Atnaujinkite slapukų nuostatas

Official U.S. Army Counterintelligence Handbook [Minkštas viršelis]

  • Formatas: Paperback / softback, 240 pages, aukštis x plotis x storis: 235x191x13 mm, weight: 426 g, 53 BW Illustrations
  • Išleidimo metai: 01-Nov-2023
  • Leidėjas: The Lyons Press
  • ISBN-10: 1493073044
  • ISBN-13: 9781493073047
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 240 pages, aukštis x plotis x storis: 235x191x13 mm, weight: 426 g, 53 BW Illustrations
  • Išleidimo metai: 01-Nov-2023
  • Leidėjas: The Lyons Press
  • ISBN-10: 1493073044
  • ISBN-13: 9781493073047
Kitos knygos pagal šią temą:

The U.S. Army's official playbook for deception on the world's deadliest stage, and a must-read for anyone with an interest in today’s difficult military intelligence questions.

Table of Contents:

U.S. ARMY COUNTERINTELLIGENCE HANDBOOK

CONTENTS


PREFACEiii

CHAPTER 1MISSION AND STRUCTURE1-1
General1-1
Mission1-2
CI in Support of Force XXI1-4
Intelligence Tasks1-6
CI Tasks1-6
Army CI as a Function of MI1-7
Counterreconnaissance1-7
Other Specialties1-7
Peace, War, and OOTW1-8
The CI Structure1-9
CI Support to US Forces1-11
Planning1-12
Tasking and Reporting1-12
Joint and Combined Operations1-13
Legal Review1-15

CHAPTER 2INVESTIGATIONS2-1
f0General2-1
Types of Investigations2-1

CHAPTER 3OPERATIONS AND TECHNIQUES3-1
General3-1
Operations3-1
Techniques3-14

CHAPTER 4COUNTERINTELLIGENCE COLLECTION
ACTIVITIES4-1
General4-1
Control of Source Information4-2
CI Liaison4-3
Debriefing4-7
CI Force Protection Source Operations4-8

CHAPTER 5COUNTERINTELLIGENCE ANALYSIS
AND PRODUCTION5-1
General5-1
CI Analysis5-3
CI Analysis Target Nominations5-6
CI Analysis Products5-9

APPENDIX ACOUNTER-HUMAN INTELLIGENCE
TECHNIQUES AND PROCEDURESA-1
Basic Investigative Techniques and ProceduresA-I-1
abInvestigative Legal PrinciplesA-II-1
Technical Investigative TechniquesA-III-1
Screening, Cordon, and Search OperationsA-IV-1
Personalities, Organizations, and Installations ListA-V-1
Counter-Human Intelligence AnalysisA-VI-1
Personnel Security InvestigationsA-VII-1
Counterintelligence InvestigationsA-VIII-1

APPENDIX BCOUNTER-SIGNALS INTELLIGENCE
TECHNIQUES AND PROCEDURESB-1
DatabaseB-I-1
Threat AssessmentB-II-1
Vulnerability AssessmentB-III-1
Countermeasures Options DevelopmentB-IV-1
Countermeasures EvaluationB-V-1

APPENDIX CCOUNTER-IMAGERY INTELLIGENCE
TECHNIQUES AND PROCEDURESC-1


GLOSSARYGlossary-1
Abbreviations and AcronymsGlossary-1
TermsGlossary-5

REFERENCESReferences-1

INDEXIndex-1

d