22.03.2013 Views

Dismounted Reconnaissance Troop - Army Electronic Publications ...

Dismounted Reconnaissance Troop - Army Electronic Publications ...

Dismounted Reconnaissance Troop - Army Electronic Publications ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Augmenting Combat Power<br />

Conducting HUMINT analysis.<br />

Supporting limited document and media exploitation.<br />

7-164. HUMINT collection teams are not organized, equipped, or authorized at any level to perform tasks<br />

normally conducted by:<br />

Military police (to include riots and crowd control).<br />

Civil affairs.<br />

MISO.<br />

CI.<br />

7-165. The troop plans security of the HCT to perform missions.<br />

COUNTERINTELLIGENCE<br />

7-166. Counterintelligence is focused on detecting, identifying, countering, exploiting, or neutralizing<br />

foreign intelligence and security and international terrorist organizations’ threat intelligence collection<br />

activities against U.S. forces. Counterintelligence personnel conduct investigations, collections, operations,<br />

analysis, and production to deny, disrupt, or degrade the FIST threat and provide threat indications and<br />

warnings to U.S. forces. Counterintelligence personnel conduct screening operations to identify personnel<br />

who may be of CI interest or have CI-related information leads.<br />

7-167. Counterintelligence investigations and operations cue other intelligence disciplines.<br />

Counterintelligence personnel work in conjunction with reconnaissance, CA, MISO, MPs, engineers, and<br />

medical personnel to create threat assessment and vulnerability assessments. These assessments provide<br />

commanders with a comprehensive assessment, comparing pertinent threat capabilities to existing<br />

conditions.<br />

7-168. Counterintelligence teams are also assigned specific missions from a higher headquarters and<br />

operate independently within the troop AO. When a team operates independently, the troop commander is<br />

notified by the squadron and is prepared to provide support, if necessary.<br />

COUNTERINTELLIGENCE SOURCES<br />

7-169. Counterintelligence sources include:<br />

Casual. These are one-time sources or casual contacts that provide atmospheric data, protection,<br />

threat indications, and warnings. The CI special agent has minimal control over the operation<br />

beyond planning and coordinating meetings and debriefing the source on CI areas of interest.<br />

Developmental. These sources are routinely contacted and provide more detailed information<br />

than a casual source. Developmental sources are never tasked to obtain information on behalf of<br />

U.S. forces; they include contacts who have demonstrated positive views or sentiments towards<br />

U.S. forces.<br />

Controlled. These sources have an established reporting history, are deemed credible, and have<br />

been vetted by CI elements. Controlled sources meet and cooperate with the CI special agent to<br />

provide information.<br />

OTHER INTELLIGENCE ASSETS<br />

7-170. Other intelligence assets available to the troop include those found in the MICO and its own<br />

organic SUAS.<br />

MILITARY INTELLIGENCE COMPANY<br />

7-171. The MICO mission is to conduct intelligence analysis, synchronization, and HUMINT collection<br />

that support the IBCT and its subordinate commands across the full spectrum of conflict. The MICO<br />

provides analysis and intelligence synchronization support to the IBCT S2. The MICO supports the IBCT<br />

and its subordinate commands through collection, analysis, and dissemination of intelligence information.<br />

It supports the IBCT S2 in synchronizing and maintaining a timely and accurate picture of the enemy<br />

16 November 2010 ATTP 3-20.97 7-35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!