All foreign countries, both enemy and
friends, wish to obtain information regarding the Armed Forces, their assets,
disposition, weapons, level of training and future plans for operations peace
time as well as in time of war.
The range of the CI operation extends in proportion to the level of
command.
At the division level the measure of CI generally have to do with
military security.
CI operations at higher levels are similar to those of the inferior
levels. Nevertheless, the operations have a broader range thanks to the
greater number of units in the scope of their areas with a great volume of
7
__________________________________________________________
LN324-91
advance planning. The CI operations at superior levels include:
MILITARY SECURITY
SECURITY OF PORTS, BORDERS AND TRAVEL
CENSORSHIP
SPECIAL OPERATIONS
CIVILIAN SECURITY
Generally speaking, Counter Intelligence is a main part of the
intelligence operation in the theater of operations.
Depriving the enemy of information regarding supplies, installations,
nuclear weapon systems, means of transport, communications is vital in
fulfillment of the mission in the zone of the theater of operations. The great
territorial responsibility of this zone require extensive operation of the CI
of all types.
COMMANDERS' RESPONSIBILITIES:
QUESTION: IN THE MILITARY UNIT, WHAT ARE THE THINGS THAT INTEREST THE
ENEMY?
ANSWER: Military information.
Personnel.
Equipment and installations.
As in all aspects of the military unit, the commanders are responsible
for the implementation and execution of all the measures of military Counter
Intelligence to protect military information, personnel, material and
installation within the unit.
The commander has his high command which can delegate the authority to
carry out these functions; nevertheless, the responsibility rests with the
commander.
The Counter Intelligence officer:
The auxiliary chief of the high command, C-2, is the officer of the high
command responsible for the military information which also includes Counter
Intelligence. This delegation of authority is given to the auxiliary chief of
8
LN324-91
the high command, C-2, who has under his charge and responsibility of the high
command regarding Central Intelligence and CI. The C-2 is responsible for the
implementation and direction of all the measures of CI inside the command.
The planning of military Counter Intelligence is based on ability or
capability of the enemy to obtain information regarding friendly activities.
This planning includes adequate CI countermeasures to prevent the enemy from
discovering the dispositions and activities that can reveal the intentions of
the command or, if interrupted, could endanger the accomplishment of the
mission.
According to the organization and the size of the command, there may be
a CI official of the high command of the C-2. At the division or brigade
level, the official of the CI normally is the chief of the section of security
or the detachment of military intelligence that supports the division of the
brigade. In other words, he wears two hats, as chief of the security section,
and as the CI officer of the joint high command of the C-2.
CATEGORIES OF CI OPERATION
Generally, there are five categories of operations of CI conducted
inside the theater of operation at which the C-2 is responsible or has direct
interest. The categories are:
MILITARY SECURITY
CIVILIAN SECURITY
HARBOR, BORDER AND TRAVEL SECURITY
CENSORSHIP
SPECIAL OPERATION
MILITARY SECURITY
The military security encompasses measures taken by the command to
protect itself from espionage, enemy civilians, supervision and sabotage and
surprise. These include passive CI measures and active ones inside the Armed
Forces and directly pertaining to the same and for specific military
operations. Examples of military securities are:
SECRECY DISCIPLINE: This is the indoctrination/training on a continuous
basis of all personnel against divulging of classified information that is not
authorized or unclassified regarding military activities, and the use of
9
LN324-91
patrol of security in areas frequented by military personnel.
SPECIAL PROTECTION OF CLASSIFIED MILITARY AND EQUIPMENT INFORMATION:
This is the observation of the security measures, such as the security
necessary inside the areas that contain information and classified equipment;
introduction of a system of passes for entering critical areas; the conduct of
studies in inspection of security to determine the strict observation of
prescribed security measures.
SECURITY OF TROOP MOVEMENT: This keeps a certain connection with the
secrecy discipline, preventing inappropriate comments by personnel in the unit
given an order for movement; in returning mail dispatches of the unit in a
certain period of time before the departure of the troops, and restricting all
personnel in the area of the unit.
COUNTER SUBVERSION INSIDE THE ARMED FORCES: This is the overcoming of
suppression of rumors and propaganda and the apprehension of subversive
agents.
THE TECHNICAL MEASURES AS REQUIRED IN THE COMBAT ZONES: This is the use
of the technical troops for the apprehension of the resistance groups, to help
reduce the intelligence subjective and the mop up operations of the guerilla
units.
TRANSMISSION SECURITY: Listening to the administration communication
networks, command operation of intelligence.
SPECIAL HANDLING OF ESCAPEES AND EVADERS: This type of person needs to
be debriefed to obtain the immediate intelligence information. It is of great
importance to make sure that the escapee or evader is not an enemy agent.
CIVILIAN SECURITY: In all cases the mission of the military forces has
priority over the well being of the civilians in the area. Examples of the
civilian security measures are:
Systematic registering of the civilian personnel, including the neutral
foreigners and enemies: This is done by the civilian affairs agency and
includes the distribution of rationing cards, work permits, travel permits and
permits for crossing borders.
Control of the circulation of the civilian personnel and refugees: This
is a very important matter: All civilian personnel must be kept away from the
advance combat zones, which will help prevent their easily finding out about
our forces and inform enemy agents of espionage or sabotage. Also, all
civilian personnel is to be kept at a distance from the major route of supply
to make it easier for the military transport and prevent enemy agents from
infiltrating the military zone.
10
LN324-91
Curfew: Keeping the public away from the streets and routes after certain
hours, thus restricting the movements of enemy agents.
Surveillance of suspect political groups: One should find out whether
other groups are sympathetic to enemy cause. Such groups must always be
considered potential agents.
Investigation of workers security: Local workers employed by the Armed
Forces should be investigated to avoid infiltration of enemy agents in areas
and military units. This include the service personnel of the countryside,
truck drivers and current workers, and interpreters, translators, etc.
Distribution of passes and permits. Passes and permits should be
strictly controlled and reviewed frequently to avoid forgery. Passes and
permits for travel are normally distributed to government functionaries,
political agencies, doctors and workers of public services.
Control of international commerce: Control of commerce in neutral
states. Experience has proven that many commercial companies are in effect spy
agencies that use the company as a cover or front of their operation. The
profits from the trade of these companies can be and is used to pay for the
expenses of espionage operations.
Surveillance of consuls and neutral/high command diplomats: It is
possible that people of this category are using their diplomatic immunity to
act as couriers for an enemy country.
SECURITY OF HARBORS, BORDERS AND TRAVEL: Consists of special
applications of both the neutral security measures as well as civilians for
the control of Counter Intelligence in entry ports and ports of departure for
borders and international lines; all movements of. a non-military character,
of entry and departure in the theater of operations.
SECURITY CONTROL OF MARITIME HARBORS: This is the responsibility of the
Navy and control should be coordinated with the Navy.
SECURITY CONTROL OF AIRPORTS: This is the responsibility of the Air
Force and control should be coordinated with the Air Force.
ESTABLISHMENT OF CROSSING POINTS ON THE BORDER: Normal routes of
movement should be directed to points of crossing located strategically. These
points of crossing should be controlled by military personnel with the help of
local and national agencies as necessary.
SECURITY CONTROL OF THE MERCHANT MARINE AND THE CREWS OF COMMERCIAL
AIRCRAFT: This is important due to such individuals who by virtue of their
occupation can enter and depart legally and frequently from the country and
such individuals can be used as pretext for carrying out fraud operations
(diplomatic pouch).
11
LN324-91
INVESTIGATION OF SECURITY AND CONTROL OF PERSONS WHO LIVE AT THE
BORDERS: Personnel in this category, for example, the farmers who live at the
border and the entire front can be on the border, personnel living on one side
of the border and working on the other side.
CONTROL OF DISEMBARKATION PASSES AND PASSES FOR LANDING, AND FISHING
PERMITS: The fishing boats and small craft of a similar nature that operate in
very shallow water and thus have the capability of landing enemy agents at any
point on the coast of the country where the military operations take place.
CENSORSHIP: Censorship is the control and elimination of communication
with a double purposes: First, to avoid the transmission of information that
can be of interest in helping the enemy; and secondly, to collect and
propagate valuable information in the service of intelligence that helps the
war effort. The term communication includes all types of postal material,
regardless of class;, means of electrical communication and any other tangible
form of communication that can be carried by a person, carried in luggage, or
among personal effects or in any other way can be transmitted from the area
where the censorship is taking place.
THERE ARE FOUR TYPES OF CENSORSHIP IMPLEMENTED DURING WAR CONDITIONS
WHICH ARE:
Censorship of the Armed Forces: This censorship is the control and
examination of all communications sent and received by personnel under the
jurisdiction of the Armed Forces, which include assigned military personnel,
the civilians that can be employed and added to the same. This includes all
war correspondents, representatives of the Red Cross and technical
representatives of the factories.
Civilian Censorship: The civilian censorship is the control and
examination of all communication of the national and civilian population of
the common goal and transit or circulate in a territory which cannot be
liberated, occupied or controlled by the Armed Forces.
Press Censorship: Press censorship is a division of the security of the
news material and other media that are used, including maintenance of
security. This applies primarily to the work that is done by the war
correspondents, radio commentators and press photographers, and also includes
any material prepared on a possible location by the personnel under the
jurisdiction of the Armed Forces.
Censorship of Prisoners or War: Censorship of prisoners of war is
control and examination of the political communication of the prisoners of war
and the civilian detainees under the jurisdiction of the Armed Forces.
SPECIAL OPERATIONS: The final category is the special operations.
Operations that come under this category will be discussed and planned
12
LN324-91
according to the specifications of the commander in keeping with the planning
within the SOP of CI.