COUNTERINTELLIGENCE WORKSHEET  ASSAULT PHASE

 

By Keshav Mazumdar

CL-1] Operation phases

CL-2] CI measures adopted-Categories

CL-3] CI Measures to be adopted

CL-4]Units/personnel responsible to execute CI measures

Civil affairs

CIS Officer

Provost Marshal

Sigint units

All units

CI Units

CL-5] Instructions regarding columns 3 and 4.Future action , staff Coordination measures.

Assault phase

Military security/discipline:

A]Security of classified information/material/equipment

B]Ensuring security of communication and information systems.

C]Movement security.

1.All vehicles/aircraft/camouflaged and distinctive markings painted.

2.Personnel should remove all regimental/unit/personal identification from uniform.

3.Entry to ops area should be restricted to those with valid entry pass and on official work only.

4.Observe OPSEC.This should be enforced strictly and all personnel should follow security discipline.Such as exercise caution during talking or on phone,while handling communication systems,documents or maps,to avoid publicly voicing ideas,intent or plans,speculations which might be overheard by enemy infiltrators,Command posts/echelons must be particularly subjected to security discipline and also at tactical ops centers.

5.Any security violations,compromises,whether verified or suspected should be immediately brought to the attention of the unit intelligence officer and also the CMP.

 

6.It can very well happen that unauthorized personnel or local civilians are in a position to observe C2 Nodes, fires,ammo or dump locations,hangars or other Combat service support locations.These people should be immediately evacuated.If not possible then placed under guard / confinement till further orders.

 

 

7.SOP should contain provisions for security,wherein plans should include destruction of cryptographic systems/decices.Any loss or compromise should be reported immerdiately.

8.Similarly there should be plans for destruction of documernts in case of capture.It should be ensured that devices to destroy documents are installed and working properly.

9..All passwords , call signs , codes , any authenticating systems , verbal or machine should be properly authorized.

10..Command posts , message centers and all other sensitive areas should be highly restricted only to authorized personnel.

11.All wire lines should be properly patrolled.Usage of guard dogs should be encouraged to increase patrolling intensity.

12.All wire lines entering enemy territory should be severed by wire cutters.

13.Often changes in regular movement patters of vehicles & aircraft telegraph changes in operational plans.Hence all such movements must be controlled in such a manner(timings,cover of darkness,terrain profile,newer routes,bypassing observable routes,etc) so as to negate any enemy opportunity.

(Others as required)

 

 

 

Coordinate with SO-4(Logistics)

Violations to be reported by CMP CO./PM

Coordinate with S1(Personnel)

Coordinate with S3(Ops)

Advisory/instructor role of CI personnel and existing SOP updated if necessary.

Coordinate with S1

CI elements check SOP

CI elements check SOP

CIS officer should be contacted if compliance is adhered to or not

Coordinate with other military units.

Coordinated with S3(Ops) and S4(Logistics)

Violations reported by CMP CO/PM.