Chinese Intelligence from AFIO's the INTELLIGENCER

Total Page:16

File Type:pdf, Size:1020Kb

Chinese Intelligence from AFIO's the INTELLIGENCER Association of Former Intelligence Officers 7700 Leesburg Pike, Suite 324 From AFIO's The Intelligencer Falls Church, Virginia 22043 Web: www.afio.com, E-mail: [email protected] Journal of U.S. Intelligence Studies Current Structure of PRC Intelligence Volume 22 • Number 1 • $15 single copy price Spring 2016 ©2016, AFIO Services There are several intelligence and security organi- zations in the PRC, some part of larger organizations. None is in charge overall. Only the ones exclusively devoted to intelligence are presented here, and the list is not exhaustive.4 Furthermore, a section inten- GUIDE TO THE STUDY OF INTELLIGENCE tionally missing here regards the important area of intelligence oversight. This is because intelligence activities in China lack parliament oversight for the basic reasons that China is not a democracy (apart from direct elections at township and local level) and there are not transparent rules to how security, inter- nal and external, is ensured. Chinese Intelligence The obvious starting point is the Ministry of State Security (Guójiā Ānquánbù, 国家安全部, MSS). It is the main agency, responsible for intelligence and by Stefania Paladini, PhD state security, in charge of counterintelligence and foreign intelligence (but not military intelligence). It was established in 1983, with Ling Yun as first chief, Intelligence With Chinese Characteristics after the reform of the predecessor Central Investiga- tion Department (Diaochabu) that was established at omparing systems and concepts like the Chi- the creation of PRC in 1949 and first headed by Kang nese and the Anglo-American is challenging, Sheng and later by Li Kenong. Before that there was and intelligence studies are no exception. It no intelligence service separate from the Communist C Party, even though there were organized intelligence is even more difficult, considering that there is not a perfect translation in Chinese for the word “intel- activities since at least 1927. ligence.” In fact, the term used by the Chinese is According to the Federation of American Scien- 5 qingbao, which can be translated as “information,” as tists, the MSS is organized – unsurprisingly – on the much as “intelligence.” The Western distinction that model of the old KGB, with a First Bureau dealing with intelligence is information that has been analyzed domestic security, the Second with foreign services does not completely apply to Chinese doctrine. How- and counterintelligence. Other sections deal with ever, what is clear from Chinese terminology is the signals intelligence (SIGINT) and countersurveillance, action-enabling purpose of intelligence – expressed or focus on outer territories like Taiwan. According with the terms jihuo zhishi – “activating knowledge.”1 to some sources, the 17th Bureau is in charge of eco- Albeit this terminology-related question, China nomic intelligence, the collection of which is one of has a long tradition in this subject, and every cultivated the characteristics of Chinese services, which have Chinese, let alone politician and intelligence expert, targeted specifically the United States and European knows about Sun Zi, the scholar from 300 BC who first countries, France among them. theorized the use of intelligence, more specifically espionage, for warfare purposes.2 This article presents a brief overview of the intelli- gence organizations in the People’s Republic of China considered part of Chinese territory by the PRC Government, the first is labeled a “renegade province” and the other two go under the term (PRC) and a few notes to understand intelligence with of “one-country, two systems.” Chinese characteristics.3 4. One of the best open sources is the French intelligence service web- site: http://servicederenseignements.e-monsite.com/pages/grandes-agenc- es/republique-populaire-de-chine.html. French sources are especially 1. There is also another term used, ziliao, which refers to data, and good concerning Chinese intelligence, starting with Faligot & Remi often is put in comparison with qingbao, which generally involves an (1990), which is a recommended reading. element of secrecy. For more about this linguistic debate, see Huo 5. FAS’ own source here is: “Spy Headquarters Behind the Shrubs — & Wang, 1991, and Mattis, 2013 in the “Readings for Instructors” Supplement to `Secrets About CPC Spies’” No. 233, by Tan Po Cheng section. Ming [Hong Kong], March 1, 1997, 34-37; Cheng Ming on Chinese 2. Sun Zi is often Romanized as Sun Tzu. Spy Headquarters, FBIS-CHI-97-047, March 1, 1997. Source no longer 3. This article does not address Taiwan, Hong Kong, or Macao. While retrievable. Spring 2016 Intelligencer: Journal of U.S. Intelligence Studies Page 65 French sources6 in 2005 estimated the MSS had BC, devotes the last chapter to intelligence and is still around 7,000 employees, but some 50,000 undercover a most common reference about the practice and doc- operatives.7 The chief of the service, since early 2015, trine of espionage and its political uses.12 Intelligence is Geng Huichang. According to many observers, operations in Communist China started long before he is President Xi Jinping’s man and not a holder of 1949 and are linked to Kang Sheng,13 Mao Zedong’s autonomous power, as often has been the case with spymaster and a central figure in China’s foreign former chiefs. policy for decades. Among other achievements, Kang The MSS should not to be confused with the Min- Sheng played a substantial role in obtaining nuclear istry of Public Security (Gōng’ānbù, 公安部, MPS) that technology for developing a national atomic program. looks after the police bureau and internal/ordinary Another figure to be mentioned for importance security,8 but has no intelligence gathering mission.9 is the second MSS chief. Soon after the removal of its Military intelligence is the prerogative of the first chief, Lin Yun, in 1985 over the defection of Yu People’s Liberation Army (PLA). Two PLA departments Qiangsheng, head of the Counterespionage Bureau, to specifically deal with it: the US, Jia Chunwang rose to power and held tenure One is the PLA General Staff Headquarters Second until 1998; until today the longest serving MSS chief Department (Qingbaobu, 2PLA), which is more specif- and one of the most influential. Jia’s tenure was fun- ically responsible for collecting and disseminating damental in expanding the MSS’ scope and grasp of military information, via human sources (HUMINT), the MSS.14 The MSS began as a central-level ministry signals intelligence (SIGINT), and imagery intelli- with only a handful of provincial departments. By gence (IMINT). Officers are dispatched to China’s the end of Jia’s tenure, the MSS covered every prov- embassies and consulates overseas, and also to big ince, provincial-level city, and a countless number of Chinese state-owned enterprises (SOEs), banks, and municipalities. think tanks. On the other hand, the Third Department (3PLA) is in charge of the direct monitoring of foreign Chinese Methods and Approach armies and their SIGINT, and with dissemination of collected intelligence. It should be mentioned that to Intelligence Chinese SIGINT is quite impressive and is considered The methods used by Chinese intelligence often the most extensive of all Asian countries. differ from the more easily understood methods of 2PLA also has a military counterintelligence other nations. Not only does the collection of intelli- service called Chi Pao Ko,10 which exercises a degree gence present some peculiarities, as outlined below, of influence on think tanks and research institutes but Chinese methods have evolved considerably over connected with intelligence studies in China, such as the years. the China Institutes of Contemporary International In the 1950s and 1960s, every Chinese diplomatic Relations (CICIR, primarily connected to the MSS) post overseas had an Investigation and Research Office and the China Institute for International Strategic with staff from the Central Investigation Department – Studies (CIISS).11 the so-called Institute of Contemporary International There are other bodies in China performing spe- Relations. However, from Deng Xiaoping (in office cific kinds of intelligence activities, but they are less from 1981 to 1989) onward, non-intelligence per- prominent than the ones presented here. sonnel, from newsmen to businessmen to academic Worth mentioning are a couple of historical notes researchers, started to be charged with intelligence on Chinese intelligence. Sun Zi’s Art of War, the classi- collection tasks. Only a few career officers were left cal text about military strategy from the fifth century in embassies. 6. French intelligence website, accessed on March 2015. 12. ”What enables the wise sovereign and the good general to strike 7. In MSS slang, the often dormant, long-term operatives are called and conquer, and achieve things beyond the reach of ordinary men, “fish at the bottom of the ocean” (Chen di yu). Eftimiades, 1999, 35. is foreknowledge. Now this foreknowledge cannot be elicited from 8. An important exception here is riot control, which is not under MPS spirits; it cannot be obtained inductively from experience, nor by any domain but is taken care of by the Chinese People’s Armed Police deductive calculation. Knowledge of the enemy’s dispositions can only Force (中国人民武装警察部队, CAPF) at the provincial level. be obtained from other men” (Sun Zi, The Art of War, Chapter 13). 9. The two services are located near each other at 14, Dongchang’an 13. Given that this brief outline excludes Taiwan, all references to Chi- (East Chang’an Street), Beijng. ang Kai-shek (Jiang Jieshi) and his formidable intelligence apparatus 10. Belonging to PLA Intelligence is Xiong Guangkai, considered by have been omitted. However, it is worth noting that Tai Li (Dai Li), his many the most important intelligence figure of the last two decades intelligence chief, was for many years a valid adversary to Kang Sheng. (Mulvenon, 2008). For more about Dai Li, see the recommended readings. 11. See Gates & Mulvenon, 2002 14.
Recommended publications
  • Emergency Operations Center How-To Quick Reference Guide August 2021
    National Incident Management System Emergency Operations Center How-To Quick Reference Guide August 2021 This page intentionally left blank Table of Contents Introduction .................................................................................................................................. 9 1. Purpose ...................................................................................................................................... 9 1.1. NIMS Compliance and Integration ................................................................................. 9 What Is an EOC? ........................................................................................................................ 10 1. Hallmarks of an EOC ............................................................................................................... 10 Preliminary Assessments .......................................................................................................... 12 1. Hazard and Vulnerability Assessment .................................................................................... 12 2. Resilience Analysis and Planning Tool ................................................................................... 12 3. Capability Assessment ............................................................................................................ 13 3.1. Interagency Coordination ............................................................................................. 13 3.2. Multiagency Coordination Groups ..............................................................................
    [Show full text]
  • HJS 'Putin Sees and Hears It All' Report.Qxd
    Putin SeeS and HearS it all: How ruSSia’S intelligence agencieS Menace tHe uK BY DR ANDREW FOXALL DEMOCRACY | FREEDOM | HUMAN RIGHTS November 2018 First published in 2018 by The Henry Jackson Society. The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society, 2018. All rights reserved. The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: “PuTiN SEES AND HEARS iT ALL: HOW RuSSiA’S iNTELLigENcE AgENciES MENAcE THE uK” By: Dr Andrew Foxall Putin SeeS and HearS it all: How ruSSia’S intelligence agencieS Menace tHe uK BY DR ANDREW FOXALL November 2018 PuTiN SEES AND HEARS iT ALL “Dr. Foxall’s report forcefully reminds us that Russian Intelligence activity in the West is still large scale and intrusive, and that we need to devote significant resources and expertise ourselves to monitoring and blunting this threat to our national security. As during the Cold War an effective counterintelligence capability remains an essential part of our own intelligence and security community.” Sir richard dearlove KcMg oBe chief of the Secret intelligence Service (Mi6) (1999-2004) “Anyone who is relaxed or complacent about Russian intelligence activity in the United Kingdom should read this Report. Not only have we experienced the murder of Litvinenko and the attempted murder of the Skripals on British soil, Britain and the West as a whole face an unrelenting assault from Putin’s bloated intelligence and security agencies.
    [Show full text]
  • How Do Chinese Cities Grow? a Distribution Dynamics Approach
    How do Chinese cities grow? A distribution dynamics approach Jian-Xin Wua, Ling-Yun Hea, b,* a School of Economics, Jinan University, Guangzhou 510632, China b College of Economics and Management, Nanjing University of Information Science and Technology, Nanjing 210044, China Abstract: this paper examines the dynamic behavior of city size using a distribution dynamics approach with Chinese city data for the period 1984-2010. Instead of convergence, divergence or paralleled growth, multimodality and persistence are the dominant characteristics in the distribution dynamics of Chinese prefectural cities. Moreover, initial city size matters, initially small and medium-sized cities exhibit strong tendency of convergence, while large cities show significant persistence and multimodality in the sample period. Examination on the regional city groups shows that locational fundamentals have important impact on the distribution dynamics of city size. Keywords: city size; distribution dynamics; kernel density; multimodality; persistence * Corresponding author. Dr. Ling-Yun He is a full professor in applied economics in the School of Economics at Jinan University, and an affiliate professor in the College of Economics and Management at Nanjing University of Information Science and Technology, email: [email protected]. Dr. Jian-Xin Wu is an associate Professor in applied economics in the School of Economics at Jinan University, [email protected]. This work was supported by the China National Social Science Foundation (No. 15ZDA054), Humanities and Social Sciences of Ministry of Education Planning Fund (16YJA790050) and the National Natural Science Foundation of China (Nos. 71473105, 71273261 and 71573258). 1 1. Introduction The issue of city size distribution has received considerable attention from urban economist.
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • The CCP Central Committee's Leading Small Groups Alice Miller
    Miller, China Leadership Monitor, No. 26 The CCP Central Committee’s Leading Small Groups Alice Miller For several decades, the Chinese leadership has used informal bodies called “leading small groups” to advise the Party Politburo on policy and to coordinate implementation of policy decisions made by the Politburo and supervised by the Secretariat. Because these groups deal with sensitive leadership processes, PRC media refer to them very rarely, and almost never publicize lists of their members on a current basis. Even the limited accessible view of these groups and their evolution, however, offers insight into the structure of power and working relationships of the top Party leadership under Hu Jintao. A listing of the Central Committee “leading groups” (lingdao xiaozu 领导小组), or just “small groups” (xiaozu 小组), that are directly subordinate to the Party Secretariat and report to the Politburo and its Standing Committee and their members is appended to this article. First created in 1958, these groups are never incorporated into publicly available charts or explanations of Party institutions on a current basis. PRC media occasionally refer to them in the course of reporting on leadership policy processes, and they sometimes mention a leader’s membership in one of them. The only instance in the entire post-Mao era in which PRC media listed the current members of any of these groups was on 2003, when the PRC-controlled Hong Kong newspaper Wen Wei Po publicized a membership list of the Central Committee Taiwan Work Leading Small Group. (Wen Wei Po, 26 December 2003) This has meant that even basic insight into these groups’ current roles and their membership requires painstaking compilation of the occasional references to them in PRC media.
    [Show full text]
  • Surveillant Individualism in an Era of Relentless Visibility
    International Journal of Communication 10(2016), 164–177 1932–8036/20160005 Managing Surveillance: Surveillant Individualism in an Era of Relentless Visibility SHIV GANESH1 Massey University, New Zealand Contemporary surveillance occurs in the context of communicative abundance, where visibility is not only easy but relentless: never ending, far reaching, and ceaseless. Managing surveillance therefore has considerable implications for democratic politics, workplace control, economic practices, cultural politics, and individual subjectivity. This article identifies surveillant individualism, or the pivotal role that individuals play in surveillance and countersurveillance, as a major feature of contemporary surveillance management. It seeks to clarify current research trajectories on digital surveillance management and to chart a course for organizational research on surveillant individualism. Keywords: countersurveillance, relentless visibility, sousveillance, surveillant individualism The rise of surveillance needs foremost to be contextualized with visibility as a major 21st century trope. It is not a stretch to claim that visibility is now a central concern of social and organizational theory, and scholars from multiple theoretical traditions and disciplines have traced how myriad forms of sociality and organizing have been modernized and rationalized, rendered knowable, and made transparent and accessible (Brighenti, 2007, 2010). Others have argued that the 21st century is characterized by a “new visibility,” a powerful new force facilitated
    [Show full text]
  • 7133 Trouble V4.Pdf
    HOW TO LOOK FOR TROUBLE A STRATFOR Guide to Protective Intelligence S t r at for Global Intelligence STRATFOR 700 Lavaca Street, Suite 900 Austin, Texas 78701 Copyright © 2010 by STRATFOR All rights reserved, including the right of reproduction in whole or in part Printed in the United States of America The contents of this book originally appeared as analyses on STRATFOR’s subscription Web site. ISBN: [?] EAN-13: [?] Publisher: Grant Perry Editor: Michael McCullar Project Coordinator: Robert Inks Designer: TJ Lensing COntenTs Introduction v ANoteonContent ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf 1 TheSecretsofCountersurveillance 8 Threats,SituationalAwarenessandPerspective 14 IntelligenceasaProactiveTool 19 CounterterrorismFunding:OldFearsandCyclical Lulls 25 AQAP:ParadigmShiftsandLessonsLearned 31 Counterterrorism:Shiftingfromthe‘Who’tothe ‘How’ 39 Profiling:SketchingtheFaceofJihadism 46 CHapter 2: The Art of SurvEillance Surveillance:ForGood—andEvil 53 TheSpreadofTechnicalSurveillance 55 PhysicalSurveillance:TailingSomeoneontheMove 57 PhysicalSurveillance:TheArtofBlendingIn 60 TurningtheTablesonSurveillants 62 iii Table of Contents CHapter 3: Protecting People Bhutto’sDeath:FatalFactors 67 India:AKidnappingCaseStudy 70 China:SecurityAspectsoftheDalaiLama’sTravels 73 TheU.S.ElectionSeason:SecurityChallengesand ConventionalWisdom 75 Mexico:ExaminingtheCartelWarThrougha ProtectiveLens 80 Mexico:TacticalImplicationsoftheLabastida Killing 87 Mexico:TheThirdWar 89 CHapter 4: SafegUaRding Places CorporateSecurity:TheTechnologyCrutch
    [Show full text]
  • National Incident Management System: Intelligence/Investigations
    NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations ..................................................................................................................
    [Show full text]
  • Chinese Intelligence : from a Party Outfit to Cyber Warriors
    Occasional Paper July 2013 Chinese Intelligence : From a Party Outfit to Cyber Warriors Ajit Doval, KC Chinese Intelligence : From a Party Outfit to Cyber Warriors 2 of 28 About The Author Ajit Doval obtained his master’s degree in Economics in 1967 obtaining first position in the University of Agra. He joined the Indian Police Service in 1968 and in 1972 was seconded to the Intelligence Bureau. During over three decades of his service with the Intelligence Bureau, he held many senior positions both within and outside the country including North-East, Sikkim, Punjab, J&K, Pakistan, U.K. etc. In the Headquarters, he headed IB’s operation wing for long years and was founder Chairman of the Multi Agency Centre and Joint Task Force on Intelligence. He retired as Director Intelligence Bureau in 2005. A recipient of Kirti Chakra, one of the highest Defence gallantry awards of the country, Shri Doval was also country’s youngest officer to be awarded prestigious Indian Police Medal for Meritorious Service at the age of 29, a record that he still holds. A graduate of National Defence College, Shri Doval was elected President of the International Association of Chiefs of the Police for Asia and Pacific region in 2004. He is presently Director of the Vivekananda International Foundation, a New Delhi based independent Think Tank and research centre. http://www.vifindia.org © Vivekananda International Foundation Chinese Intelligence : From a Party Outfit to Cyber Warriors 3 of 28 Chinese Intelligence : From a Party Outfit to Cyber Warriors Whatever yardstick we choose to apply – size of the economy and its rate of growth, military hardware and pace of modernisation, stability of the polity and the government; size, population and geo-political setting – China qualifies for a major power status.
    [Show full text]
  • MCWP 2-14 Counterintelligence CI Support to the Combat Service Support Element and Rear Area Operations
    MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations may be sent directly to Commanding General, Marine Corps Combat Development Command, Doctrine Division (C 42), 3300 Russell Road, Suite 318A, Quantico, VA 22134-5021 or by fax to 703-784-2917 (DSN 278-2917) or by E-mail to [email protected]. Recommendations should include the following information: l Location of change Publication number and title Current page number Paragraph number (if applicable) Line number Figure or table number (if applicable) l Nature of change Add, delete Proposed new text, preferably double-spaced and typewritten l Justification and/or source of change Additional copies: A printed copy of this publication may be obtained from Marine Corps Logistics Base, Albany, GA 31704-5001, by following the instructions in MCBul 5600, Marine Corps Doctrinal Publications Status. An electronic copy may be obtained from the Doctrine Division, MCCDC, world wide web home page which is found at the following uni- versal reference locator: http://www.doctrine.usmc.mil. Unless otherwise stated, whenever the masculine gender is used, both men and women are included. DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 5 September 2000 FOREWORD Marine Corps Doctrinal Publication (MCDP) 2, Intelligence, and Marine Corps Warfighting Publication (MCWP) 2-1, Intelligence Operations, provide the doctrine and higher order tactics, techniques, and procedures for intelligence operations. MCWP 2-14, Counterintelligence, complements and expands on this information by detailing doctrine, tactics, techniques, and procedures for the conduct of counterintelligence (CI) operations in support of the Marine air- ground task force (MAGTF).
    [Show full text]
  • Tactical Deception (TAC-D) Policy (Including Camouflage, Countersurveillance, and Concealment)
    Army Regulation 525–21 Military Operations Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) Headquarters Department of the Army Washington, DC 15 June 1982 UNCLASSIFIED SUMMARY of CHANGE AR 525–21 Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) This regulation-- o Sets forth the Army’s tactical deception (TAC-D) policy; o Describes the role of TAC-D in combat operations, and identifies objectives and assigns responsibilities for TAC-D. Headquarters Army Regulation 525–21 Department of the Army Washington, DC 15 June 1982 Effective 15 July 1982 Military Operations Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) assigned operational missions effectively copy of each to the next higher headquar- in all elements of the US Army. ters. Applicability. This regulation applies to t h e A c t i v e A r m y , t h e A r m y N a t i o n a l I n t e r i m c h a n g e s . I n t e r i m c h a n g e s t o Guard (ARNG), and the US Army Re- this regulation are not official unless they serve (USAR). are authenticated by The Adjutant Gener- Proponent and exception authority. al. Users will destroy interim changes on The proponent agency for this regulation their expiration dates unless sooner super- is the Office of the Deputy Chief of Staff seded or rescinded. for Operations and Plans. Army management control process. Suggested Improvements. Users are This regulation contains management con- invited to send comments and suggested trol provisions but does not identify key improvements on DA Form 2028 (Recom- management controls that must be evalu- m e n d e d C h a n g e s t o P u b l i c a t i o n s a n d ated.
    [Show full text]