CL-1] Operation phases |
CL-2] CI measures
adopted-Categories |
CL-3] CI Measures to be adopted |
CL-4]Units/personnel responsible
to execute CI measures
|
CL-5] Instructions regarding
columns 3 and 4.Future action , staff Coordination measures. |
||||||
Assault
phase |
Military
security/discipline: A]Security
of classified information/material/equipment B]Ensuring
security of communication and information systems. C]Movement
security. |
1.All
vehicles/aircraft/camouflaged and distinctive markings painted. 2.Personnel
should remove all regimental/unit/personal identification from uniform. 3.Entry
to ops area should be restricted to those with valid entry pass and on
official work only. 4.Observe
OPSEC.This should be enforced strictly and all personnel should follow
security discipline.Such as exercise caution during talking or on
phone,while handling communication systems,documents or maps,to avoid
publicly voicing ideas,intent or plans,speculations which might be
overheard by enemy infiltrators,Command posts/echelons must be
particularly subjected to security discipline and also at tactical ops
centers. 5.Any
security violations,compromises,whether verified or suspected should be
immediately brought to the attention of the unit intelligence officer
and also the CMP. 6.It
can very well happen that unauthorized personnel or local civilians are
in a position to observe C2 Nodes, fires,ammo or dump locations,hangars
or other Combat service support locations.These people should be
immediately evacuated.If not possible then placed under guard /
confinement till further orders. 7.SOP
should contain provisions for security,wherein plans should include
destruction of cryptographic systems/decices.Any loss or compromise
should be reported immerdiately. 8.Similarly
there should be plans for destruction of documernts in case of
capture.It should be ensured that devices to destroy documents are
installed and working properly. 9..All
passwords , call signs , codes , any authenticating systems , verbal or
machine should be properly authorized. 10..Command
posts , message centers and all other sensitive areas should be highly
restricted only to authorized personnel. 11.All
wire lines should be properly patrolled.Usage of guard dogs should be
encouraged to increase patrolling intensity. 12.All
wire lines entering enemy territory should be severed by wire cutters. 13.Often
changes in regular movement patters of vehicles & aircraft
telegraph changes in operational plans.Hence all such movements must be
controlled in such a manner(timings,cover of darkness,terrain
profile,newer routes,bypassing observable routes,etc) so as to negate
any enemy opportunity. (Others
as required) |
Coordinate
with SO-4(Logistics) Violations
to be reported by CMP CO./PM Coordinate
with S1(Personnel) Coordinate
with S3(Ops) Advisory/instructor
role of CI personnel and existing SOP updated if necessary. Coordinate
with S1 CI
elements check SOP CI
elements check SOP CIS
officer should be contacted if compliance is adhered to or not Coordinate
with other military units. Coordinated
with S3(Ops) and S4(Logistics) Violations
reported by CMP CO/PM. |