Dismounted Reconnaissance Troop - Army Electronic Publications ...
Dismounted Reconnaissance Troop - Army Electronic Publications ...
Dismounted Reconnaissance Troop - Army Electronic Publications ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Augmenting Combat Power<br />
Conducting HUMINT analysis.<br />
Supporting limited document and media exploitation.<br />
7-164. HUMINT collection teams are not organized, equipped, or authorized at any level to perform tasks<br />
normally conducted by:<br />
Military police (to include riots and crowd control).<br />
Civil affairs.<br />
MISO.<br />
CI.<br />
7-165. The troop plans security of the HCT to perform missions.<br />
COUNTERINTELLIGENCE<br />
7-166. Counterintelligence is focused on detecting, identifying, countering, exploiting, or neutralizing<br />
foreign intelligence and security and international terrorist organizations’ threat intelligence collection<br />
activities against U.S. forces. Counterintelligence personnel conduct investigations, collections, operations,<br />
analysis, and production to deny, disrupt, or degrade the FIST threat and provide threat indications and<br />
warnings to U.S. forces. Counterintelligence personnel conduct screening operations to identify personnel<br />
who may be of CI interest or have CI-related information leads.<br />
7-167. Counterintelligence investigations and operations cue other intelligence disciplines.<br />
Counterintelligence personnel work in conjunction with reconnaissance, CA, MISO, MPs, engineers, and<br />
medical personnel to create threat assessment and vulnerability assessments. These assessments provide<br />
commanders with a comprehensive assessment, comparing pertinent threat capabilities to existing<br />
conditions.<br />
7-168. Counterintelligence teams are also assigned specific missions from a higher headquarters and<br />
operate independently within the troop AO. When a team operates independently, the troop commander is<br />
notified by the squadron and is prepared to provide support, if necessary.<br />
COUNTERINTELLIGENCE SOURCES<br />
7-169. Counterintelligence sources include:<br />
Casual. These are one-time sources or casual contacts that provide atmospheric data, protection,<br />
threat indications, and warnings. The CI special agent has minimal control over the operation<br />
beyond planning and coordinating meetings and debriefing the source on CI areas of interest.<br />
Developmental. These sources are routinely contacted and provide more detailed information<br />
than a casual source. Developmental sources are never tasked to obtain information on behalf of<br />
U.S. forces; they include contacts who have demonstrated positive views or sentiments towards<br />
U.S. forces.<br />
Controlled. These sources have an established reporting history, are deemed credible, and have<br />
been vetted by CI elements. Controlled sources meet and cooperate with the CI special agent to<br />
provide information.<br />
OTHER INTELLIGENCE ASSETS<br />
7-170. Other intelligence assets available to the troop include those found in the MICO and its own<br />
organic SUAS.<br />
MILITARY INTELLIGENCE COMPANY<br />
7-171. The MICO mission is to conduct intelligence analysis, synchronization, and HUMINT collection<br />
that support the IBCT and its subordinate commands across the full spectrum of conflict. The MICO<br />
provides analysis and intelligence synchronization support to the IBCT S2. The MICO supports the IBCT<br />
and its subordinate commands through collection, analysis, and dissemination of intelligence information.<br />
It supports the IBCT S2 in synchronizing and maintaining a timely and accurate picture of the enemy<br />
16 November 2010 ATTP 3-20.97 7-35