Escolar Documentos
Profissional Documentos
Cultura Documentos
Communication
Module 2: Communication
FLOW CHART
Content Flow at A Glance
Module 2: Communication
Subject/topic/activity
Introduction to the basics of
communication.
Activity on hearing and
listening.
Activity on seeing and
looking.
Game Pitfalls of
Communication.
Game Whose Perception
Counts?
Game State It Clearly.
Exercise on Preparing
Messages for prevention of
HIV/AIDS.
Material for reading,
preparing handouts and
facilitating session 2.6.
Material for reading and
making posters.
Objective
To introduce the peer educator to
the basic concept and important
principles of communication.
To know the difference between
hearing and listening.
To know the difference between
seeing and looking.
To demonstrate the importance
of verbal and non-verbal
communication.
To demonstrate that recent
events influence the way in
which we see things.
To demonstrate that it is easy for
even simple messages to be
misinterpreted by the receiver.
To know about effective message
formulation.
Page No.
2-2 to 2-6
2-16 to
2-17
2-18
2-1
2-7 to 2-8
2-9
2-10 to
2-11
2-12
2-13 to
2-14
2-15
Module 2: Communication
Module 2
Communication
The eyes of men converse as much as their tongues, with the advantage that the
ocular dialect needs no dictionary, but is understood the world over.
Ralph Waldo Emerson
I Introduction
ommunication can occur without words. Our four senses, audio, visual,
touch and smell, communicate. The ring of the alarm tells us its time to wake
up, the eyes gaze at the window and check for the time of day or weather,
the touch of the wind on our skin tells us if it is hot or cold and the smell from the
kitchen tells us what is cooking. When a message is sent from a source to a receiver, a
specific mental or physical response (communication) occurs.
Communication is a two-way process. It has a transmitter and a receiver. Therefore,
it is essential for facts to be transmitted in such a manner that the meaning intended
2-2
Module 2: Communication
is conveyed and the receiver understands the use of the message. It becomes a twoway process.
There are many different types and methods of communication. For example, in
India, people fold their hands in greeting. In Japan, people bow from the waist. In
Pakistan, people touch their forehead with the right hand. Simple gestures are an
effective means of communication. An effective and culturally sensitive
communicator is able to read feelings and reactions through these gestures.
Communication is a process. It is the process of transmitting meaning between
individuals. Early human beings communicated through symbols and gestures.
Later, the spoken word, in the form of language, was used for communication. As
technology developed, written words and media were used, in addition to symbols,
gestures and the spoken word.
Research shows that, on average, a person spends about 70 per cent of his/her active
time communicating speaking, reading, gesturing, writing, listening and watching.
Communication can be defined as a process of meaningful interaction whereby a
person not only sends but also receives and understands a message. Communication
always has a purpose.
Intrapersonal communication
Interpersonal communication
Intergroup communication
Mass communication
2-3
Module 2: Communication
V Barriers to Communication
here are many barriers to communication. These barriers can stall or distort
communication, therefore, attention must be paid to overcome these barriers.
Communication barriers can be classified into three main groups:
Judgmental attitude may be reflected through excessive analysis, bossiness, namecalling, ridiculing, making value-based comments and judgments, moralizing or
ignoring. This is often the single most powerful barrier in communicating with
young people on the subject of HIV/AIDS and related subjects, such as sexual
health, reproductive health, STIs and drug use
Know it all attitude may be reflected through advising, moralizing, ordering,
patronizing, threatening or lecturing. This form of behaviour often inhibits people
from sharing their concerns and experiences. When communicating with youth, this
kind of behaviour/communication should be avoided.
Unconcerned attitude may be reflected through voicing platitudes, diverting the
issue, using excessive logic, offhanded assurances, half-listening, not making eye
contact or being flippant. In communicating with people on sensitive topics, such as
HIV/AIDS, care must be taken to avoid such behaviour and actions. Concern,
empathy and confidentiality are valued components of communication on sensitive
subjects.
VI Listening
2-4
Module 2: Communication
uman beings can rece ive messages subject to certain limitations. These
limitations are called filters. Anything below or above the range of these
filters is usually left out:
Physical filters The inherent structure of our senses limits our capacity to perceive.
For example, we can only see certain colours from a spectrum of colours. We can
only hear between certain frequencies 20Hz to 20,000 Hz. All frequencies higher or
lower are filtered out.
Psychological filters enable people to look/view the same things differently. Our
attributes, expectations, past experiences, and knowledge influence what we perceive
and how we perceive it. These perceptions change during the course of life and
greatly influence the way we communicate.
Know your target audience who are they, what do they need, how can you
reach them?
Set clear objectives what do you expect from the message, how will you
measure it, when will it happen?
Work for approval your audience should chose your message over the
others that are also coming its way
Be strategic use words, images and sounds that are acceptable to your
audience, because your main purpose is to make them listen.
Work for acceptance is your message credible, do people believe your
message and the communicator, who and what will people believe?
Work for recall the message should remain with the audience, make it
catchy, make it funny, repeat if necessary, use different types of media
2-5
Module 2: Communication
Review and re-plan are you reaching the intended audience, are you
achieving the objectives, do you need to change, do you need a new message?
X Reducing Distortions
2-6
Module 2: Communication
Session 2.1
Hearing and Listening
Expected Outcomes
Participants will know the difference between hearing and listening.
Participants will become more aware of themselves, while listening to others.
Objective
Listening
To know the difference between hearing and listening.
Materials
Time
30 minutes.
Process
2-7
Module 2: Communication
2-8
Module 2: Communication
Session 2.2
Seeing and Looking
Expected Outcomes
Participants will become aware of the difference between seeing and looking.
Participants will be more observant and aware and this will improve their ability to
communicate.
Objective
Materials
None.
Time
20 minutes.
Process
Invite the participants to take a break. Ask them to take a walk outside
and come back in 5 minutes.
When they return, ask them what they saw during their walk outside.
After about 5 minutes, ask them to, once again, go out for a walk. This
time, they should bring back information on something specific
(flowers trees a structure) that they find in the surrounding
environment.
Ask the participants to share their information on the specific item,
then, ask what they think was the difference between their first and
second walk.
Somebody might point out that they had an objective on the second
walk. It is also possible that this point will not be raised. In either case,
the message is that the difference between seeing and looking is that
looking has an objective, while seeing is general. Eyes have an
important role in communication. When we wish to communicate
effectively, we must remember that visuals should require an
objective for them to make sense to the receiver.
2-9
Module 2: Communication
Session 2.3
Pitfalls of Communication
Expected Outcomes
Participants will learn the importance of feedback in communication.
Participants will know that both verbal and non-verbal means of communication are
important.
Participants will become better communicators.
Objective
Materials
Time
15 to 20 minutes.
Process
2-10
Module 2: Communication
2-11
Module 2: Communication
Session 2.4
What Influences Our Perception?
Expected Outcomes
Participants will understand the reasons people perceive things different.
Participants will design their future methods of communication more effectively.
Objective
Materials
Time
15 minutes.
Process
Invite the participants to sit so that everyone is able to see the board.
Exhibit the following diagram:
Ask them, What do you see? They will probably say three arrows,
houses on the side, sign showing go left or you may get the correct
response, which is two Ks. Commend the answers, and quickly move
to the following exhibit:
Ask them What do you see now? It is likely that you will get the
correct response immediately (2 Hs). Now, ask the group if they
would have seen this as quickly, had they not had the benefit of the
first round?
Notes to the Facilitator
It is best to prepare the two diagrams in advance, as the process of drawing them can
reveal the answer. Use this exercise to point out the importance of conditioning. Ask
them why they saw the Hs faster than the Ks, could they give any examples of a
similar experience in their life when they have analyzed something or perceived
something in light of what had happened immediately before. Point out that while
communicating, it is important to keep a link with what has preceded, as it enables
faster learning and analysis.
2-12
Module 2: Communication
Session 2.5
Blocks in Receiving Messages
Expected Outcomes
Participants will understand that even simple messages can be misunderstood.
Participants will be more careful in designing messages and communicating with
others.
Objective
State It Clearly!
To demonstrate that it is easy for messages (even simple ones) to be
misinterpreted, if the words used are not familiar and clear, and that,
things become worse, if the recipient is not able to ask for clarification.
Materials
Time
15 minutes.
Process
2-13
Module 2: Communication
2-14
Module 2: Communication
Session 2.6
Messages on Prevention of HIV/AIDS
Expected Outcomes
Participants will design messages using the principles of communication learnt in
earlier sessions.
Objective
Modes of Transmission
To prepare and deliver a message on ways in which HIV can be
transmitted.
Materials
Time
2 hours.
Process
2-15
Module 2: Communication
2-16
Module 2: Communication
Sensitivity
Be aware of the comfort and discomfort of the person speaking with you or to whom
you may be speaking. Learn to read body language and take cues that inform you
about anothers feelings and emotions.
Privacy
In cases where the issues being discussed are private and personal, make sure these
are discussed in private. If you are in a group meeting and personal issues emerge,
establish that these will only be discussed after the group meeting and in private. Do
not refer to personal information in public forums. Do not give examples using
names and places.
Cultural and Religious sensitivity
HIV/AIDS, sexual health, and reproductive health are all sensitive subjects. They are
often mired in religious and socio-cultural taboos and beliefs. Therefore, it is very
important that you become aware of these dimensions. Religious beliefs are an
important part of the cultural identity of many people. Freedom of thought and
religion is a basic human right recognized in the Universal Declaration of Human
Rights.
Most religions and cultures of the world promote tolerance and love. These should
be used to help overcome the discrimination and stigmatization associated with
HIV/AIDS and other sexual and reproductive choices, such as, homosexuality and
use of family planning methods.
General reading material for the peer educator that may also be used to
make posters
Some pointers for an effective question and answer session
Listen to the questions.
Observe the tone and the manner in which the question is asked.
Repeat the question as you understand it, and ask if you got it right.
Answer if you can and cannot involve others in finding an answer.
Speak clearly and confidently.
Do not fidget or read from a paper, if you need to consult your notes, say so.
Establish eye contact with as many people as possible.
Be aware of your body language. Do not point or lean threateningly.
Involve the participants in seeking answers. Ask for their opinion and
knowledge.
Allow time for questions and answers.
Some practical points for working in different socio -cultural and religious settings
Do not address religious or sensitive socio-cultural issues without setting the
stage first. Try to form alliances with people already working at the location,
especially youth groups.
First, find out what is possible, and what is already happening on the issue of
HIV/AIDS, sexual health and reproductive health.
Contact existing open-minded religious leaders and groups because they
might lend you their support.
2-17
Module 2: Communication
Gather knowledge and information about the social, cultural and religious
practices and beliefs of people; research their scriptures and holy books.
Confrontation can be counter-productive.
Remember that all religions are in favour of tolerance, respect for all Gods
children and caring for the weak and the sick.
Present facts and avoid getting into arguments.
Start with simple, non-threatening activities, such as group discussions on
what is culturally acceptable concerning sexuality or reproductive health.
Some people feel that anonymous telephone helplines are a useful initial step.
2-18
#4
Communication techniques
#4
Communication
chapter 4
IV.1 Informal
communication
102
Communication
in a humanitarian response
techniques
In many situations, if
you start to converse
with one or two
people, you will find
that others join in,
and that a focus
group will take
shape spontaneously.
In a humanitarian
crisis social dynamics
change so look for
new opportunities to
communicate with
different groups.
IV.2 Formal
communication
methods
103
#4
Communication
Participation Handbook
In humanitarian
crises, new leaders
may emerge. When
dealing with formal
representatives of
a population, try to
find out how they
gained their position
and the basis of their
authority. Were they
democratically elected
or self-selected? Have
they discussed the
issue at hand with the
people they intend to
represent?
104
Communication
techniques
105
#4
Communication
in a humanitarian response
Tips
Participation Handbook
and why, they can decide whether meeting with you is a priority. People affected by crises have needs that they hope you
may be able to meet, and may be impatient of long drawn out
processes for relatively simple and obvious matters.
Example
106
Communication
in a humanitarian response
Group size
The size of a group will determine the dynamics of the discussion. There are advantages and disadvantages to different
types of groups (see Table 2) - some people may be more
comfortable in a large assembly, while others will prefer
smaller gatherings. In larger groups the most vulnerable and
socially marginalized may not feel comfortable speaking.
Large assemblies
Smaller groups
Useful to communicate
general information
about the project and
participatory exercises
Allow marginalised
groups to speak out
more freely
Create a sense of
transparency
Possibility
of someone
monopolizing the
debate
May go off at
a tangent
techniques
Advantages
Table 2
The roles and
constraints of
different group
sizes
Constraints
107
#4
Communication
Participation Handbook
Example
108
Facilitating meetings
Be aware that your origin, status, gender, age, profession, experience or
knowledge of the area all affect how
you are perceived, and determine your
legitimacy as a facilitator. The success
of the discussion is often determined by
the quality of the relationship between
you and the group As de facto facilitator
you have a key role in ensuring the discussions and interactions are fruitful
and positive, and enable maximum participation, especially that of socially
marginalized people.
Keep the discussion to the point. However, if participants main concerns
lie outside the stated objectives and
other important issues arise, do not be
Delville, L. Mathieu, M. and Sellamna, N., Living up to Ambitions: For a More Rigorous
Practice of Participatory Appraisals and Enquiries, Scientific Directorate working paper no. 28,
(Paris: GRET -Groupe de Recherche et dEchanges Techniques-, 2001).
techniques
#4
109
Communication
Communication
in a humanitarian response
Example
Participation Handbook
Make a point of
observing how
people interact
during the
conversation;
this can help
manage the group
dynamics, and could
provide interesting
information on
social relations
within the
community.
Do not take sides in a discussion but provide information if needed, and help unblock
situations. Stay calm, even if you disagree with
what certain participants say. If you think people feel threatened by a subject, change it, but
try to learn something from what happens as this may be
relevant for your work.
Responsibility and expectations
During group discussions with crisis-affected populations,
individual or collective wounds, traumas, and conflicts may
re-emerge. Be ready to manage such situations if they
arise. If you feel unable to do so, try to avoid sensitive
subjects. Remember that, though your stay in a village may
be short, it will have lasting effects.
Find out in advance where to refer people for more specialised information or support as you might not be the
most qualified person to manage issues that have arisen,
or your organisation may not be able to deal with needs or
issues that have been brought up during your meeting.
Bringing people together to discuss issues that affect
their lives and especially their practical needs - is likely
to raise expectations. Explain clearly what you can and
cannot do, particularly with regard to the delivery of aid
supplies.
Cross-checking information
The social and political dynamics among participants can
sometimes mean that you get conflicting information from
different sources. The triangulation of information, whereby you cross-check information collected in different
110
Communication
in a humanitarian response
techniques
#4
Communication
Participation Handbook
Taking photos during the sessions and showing participants photos of themselves can be a strong motivating
factor. However, make sure people feel comfortable with
this. Also, be aware that a camera changes the dynamic in
a meeting, which may not be helpful. Carrying a camera in
conflict situations can also create a security risk for you
or the people you meet.
There are many ways of collecting information on a single
topic. Be ready to adapt your tools to suit participants. Let
individuals express themselves in their own way according to their own practical experience and usual forms
of dialogue. Some planning tools and methods may also
create a distance see what tools people already use and
are familiar and comfortable with before introducing your
own.
Quot e
Quoted by Boulier, F., La diversit des stratgies paysannes dans la zone de Koba (Guine), in
Delville, L. et al (eds), Les Enqutes Participatives en Dbat, (Paris : Karthala, 2000).
10
111
Communication
in a humanitarian response
Closing
Before moving on, summarize and clarify what has been said.
This can be done by you, a participant, or collectively. Acknowledge the positive contribution of the meeting, interview,
or event and let people know how they can continue to participate in the project and what will happen next. Take care
to ensure that communication remains a two way process by
letting people know how they can contact you in future, or
when you will next visit them.
techniques
Chapter 4 summary
Communication techniques
1 Good communication is the basic building-block of
participation
#4
Communication
Participation Handbook
112
113
MODELLINGSPACE
Space of ideas' expression, modelling and collaboration
for the development of imagination, reasoning and learning
D13
September 2003
Final
Public
FCTUNL
MODELLINGSPACE : IST-2000-25385
Development of Pedagogical
Methodology
SUMMARY:
MODELLINGSPACE : IST-2000-25385
TABLE OF CONTENTS
What is a Pedagogical Methodology? . . . . . . . . . . . . . . . . . . . . . . .4
Effective teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
. . . . . . . . . . . . . . . . . . . . . . . . . . . .11
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
What is a
Pedagogical
Methodology?
MODELLINGSPACE : IST-2000-25385
Effective
teaching
MODELLINGSPACE : IST-2000-25385
teacher competencies;
teaching methods;
classroom atmosphere;
students characteristics.
Six Tenets of
the
Pedagogical
Methodology
MODELLINGSPACE : IST-2000-25385
Knowledge of Students
Teachers know and care about their students,
know how they learn and develop, understand
the impact of home life and cultural background,
and use this knowledge to guide their curricular
and instructional decisions.
Commitment to
Teaching, to
Students and to
Their Learning
MODELLINGSPACE : IST-2000-25385
Knowledge of
Science and
Mathematics
MODELLINGSPACE : IST-2000-25385
Knowledge of
Students
MODELLINGSPACE : IST-2000-25385
Knowledge of
the Art of
Teaching
MODELLINGSPACE : IST-2000-25385
10
Science as a Way
of Thinking
MODELLINGSPACE : IST-2000-25385
11
Reflection and
Professional
Growth
MODELLINGSPACE : IST-2000-25385
12
Thirteen
Proposals for
a Modelling
Methodology,
with
Illustrations
MODELLINGSPACE : IST-2000-25385
10
11
12
13
13
1
Make clear goals and
plan how concepts
and ideas evolve
during the activities,
anticipating learning
difficulties
MODELLINGSPACE : IST-2000-25385
This discussion
is an essential
pre-requisite
to understand
proportionaly.
14
MODELLINGSPACE : IST-2000-25385
15
3
Promote interaction,
collaboration, and
group cohesion
MODELLINGSPACE : IST-2000-25385
16
4
Give prompt feedback
MODELLINGSPACE : IST-2000-25385
17
5
Induce self and group
formative assessment
MODELLINGSPACE : IST-2000-25385
it is timeliness;
18
6
Proceed from concrete
to abstract
MODELLINGSPACE : IST-2000-25385
19
7
Verbalize
mathematical
procedures
MODELLINGSPACE : IST-2000-25385
20
8
Promote schematic
drawing and writing
as tools-to-thinkwith
MODELLINGSPACE : IST-2000-25385
1 hour after
21
9
Scaffold the
transition from direct
computations to
algebraic reasoning,
from number sense to
symbol sense
MODELLINGSPACE : IST-2000-25385
22
10
Explore multiple
representations
MODELLINGSPACE : IST-2000-25385
23
11
MODELLINGSPACE : IST-2000-25385
24
12
Balance discovery
and exploratory
learning with guided
learning
MODELLINGSPACE : IST-2000-25385
25
13
Anticipate, check, and
revise the coherence
of models and data
MODELLINGSPACE : IST-2000-25385
26
References
MODELLINGSPACE : IST-2000-25385
27
MODELLINGSPACE : IST-2000-25385
28
UK/BM-84 TRANSLATION
TWELFTH LESSON
ESPIONAGE
( 2 ) INFORMATION-GATHERING USING COVERT METHODS
UK/BM-85 TRANSLATION
UK/BM-86 TRANSLATION
f.
2.
3.
4.
5.
6.
7.
8.
UK/BM-87 TRANSLATION
9.
10.
11.
12.
Surveillance on foot:
1.
2.
3.
UK/BM-88 TRANSLATION
4.
5.
6.
7.
8.
9.
Surveillance by car:
Surveillance by car requires taking certain measures:
1.
2.
3.
4.
5.
6.
UK/BM-89 TRANSLATION
The car being used for surveillance should keep up with the
targets car during the surveillance operation, especially
in crowded areas and on side streets. The distance between
the two cars depends on the circumstances.
2.
If the target gets out of his car and starts to walk, one
of the surveillance team members should get out and observe
him.
3.
2.
3.
4.
5.
6.
A.
UK/BM-90 TRANSLATION
The Drawing: The brother should draw a diagram of the area, the
street, and the location which is the target of the informationgathering. He should describe its shape and characteristics.
The drawing should be realistic so that someone who never saw
the location could visualize it. It is preferable to also put
on the drawing the directions of traffic, police stations, and
security centers.
The Description: It is necessary to gather as much information
about the location as possible. For instance:
1.
2.
3.
4.
5.
6.
7.
8.
9.
UK/BM-91 TRANSLATION
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
Location
Exterior shape
Transportation to it
Space [area]
Weapons used
Unit using the camp
Fortifications and tunnels
Guard posts
Amount and periods of lighting
Number of soldiers and officers. Officers ranks
Ammunition depot locations
Vehicles and automobiles
Leave policy
Commanders name, rank, arrival and departure times
Degree and speed of mobilization
Brigades and names of companies
Sleeping and waking times
Telephone lines and means of communication
UK/BM-92 TRANSLATION
2.
3.
4.
5.
6.
7.
C.
UK/BM-93 TRANSLATION
1.
2.
3.
4.
5.
6.
Smugglers
Those seeking political asylum
Adventurers
Workers at coffee shops, restaurants, and hotels
People in need
Employees at borders, airports, and seaports
2.
3.
UK/BM-94 TRANSLATION
4.
1.
2.
3.
UK/BM-95 TRANSLATION
5.
6.
UK/BM-96 TRANSLATION
UK/BM-97 TRANSLATION
3.
UK/BM-98
TRANSLATION
5.
When meeting with the agent, make sure neither you or the
meeting place are being monitored. Do not enter a place to
meet with an agent before he does. There could be a trap
for you.
6.
7.
8.
IF AN INDICTMENT IS ISSUED AND THE TRIAL, BEGINS, THE BROTHER HAS TO PAY
ATTENTION TO THE FOLLOWING:
1 . At the beginning of the trial, once more the brothers must insist on proving that torture was
inflicted on them by State Security [investigators] before the judge.
2. Complain [to the court] of mistreatment while in prison.
3. Make arrangements for the brothers defense with the attorney, whether he was retained by
the brothers family or court-appointed.
4. The brother has to do his best to know the names of the state security officers, who
participated in his torture and mention their names to the judge. [These names may be
obtained from brothers who had to deal with those officers in previous cases.]
5. Some brothers may tell and may be lured by the state security investigators to testify against
the brothers [i.e. affirmation witness], either by not keeping them together in the same prison
during the trials, or by letting them talk to the media. In this case,they have to be treated
gently, and should be offered good advice, good treatment, and pray that God may guide
them.
6. During the trial, the court has to be notified of any mistreatment of the brothers inside the
prison.
7. It is possible to resort to a hunger strike, but i t is a tactic that can either succeed or fail.
8. Take advantage of visits to communicate with brothers outside prison and exchange
information that may be helpful to them in their work outside prison [according to what
occurred during the investigations]. The importance of mastering the art of hiding messages
is self evident here.
- When the brothers are transported from and to the prison [on their way to the court] they
should shout Islamic slogans out loud from inside the prison cars to impress upon the people
and their family the need to support Islam.
- Inside the prison, the brother should not accept any work that may belittle or demean him or
his brothers, such as the cleaning of the prison bathrooms or hallways.
- The brothers should create an Islamic program for themselves inside the prison, as well as
recreational and educational ones, etc.
- The brother in prison should be a role model in selflessness. Brothers should also pay
attention to each others needs and should help each other and unite vis a vis the prison
officers.
- The brothers must take advantage of their presence in prison for obeying and worshiping
[God] and memorizing the Qoraan, etc. This is in addition to all guidelines and procedures
that were contained in the lesson on interrogation and investigation. Lastly, each of us has to
understand that we dont achieve victory against our enemies through these actions and
security procedures. Rather, victory is achieved by obeying Almightyand Glorious God and
because of their many sins. Every brother has to be careful so as not to commit sins and
everyone of us has to do his best in obeying Almighty God, Who said in his Holy Book: We
will, without doubt. help Our messengers and those who believe (both) in this worlds life
and the one Day when the Witnesses will stand forth.
May God guide us.
[Dedication)
To this pure Muslim youth, the believer, the mujahid (fighter) for Gods sake. I present this
modest effort as a contribution from me to pave the way that will lead to Almighty God and to
establish a caliphate along the lines of the prophet.
The prophet, peace be upon him, said according to what was related by Imam Ahmed: Let the
prophecy that God wants be in you, yet God may remove it if He so wills, and then there will be
a Caliphate according to the prophets path [instruction], if God so wills it. He will also remove
that [the Caliphate] if He so wills, and you will have a disobedient king if God so wills it. Once
again, if God so wills, He will remove him [the disobedient king], and you will have an
oppressive lung. [Finally], if God so wills, He will remove him [the oppressive king], and you
will have a Caliphate according to the prophets path [instruction]. He then became silent.
2. Abandoning team work for individual and haphazard work means disobeying that orders of
God and the prophet and falling victim to disunity.
3. Team work is-conducive to cooperation in righteousness and piety.
4. Upholding religion, which God has ordered us by His saying, Uphold religion, will
necessarily require an all out confrontation against all our enemies, who want to recreate
darkness. In addition, i t is imperative to stand against darkness in all arenas: the media,
education, [religious] guidance, and counseling, as well as others. This will make i t
necessary for us to move on numerous fields so as to enable the Islamic movement to
confront ignorance and achieve victory against it in the battle to uphold religion. All these
vital goals can not be adequately achieved without organized team work. Therefore, team
work becomes a necessity, in accordance with the fundamental rule, Duty cannot be
accomplished without it, and it is a requirement. This way, team work is achieved through
mustering and organizing the ranks, while putting the Amir (the Prince) before them, and the
right man in the right place, making plans for action, organizing work, and obtaining facets of
power......
Page | 1
Developed by
www.executivecoachingforum.com
Page | 2
Copyright ! 2008 by The Executive Coaching Forum
All Rights Reserved
This Handbook may be reproduced only for the benefit of people involved
with executive coaching (executives, coaches, HR professionals supporting a
coaching project, managers and other colleagues of an executive being
coached), and only where no fee will be charged nor profit made as a result of
the reproduction or distribution of the Handbook.
Page | 3
Systems Perspective........................................................................................... 27
Results Orientation ............................................................................................ 30
Business Focus.................................................................................................... 32
Partnership.......................................................................................................... 34
Competence ........................................................................................................ 36
Integrity ............................................................................................................... 41
Judgment..41
Managing Confidentiality................................................................................. 43
Pre-coaching Activities...46
Contracting ......................................................................................................... 48
Assessment.......................................................................................................... 51
Goal Setting......................................................................................................... 54
Coaching.............................................................................................................. 56
Transitioning to Long-Term Development .................................................... 59
Page | 4
Core Competencies of the Executive Coach....68
Why a Competency Model?...................................................................................68
Defining Executive Coaching.................................................................................68
Construction of the Model.....................................................................................69
Potential Uses of the Model...................................................................................70
Psychological Knowledge.................................................................................... 72
Business Acumen....................................................................................................73
Organizational Knowledge...................................................................................74
Coaching Tasks and Skills....................................................................................76
Building and Maintaining Coaching Relationships.....................................78
Contracting.........................................................................................................79
Assessment.........................................................................................................80
Development Planning.....................................................................................81
Facilitating Development and Change...........................................................82
Ending Formal Coaching & Transitioning to long-term development.....84
Attributes and Abilities.........................................................................................85
Mature Self-confidence.....................................................................................85
Positive Energy..................................................................................................86
Assertiveness......................................................................................................87
Interpersonal Sensitivity...................................................................................88
Openness and Flexibility..................................................................................89
Goal Orientation................................................................................................90
Partnering and Influence..................................................................................91
Continuous Learning and Development.......................................................92
Integrity...............................................................................................................93
Page | 5
Page | 6
with unique requirements. Our Handbook has been part of this journey and highly
influential, we hear, in establishing the training curricula. We hope you benefit from
this guide and that you share your learnings and insights with others in the field. Please
let us know if you use the Handbook and provide your comments. (Contact Judy Otto by
emailing her: otto.judy@gmail.net)
Future Trends
Now, coaching is accepted as a viable, impactful leadership development tool.
Coaching will likely increase as baby boomers mature and new leaders need to take
their places and define what leadership looks like in the new business order. Just as the
demand will increase to meet the needs of emerging leaders, the supply of experienced
semi-retired executives and development professionals will increase. The market will
mature further with customers looking for more robust coach credentials, simpler
pricing structures, more common contracting procedures, and protocols to manage
coaching interventions. There will be fewer independent coaches and more firms
offering coaching, as consumers want one-stop shopping, and a third party to watch
over the coaches activities with clients. This will increase barriers to entry for executive
coaches and create clearer definition between coaches who work in organizations and
business systems, and those who do life and career coaching with individuals. There
will be greater networks amongst coaches using their alumni connections from their
coach training and from working together in systems, so that collaboration and sharing
of leads and opportunities are more likely. All of this speaks to consolidation of the
field.
There will be more and better-trained internal coaches within companies, an increase in
peer coaching amongst colleagues, group coaching sessions, and more virtual or
phone/video conference coaching. There will be an increased drive to train and
measure line managers on their coaching abilities as well. All these factors will drive
prices down and make coaching more prevalent in organizations.
Some issues have been challenges from the beginning of executive coaching such as:
"
"
"
"
Page | 7
"
How do you meet the needs of the individual and the organization if they are in
conflict?
"
What is coach/client chemistry and how much of a role does it play in success?
These and other questions need to be further explored as part of making executive
coaching an even more compelling route to performance enhancement. It will be
exciting to watch and participate in the next phase of growth and maturity of the field.
Current State of Research
The first Global Coaching Convention took place in Dublin, Ireland in July 2008. More
than 60 leaders in coaching who represented dozens of coaching and related
organizations represented 22 countries from around the world. Nine working groups
spent a year leading up to the Convention. More than 200 people from all aspects of
coaching from around the world worked as part of those groups, which led to the
development of White Papers. Recommendations came out of that exploration to
further the field of coaching as a professional discipline. One of those Working Groups
was on Coaching Research. The White Paper on the topic was published as part of the
Appendix to the GCCs Declaration for Coaching, which is available at:
http://www.pdf.net/Files/Dublin%20Declaration%20on%20Coaching.pdf
One outgrowth of the call for research on key questions about coaching is that the
Foundation of Coaching sponsored the first International Research Conference on
Coaching at Harvard University in September 2008. More than 100 research questions
were identified with recommendations on how they might be studied. Forty world
leaders on coaching research developed these recommendations at the conference.
Those topics are available at: http://www.coachingresearchforum.org/
Although there is an enormous need to generate useful, reliable and valid data about
executive coaching and coaching in general, in the past few years much research has
begun. We know more about what kinds of coaching are being done by whom in what
ways, but little about the factors that make significant differences in the outcomes of
executive coaching. We also know very little about the satisfaction with its practice, or
what coaches, their leaders, and their organizations do or dont do that differentiates
the better practices of coaching from the least effective. Although controlled
experimental studies are often difficult to conduct in executive coaching situations,
many other research designs can and do add to the evidence we need to inform best
practices and help coaches and the people they coach know what to do to get the
desired results.
Page | 8
Leadership Quarterly
Management Learning
Management Review
Organizational Development Journal
Organizational Dynamics
People and Organizations at Work
People Management
Performance Improvement Quarterly
Proceedings of the ICF Coaching Research
Symposiums
Public Personnel Management
Public Service Executive
Research in Personnel and Human
Resources Management
Selection and Development Review
Social Behaviour and Personality: An
International Journal
Supervisory Management
The Annual Review of High Performance
Coaching and Consulting
The Coaching Journal
The Coaching Psychologist
The Industrial-Organizational Psychologist
The Journal of Applied Behavioral Science
The Occupational Psychologist
Training and Development
Page | 9
"
What kinds of learning and development needs is executive coaching best suited for?
o Can a useful typology of such needs be developed and validated?
"
"
What role does/should organizational position and role (CEO, VP) play on executive
coaching processes and outcomes?
"
What role does/should gender, race, ethnicity, religion, and sexual orientation play in
executive coaching processes and outcomes?
"
P a g e | 10
"
"
"
"
How do the executive coachs personality, life stage, career stage, and values influence
his effectiveness as a coach?
"
How does the executive coachs gender, race, ethnicity, religion or sexual orientation
influence coaching processes and outcomes?
"
What factors influence the initial match between the executive and her coach?
"
How can/should the coach handle the executives expectations of or assumptions about
coaching?
"
What role do conscious and unconscious aspects of the relationship between executive
and coach play in the success or failure of the coaching?
"
How does/should the relationship between executive and coach evolve over time?
"
What ethical issues can and will emerge in the relationship between executive and
coach?
What critical success factors are required for successful contracting between executive
and coach? Under what conditions?
"
What assessment processes are best suited to particular executives, executive issues,
organizational contexts, and desired outcomes?
"
What goal-setting processes are best suited to particular executives, executive issues,
organizational contexts, and desired outcomes?
P a g e | 11
"
What coaching activities or techniques are best suited to particular executives, executive
issues, organizational contexts, and desired outcomes?
"
What is the role of planned versus unplanned (emergent) learning opportunities in the
success of executive coaching?
"
How long should coaching last? How frequently should executive and coach meet to
achieve the desired outcomes with specific issues and within particular organizational
contexts?
"
What are the relative strengths and weaknesses of executive coaching that takes place in
person, by telephone, or via the Internet?
o When should such communications tactics be used? When should they not be used?
"
What theoretical frame or frames of reference are best suited to guide the executive
coaching process? Under what circumstances?
o Experiential learning (action, reflection, feedback)
o Adult development
o Social systems interventions
o Psychodynamic
o Emotional intelligence
o Competency modeling
"
What role does confidentiality play in executive coaching? What is/should be the limits
of confidentiality?
o How does confidentiality influence the potential for organizational or team
learning?
"
How can executive coaching best relate to other forms of leadership development such
as job rotation, task force assignments, and classroom-based executive education?
"
How should multiple coaching needs within the same team be handled? By one coach
working with multiple team members, or multiple coaches each working with an
individual team member? What factors influence the choice between the two options?
"
When should team coaching supplement or supplant individual coaching? Under what
conditions?
P a g e | 12
5. The Organizational Context of Executive Coaching
"
What factors (industry, location, size, organizational culture, and business economics)
shape an organizations use of executive coaching?
"
How does executive coaching relate best to the larger organizational system within
which the coaching takes place?
o How should executive coaching fit with other human resources and leadership
development structures and processes?
"
How does the context of the referral for executive coaching influence the executive,
executive coach, coaching process, and outcome? What is the impact of:
o A culture of trust or mistrust?
o A strong focus on performance?
o An organizations values or mission?
o Downsizing or other restructuring measures?
"
How does the relationship between the executive and his immediate boss influence
executive coaching?
o How can the executive coach best improve this relationship?
o When should the executive coach try to influence this relationship?
"
"
What ethical responsibilities does an executive have when bringing in a coach to work
with an individual or team?
"
How should the organization monitor the executive, the coach, the coaching process,
and coaching outcomes?
6. Coaching Outcomes
"
"
Does executive coaching help the executives performance on the job? If so, under what
conditions?
P a g e | 13
"
Does executive coaching improve the following competencies, and under what
conditions?
o Strategy definition and execution
o Vision setting and communications
o Role relationships
o Teamwork
o Organizational and team learning
o Product, process, or organizational innovation
"
"
Does coaching influence the executives ethical decision making and actions? If so,
how?
"
"
"
P a g e | 14
employing organizations have a compelling need for solid answers to most of the questions
above. Similarly, researchers, particularly those from management and
industrial/organizational/consulting psychology, have a tremendous opportunity in
providing answers to such questions. The failure to adequately describe the outcomes,
individual and organizational, of executive coaching and, in particular, the processes that lead
to those outcomes, creates the potential that executive coaching will be guilty of providing
flawed advice (Argyris, 2000).
The research effort requires both theory building and the theoretical testing of research
designs. Theory building will be most useful if it is rooted in the data, an approach to research
that builds grounded theory (Glaser and Strauss, 1967). Because grounded theory relies on
the very careful reporting of data from cases, it should benefit from the strength of the field,
the work of its practitioners. Careful and systematic reporting of cases will be much more
useful in the long run than publications that are heavy on theory but short on data.
Background
In the spring of 1999, a group of executive coaches and executive development and human
resource professionals in the Greater Boston area began a regular series of meetings. As we
discussed how to develop and maintain the highest standards for the practice of executive
P a g e | 15
coaching, we developed principles and guidelines for use in our own practices and
organizations. Our goal in this Handbook is to share these proposed standards with the greater
community. We hope to stimulate a continuing dialog and process that enhances the
professionalism of executive coaching.
For the past 10 years, TECF has expanded the distribution of this Handbook to the World Wide
Web for anyone supplying, receiving, seeking, learning, managing, or supporting executive
coaching. Our website www.executivecoachingforum.com has provided a variety of free
resources since May of 2001. They include this Handbook, links to other executive coaching
resources, executive coaching tools for executives, their organizations, coaches, and Human
Resource professionals, and a comprehensive competency model. At the end of 2008, we are
getting more than 6000 visits a month to our site from all over the United States and dozens of
other countries. Executive coaches are likely to present our Handbook to establish their methods
and ethics with prospective clients. Many Fortune 500 companies and other organizations,
large and small, in many industries, use this Handbook and other TECF resources regularly.
P a g e | 16
Current Leadership Team in alphabetical order:
Susan A. Ennis, M.Ed.
Susan@SusanEnnisAssociates.com
Otto.judy@gmail.net
Robert Goodman, Ed.D.
Principal, R.G. Goodman Associates
Bob@rgoodmanassociates.com
Handbook Organization
The Executive Coaching Handbook is divided into five sections as follows:
Defining Executive Coaching describes executive coaching and the partnership required for
maximum success. We believe executive coaching is most successful as a three-way
partnership among coach, executive, and the executives organization. Each partner has an
obligation and responsibility to contribute to the success of the coaching process. Although the
primary work is between executive and coach, coaching is always an organizational
intervention and, as such, should be conducted within the context of the organizations goals
and objectives.
Overarching Principles for Executive Coaching describes a set of values or goals that guide
the coaching process. These principles provide a compass that the coach, the executive, and
other members of the organization will use to set, maintain, and correct their course of action.
Guidelines for Practice provide procedural help for all coaching partners. These guidelines
define the components of the process and outline the commitments that each partner must
make.
P a g e | 17
Overview of Guidelines for Each Member of the Executive Coaching Partnership is a quickreference guide for executives, coaches, and other interested parties in the executives
organization.
Core Competencies of the Executive Coach lists a robust set of four knowledge areas that
underpin the work of coaching, the tasks and skills sets aligned to the six phases of the
coaching process, along with the 10 attributes and abilities that promote superior
performance. Each of these competency areas is delineated into basic and advanced levels.
The Fourth Edition
Major changes to the fourth edition of the Handbook include:
"
"
These additions bring The Executive Coaching Handbook materials up to date, and expand the
horizons of the dialogue about what executive coaching is and how to do it well.
P a g e | 18
To help TECF improve its offerings and enhance executive coaching as a viable
development solution, please review our website at www.executivecoachingforum.com.
E-mail your feedback and suggestions on the Handbook to Judy Otto otto.judy@gmail.net
P a g e | 19
Definition of Terms
Experiential. The development of the leader(s) is accomplished primarily by practical, on-thejob approaches rather than through classroom or more abstract methods.
Individualized. The goals and specific activities are tailored to the unique aspects of the
individual(s) and the organizational system.
P a g e | 20
Leader development process: Executive coaching focuses on developing the executives ability
to influence, motivate, and lead others. Rather than relying on tactical problem solving or basic
skill acquisition, executive coaching develops strategic thinking skills.
Leader: We use the term broadly to mean any individual(s) who have the potential of making
a significant contribution to the mission and purpose of the organization.
One-on-one: The primary coaching activities take place between the individual leader(s) and
the coach.
Build capability: Developing new ways of thinking, feeling, acting, learning, leading, and
relating to others builds individual and organizational effectiveness.
Data from multiple perspectives: In order for the executive and her principal stakeholders to
understand, clarify, and commit to appropriate coaching goals, various data collection
methods are used to identify key factors and skills required in the organizational context. The
appropriate use of interviews and standardized instruments assures accuracy and validity of
data gathered from people representing a range of perspectives within the organization.
Mutual trust and respect: Adult learning works best when the executive and the coach, along
with other members of the organization, treat each other as equals, focus on their mutual
strengths, and believe in each others integrity and commitment to both coaching and the
organization.
Three Levels of Learning
Executive coaching involves three levels of learning:
1. Tactical problem solving
2. Developing leadership capabilities and new ways of thinking and acting that generalize
to other situations and roles
3. Learning how to learn: developing skills and habits of self-reflection that ensure that
learning will continue after coaching ends
P a g e | 21
The third level is an important and sometimes overlooked goal of coaching. Its aims are to
eliminate an executive's long-term dependency on his coach and teach habits of learning and
self-reflection that will last a lifetime, enabling him to keep developing throughout his career.
"
skill building
"
performance improvement
"
"
(From Robert Witherspoon and Randall P. White, Four Essential Ways that Coaching Can Help Executives, Center
for Creative Leadership, 1997.)
"
contracting
"
data gathering
"
"
"
P a g e | 22
"
"
"
feedback
"
dialogue
"
"
"
6. The focus of the partnership is on using the executives strengths and building the key
competencies needed to achieve strategic business objectives.
7. The partnership involves key stakeholders in the coaching process (called other
partners), including:
"
"
senior management
"
Human Resources
"
"
Executive Development
"
"
direct reports
"
8. Executive coaching is paid for by the organization that employs the executive.
9. A successful coaching partnership is guided by clear personal values, ethical guidelines,
and experiences that establish the credibility of the coaching process and maintain the
welfare of the executive and her coworkers.
P a g e | 23
designed to help individuals make enlightened career choices. Other attempts at
categorization make distinctions based on the means used in a particular kind of coaching. As
an example, presentation and communication skills coaching employs video feedback.
The practice of executive coaching may involve many of the types of coaching described
below. Thus, an executive coaching engagement may over time touch on the executive's career
or personal life issues involving work/life balance, and use video feedback to work on some
particular behavioral or communication problem. Two factors always distinguish executive
coaching from these other types, however:
"
"
The individual goals of an executive coaching engagement must always link back and
be subordinated to strategic organizational objectives.
P a g e | 24
Performance Coaching
Performance coaches help employees at all levels better understand the requirements of their
jobs, the competencies needed to fulfill those requirements, any gaps in their current
performance, and opportunities to improve performance. Coaches then work with the
employees, their bosses, and others in their workplace to help the employees fill performance
gaps and develop plans for further professional development.
Newly Assigned Leader Coaching
Coaches of individuals assigned or hired into new leadership roles help these leaders to
onboard. The goal of the coaching is to clarify with the leaders key constituents the most
important responsibilities of her new role, her deliverables in the first few months of the new
assignment, and ways to integrate the team she will lead with the organization. The major
focus of this type of coaching is on helping the new leader to assimilate and achieve her
business objectives.
Relationship Coaching
The relationship coach helps two or more people to form, change, or improve their
interactions. The context can be work, personal, or other settings.
High-Potential or Developmental Coaching
The coach works with organizations to develop the potential of individuals who have been
identified as key to the organizations future or are part of the organizations succession plan.
The focus of the coaching may include assessment, competency development, or assistance
planning and implementing strategic projects.
Coaching to Provide Feedback Debriefing and Development Planning
Organizations that use assessment or 360 feedback processes often utilize coaches to help
employees interpret the results of their assessments and feedback. In addition, coaches work
P a g e | 25
with individuals to make career decisions and establish professional development plans based
on feedback, assessment results, and other relevant data.
Targeted Behavioral Coaching
Coaches who provide targeted behavioral coaching help individuals to change specific
behaviors or habits or learn new, more effective ways to work and interact with others. This
type of coaching often helps individuals who are otherwise very successful in their current
jobs or are taking on new responsibilities that require a change in specific behaviors.
Legacy Coaching
The legacy coach helps leaders who are retiring from a key role to decide on the legacy they
would like to leave behind. The coach also provides counsel on transitioning out of the
leadership role.
Succession Coaching
The succession coach helps assess potential candidates for senior management positions and
prepares them for promotion to more senior roles. This type of coaching may be used in any
organization that is experiencing growth or turnover in its leadership ranks. It is especially
helpful in family businesses to maintain the viability of the firm. Since assessment is often part
of this intervention, clear expectations and groundrules for confidentiality are essential. It may
be necessary in some companies to use separate consultants for assessment and coaching.
Presentation/Communication Skills Coaching
This type of coaching helps individuals gain self-awareness about how they are perceived by
others and why they are perceived in that way. Clients learn new ways to interact with others.
The use of videorecording with feedback allows clients to see themselves as others do. The
coach helps clients change the way they communicate and influence others by changing their
words, how they say those words, and the body language they use to convey their intended
messages.
P a g e | 26
Team Coaching
One or more team coaches work with the leader and members of a team to establish their team
mission, vision, strategy, and rules of engagement with one another. The team leader and
members may be coached individually to facilitate team meetings and other interactions, build
the effectiveness of the group as a high-performance team, and achieve team goals.
P a g e | 27
1. Systems Perspective
Executive coaching is one of many approaches or types of interventions that can be used to
promote organizational and leadership development. The goal of developing a single
leader must always be pursued within the larger objective of organizational success. Since
executive coaching should be conducted as one of the components of an overall plan for
organizational development, executive and coach must both be aware of the larger
objectives.
Often the components of the executive coaching process are single, discrete activities in a
larger organizational development initiative. These components include pre-coaching
needs analysis and planning, contracting, data gathering, goal setting, coaching, measuring
and reporting results, and transitioning to long-term development. Such coaching activities
do not usually have the impact of full executive coaching unless they are conducted as part
of the process described under Guidelines for Practice in this Handbook.
The coach must have enough expertise in organizational dynamics and business
management to conduct the coaching with awareness and understanding of the systems
issues. Approaching executive coaching from a systems perspective requires the coach to
recognize and appreciate the complex organizational dynamics in which the executive
operates. The coach ensures a systemic approach through continual awareness of the
impact of the coaching process on everyone in the system and vice versa. Accordingly, the
coach encourages a shift in the executives viewpoint, from seeing himself as separate to
recognizing his interdependence with other people and processes in the organization. This
P a g e | 28
approach encourages respect for the complexity of organizational life and an ability to
penetrate beyond this complexity to the underlying structures. In effect, the coach helps the
executive to see both the forest and the trees.
Coaching from a systems perspective helps coach and the executive assess development
needs. By thinking in terms of the big picture and core issues, both partners will
understand long- and short-term strategies and how all the pieces of the organization fit
together into a whole. Systems thinking also encourages all partners to appreciate the
impact of the executives behavioral change on other facets of the organization.
Executives Commitments
! Explore changes in vision, values, and behaviors.
! Examine how your own behaviors and actions affect the systems in which you operate.
! Work in open exploration with your coach; help your coach to understand the forces of
the organizational system.
! During the coaching process, take responsibility for your actions and remain aware of
the impact of your behavioral changes on others and the organization as a whole.
Coachs Commitments
! See the executive, his position, and the organization through multiple lenses and
perspectives.
! Maintain an objective and impartial perspective by resisting collusion with the
executive or the organization.
! Recognize and appreciate the complexity of the organizational structure in which the
executive functions.
! Encourage the executive to explore both long- and short-term views.
! Recognize the interaction of all parts in the wholeespecially how change in one of the
executives behaviors may affect other behaviors and other people.
! Help the executive distinguish between high- and low-leverage changes. Encourage
commitment to the highest-leverage actions to achieve results.
P a g e | 29
Other Partners Commitments
! Identify and share organizational information that may help the coach and the
executive recognize and understand the context, organizational forces, business-related
issues, and financial constraints they must factor into the coaching.
! Guide the coach regarding organizational changes that may influence the coaching.
! Be willing to examine and possibly change aspects of the organizational system in order
to improve both the executives and the organizations performance.
P a g e | 30
2. Results Orientation
Executive coaching is planned and executed with a focus on specific, desired results. The
executive, her coach, and the organization begin by deciding the ultimate goals of the
coaching. Then they agree on specific results for each goal. Key members of the coaching
partnership sign off on a written coaching plan that specifies expected deadlines for
accomplishing each goal. Appropriate measurements are applied to each goal, including
follow-up and feedback reports. Actual activities, during the coaching sessions and in
between, focus specifically on achieving the agreed-upon goals for the executive and her
organization.
Executives Commitments
! Take responsibility for focusing the coaching on the results you care about most.
! Commit adequate time between coaching sessions to work on the results.
! Prepare well for each coaching session.
! Monitor your own results and communicate with coaching stakeholders about your
accomplishments and the gaps that still exist.
! Enlist support to attain results.
Coachs Commitments
! Push the executive and her organization to be specific about desired accomplishments
and how results will be measured.
! Structure each coaching session with a results-driven agenda, following up on previous
meetings and the actions taken between sessions.
! Facilitate communication between the executive and the organization about what the
executive is working on, her progress, and her support needs.
! Plan follow-up meetings to track progress toward coaching goals. Drive these meetings
even in the face of the organizations work demands.
! Continually check in with the executive to update coaching goals based on changes in
her role, the business environment, and priorities.
P a g e | 31
! Focus coaching sessions on specific issues, executive development, and action items that
contribute to the coaching goals.
Other Partners Commitments
! Communicate directly about what you most want and need the executive to do.
! Hold the executive and the coach accountable to the agreed-upon goals.
! Give constant feedback, both positive and negative, to help both the executive and
coach stay on track.
! Demonstrate your trust in the executive.
! Follow through with the commitments you make as part of the coaching to provide
support, attend meetings, communicate with others, and remove barriers.
P a g e | 32
3. Business Focus
Executive coaching is primarily concerned with the development of the executive in the
context of organizational needs. The coaching objective is to maximize the executives
effectiveness and his contribution to the organization. The coach develops an
understanding of the broader business context in which the executive operates, with
particular emphasis on key business initiatives directly relevant to the executive. The
executive and coach then agree upon specific results that best reflect the organizations
business objectives. Successful executive coaching links a business focus with human
processes by closely aligning the executives development with critical business needs.
Executives Commitments
! As soon as coaching begins, inform your coach of any relevant information about your
company, its business strategy, your key initiatives, and how your role fits into the
overall strategy.
! Regularly update your coach on any changes in business direction or outlook that
might influence business strategy, your role, or your measures of success. Adapt your
development needs as appropriate.
! Take ultimate responsibility for aligning your coaching with the organizations business
focus.
Coachs Commitments
! Strive to maximize the executives contribution to the organizations needs.
! Maintain an ongoing awareness of the executives business and leadership development
objectives, market outlook, competition, products and services, and clients or
customers.
! Understand the indicators of success and key business metrics that determine how the
organization evaluates the executives performance and results.
! Be flexible in adapting the executives development needs to changing business
priorities.
P a g e | 33
Other Partners Commitments
! Provide the coach with enough information to understand the context for the coaching.
Such information may include an overview of the organization, strategic and business
planning documents, organizational charts, and key business initiatives.
! Whenever possible, inform the coach of changes in the organization that may affect the
executive, including mergers and acquisitions, restructuring or downsizing, changes in
leadership, key roles and relationships, and relevant business initiatives.
P a g e | 34
4. Partnership
Although executive coaching focuses primarily on individual work with an executive, it is
ultimately an organizational intervention. The executive and her coach are obviously at the
center of the process, but other stakeholders are also involved. They may include the
executives manager, her direct reports, the Human Resources business partner or
generalist, the individual responsible for executive development, training, or
organizational development, and other executives or consultants. The time commitment
and level of involvement will vary for each stakeholder. However, for the coaching
outcome to be of the greatest benefit for the organization as a whole, all stakeholders must
see themselves as partners in the coaching process.
Executives Commitments
! Assume ownership of your learning. Use your coach as a consultant to help you
maximize your unique learning style.
! Be forthright about what is and isnt working in coaching sessions.
! Engage wholeheartedly in the agreed-upon coaching assignments.
! Take required actions for learning, and reflect on those actions.
Coachs Commitments
! Maintain the highest level of professionalism in serving both the executive and the
organization as your clients.
! Communicate openly about the progress of the coaching with the executive and other
stakeholders (within the limits of agreed-upon confidentiality).
! Invest in the professional and personal success of the executive and in the success of her
organization.
Other Partners Commitments
! View the coach as a partner with the organization, working to increase both
organizational and executive learning.
P a g e | 35
! Provide feedback, within the confines of confidentiality agreements, to both the coach
and the executive in the initial data-gathering phase and throughout the coaching.
! Invest in a successful outcome by becoming familiar with and consistently applying the
overarching principles and guidelines set out in this Handbook.
P a g e | 36
5. Competence
Executive coaching requires the use of highly skilled and experienced professional coaches.
These coaches maintain high standards of competence and exercise careful judgment in
determining how best to serve their clients needs, choosing the most appropriate methods
from their range of expertise.
We believe that competence of an executive coach is not determined by any arbitrary
academic degree or coaching certification (although many such degrees or certifications
may represent completion of education, training, and objective evaluation on some of the
following relevant topics and capabilities). Rather, effective executive coaches are
knowledgeable and competent in the Core Competencies of the Executive Coach defined in
this Handbook:
Four knowledge areas that underpin the work of coaching, the tasks and skills sets aligned
to the six phases of the coaching process:
Psychological Knowledge
Business Acumen
Organizational Knowledge
Coaching Knowledge
"
Contracting
"
Assessment
P a g e | 37
"
Development Planning
"
"
Mature Self-confidence
"
Positive Energy
"
Assertiveness
"
Interpersonal Sensitivity
"
"
Goal Orientation
"
"
"
Integrity
Each of these competency areas is delineated into basic and advanced levels. They fully
understand and adhere to the principles and guidelines in this Handbook.
Finally, competent executive coaches are perceived by the executives they coach as capable,
independent, practical, and interested in the executive and his/her business, flexible, and
able to serve as a good role model.
P a g e | 38
Executive coaches recognize the limitations of their expertise and provide only those
services for which they are qualified by education, training, or experience. They constantly
strive to increase their competence through client interactions, continuing their education
and staying up to date with best practices in coaching.
Executives Commitments
! Determine your own criteria for a coach, including style, training, and specific areas
of competence, expertise, and experience. Apply these criteria to selecting the best
coach for you.
! Take an active role in your own development by providing feedback to the coach on
how the coaching is progressing and what gaps still exist.
! Communicate with stakeholders of your coaching about progress and results.
! Provide your organization and your coach with feedback, both positive and
negative, about the effectiveness of the coach and the coaching process.
! Coachs Commitments
! Consistently operate at the highest level of competence.
! Accurately represent to clients your training, experience, areas of expertise, and
limitations.
! Understand the requirements of each coaching engagement. Be objective and
flexible in choosing methods to meet these requirements.
! Be aware of your limitations; decline assignments that are beyond your experience,
knowledge, capability, or interest, or where there is not a good match between you
and the executive.
P a g e | 39
! Maintain a network of contacts with other qualified professionals and refer clients
when you are not the best possible resource.
! Update your knowledge of the client organizations core business as well as best
practices in coaching.
! Extend your knowledge and skills through continuing education and other
professional development activities.
! Properly apply psychological and organizational assessment techniques, tests, or
instruments. Use only those for which you are qualified or certified.
! Other Partners Commitments
! Maintain high standards in screening and recommending executive coaches for
assignments.
! If you are responsible for providing coaching referrals or information to your
organization, keep current on the reputation of coaches and best coaching practices.
! Select coaches based on their competence and fit with the executives and the client
organizations needs.
! Monitor the effectiveness of coaching in the organization and provide feedback to
both the coaches and the executives.
! Evaluate the competency of coaches and their results to determine their future use in
your organization.
Core Competencies of the Executive Coach lists a robust set of four knowledge areas that
underpin the work of coaching, the task and skill sets aligned to the six phases of the
P a g e | 40
coaching process, along with the ten attributes and abilities that promote superior
performance. Each of these competency areas is delineated into basic and advanced levels.
P a g e | 41
6. Integrity
Upon beginning executive coaching, the executive is placing significant trust in the coach
and the organization. He is allowing himself to be vulnerable and open. To ensure that he
remains receptive to feedback, new ideas, and learning, the organization, coach, and other
stakeholders must establish and maintain a psychologically safe and respectful
environment.
The relationship between the executive and his coach is sensitive and often private. To
maintain this relationship, all stakeholders must be clear in their presentation of issues,
organizational information, coaching goals, coaching activities, and ground rules for
confidentiality. All partners must adhere to clearly articulated guidelines and rules of
engagement. Breaches of trust or actions that run counter to agreements and guidelines are
extremely serious, especially if the executive suffers negative consequences such as a loss of
reputation, income, or relationships. All parties must therefore function at the highest
levels of integrity and candor when involved in executive coaching activities.
Executives Commitments
! Trust your coach and the coaching process once you are assured of appropriate
safeguards. Remain open, willing to learn, and appropriately vulnerable.
! Take an active role in establishing appropriate guidelines for your coaching.
! Adhere to agreements of confidentiality, anonymity, and information sharing not only
about you, but also about everyone involved.
! Work within the coaching contract and its learning goals, unless all parties revise these
goals. (For example, do not treat a developmental coaching contract as a job-search
opportunity.)
! Be honest and candid with your coach about you and your situation.
! Follow up on your commitments.
! Provide your coach and the organization with forthright and constructive performanceimprovement feedback.
P a g e | 42
Coachs Commitments
! Develop and adhere to a set of professional guidelines, especially in the areas of
confidentiality, conflict of interest, and expertise.
! Abide by the organizations existing values, ethical practices, confidentiality and
proprietary agreements, business practices, and Human Resource policies.
! Honor the relationship you have established with both the executive and the
organization, seeking resolution when conflicts arise.
! Help the organization to develop guidelines on how its managers and employees will
learn in their jobs. Follow and embellish an organizations learning contract. Strictly
apply existing standards for dealing with personal data, or provide such standards if
the organization does not have any.
! Discuss with the executive organizational requests for information about him and his
coaching, including status updates, feedback data, and input for reviews.
! Act in the executives best interests and well-being.
Other Partners Commitments
! Provide coaching guidelines, standards, and business practices that meet the needs of
all parties.
! Present your perspective on the need for coaching, the executives situation, the
organizational context, performance concerns, and organizational goals for coaching in
a realistic and forthright manner.
! Inform all parties if the goals or information you have provided change significantly
during the course of the coaching.
! Establish and adhere to standards for the learning contract, including purpose and
objectives, timelines, scope and types of assessment, measures of success, identification
and roles of stakeholders, confidentiality agreements, use of personal and coaching
information, and distribution of information.
! Establish a problem-resolution process for coaching issues, especially ethical practices.
! Provide both executive and coach with ongoing feedback and support.
! Function within the learning and business agreements. Avoid putting the coach or
executive in difficult positions by requesting feedback or personal data, input for
performance reviews, or promotion discussions.
P a g e | 43
7. Judgment
Executive coaching is a balance of science, art, and expert improvisation. No matter how
many guidelines are developed and followed, successful coaching requires that you
continually step back, evaluate the situation, weigh the options, and apply good judgment
for well-balanced decisions. An executives influence is determined not only by her
attributes and skills, but also by how others perceive her, plus her match to the needs,
circumstances, and culture of the organization. All coaching partners offer different
perspectives which, combined with good judgment, provide the executive with a dynamic
learning experience.
There is no recipe for the perfect coaching experience. Along the way, unpredictable
challenges, conflicts, and opportunities arise. Whether these situations help or hinder the
executives development depends upon the judgment stakeholders exercise in an everchanging work environment.
Executives Commitments
! Maintain an open mind and be willing to change it.
! Focus on the greater good.
! Weigh all perspectives.
! Ask for help.
! Be flexible.
! Try new approaches.
! Accept the credit and blame when they are yours. Admit your strengths and
weaknesses to be able to deal with them effectively.
! Make decisions by balancing hard data with intuition.
! Be honest and direct.
! Take reasonable risks.
P a g e | 44
Coachs Commitments
! Always maintain a high level of professionalism.
! Do not mix personal and professional relationships that could bias your judgment in a
coaching situation.
! Avoid any activities that could result in a conflict of interest.
! Build and maintain a communication network with all coaching partners.
! Listen attentively, with an open mind.
! Be honest and direct about your intentions and points of view.
! Prevent misunderstandings by explaining your activities beforehand whenever they
could be misunderstood.
! Do nothing that could be misinterpreted as an impropriety within the standards of the
executives organization.
! Tailor your approach to the priorities and preferences of the executive and the coaching
partnership.
! Bring the members of the partnership together to facilitate decision-making.
! Hear all relevant perspectives and mediate conflicts.
Other Partners Commitments
! Focus on the development and success of the organization and the executive.
! Be honest and direct about your goals and perspectives on the organization and the
executive.
! Consider all available information before making a judgment.
! Be open-minded.
! Be flexible.
! Support the executive and coach in following through with the judgments they make
about the coaching.
! Be balanced in your judgments regarding the coaching: short vs. long term, work vs.
personal life, data vs. intuition, and individual vs. organizational good.
P a g e | 45
1. Managing Confidentiality
The executive and other members of the organization must be able to open up and share
information with the coach and one another without fear that the information will be
passed on inappropriately or without their approval. Because each coaching situation is
unique, it is important for all partners to develop a formal, written confidentiality
agreement before the coaching begins. This agreement specifies what information will and
will not be shared, in which circumstances, with whom, and how. The agreement helps all
coaching partners remain sensitive to confidentiality issues from each others points of
view. Coaching partners should communicate with other members of the partnership
before sharing any information with anyone outside the partnership.
Coachs Commitments
! Guidelines: Work within the proprietary and confidentiality guidelines noted in the
organizations financial, legal, and business contracts and documents.
! Organizational information: In general, within the boundaries of the law, keep all
organizational information confidential unless it is otherwise available to the public.
Exception to this guideline: You may be required to reveal to the appropriate
representatives of the organization, and possibly to legal authorities, any information
regarding illegal or unethical improprieties or circumstances that pose a physical or
emotional threat to any individual, group, or organization.
! Information about the executive: Do not share with anyone except the executive himself
any details regarding that executive unless members of the coaching partnership have
agreed otherwise.
Exception to this guideline: You are often obligated to provide the organization with a
summary of your conclusions on the executives current and potential ability to serve in
P a g e | 46
his role. Share this summary with the executive and get his input as appropriate. Obtain
a detailed agreement from all partners on what this summary will and will not include
before the coaching begins.
! Feedback from others about the executive: You may often get feedback, usually under
promise of anonymity, from members of the organization or other people familiar with
the executive. Members of the coaching partnership should agree on the anonymity and
confidentiality of such information before it is collected. You should also obtain
agreement, before coaching begins, on exactly how anonymously the feedback will be
reported: no identification, identification by category of person (work group, level, etc.)
or by specific name. You are obliged to the people from whom you obtain this feedback
to be clear up front about the terms of this anonymity and confidentiality and to work
strictly within these terms. Present any feedback to the executive in verbatim or
summary form.
Commitments of the Executive and Other Partners
! Members of the organization who, as a result of coaching, learn confidential
information about the executive, keep that information confidential unless otherwise
agreed before the coaching begins.
! The executive responds to feedback from others in non-defensive ways, without
second-guessing who might have said what or retaliating for feedback that is difficult to
hear. This non-defensive response maximizes the trust the executive will share with
others in the future.
! All members of the coaching partnership ensure that no confidential information
coming out of the coaching process is shared electronically unless they can control
access to that information.
! Before coaching begins, all partners consider how the confidentiality of each of the
following types of information will be managed. They agree on what will or will not be
shared, with whom, by whom, when, in what form, and under what circumstances:
"
assessment results
"
coaching goals
"
"
360-degree feedback
"
performance appraisals
"
interpersonal conflicts
"
P a g e | 47
"
! The organization identifies an internal resource who can advise coaches and
stakeholders on questions of confidentiality and other sensitive topics, and who can
help resolve these issues.
P a g e | 48
2. Pre-coaching Activities
Certain activities can determine if coaching is appropriate in the first place, help select the
most appropriate coach, and prepare both coach and executive for the process. This
important set of behind-the-scenes activities, usually conducted by HR, includes sourcing,
selecting, and orienting coaches, consulting with executives on their needs, matching coach
to executive, and establishing standards for practice. The intent of these pre-coaching
activities is to ensure the best possible experience and outcomes for the executive and the
organization.
Executives Commitments
! Consult with appropriate stakeholders to determine if executive coaching is a viable
option for you. Consider your organizations overall development focus, your specific
learning needs, and the skills and experience of available coaches.
! Conduct exploratory interviews with several coaches before selecting the one who is
best for you.
! Handle all business and financial contract requirements yourself, or make sure
appropriate people in your organization handle them.
! Provide your coach with the necessary background information about your
organization, specific business documents, and personal information.
! Begin the coaching process with a willingness to learn.
Coachs Commitments
! Participate in the organizations process for selecting, matching, and orienting executive
coaches.
! Provide the organization and the executive with requested background information
about you and your practice, your rates, business practices, and references.
! Partner with the Human Resources staff and other stakeholders as needed.
Other Partners Commitments
! Establish business practices and standards for executive coaching.
P a g e | 49
! Develop a coach selection and orientation process.
! Apply criteria for analyzing coaching needs and matching the executive with the most
appropriate coach.
! Provide feedback to the coaches you do not select.
! Consult with the executive to provide guidance and support in determining coaching
needs, requirements, and desired outcomes.
! Partner with coaches to ensure their best fit with the organization and the executive.
P a g e | 50
3. Contracting
The purpose of contracting in executive coaching is to ensure productive outcomes, clarify
roles, prevent misunderstandings, establish learning goals, and define business and
interpersonal practices. There are three major components of contracting: the Learning
Contract, the Business/Legal/Financial Contracts, and the Personal Contract between the
executive and the coach.
The Learning Contract includes:
"
"
Timelines
"
"
Milestones
"
Measures of success
"
"
Confidentiality agreements
"
"
"
"
"
"
"
"
"
"
"
"
P a g e | 51
Personal Contracts between the coach and the executive include:
"
"
Understanding of the coachs theoretical and practical approach and how coaching
sessions will be structured
"
"
Scoping of how much pre-work coach and executive will do before each coaching
session
"
"
Understanding of when the coach will be available to the executive and vise versa, and
how contact will be made
"
"
Executives Commitments
! Actively participate in establishing learning and personal contracts.
! As your organization deems appropriate, participate in establishing, monitoring, and
administering business/legal/financial contract(s) with the coach.
! Adhere to the learning contract and use it to gauge progress and success.
! Adhere to the personal contract and hold the coach to it as well.
Coachs Commitments
! Share your own standards and guidelines for contracting with the executive and
organization while respecting and agreeing to use the organizations standards.
! Actively use the learning contract to plan and deliver coaching and to assess progress
and results.
! Use the personal contract as the set of guidelines to follow in all interactions with the
executive; hold the executive to the guidelines as well.
! Negotiate the terms of the contracts in good faith or have the appropriate
representative(s) from your practice do so. Comply with the terms of the contract in
full, or reestablish them as mutually agreeable between your practice and the
executives organization.
P a g e | 52
Other Partners Commitments
! Establish and disseminate standards for learning contracts in your organization.
! Actively participate in establishing and supporting the executives learning contract.
! Respect the personal contract as established between the coach and executive.
! Ensure that the coach has and uses business/legal/financial contractual information.
! Expedite the contracting and payment process in your organization in support of the
executive and the coach.
P a g e | 53
4. Assessment
The assessment phase of executive coaching provides both the coach and the executive
with important information upon which to base a developmental action plan. The
assessment is customized, taking into account the needs of the executive and the norms
and culture of the organization. The coach can select among a wide variety of assessment
instruments, including personality, learning, interest, and leadership style indicators.
Observing the executive in action in her usual work setting provides assessment data, as
does interviewing her, her peers, direct reports, manager, and other stakeholders. In some
cases, the coach administers a formal 360-degree assessment.
There are times when an executive or her organization chooses not to initiate a full
executive coaching process. Sometimes, rather than providing full coaching, the executive
participates in feedback debriefing/development planning. This process can be
appropriate for gathering data, receiving feedback, and creating a development plan. It is
often conducted without an executive coaching partnership as recommended in this
Handbook. Without that partnership, however, it can be difficult for the executive to
implement change in herself or in the system.
When separate assessment and development planning has been done and coaching is
added after the fact, it may be necessary to include others in further data gathering, review,
and goal setting. When assessment and planning are done without a formal coaching
phase, some coaching should accompany the presentation and review of the results. This
will help the executive not only understand the data and their implications, but also make
the best use of the information to increase self-awareness and identify development areas
with the greatest potential for success.
In addition to assessing the executive, it is also valuable to assess the team and
organization with and within which the executive works. Such additional assessments are
an important part of the systems perspective of executive coaching. By understanding the
P a g e | 54
team and organizational environment, the executive and her coach can better determine
what to change and how to achieve that change.
Additional assessments include such variables as the organizational culture, team
communication, organizational trust, quality, employee satisfaction, efficiency, and
profitability. These systems factors may indicate how the organization operates, the results
achieved, or predictive measures of likely success. They can be assessed through direct
observation, questionnaires, focus groups, one-on-one interviews, and other methods. The
data collected on the organizational system are often valuable to share with others besides
the executive. If the larger assessment is contemplated, the coaching partnership needs to
decide ahead of time how to deal with the data and include these decisions in the learning
contract.
Executives Commitments
! Maintain an open attitude toward feedback and other assessment results, considering
all information as hypotheses to be proved or disproved.
! Invest the required time to expedite the assessment phase.
! Partner with the coach to identify situations, such as meetings and events, which might
provide on you and your organization.
! Ask questions and digest feedback to make the best use of assessment information.
Coachs Commitments
! Be knowledgeable in a broad range of assessment methodologies.
! Administer only those instruments for which you have been fully trained/certified or
otherwise adequately prepared.
! Maintain the confidentiality of the executive by protecting the assessment data.
! Provide a safe, supportive environment in which to deliver assessment feedback.
Deliver feedback in ways that encourage the executive to act upon her assessment.
! Offer a clear context for the strengths and limitations of the testing process.
P a g e | 55
! Help the executive use her assessment data to create a development action plan.
Other Partners Commitments
! Respect the agreed-upon level of confidentiality for executive coaching data.
! Provide information about the executive and the organization.
! Partner with the coach and executive to identify ways for the coach to directly observe
the executive and the organization.
P a g e | 56
5. Goal Setting
Executive coaching is driven by specific goals agreed upon by all members of the coaching
partnership. These goals focus on achievements and changes the executive can target, both
for himself and for his organization. Initial goals are established when coaching begins and
revised or refined as coaching progresses. Based on whether they should be achieved
within weeks, months, or over a longer time period, goals can be divided into short-, mid-,
and long-term targets.
Goals are based on valid and reliable data that exemplify how the executive should learn
new skills, change his behavior, work on organizational priorities, or achieve specific
business results. After a specified time period, progress is measured against goals, and they
are updated to adapt to the executives changing capabilities and the organizations
evolving priorities. Goal achievement is measured both quantitatively and qualitatively.
Executives Commitments
! Collaborate with and listen to your stakeholders to become aware of how others
perceive your needs for change and development.
! Be honest about your own priorities for coaching.
! Clarify specifically what you will need to do so that others perceive you as achieving
your goals.
! Invest time in the coaching and on the job based on the established goals.
Coachs Commitments
! Facilitate collaboration between the executive and his stakeholders to identify and agree
upon coaching goals.
! Accept responsibility only for coaching activities that are based on specific, measurable
goals.
! Help members of the coaching partnership gather valid and reliable data as a basis for
establishing goals.
P a g e | 57
! Document the coaching goals and communicate them to all partners.
! Assess coaching progress and adjust goals based on interim results and changing
priorities.
Other Partners Commitments
! Be honest and direct about your goals for the coaching.
! Collaborate with the executive and other partners to agree on specific, measurable,
achievable, challenging, time-bound, and practical goals.
! Base the goals on valid and reliable data about the executives performance and
organizational priorities.
! Provide ongoing feedback to both executive and coach on the executives progress
toward his goals.
! Support the executives efforts to achieve his goals.
! Allow the executive to take the agreed-upon time to achieve his goals before changing
his responsibilities or the resources he needs.
P a g e | 58
6. Coaching
The quality of the coaching relationship is a key element of success. The coach creates a safe
environment in which the executive can feel comfortable taking the risks necessary to learn
and develop. Drawing from a broad knowledge base and a solid repertoire of learning
tools, the coach offers guidance and activities that help the executive meet her learning
goals. Conversations explore the executives current work situation to find practical,
business-focused learning lab opportunities.
The practical activity of coaching is based on principles of adult learning: awareness,
action, and reflection. Using data gathered from the assessment phase of the process, the
coach engages the executive in discussion and activities designed to:
"
"
"
P a g e | 59
Executives Commitments
! Maintain an open attitude toward experimenting with new perspectives and behaviors.
! Willingly be vulnerable and take risks.
! Focus on your own growth within the context of your current and future organizational
role.
! Transfer learning gained through coaching to your day-to-day work.
! Exchange feedback with your coach about the helpfulness of the coaching.
! Seek feedback from others in the organization about the results of your coaching.
Coachs Commitments
! Adhere to the standards and guidelines for practice outlined in this Handbook.
! Maintain the coaching focus on the executives learning goals.
! Prepare relevant action items for all coaching meetings.
! Role-model effective leadership practices.
! Apply adult learning principles during coaching.
! Participate actively in all meetings with the executive and other stakeholders.
! Offer truthful and relevant feedback.
! Create an environment that supports exploration and change.
! Make appropriate referrals to other resources when you are not the best source for
additional assistance.
Other Partners Commitments
! Maintain a supportive and patient attitude toward the change process.
! Provide feedback to both the executive and the coach on progress and concerns.
! Offer to mentor, coach, role model, and support the executive from your own
perspective within the organization.
P a g e | 60
! Assist the executive and coach in finding additional resources within or outside the
organization when help beyond the scope of the coaching or the coachs area of
expertise is needed.
P a g e | 61
P a g e | 62
! Provide your organization with a forthright assessment of the coachs capabilities and
organizational fit.
Coachs Commitments
! Use your knowledge and expertise to guide the executive and other stakeholders in
developing a long-range plan that targets areas of focus and action steps.
! Recommend internal and external means of development that best fit the needs of the
executive and the organization.
! Communicate with the executives manager or other stakeholders to ensure
commitment to his future development, including regular progress reviews.
! After the coaching ends, make yourself available for questions and clarification.
! Check in with the executive occasionally, as appropriate, to maintain the relationship.
Other Partners Commitments
! Support the executives future development, including a long-term development plan.
! Facilitate internal and external means of development for the executive including, but
not limited to, rotational assignments, stretch assignments, mentoring opportunities,
task force leadership or participation, and internal or external seminars or courses.
! Share constructive feedback about the executives progress toward development
objectives.
! Evaluate the effectiveness of the coach and the coaching process for future use in the
organization.
! Provide feedback to the coach on performance, strengths, and development needs.
P a g e | 63
P a g e | 64
Assessment
! Invest the needed time to expedite your assessment.
! Maintain an open attitude toward feedback and other assessment results.
! Work collaboratively with your coach to identify and ask questions about situations
that might provide insight into you and your organization.
! Make the best use of feedback and other assessment information to change you and
your organization as needed.
Goal Setting
! Collaborate with stakeholders to understand how others perceive your needs for
change and development.
! Be honest about your own priorities for coaching.
! Clarify what you need to do to achieve your goals.
! Invest the time in coaching and on the job to achieve your goals.
Coaching
! Be open and willing to try new things and take appropriate risks.
! Focus on what you need to do to learn and take action within the context of your work
role.
! Exchange feedback with your coach and others in your organization about your
performance and how the coaching has helped you achieve the desired results.
Transitioning to Long-Term Development
! Work with your coach and others in your organization to identify improvements and
opportunities for further progress.
! Participate in formulating a long-term plan for your continued development.
! Establish an agreement with an appropriate person in your organization to support and
monitor your future development.
! Follow through with your plan and invest the time needed to achieve your long-term
development goals.
P a g e | 65
! Communicate with your coach and the appropriate people in your organization about
the effectiveness of the coach and the coaching process.
P a g e | 66
Coachs Guidelines
Managing Confidentiality
! Work within the proprietary and confidentiality guidelines of the organizations
contracts and documents.
! In general, within the boundaries of the law, keep all organizational information
confidential unless it is otherwise available to the public.
! Do not share with anyone except the executive herself any details regarding that
executive unless members of the coaching partnership have agreed otherwise.
! When getting feedback from others about the executive, be clear up front about the
terms of confidentiality and work strictly within these terms.
Pre-coaching Activities
! Participate in the organizations selection and orientation process for coaches.
! Provide the needed information about you and your practice.
! Partner with the executive and other members of the organization to facilitate decision
making and communication regarding the coaching.
Contracting
! Share your own standards and guidelines for contracting with the executive and
organization while respecting and agreeing to use the organizations standards as
feasible.
! Actively use the learning and personal contracts to plan and deliver coaching and to
assess progress and results.
! Negotiate the terms of the contracts in good faith and comply with them in full, or
reestablish them as mutually agreeable and in a timely fashion.
Assessment
! Be knowledgeable in a broad range of assessment methodologies. Administer only
those for which you have been fully trained or otherwise adequately prepared, offering
a clear context for their strengths and limitations.
P a g e | 67
! Deliver feedback in a safe, supportive environment and in ways that encourage the
executive to constructively act upon the assessment.
! Help the executive use the assessment data to create a development action plan.
Goal Setting
! Facilitate collaboration between the executive and her stakeholders to identify and
agree upon specific and measurable coaching goals.
! Document the coaching goals and communicate them in writing to all members of the
coaching partnership.
! As the coaching progresses, adjust goals based on interim results and changing
circumstances and priorities.
Coaching
! Adhere to the standards and guidelines for practice outlined in this Handbook.
! Maintain the coaching focus on the goals that have been agreed upon by the
partnership.
! Participate actively in all meetings with the executive and her stakeholders, preparing
relevant action items, role-modeling, applying adult learning principles, and creating an
environment that supports exploration and change.
! Offer truthful and relevant feedback during coaching in helpful and supportive ways.
Transitioning to Long-Term Development
! Facilitate, guide, and make recommendations for a long-term development plan for the
executive based on the coaching experience and your expertise.
! Communicate with the executives manager and/or stakeholders to ensure
commitment to the executives future development.
! After the coaching ends, make yourself available for questions and clarification. Check
in with the executive occasionally, as appropriate, to maintain the relationship and her
learning momentum.
P a g e | 68
P a g e | 69
! Provide honest, accurate, and complete information about the executive and the
organization.
! Participate in identifying and facilitating ways for the coach to directly observe the
executive and the organization.
Goal Setting
! Be honest and direct about your goals for the coaching.
! Collaborate with the executive and other members of the partnership to agree on
appropriate coaching goals.
! Provide ongoing feedback to both executive and coach on the executives progress
toward his goals.
! Support the executives efforts to achieve his goals, allowing him to take the agreedupon time to achieve them before changing his responsibilities or the resources he
needs.
Coaching
! Maintain a supportive and patient attitude toward the change process.
! Provide feedback to both the executive and the coach on progress and concerns.
! Offer to mentor, coach, role model, and support the executive from your own
perspective within the organization.
! Make suggestions and help the executive get the support he needs from others in the
organization.
Transitioning to Long-Term Development
! Actively participate in creating a long-term development plan for the executive.
! Facilitate internal and external means of development.
! Share ongoing constructive feedback with the executive about his progress toward
development objectives.
! Evaluate the effectiveness of the coach and the coaching process; provide the coach and
others in the organization with feedback to maximize the effectiveness of future
coaching.
P a g e | 70
What are the essential competencies of the effective executive coach? This is a challenging and
important question. A number of writers have addressed this question over the past decade.i
Unfortunately, commercial concerns and a lack of research in the field make it difficult to find
a reasonable answer. The danger for consumers is that, given the lack of standards, they may
be vulnerable to fads and sales pitches without a clear sense of how to evaluate executive
coaches and the coaches ability to meet the consumers needs. Our goal in offering this work
is to provide an initial framework of executive coaching to define the needs in specific
situations and develop criteria for coach selection, not dissimilar to any good human resource
selection process. In addition, we also hope to stimulate further research and dialogue on this
critically important topic. The competencies we will describe here are based on our collective
experience and judgment as executive coaches, executives, educators, and consumers of
executive coaching services. The competencies must be considered tentative to be refined as
further research becomes available.
P a g e | 71
Executive coaching is an experiential and individualized leader development process that
builds a leaders capability to achieve short- and long-term organizational goals. It is
conducted through one-on-one interactions, driven by data from multiple perspectives,
and based on mutual trust and respect. The organization, an executive, and the executive
coach work in partnership to achieve maximum impact.
A discussion of competencies has to begin with the question, competent for what? In this
work we consider those competencies that we believe are necessary to effectively execute the
tasks described in this baseline definition. Clearly such a set of tasks requires a broad set of
competencies.ii Examination of the definition suggests that the competent executive coach will
likely possess or display psychological knowledge, business acumen, organizational
knowledge, knowledge about coaching, coaching skills needed to perform essential coaching
tasks, and a set of personal attributes that serve as a foundation for these competencies and
skills.
While the need for some competencies may vary from situation to situation, we also articulate
here a set of personal attributes that are likely to be important regardless of context. Similar to
the growing awareness on the part of leadership-development researchers and practitioners of
the importance of emotional intelligence in that area, our experience suggests that emotional
intelligence competencies are important to the effectiveness of executive coaches as well.iv
Finally, the reader will note that we consider each competency or attribute from a basic or
foundational level and from a more advanced perspective as well. In doing so, we are trying to
P a g e | 72
capture the simple premise that individual coaches will demonstrate a varying level of
effectiveness within each competency as a function of both their natural gifts and their current
level of development and that competency at the basic level is essential while an advanced
level can be helpful in many situations.
We realize that research on this area is continuing apace and that these competency
descriptions are subject to further scrutiny and debate. Matching coach, executive, and
organization still requires a bit of intuition on the part of those involved because of the state of
research in the field and because of the ambiguous nature of many coaching assignments. In
spite of these limitations, given the growth of executive coaching, we believe it is critically
important to assist executives, organizations, coaches and coaching educators and researchers
by providing focus and language and by so doing try to help move the dialogue forward.
P a g e | 73
Likewise, the executive coach can also use the competencies to consider the kinds of
coaching cases to which he or she is best suited.
4. Designers of training programs and curricula for future executive. There are now a
number of executive coaching training institutes and academic programs and more are
likely to start up over the next decade. Too often, training and education for coaches
offers little more than a few days of workshops with some follow up coaching. As this
list of competencies implies, it makes little sense to expect that an individual can
become an effective executive coach in one week, or one month for that matter. Those
teaching executive coaches or running institutes or programs should grapple with the
serious challenge of helping their clients develop a broad and deep set of
organizational, psychological, business, and coaching competencies.
Please Provide Feedback on this Document
Thank you for your interest in Core Competencies of the Executive Coach. As you will read, this effort to
articulate the competencies of effective executive coaches was based on an on-going dialogue involving
individuals with significant experience as executive coaches, coaching practice managers, educators, and
supervisors of coaches, and researchers and authors on the topic. It was undertaken as part of our effort
to support quality practices in the field. We ask that in return for this service, you provide us your
feedback. Please e-mail otto.judy@gmail.com, and let us know your role, how you have made use of this
document, and your own perspective on the competencies of an effective executive coach. We thank you
in advance for your help.
P a g e | 74
Psychological Knowledge
In laying out the competencies and knowledge essential for the effective executive coach, it is
important to differentiate between formal psychological knowledge that is, knowledge of
psychological theories and concepts relevant to the practice of executive coaching and tacit
psychological knowledge, sometimes also referred to as social intelligence or emotional
intelligence. This section describes the formal psychological knowledge necessary for effective
executive coaching.
Basic
Advanced
Understanding of:
Understanding of:
" Personality theories
" The psychology of transitions
between developmental stages
" Models of human motivation
" Models of substance abuse
" Adult development theories, including
moral, intellectual, emotional, relational, and
" Clinical diagnoses and how they
spiritual development
play out in workplace (e.g.,
narcissism)
" Models of adult learning
" Conflict resolution and mediation
" Models of career development
" Family systems theory
" Models of personal and behavioral change
" Abnormal
" Work/life balance
psychology/psychopathology
" Stress management techniques
" Psychological assessment
" Social psychology and how social factors
methods and tools (e.g., 16PF,
impact individual and group behavior
Strong Interest Inventory, Firo B)
" How to identify individuals in need of
psychological or medical referral
" Models of emotional intelligence
" The role of gender differences in adulthood
" Models and methods of 360 degree feedback
" Models of personal and leadership style
(e.g., MBTI, DISC)
P a g e | 75
Business Acumen
Executive coaches need business acumen in order to understand the goals and work context of
their coachees. Business knowledge also gives executive coaches credibility with their coachees
and others in the coachees organization. In addition to general business knowledge, coaches
need to acquire knowledge of the specific businesses of their coachees.
Basic
Advanced
Understanding of:
Understanding of:
" Business practices and concepts
" Merger and acquisition issues
" Basic financial concepts (e.g.,
" Several specific industries and
income and balance sheets)
their technologies
" Business functions and their
" The use and abuse of technology
interdependencies
" Leading edge business practices
" The strategic planning process
" Governance structures and
and its relationship with team
practices and how they interface
and individual goal setting
with business operations
" Current information
" Management of the supply
technologies
chain/network
" The role of information
" Product lifecycles
technology in business (e.g.
" Government regulations (e.g.
E.R.P., enterprise management)
compliance, approval, and other
" Process improvement
governmental regulations and
technologies
processes)
" Global capitalism and global
" How boards operate in
firms
relationship to senior
" The differences between
management
regulated and non-regulated
" Re-engineering and downsizing
businesses
" The differences between forprofit and not-for-profit
businesses
" The key leadership roles of
organizations (e.g. COO, CFO,
CTO, CEO, Executive Director,
Board Chair, etc.)
" Knowledge of current business
events, issues and trends
" Management principles and
processes
" Human resource management
P a g e | 76
Organizational Knowledge
Executive coaches work with coachees who must accomplish their work goals and advance
their careers within the context of their organization(s). Therefore, it is important for executive
coaches to understand organizational structures, systems, processes, and how to assess all of
these elements of the organization in which the coachee works.
Basic
Advanced
Understanding of:
Understanding of:
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
P a g e | 77
"
"
"
P a g e | 78
Coaching Knowledge
Executive Coaches need to have specific knowledge of theory, research, and practice in the
developing field of executive coaching.
Basic
Advanced
Understanding of:
Understanding of:
"
"
"
"
"
"
"
"
"
P a g e | 79
Coaching Knowledge (Continued)
Basic
Understanding of:
"
"
"
"
"
"
"
"
"
"
Advanced
P a g e | 80
Basic
"
"
"
"
"
"
"
"
"
"
"
P a g e | 81
Contracting
Basic
" Evaluate the readiness of the coachee for
coaching
" Engage all appropriate constituents in goal
setting and agenda setting for the coaching
(coachee, boss, HR, others)
" Obtain commitment and support from all
appropriate constituents
" Establish guidelines for confidentiality
" Establish the bosss and HRs role in the
coaching
" Facilitate agenda-setting and goal-setting
meetings between the coachee, his/her
boss and the HR professional
" Develop realistic and challenging coaching
goals
" Set realistic time frames for accomplishing
the coaching goals
" Re-contract when appropriate
" Tailor the coaching process to the unique
needs of the coachee and organization
Advanced
" Play multiple roles without
crossing key boundaries or
compromising the guidelines
for practice
" Challenge the coachees commitm
" Contract with the boss for
feedback to him/her
" Negotiate and write three forms
of coaching contracts: the
learning contract with the
coachee, his/her boss and HR
professional; the
business/legal/financial
contract with the coachees
organization; and the
personal/relationship contract
with the coachee ii
" Manage times of low and high
demand in ones own coaching
practice so as not to negatively
impact client service
P a g e | 82
Assessment
Basic
"
"
"
"
"
"
"
"
"
Advanced
Design assessment plans
Administer and interpret 360 degree
feedback instruments and measures of
personal and leadership style (e.g., MBTI,
DISC)
Interview the coachee and his/her key
constituents
Unobtrusively observe/shadow the coachee
in his/her work environment
Gather data from multiple sources, aggregate
them and present the results and
implications in a useful format
Use the results of assessment tools and
instruments to evaluate the coachees
strengths, weaknesses, abilities, tendencies,
preferences, behavior patterns, emotions,
thinking styles, opportunities, constraints,
and other factors important to the coaching
Use the results of assessment tools,
instruments and other methods to evaluate
the coachees organizational context (e.g.
characteristics, strengths, weaknesses,
opportunities, constraints, etc.)
Refer when appropriate to Employee
Assistance Programs, career counselors, or
other specialists for the administration,
scoring, and interpreting of assessments
Identify the coachees learning style
"
"
"
"
"
P a g e | 83
Basic
"
"
"
"
"
"
"
"
"
"
Development Planning
Advanced
Partner with Human Resources
" Involve other development
Conduct debriefing and feedback sessions
resources in coaching
with the coachee of the assessments and 360interventions (mentors,
degree results
trainers, consultants,
Establish specific coaching goals (behavioral,
therapists, physicians, etc.)
cognitive, skills, business, relationships, etc.)
" Continually build and manage
Help the coachee design and create action
a network of referral sources
plans and a coaching time table
to other relevant professional
Help the coachee, his/her boss, and HR to
services and providers
review assessment results within agreedupon guidelines for confidentiality and
translate those results into actionable
coaching strategies
Establish qualitative and quantitative
measures of results for the coaching goals
Determine what can be achieved in coaching
and recommend appropriate training and
other methods to achieve other
developmental goals
Quickly identify the need for, and make
referrals to other helping professionals
Gain commitment for the coachees selfmanagement of coaching action plans
Help the boss to provide useful feedback
and to coach the coachee as his/her manager
P a g e | 84
Basic
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
"
P a g e | 85
Basic
"
"
P a g e | 86
Basic
"
"
"
"
"
"
"
"
P a g e | 87
A number of underlying attributes and abilities facilitate performance of the Coaching Tasks
described in the previous section. An individual who demonstrates the following nine
categories of attributes may be more likely to be effective as an executive coach: Mature Selfconfidence; Positive Energy; Assertiveness; Interpersonal Sensitivity; Openness and
Flexibility; Goal Orientation; Partnering and Influence; Continuous Learning and
Development; and Integrity. An effective executive coach may further develop these
attributes and abilities as a result of the demands and opportunities of the coaching role.
Mature Self-confidence
"
"
"
"
Basic
Appears comfortable with
himself/herself
"
Advanced
Demonstrates a sense of comfort around
senior management or others in power;
views him/herself as a peer to senior
managers.
"
"
"
P a g e | 88
Positive Energy
"
Basic
Shows energy, optimism and
enthusiasm
"
"
"
"
"
"
Conveys hopefulness
"
"
Advanced
Uses humor to defuse tense situations
Manages her or his own stress in
unusual coaching situations so as not
to allow it to interfere with the
coaching process or relationship
P a g e | 89
Assertiveness
"
Basic
Asserts him/herself and appropriately
says no to set limits
"
"
"
"
"
Advanced
Is able to challenge or confront even
the most senior leaders
P a g e | 90
Interpersonal Sensitivity
"
"
Basic
Shows empathy with others
"
"
"
"
"
"
"
Advanced
Is continually alert to subtle behaviors
providing clues about others interest,
engagement, and concern
Asks questions to elicit concerns and
feelings suggested by subtle
nonverbal behavior or group
dynamics
P a g e | 91
Basic
Is able to understand and appreciate
perspectives that differ from her or his
own
"
"
"
"
"
Advanced
Demonstrates comfort with a very high
level of ambiguity
P a g e | 92
Goal Orientation
"
Basic
Sets challenging but achievable goals
for himself/herself
"
"
"
"
"
"
"
"
Advanced
Manages multiple and sometimes
conflicting goals and their attainment
Translates complex goals into parallel
tracks of actions and their associated
measures of success
P a g e | 93
Basic
Carefully plans and tailors his or her
own words in ways that achieve a
desired impact
"
"
"
"
"
Demonstrates inclusiveness by
encouraging the participation of
multiple stakeholders
"
Advanced
Is perceived by others as being of the
stature of an executive or senior
consultant
"
"
"
P a g e | 94
"
"
"
"
"
"
"
P a g e | 95
Integrity
"
Basic
Takes and holds an ethical stand
regardless of financial or other pressures
"
"
"
"
"
"
"
"
"
Advanced
Helps all members of the coaching
partnership to challenge their
integrity and impact on the business
P a g e | 96
Sherman, Stratford & Freas, Alyssa (2004/November). The wild west of executive coaching. Harvard
Business Review, pp. 82 90. Hunt (2004), Successful Executive Coaching from the Consumers
Perspective. Creative Consulting: Research in Management Consulting, Vol. 4, Greenwich, CT: IAP Press.
pp. 165 200.
ii We use the term competency here to as it was originally suggested by Boyatzis (1982, in The
Competent Manager, New York: Wiley-Interscience) as: an underlying characteristic of an individual,
which is causally related to effective or superior performance in a job. This definition was further
articulated by Spencer, McClelland & Spencer (1994, Competency Assessment Methods, Boston:
HayMcBer Research Press) as motives, traits, self-concepts, attitudes or values, content knowledge or
cognitive or behavioral skills (p. 6).
iii This articulation process began with each of us listing those competencies that seemed particularly
significant in our own experiences. We then compared lists, added and deleted items, and refined
terminology until we were comfortable that we had an inclusive or complete list of appropriate
competencies. Such a process of course has a number of limitations from a research perspective and as
such, we offer this model as the shared perspective of a varied group of experienced professionals in
the field. We hope that future research will provide quantitative and qualitative evidence that
demonstrates a direct relationship between specific coaching competencies and coaching results.
i
Crisis Negotiation Unit, Federal Bureau of Investigation, FBI Academy, United States
b
Center for Psychological Studies, Nova Southeastern University, United States
c
Crisis and Security Management, Control Risks Group, Washington, DC, United States
Received 24 August 2003; received in revised form 14 September 2004; accepted 4 October 2004
Abstract
Crisis (hostage) negotiation has been described as the most significant development in law
enforcement and police psychology over the past several decades. This paper reviews three primary
components of crisis negotiation: (1) the incorporation of crisis management and intervention in
current broad-spectrum approaches to crisis negotiation; (2) the Behavioral Change Stairway Model
(BCSM), constructed by the Federal Bureau of Investigations (FBI) Crisis Negotiation Unit (CNU),
that provides a systematic, multistep process directed toward peaceful, nonlethal resolution of critical
incidents; and (3) role-playing as a vital tool in the assessment and training of crisis negotiation skills.
Advancements and limitations in the field of crisis negotiation are highlighted; suggestions for
directions that future work in this area might take are offered.
D 2004 Elsevier Ltd. All rights reserved.
Keywords: Crisis negotiation; Hostage negotiation; Crisis intervention; Role-playing; Conflict resolution; Online
534
Contents
1.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
535
535
536
537
537
537
538
538
538
538
539
539
539
539
540
540
541
541
542
543
543
544
545
545
545
546
546
546
546
547
548
550
550
Law enforcement agencies have been employing negotiation strategies in their responses to
hostage/barricade situations, kidnappings, personal crises, and other critical incidents since
they were first introduced by the New York City Police Department in 1973. This trend
followed the debacle of the 1971 Attica, New York prison riot, and the murder of Israeli athletes
during the 1972 Olympic Games in Munich, Germany. Since that time, several models of
negotiation have been developed for use in hostage situations, based primarily on problemsolving approaches to response, management, and resolution of these incidents (Fisher, Ury, &
Patton, 1991; Lanceley, 1999; McMains & Mullins, 2001; Webster, 1998a). However, problemsolving strategies have proven effective only subsequent to addressing and defusing the
subjects emotional state; and this appears true regardless of the situation (Noesner & Webster,
1997; Rogan, Hammer, & Van Zandt, 1997; Romano & McMann, 1997).
535
This paper discusses current strategies in crisis (hostage) negotiation that have been
developed and implemented to facilitate: (a) the transition of a hostage or non-hostage
critical incident from a state of high emotionality (crisis) to rationality (problem solving),
and (b) the eventual peaceful or nonlethal resolution of the crisis situation. Following an
overview and definition of key terms, we review three primary components of the crisis
negotiation process: (1) crisis management and intervention in the context of critical
incidents, (2) the Behavioral Change Stairway Model for achieving conflict resolution,
and (3) utilization of role-play procedures to train requisite crisis negotiation skills.
536
of these scenarios are: holding ones spouse captive as a result of an extramarital affair, and
rejection due to an impending separation or divorce (Van Hasselt et al., in press c). The
hostagenon-hostage distinction is further underscored in Fig. 1. This figure presents the
bBehavioral ContinuumQ which includes the focus of both hostage (i.e., instrumental) and
non-hostage (expressive) situations.
Even in bpureQ hostage situations, however, there is evidence that perpetrators experience
considerable emotionality, especially during the chaos of the incident onset (Romano, 2002).
This makes hostage-takers, as well as victims, susceptible to slipping into a crisis, which
requires the application of appropriate crisis intervention techniques.
1.2. Tactical vs. negotiated resolution
A tactical response refers to actions taken by a Special Weapons and Tactics (SWAT) or
similar specialized unit to resolve either the hostage or non-hostage situation (Mijares,
McCarthy, & Perkins, 2000). In most of these cases, a determination has been made that
despite negotiation efforts, peaceful resolution appears unlikely (e.g., the subject refuses to
talk with negotiators, or remains adamantly noncompliant/resistive). In some situations, the
subject may have engaged in a behavior, such as a shooting of a victim, that necessitates
an immediate tactical response to prevent additional harm (McGeorge, 1983). SWAT teams
are composed of personnel with highly specialized training in forced entries, hostage/
victim extraction, and subject containment/termination (Jones, 1996; Kaiser, 1990; Vecchi,
2002).
An important concept that has received increased attention in this field is the action
imperative. This refers to the taking of (tactical) action when, in fact, there was no clear basis
for doing so (Dalfonzo, 2002). An example of the action imperative is an on-scene
commander deciding to end a situation tactically because, although negotiations are in
progress, they are (from his perspective): (a) too lengthy, or (b) not resulting in any obvious
resolution. Such decision-making is usually based on a lack of understanding regarding the
negotiation process (Vecchi, 2002). In particular, the action imperative is taken when
commanders or tactical operators are not aware that time (i.e., protracted negotiations) is the
bnegotiators allyQ in defusing critical incidents.
537
Conflict can be defined as the perceived blocking of important goals, needs, or interests of
one person or group by another person or group (Wilmot & Hocker, 1998). A persons
response to conflict can be constructive or destructive. For example, in a child custody battle,
the losing parent (whose need to have her children is blocked by her former husband, via a
court order) could respond constructively by taking her ex-husband back to court, or
destructively by taking her children by force. In the event of the latter, a crisis may result if
she is unable to cope with the problem. At this point, the wifes response to the crisis could be
adaptive or maladaptive (Rosenbluh, 2001). For example, she could take an adaptive
approach by returning the children and seeking counseling. Or, she could take a maladaptive
approach by taking the children hostage, barricading herself, and threatening to kill them if
she is not awarded custody.
538
event. The crisis stage is characterized by high emotions, low rationality, and an inability to
cope with a problem that is perceived to be a serious threat. Here, frustration and tension
increase as a result of conflict and the person being unable to deal with the challenge using
previously effective coping skills. It is often during the onset of the crisis stage that police
negotiators or mobile crisis responders are called upon to intervene. By the accommodation/
negotiation stage, the individual begins to bwork throughQ the crisis by being receptive to
suggestions and thinking more clearly about resolving the situation. In this stage, there is a
lessening of emotional intensity and a shift towards more productive problem solving. The
resolution stage involves the working out of an acceptable solution, thus ending the crisis.
This final stage results in the person experiencing renewed equilibrium and stability.
2.3. Goals of crisis intervention
Once coping mechanisms fail, and a person falls into a crisis state, normal functioning is
disrupted. What is normally resolved at a rational or cognitive level is now dealt with at an
emotional or affective level. Therefore, restoring the ability of a person to cope through the
reestablishment of baseline functioning levels is the primary purpose of crisis intervention
(James & Gilliland, 2001; Roberts, 2000). To accomplish this, crisis negotiation involves: (1)
establishing communication and developing rapport, (2) buying time, (3) defusing intense
emotions, and (4) gathering intelligence to ascertain the optimal negotiation/intervention
strategies and tactics (Lanceley, 1999; Romano & McMann, 1997). These events are
discussed briefly below.
2.3.1. Establishing communication and developing rapport
Individuals who are able to articulate clear statements of feeling are ultimately in a better
position to solve their problems. Thus, in crisis intervention, actively listening to what the
person in crisis is saying is vital. When a listener (negotiator) is able to reflect the subjects
feelings, the former is perceived as being understanding (see bActive Listening SkillsQ
below). This is the basis for a relationship in which the person in crisis is ready to accept and
act upon the suggestions of the negotiator, thereby resolving the crisis.
2.3.2. Buying time
bTime is the crisis negotiators greatest allyQ (Romano, 2002). The passage of time alone
usually decreases stress and emotional levels, and sets the stage for achieving the goals of
crisis intervention. In law enforcement circles, buying time is known as bverbal containmentQ,
or the process of keeping the person in crisis boccupiedQ via ongoing discussions with the
negotiator.
2.3.3. Defusing intense emotions
Communication occurs on two levels. The first level relates to the content or story, which
is based on the facts as related by the speaker. The second level of communication pertains to
emotion, which is the affective reaction to the story (i.e., how the person feels about what he
or she just said). The emotional reaction, and behavior based on that reaction, is what creates
539
crisis, rather than the actual event itself. Assessing communication levels is accomplished by
examining statements in terms of their content and attached emotions; a person may
communicate the same content, but with different emotional overlays. For example, bI hate
youQ may reflect disdain, while bI HATE YOU!Q may reflect anger. How a person feels about
a situation will strongly influence their behavior; therefore, listening for and addressing the
intense emotions behind the content is crucial in influencing the persons behavior in crisis
situations.
2.3.4. Gathering intelligence
This relates to the ongoing assessment of the crisis situation in order to: (a) ascertain the
lethality or potential harm to the person in crisis (and others), (b) identify precipitating events,
and (c) formulate proposed courses of action and post-crisis options (e.g., therapy, medical
follow-up, incarceration). Intelligence gathering is accomplished through communication
with the person in crisis, and by investigating the background of the person via interviews
(family, friends, co-workers) and records checks (criminal, civil, medical, psychological).
2.4. Crisis intervention stages
Regardless of the model employed, crisis intervention in the context of negotiation
encompasses four primary stages (Hammer & Rogan, 1997; Rogan, 1997; Womack & Walsh,
1997): (1) dealing with emotions, (2) establishing communication, (3) identifying the
precipitating event(s), and (4) problem solving.
2.4.1. Dealing with emotions
Dealing with emotions is a requisite skill for a crisis negotiator given the fact that intense,
volatile emotions are a hallmark of crisis situations (Noesner & Webster, 1997; Rogan, 1997;
Webster, 1998a). However, making assumptions about a persons emotions based upon the
circumstances can impede crisis intervention. For example, during a situation where a subject
has barricaded himself in his home and is threatening to commit suicide, the negotiator
attempts to demonstrate empathy by saying: bI know how you feelQ. The subject responds by
saying, bYou dont know how I feel. . .just go awayQ. In this case, the negotiators attempt at
empathy is counterproductive because the person in crisis does not believe the negotiator has
ever tried to commit suicide before. And regardless of whether or not this is true, the
perception of the person in crisis is their reality. Therefore, arguing or trying to be rational
with the person in crisis is pointless. An alternative approach would be for the negotiator to
state, bIve never been in your situation before, but I imagine you must be feeling very
depressed and lonelyQ. In saying this, the negotiator is demonstrating that he or she is trying to
understand the situation from the perspective of the person in crisis without making
potentially faulty assumptions.
2.4.2. Establishing communication
Establishing communication is the vehicle for the delivery of crisis intervention strategies
and tactics (Hammer & Rogan, 1997; Noesner & Webster, 1997; Webster, 1998a). The
540
negotiators voice tone and intonation are at least as important as the content of the
communication. Content can be easily altered by informing the person in crisis that you are
simply trying to understand; however, it is much more difficult to bfixQ an attitude that is
perceived by the person in crisis as being bbadQ, hostile, or disinterested. In addition,
communication delivery must be deliberate, methodical, and, most importantly, nonjudgmental. A nonjudgmental perspective is best described as accepting; the subject
perceives that his or her feelings, values, thoughts, and opinions are viewed as important. The
negotiator should not inject his or her values into the situation; however, this does not mean
that the negotiator agrees with the values of the subject. This disagreement can be relayed to
the subject as follows: bFrom what youre saying, I can imagine how your wife could have
made you angry enough to kill her. . .That would have made me angry too, but I dont think I
could have done what you didQ.
2.4.3. Identifying the precipitating event(s)
A precipitating event is the blast strawQ or btriggerQ that propels a person into crisis. As
mentioned earlier, the precipitating event is often a significant loss or reversal (e.g., spouse,
job, money) (Romano, 2002). Identifying the precipitating event is critical in laying the
groundwork for problem solving because it identifies the conflict that needs to be resolved in
the negotiation process.
Due to initial high levels of emotionality, the person in crisis is often confused about the
impact of the precipitating event. However, these are the bhooksQ used by negotiators to
resolve the crisis, and must be identified and focused upon in crisis negotiations (Dalfonzo,
2002). For example, a scenario encountered by law enforcement might involve a despondent
subject whose ex-wife recently informed him that she is planning to gain full custody of their
children and deprive him of visitation. The subject responds by barricading himself and the
children in his home, refusing to come out or release the children. The bhookQ here is
obviously the anticipated loss (of the children) which must be identified and targeted by the
negotiator. Then, by providing justification (and minimization of hostile intent) for this
behavior (e.g., bYou arent doing this to hurt your children in any way; youre doing this out
of your love and concern for them; youre trying to protect themQ), the actions of the subject
are positively reframed. This serves to alleviate internal conflict, defuse negative emotions,
and set the stage for subsequent problem solving and crisis resolution.
2.4.4. Problem solving
Once emotions are better controlled, communication has been established, and the
triggering event has been identified and discussed, the subject is more likely to be receptive to
problem solving. Problem solving is a multistep behavioral process in which the negotiator
helps the person in crisis explore alternatives and concrete solutions. Problem solving in crisis
negotiation is an adaptation of steps delineated by behavioral researchers over the past several
years: (1) defining the problem, (2) brainstorming possible solutions, (3) eliminating
unacceptable solutions, (4) choosing a solution that both the negotiator and person in crisis
finds acceptable, (5) planning the implementation, and (6) carrying out the plan (e.g.,
DZurilla & Goldfried, 1971; Goldfried & Davison, 1994).
541
Effective problem solving involves, in part, listening for distorted cognitions from the
person in crisis. Cognitive style influences an individuals perception of self and the situation.
Cognitions serve as a bfilterQ through which the world is viewed. Further, they influence a
persons reaction to events, where faulty, dysfunctional, or irrational thinking may lead to
emotional distress or even crisis. Sometimes these distortions affect the prospects for problem
solving and must be addressed by the negotiator. Illustrative is the case of a drug addict who
tries to steal a prescription drug in a pharmacy and is caught. The police are notified and
surround the building before he can escape. As a result, the subject becomes despondent and
demands to be set free or he will kill himself because he does not view going to prison as an
option. Here, the distorted thinking is the presumed assumption of only two options: going free
or to prison. In response, the negotiator offers another choice: the possibility of being sent to
drug rehabilitation rather than prison (which may or may not be a reality). Eventually, the
person surrenders without further incident. This suggestion by the negotiator redirects the
thinking of the subject, who now sees a more acceptable option.
542
the supplemental group. These skills are virtually identical to those utilized in counseling to
establish rapport and positive therapeutic relationships with clients (Evan, Hearn, Uhlemann,
& Ivey, 1989; Hersen & Van Hasselt, 1998).
3.1.1. Core active listening skills
Mirroring refers to repeating the last few words or gist of the person in crisis. It
demonstrates to the subject that the negotiator is attentive. Further, it elicits the individuals
specific concerns and problems that must be identified in the negotiation process. Using
mirroring helps to ensure that the discussion focuses on the person in crisis rather than on the
negotiator, thereby remaining in the subjects frame of reference.
Paraphrasing involves restating the content of what the subject said in the negotiators
own words. This reflects an attempt by the crisis negotiator to take the perspective of the
person in crisis. Emotional labeling identifies the emotions of the subject. Even if the
negotiator initially misidentifies an emotion, this effort at least demonstrates to the person
in crisis that the negotiator is trying to understand the situation, which tends to defuse
emotionality. Examples of emotional labeling include: bYou sound angryQ, bYou seem
frustratedQ, and bI hear frustration in your voiceQ.
Summarizing offers a restating of both the content and emotion expressed by the subject.
This provides clarification of what the person in crisis is experiencing. In addition, it further
reflects the effort of the negotiator to view the situation from the perspective of the subject.
An example of summarizing might be, bLet me make sure I understand what youre saying;
you lost your job for no apparent reason (paraphrase) and this makes you angry (labeled
emotion)Q.
543
544
Fig. 3.
saying. And it is this perception of meaning that counts most in effective crisis intervention
(whether or not the perception is based in reality). Tone reflects concern and genuineness
through inflection and pitch; it also expresses emotion, demeanor, and sincerity.
3.3. Stage 3: rapport
Until this stage of the BCSM, the relationship has been one-sided: the person in crisis has
been talking and the negotiator has been actively listening and empathetic. As empathy is
shown, rapport develops, which is characterized by increased trust and mutual affinity. Once
rapport has been developed, the person in crisis is more likely to listen to (and accept) what the
negotiator has to offer. At this stage, the negotiator, in collaboration with the subject, begins to
build themes that provide bface savingQ justifications, minimizations, or bblendingQ which serve
as precursors to ending the crisis (Dalfonzo, 2002). Themes involve contrived rationales to
545
explain, justify, mitigate, or excuse the faulty behavior; they also address distorted thinking by
positively reframing the situation. Minimization serves to downplaying negative behavior
exhibited by the person in crisis. In blending, the negotiator and subject: (a) agree where
possible without conceding, (b) reduce real or perceived differences, and (c) find common
ground. By now, the subject should be more amenable to behavior change efforts by the
negotiator.
3.4. Stage 4: influence
At this stage, a relationship has been established and the subject is willing to accept the
suggestions of the negotiator as a prelude to behavior change. In negotiator parlance, the
negotiator has bearned the rightQ to recommend a course of action to the subject as a result of
collaborative problem solving. Now, the negotiator and subject work together to identify
solutions and alternatives that are nonviolent and realistic.
3.5. Stage 5: behavioral change
Behavioral change will most likely occur only if the previous four stages have been
successfully completed. Obstacles to reaching this final stage are usually: (1) the negotiator
moving too rapidly through the stages, or (2) omitting stages in a misguided effort to end the
crisis through (premature) problem solving. Again, the key to behavior change in crisis
negotiation is achieving a positive relationship between the negotiator and subject via active
listening, empathy, rapport, and behavior influence strategies and tactics. At this final stage,
the subject will likely follow the negotiators suggestions to the extent that negotiator tasks in
the previous stages have been effectively carried out.
4. Role-playing
Role-playing has become one of the most frequently used instructional tools in law
enforcement. Illustrative of the widespread use of role-playing are results of a survey by
Sharp (2000) who found that over 80% of police agencies polled utilized them in training.
Further, 100% of respondents indicated that role-plays are valuable in a variety of exercises,
such as those conducted by SWAT and Field Force Units. In addition, role-play procedures
have been successfully employed in police recruit selection and promotion evaluations
(conducted in law enforcement assessment centers).
In recent years, role-playing has also become a mainstay in the evaluation and training of
crisis negotiation skills (see review by Van Hasselt and Romano, 2004). Indeed, the vast
majority of crisis negotiation training programs rely on role-playing to provide simulations of
real-world critical incidents. Moreover, role-plays have served as the primary vehicle for the
training of requisite negotiator competencies (e.g., active listening skills) that have been
associated with successful negotiation efforts (Greenstone, 1995; Noesner, 1992). Even online
role-plays have been proven effective in negotiation skills building (Vecchi, 2003b). bAnd
546
although direct or naturalistic observation. . .of negotiators in actual critical incidents would be
a preferred approach for assessment and modification of negotiators skill level, the seriousness
and high-risk nature of these encounters make such an approach unrealistic (and dangerous).
Therefore, role-playing is a vital dnext bestT approachQ (Van Hasselt et al., in press a, p. 4).
4.1. Role-play format
Role-playing in crisis negotiation training has taken a variety of forms. Some role-plays
have been based on actual incidents that have occurred, while others have been designed in
anticipation of situations likely to be encountered. CNU has employed a combination of roleplay scenarios in its NCNC, which provides crisis negotiation training to FBI agents and
police officers. Training incorporates role-play scenarios that are based on hostage,
barricaded, suicide, and kidnapping incidents that have taken place and required a law
enforcement response. These situations reflect CNUs direct involvement in numerous critical
incidents nationally and internationally over the past 25 years.
One set of role-play items developed by CNU consists of scenarios describing crises in
each of three categories: (1) Family-Domestic, (2) Workplace, and (3) Suicide. Sample items
from each category are provided below.
4.1.1. Family-domestic
Jim Smith has abducted his common law wife and their son from a distant state. She had
obtained a court order preventing him from seeing her or her son. She has repeatedly rejected
his efforts at reconciliation and he has stalked and harassed her in the past. He kidnapped her
and the child in the middle of the night from her parents home and drove her to an
unoccupied farmhouse nearby where he ran out of gas. Authorities located his vehicle and
then discovered them holed up in the farmhouse.
4.1.2. Workplace
John Henry is angry because the factory where he has worked for 10 years fired most of
the senior workers to reduce payroll and increase profits. He blames the factory manager for
the loss of his job. He brought a gun into his office and is threatening to kill him if he does not
get his job back. He feels he has been treated badly and not given the respect he has earned
after 10 years of hard work.
4.1.3. Suicide
Frank was a successful banker who has been living the good life. Unfortunately,
several of his investments and financial decisions have failed and he is facing financial
ruin. He feels he will bring shame to his family, his wife will leave him, and his
possessions will be taken away. He feels hopeless and helpless. He believes that killing
himself is the only way out. One of his bank employees observed him with a gun in his
office and called the police to intervene.
For training purposes, the above scenarios may include a series of pre-arranged prompts
delivered by a confederate playing the role of subject. In these cases, the role-play is
547
relatively brief, lasting anywhere from one to several minutes. Where prompts are not
provided, the scenario lasts longer, but is still much shorter than most real-world crisis
situations. However, the relatively brief format allows for frequent instructor feedback
concerning the use of targeted negotiation skills.
Scenarios of longer duration (30 min or more) provide negotiators the opportunity to apply
their skills in increasingly more realistic situations. Examples include a bank robbery gone awry,
and a domestic situation involving a barricaded husband and spouse. The NCNC carries out such
training in bHogans AlleyQ, the FBI Academys mock city that provides a variety of naturalistic
settings (e.g., hotel, drug store, apartment building) to stage critical incidents. Student
negotiation teams are provided with a scenario/incident overview, including some background
on the perpetrator and setting. Then, they are asked to make contact with the subject, and attempt
to resolve the situation peacefully using their newly acquired negotiation skills.
Still another type of role-play involves events that are several hours in duration, and thus
more like actual crisis situations. An example is an NCNC scenario in which a subject has
hijacked a school bus with children and is threatening to blow up the bus and kill everyone
inside if his demands are not met.
Finally, initial experimentation on the use of online role-plays has taken the above precepts
and applied them within a synchronized (live) chat room environment, where confederates
play persons in crisis (suicidal, violent, psychotic) and the negotiator applies the BCSM to
alleviate the crisis (Vecchi, 2003a, 2003b). Communication occurs via the written word;
emotion is portrayed through pauses (b. . .Q), punctuation (b!Q), variations of upper and lower
case letters (bGO AWAYQ or bgo awayQ), or any combination. Advantages of this training
format in which negotiations are automatically recorded verbatim, include the ability to: (1)
provide clear and frequent feedback, (2) make comparisons between training sessions to
assess the negotiators level of skill acquisition, and (3) provide specific suggestions for
improvement. Disadvantages include the variances associated with typing ability, interresponse, time delays, and the absence of visual and audio cues (Vecchi, 2003b).
4.2. Negotiation skills building
As Hatcher, Mohandie, Turner and Gelles (1998) cogently point out, bThe goal or mission
of crisis/hostage negotiation is to utilize verbal strategies to buy time and intervene so that the
emotions of the perpetrator can decrease and rationality can increaseQ (p. 455). The specific
verbal strategies used to accomplish this goal fall under the rubric of bactive listening skillsQ
discussed earlier. Consequently, these behaviors, which are critical for the establishment of
rapport between negotiator and subject in crisis situations, have been targeted in most crisis
negotiation skills training programs (Van Hasselt and Romano, 2004).
To teach these skills, training has typically employed a number of behavior change
strategies, including: (1) direct instructions concerning skills needed (e.g., active listening,
surrender instructions) in crisis situations; (2) performance feedback regarding negotiator
behaviors and skill level displayed in scenarios; (3) positive reinforcement of successive
approximations to desired negotiator responses (i.e., bshapingQ); and (4) modeling by the
trainer to demonstrate effective responses.
548
549
negotiated resolutions. And third, role-play procedures were described as one of the most
frequently employed vehicles for the evaluation and training of required crisis negotiation
skills.
Interestingly, while a voluminous body of writings has emerged concerning strategies and
issues in crisis negotiation (see Call, 1999; McMains & Mullins, 2001; Romano & McMann,
1997), most of these have been position papers, case studies, or anecdotal reports. Further,
most research in this area has involved attempts to develop typologies of hostage takers
(Kobetz, 1975; Soskis & Van Zandt, 1986; Strentz, 1986), or to determine outcomes of
hostage or barricade incidents (e.g., number of hostages/responding officers killed, wounded,
or unharmed) (Butler, Leitenberg, & Fuselier, 1993; Friedland & Merari, 1992). To date, there
is a modicum of data regarding the utility of specific negotiation approaches themselves.
Moreover, investigative efforts to prescriptively apply the most efficacious negotiation
strategies based on empirically grounded decision-making have yet to be conducted.
In an initial attempt to remedy this situation, CNU is currently carrying out a
comprehensive analysis of crisis negotiation strategies to reduce harm to a group constituting
a significant portion of negotiation call-outs: domestic violence victims (see Van Hasselt et
al., in press c). This will be accomplished through in-depth assessments of domestic violence
perpetrators who have taken a spouse, partner, and/or child(ren) hostage. Evaluations will
include: extensive assessments of a wide range of subject/background, victim, and (where
relevant) child variables, and determination of factors associated with successful or
unsuccessful crisis negotiation and resolution. It is anticipated that this analysis will yield
data that will be of crucial importance to crisis negotiators in their efforts to successfully
resolve high-risk critical incidents occurring in the home.
Another topic warranting further attention is the effectiveness of crisis negotiation skills
training programs. Van Hasselt et al. (in press b) and Vecchi (2003b) found preliminary
evidence for the potential value of such training. However, their results were based on results
of role-play assessments employed pre- and post-training. Evaluation of in vivo skill level, as
well as maintenance of trained skills over time (post-training), is clearly warranted.
There is also a need for further research in online crisis negotiation, both as a training
forum for skills building and as a possible medium for crisis intervention and negotiation. The
practical value of online skills building is evident, as it is generally more convenient and less
costly than traditional training formats. Also, preliminary evidence suggests its potential for
skills building (Vecchi, 2003b). However, data have yet to be adduced regarding its
effectiveness relative to bliveQ training. Further, there is a need for research on the feasibility
of using online crisis intervention and negotiation in real life situations. This is important in
light of the significant increase in computer usage internationally; the computer may become
a preferred method by which some individuals may actually choose to communicate.
Finally, there is a need to make BCSM and role-play strategies presently discussed
available to non-law enforcement professionals, (e.g., psychologists and mediators) since
these groups frequently deal with persons in crisis where violence potential is high. Such
training could be provided by law enforcement experts in non-law enforcement contexts, such
as crisis counseling and family mediation.
550
Acknowledgments
Preparation of this paper was supported, in part, through a Nova Southeastern University
Presidents Faculty Scholarship Award (Grant No. 338339) to the first and second authors.
The authors would like to thank Justin A. Rigsbee for his technical assistance in the
preparation of this manuscript.
Requests for reprints should be sent to Supervisory Special Agent Gregory, M. Vecchi, Crisis
Negotiation Unit, Critical Incident Response Group, FBI Academy, Quantico, VA 22135.
References
Butler, W. M., Leitenberg, H., & Fuselier, G. D. (1993). The use of mental health professional consultants to
police hostage negotiation teams. Behavioral Sciences & the Law, 11, 213 221.
Call, J. A. (1999). The hostage triad: Takers, victims, and negotiators. In H. V. Hall (Ed.), Lethal violence: A
sourcebook on fatal domestic, acquaintance, and stranger violence. Boca Raton, FL7 CRC Press.
Caplan, G. (1961). An approach to community mental health. New York7 Grune & Stratton.
Carkhuff, R. R., & Berenson, B. G. (1977). Beyond counseling and therapy (2nd ed.). New York7 Holt, Rinehart,
& Winston.
Dalfonzo, V. (2002). National crisis negotiation course. Quantico, VA7 FBI Academy.
DZurilla, T. J., & Goldfried, M. R. (1971). Problem solving and behavior modification. Journal of Abnormal
Psychology, 78, 102 126.
Evans, D. R., Hearn, M. T., Uhlemann, M. R., & Ivey, A. E. (1989). Essential interviewing: A programmed
approach to affective communication. Pacific Grove, CA7 Brooks/Cole.
Fisher, R., Ury, W., & Patton, B. (1991). Getting to yes: Negotiating agreement without giving in (2nd ed.).
New York7 Penguin.
Friedland, N., & Merari, A. (1992). Hostage events: Descriptive profile and analysis of outcomes. Journal of
Applied Social Psychology, 22, 134 156.
Flood, J. J. (2003). Hostage barricade database (HOBAS). Quantico, VA7 FBI Academy.
Greenstone, J. L. (1995). Hostage negotiation team training for small police departments. In M. I. Kurke, & E. M.
Scrivner (Eds.), Police psychology into the 21st century. Hillsdale, NJ7 Lawrence Erlbaum.
Goldfried, M. R., & Davison, G. C. (1994). Clinical behavior therapy. New York7 Wiley.
Hammer, M. R., & Rogan, R. G. (1997). Negotiation models in crisis situations: The value of a communication
based approach. In R. G. Rogan, M. R. Hammer, & C. R. Van Zandt (Eds.), Dynamic processes of crisis
negotiation: Theory, research, and practice (pp. 9 23). Westport, CT7 Praeger.
Hatcher, C., Mohandie, K., Turner, J., & Gelles, M. G. (1998). The role of the psychologist in crisis/hostage
negotiations. Behavioral Sciences & the Law, 16, 455 472.
Hersen, M., & Van Hasselt, V. B. (Eds.), (1998). Basic interviewing: A practical guide for counselors and
clinicians. Mahwah, NJ7 Erlbaum.
James, R. K., & Gilliland, B. E. (2001). Crisis intervention strategies (4th ed.). Stamford, CT7 Brooks/Cole.
Jones, T. L. (1996). SWAT leadership and tactical planning: The SWAT operators guide to combat law
enforcement. Boulder, CO7 Paladin Press.
Kaiser, N. F. (1990). The tactical incident: A total police response. FBI Law Enforcement Bulletin, 59, 14 18.
Kobetz, R. W. (1975). Hostage incidents: The new police priority. The Police Chief, 32 35.
Lanceley, F. J. (1999). On-scene guide for crisis negotiators. Boca Raton, FL7 CRC Press.
Marino, T. W. (1995). Crisis counseling: Helping normal people cope with abnormal situations. Counseling Today,
38, 25 40.
McGeorge, H. J. (1983). Plan carefully, rehearse thoroughly, execute violently: The tactical response to hostage
situations. World Affairs, 146, 59 68.
551
Mehrabian, A., & Epstein, N. (1972). A manual of emotional empathy. Journal of Personality, 40, 525 543.
McMains, M. J., & Mullins, W. C. (2001). Crisis negotiations: Managing critical incidents and hostage situations
in law enforcement and corrections (2nd ed.). Cincinnati, OH7 Anderson Publishing. ISBN: 1-58360-513-4.
Mijares, T. C., McCarthy, R. M., & Perkins, D. B. (2000). The management of police specialized tactical units.
Springfield, IL7 Charles C. Thomas.
Noesner, G. W. (1992). First responder negotiation training. FBI Law Enforcement Bulletin, 61, 101 104.
Noesner, G. W., & Webster, M. (1997). Crisis intervention: Using active listening skills in negotiations. FBI Law
Enforcement Bulletin, 66, 13 18.
Roberts, A. R. (2000). An overview of crisis theory and crisis intervention. In A. R. Roberts (Ed.), Crisis
intervention handbook (2nd ed.). New York7 Oxford University Press.
Rogan, R. G. (1997). Emotion and emotional expression in crisis negotiation. In R. G. Rogan, M. R. Hammer, &
C. R. Van Zandt (Eds.), Dynamic processes of crisis negotiation: Theory, research, and practice (pp. 25 43).
Westport, CT7 Praeger.
Rogan, R. G., Hammer, M. R., & Van Zandt, C. R. (Eds.), (1997). Dynamic processes of crisis negotiation:
Theory, research, and practice. Westport, CT7 Praeger.
Romano, S. J. (2002). Personal communication. Crisis Negotiation Unit, Critical Incident Response Group.
Quantico, VA7 FBI Academy.
Romano, S. J., & McMann, M. F. (Eds.), (1997). Crisis negotiations: A compendium. Crisis Negotiation Unit,
Critical Incident Response Group. Quantico, VA7 FBI Academy.
Rosenbluh, E. S. (2001). Police crisis intervention: A dilemma in the aftermath of Columbine High School.
Journal of Police Crisis Negotiations, 1(1), 35 46.
Sharp, A. G. (2000). The importance of role-playing in training. Law and Order: The Magazine for Police
Management, 48, 97 100.
Soskis, D. A., & Van Zandt, C. R. (1986). Hostage negotiation: Law enforcements most effective nonlethal
weapon. Behavioral Sciences & the Law, 4, 423 435.
Strentz, T. (1986). Negotiating with the hostage-taker exhibiting paranoid-schizophrenic symptoms. Journal of
Police Science and Administration, 14, 12 17.
Van Hasselt, V. B., Baker, M. T., Dalfonzo, V. A., Romano, S. J., Schlessinger, K. M., Zucker, M., & et al.
(in press a). Crisis (hostage) negotiation training: A preliminary evaluation of program efficacy. Criminal
Justice and Behavior.
Van Hasselt, V. B., Baker, M. T., Romano, S. J., Sellers, A. H., Noesner, G. W., & Smith, S. (in press b).
Development and validation of a role play test for assessing crisis (hostage) negotiation skills. Criminal Justice
and Behavior.
Van Hasselt, V. B., Flood, J. J., Romano, S. J., Vecchi, G. M., de Fabrique, N., & Regini, C. (in press c). Hostagetaking in the context of domestic violence: Some case examples. Journal of Family Violence.
Van Hasselt, V. B., & Romano, S. J. (2004). Role playing: A vital tool in crisis negotiation skills training. FBI Law
Enforcement Bulletin, 73, 12 21.
Vecchi, G. M. (2002). Hostage/barricade management: A hidden conflict within law enforcement. FBI Law
Enforcement Bulletin, 71, 1 6.
Vecchi, G. M. (2003a). Active listening: The key to effective crisis negotiation. ACR Crisis Negotiation News, 1,
4 6.
Vecchi, G. M. (2003b). Crisis negotiation: Skills building in an online environment. Unpublished Manuscript.
Fort Lauderdale, FL: Nova Southeastern University.
Webster, M. (1998a). Active listening and beyond: Compliance strategies in crisis negotiation. Unpublished
manuscript. British Columbia: Centurion Consulting Services.
Webster, M. (1998b). Active listening and beyond: Problem solving in crisis negotiation. Unpublished manuscript.
British Columbia: Centurion Consulting Services.
Wilmot, W. W., & Hocker, J. L. (1998). Interpersonal conflict (5th ed.). Boston7 McGraw-Hill.
Womack, D. F., & Walsh, K. (1997). A three-dimensional model of relationship development in hostage
negotiations. In R. G. Rogan, M. R. Hammer, & C. R. Van Zandt (Eds.), Dynamic processes of crisis negotiation:
Theory, research, and practice. Westport, CT7 Praeger.
Abstract
The first part of the study presents the contextual and conceptual novelty
elements concerning human resources on which this human resource management
approach relies. The conceptual novelty element is represented by the comprehensive
approach of human resource management (MRU), focused on the relationships of the
organisation with internal and external human stakeholders, not limiting to the
traditional approach, managers subordonees.
The second part of the paper makes a selection of methods and techniques
used in human resource management, grouped on the 14 activities specific to MRU.
This ensures a coherent and effective methodological basis for human resource
managers and specialists, in agreement with the challenges of the current period of
transition to knowledge-based economy.
The last part of the study indicates the methods and the techniques
recommended to be used in particular during the eight stages of human resource
reengineering.
Preliminary Considerations
awareness for the decisive impact that human resources have on the
Career Development
10
Human Resources
Promotion
11
Relationships with
Special Stakeholders
12
Human Resource
Motivation
13
Human Resources
Labour and Social
Protection
14
Organisation Culture
Modelling
Human Resource
Training and Re-Training 6
Employees Integration 5
Human Resource
Recruitment and
Selection
Human Resource
Forecasting
Determining the
Requirements for Human 2
Resources
Human Nature Elements 1
of Managers Work
HUMAN RESOURCE
MANAGEMENT
subsYstem
15
Determining the
eficacity and eficiency
of MRU in organisation
Activity
Determining
the requirements
for human
resources
jobs analysis
workday tasks analysis
instantaneous observation
time recording
workday shooting
standard administrative times
work standards determination
the scenario
extrapolation
the correlation coefficient
physical and/or value work productivity
the critical incidents method
the dynamics of the size and structure of market demand
for the companys products
the dynamics of the size and structure of market offer for
the companys products
the forecasts on companys branch of activity
the forecasts on the evolution of national economy
the dynamics of the companys turnover
the dynamics of the production
productivity dynamics
trends analysis
the regression method
the Delphi method
the business plan
Forecasting
the requirements
for human
resources
Curren
t No.
Activity
Recruiting
and selecting
human resources
Integrating
employees
Training human
resources
Curren
t No.
Activity
Communicating
with human
resources
Human resource
assessment
Curren
t No.
Activity
Career
development
Human resource
promotion
10
Relationships
with special
stakeholders
11
Motivating
human resources
The methods and the techniques specified for human resource training and re-training activities are
quasi-totally added hereto.
Curren
t No.
Activity
12
Human resource
labour and social
protection
13
Modelling the
organisational
culture*
This includes also the quasi-totality of the methods, techniques and procedures for training,
promoting and motivating human resources.
Review of International Comparative Management
11
Curren
t No.
14
Activity
The efficiency
of using human
resources
The use of specific human resource management methods and techniques in the human resource management subsystem redesign stages
Table 2
Stages
Current
no.
Method
or technique
0
1
2
3
1
Job analysis
Job description
Workday tasks
analysis
Instantaneous
observation
Work standards
The scenario
technique
Work
productivity
Turnover
dynamics
Physical
production
dynamics
Trends analysis
Investment value
per workplace
Investment value
for the following
4
5
6
7
8
9
10
11
12
Clearly
Elaborating
Assessing the
establishing Elaborating Analysing Designing the
the specific
Implementing
Outlining
functionality
objectives
the
the human
human
programme for
the human
the
and the
to reach subsystem resource
resource implementing the
resource
design
performances
and the
redesign management management human resource management
team
of the new
scope of the programme subsystem subsystem
management
subsystem
subsystem
project
project
1
2
3
4
5
6
7
8
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
13
Current
no.
Method
or technique
1
period
The Delphi
method
Gantt Chart
Business plan
Knowledge tests
Skills tests
Qualities tests
Personality tests
Case study
Interview
Questionnaire
C.V.
Organisation and
operation
handbook
Internal
regulation
Organigram
Training
programme
Re-qualification
programme
Specialisation
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Stages
Clearly
Elaborating
Assessing the
establishing Elaborating Analysing Designing the
the specific
Implementing
Outlining
functionality
objectives
the
the human
human
programme for
the human
the
and the
to reach subsystem resource
resource implementing the
resource
design
performances
and the
redesign management management human resource management
team
of the new
scope of the programme subsystem subsystem
management
subsystem
subsystem
project
project
1
2
3
4
5
6
7
8
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Current
no.
Method
or technique
1
training
Job rotation
Quality circle
Managerial
simulation
Managerial game
Information
seminar
Sites specialised
on human
resource
management
Professional
conferences,
congresses etc.
Tutoring
Coaching
Mentoring
Meeting
E-mail
Written
communication
Balanced
scorecard
30
31
32
33
34
35
36
37
38
39
40
41
42
43
Stages
Clearly
Elaborating
Assessing the
establishing Elaborating Analysing Designing the
the specific
Implementing
Outlining
functionality
objectives
the
the human
human
programme for
the human
the
and the
to reach subsystem resource
resource implementing the
resource
design
performances
and the
redesign management management human resource management
team
of the new
scope of the programme subsystem subsystem
management
subsystem
subsystem
project
project
1
2
3
4
5
6
7
8
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
15
Current
no.
Method
or technique
0
44
45
1
3600 assessment
Management by
objectives
Checklist
Career plan
List of jobs
Job description
Informing
stakeholders on
special events in
the organisation
Listen and
answer technique
Verbal feedback
Job extension
Job enhancement
Salary
Bonus
Profit sharing
Verbal and/or
written thanks
Praise
Critics
Performers
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
Stages
Clearly
Elaborating
Assessing the
establishing Elaborating Analysing Designing the
the specific
Implementing
Outlining
functionality
objectives
the
the human
human
programme for
the human
the
and the
to reach subsystem resource
resource implementing the
resource
design
performances
and the
redesign management management human resource management
team
of the new
scope of the programme subsystem subsystem
management
subsystem
subsystem
project
project
1
2
3
4
5
6
7
8
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Current
no.
Method
or technique
1
panel
Labour
protection
regulations
Organisational
culture audit
Organisational
transformation
Remythologisation
Formal
organisational
norms
The Schein
model
The Lundberg
model
Salary costs for
1000 lei turnover
Labor costs for
1000 lei turnover
Average profit
per employee
Companys share
value
62
63
64
65
66
67
68
69
70
71
72
Stages
Clearly
Elaborating
Assessing the
establishing Elaborating Analysing Designing the
the specific
Implementing
Outlining
functionality
objectives
the
the human
human
programme for
the human
the
and the
to reach subsystem resource
resource implementing the
resource
design
performances
and the
redesign management management human resource management
team
of the new
scope of the programme subsystem subsystem
management
subsystem
subsystem
project
project
1
2
3
4
5
6
7
8
x
x
x
x
x
x
x
x
x
x
17
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
AB O U T IC C
The International Coaching
Community is one of the largest
professional membership
organizations for coaches in the
world with over 6000 coaches in 60
countries.
1 . E X E C U TIV E S UM MAR Y
The Lambent coaching methodology is being used by ICC to deliver over one hundred trainings a year in
over thirty countries.
It has been used to train over six thousand people in sixty countries since 2001. It is structured and
delivered using principles of Andragogy (Adult learning principles) that engage, motivate and efficiently pass
knowledge and skills to adult learners.
The Lambent International Coaching Certification Training certified by the ICC at their level one, has been
independently evaluated according to University Standards. It has been awarded a European Quality Award
(EQA) in 2010 by the European Coaching and Mentoring Association. (EMCC)
It therefore also meets the requirements of the International Coach Federation (ICF) ACC Portfolio path.
The structure and content of the Lambent course is designed to give the students knowledge, skill and self
development. It is applicable to business people at every level.
The method is an integrated framework from the following main coaching models:
The method is suitable to develop executives and for executives to use to develop others.
info@internationalcoachingcommunity.com
2 . I NT E R NA TI O N AL C O A CH IN G COM M UN IT Y
The Lambent coaching methodology is international. It is used exclusively by the International Coaching
Community (ICC). The ICC is one of the largest professional membership organisations for coaches in the
world. It was established in 2001 and is a Not for Profit company registered in London UK. It has trained
over 6000 coaches in 60 countries since 2001 using Lambent methodology. There are currently 34 trainers
worldwide training with this methodology.
Please see www.internationalcoachingcommunity.com
3 . TH EO RETICA L B AC KG RO U ND
The methodology follows the three foundational knowledge traditions of coaching.
1
a) Humanistic psychology and the works of Abram Maslow and Carl Rogers .
The main principles of Humanistic Psychology are:
- People have a valid experience of their own values and goals.
- People want to be the best they can be.
- Everyone is unique and valuable.
- Everyone wants to have a choice and to exercise choice.
These are basic principles of all schools of coaching.
b) Constructivism
3
This viewpoint comes from Cybernetics and the works of Heinz von Foerster
Constructivism developed the idea that we help create the world we live in. Our perception of reality is as
much a construct of our minds as what is in the world outside us. Therefore coaching needs to discover the
world the client is constructing and not try to give them a right answer.
c) Linguistics
People describe the world and themselves in language, and the structure of language shapes their thinking
and limits it. Coaching takes into account how the language the client uses is a clue to how they are thinking
about their issue.
The Lambent methodology is an integrated model, based on sound theoretical foundations and developed
from many further lines of thinking:
Ontological coaching. Ontological coaching focuses on the clients way of being, the dynamic
interaction of the clients language, emotions and physiology. There is a strong emphasis on
listening, language patterns and emotions expressed in physiology. Lambent methodology takes
these dimensions into account; the client is a whole person, mind, heart and spirit. The principles
4
5
of Ontological coaching are taken mainly from the writings of James Flaherty Fernando Flores
6
and Rafael Echeverria .
info@internationalcoachingcommunity com
Integral studies. This rapidly developing field of transpersonal psychology has been pioneered
7
by the writings of the United States Philosopher, Ken Wilber . The integral model uses a number
of different perspectives to gain as full an understanding of a situation as possible. It looks at lines
of development, states of mind, types of psychology, and stages of development. It uses interior
and exterior, individual and collective perspectives. Perspectives are an important part of
Lambent methodology and Integral studies provide some very useful ones.
Inner Game and Co active coaching. The Inner game methodology was very important in the
1
development of coaching. Pioneered by Timothy Gallwey , it focused on defeating your inner
1
opponent to become your best. The method was brought to Europe by Sir John Whitmore .
Coactive Coaching is a model originally also developed in the United States, by Laura
1
Whitworth . The four principles are that the client is naturally creative, resourceful and whole,
coaching addresses the clients whole life, the client sets the agenda and the coaching
relationship is a partnership. Coactive coaching also places emphasis on the coachs intuition as
a coaching tool.
Positive Psychology. This follows Abram Maslows ideas of self actualisation. The approach has
1
been used in the United States and developed by Martin Seligman . Positive psychology
concentrates on mental well being and researches positive emotions and what people can do to
build more of them into their life. Hope and Optimism as character traits are seen as very
important. This has led to a school of coaching known as Authentic Happiness Coaching.
Behavioural Coaching. This model focuses on external behaviour rather than inner goals and
seeks sustainable measurable changes in behaviour. It is mostly applied in a business context.
Lambent methodology recognises the importance of measurable results for individuals; teams
and organisations so the impact of coaching can be evaluated from different aspects. Coaching
changes thinking and emotions and this leads to behavioural change. Behavioural Coaching has
1
been primarily developed by Perry Zeus and Suzanna Skiffington in Australia
Lambent methodology also follows the principles of Evidence based coaching , defined as:
Intelligent and conscientious use of best current knowledge integrated with practitioner expertise
in making decisions about how to deliver coaching to individual coaching clients and in
designing and teaching coach training programs.
The designers of Lambent methodology, Andrea Lages and Joseph OConnor have written two
1
1
books on Coaching . Their second book, How Coaching Works , was nominated for the
Financial Times best Business Book of the Year in 2007.
Over 6000 coaches in 60 countries since 2001 using Lambent methodology. There are currently 34 trainers
worldwide training with this methodology.
info@internationalcoachingcommunity.com
4 . M E TH O DO LOG Y A ND S T R UC TU R E
Adults are autonomous and self-directed. They want to be free to direct their own learning.
Trainers need to be like facilitators, and guide participants to their own knowledge rather
than supplying them with facts.
Adults need to connect learning to their knowledge and life experience. Adults learn best
when their relevant experience and knowledge of the topic is drawn out and utilised and
theories and concepts relate to that experience.
Adults are goal-oriented. So trainers need to show participants how the training will help
them attain their goals.
Adults need to see learning as applicable to their work or other responsibilities to be of value
to them.
Adults are practical, focusing on the aspects of a lesson most useful to them in their work.
Adults need to be respected.
1
Adult learning follows the Kolb learning cycle of Experience, Reflection, Conceptualisation
and Testing.
The structure of the Lambent coaching course and the way it is trained follows these important principles.
All our trainers are highly experienced and trained specifically in the Lambent methodology and approach.
E X E C U TI V E C O A CH IN G
Executive coaching is a very important application of coaching. Coaching executives to make better
decisions, work better with teams and clarify their goals and values, is an enormous help and can have
great impact on themselves their team and the business. This impact can be measured financially. The
focus on coaching executives is to develop their authentic leadership so they can be their best, and develop
other leaders in the organisation. There is a balance between the business approach where coaching
objectives need to be aligned with organisational and business goals, and coaching the executive as a
unique individual, respecting his or her strengths and developing his or her potential. The Lambent
methodology is well developed to do this in an efficient and effective way.
__________________________________________________________________________________
1
info@internationalcoachingcommunity.com
6oo
}lospjital-(ornell AMwlicwal
.se2SaMCIENTIFIC
60o
C(N11U\NIST M ETHODS
Bvyzantine Heritage
1Pth Century
IET-l'OD)S
1. U nrestricte(d Autocracy
2. Internal Intrigue & Fs')ionage
1.
only to Czar
2. Central Control of all Aspects of the State
3. Purges
1,7th-18th Century
19th Century
20th Centurv
Cheka.
1.
2.
3.
4.
()GPtU-NKVD1)-.I 1VJ)
1. Purges
2. Puhlic Trials
(KGB)
:.. POWNV
Chinese
System
1.
Group Pressures
Group Criticism
(Applied to Non-Party Personnel & to Prisoners)
2. Self &
3. Prisoner Indoctrination
IR ote Learning
Autobiography and WiaryWriting
60
COMMUNIST AIETHODS
60 3
7. Therefore:
Anyone arrested by "KGB" is a Criminal
COMINIUNIST
METHODS
COMNS
MEHD
6 00 5
TABLE IV. A TYPICAL TIME TABLEEASTERN EUROPEAN SECRET POLICE SYSTEMS (COMMUNIST)
I Veeks
Steps
Reaction of Prisoner
1. Suspicion
2. Accumiulation of Evidence
Surveillance
12eports of Informers
Seizure of Associates
:3. Seizure
4. Detention
1'
it
0
G
it
E
6
I2 igid Regimen
I
S
Increasing Pressure
0
I'
A
T
1
()
I
N
'1'
1',E
It
it
(.
I
V
E
I)
I
S
0
it
G
A
G
A
I
0
N
N
I
z
A
T
I
7. Deposition
N
11
12
Suspense
Awareness of Being Avoided
Feelings of Unfocused Guilt
Fear aind Uncertainty
Bewildernient
Hyperactivity
!,.
10
Anxiety
Diminishing Activity
Increasing Depression
Fatigue (Pain)
Humiliation, Loss of Self Esteemat
Filth, Mental Dulling
] )espair
Frustration Tolerance
Greatly Reduced
Great Need to Talk
Utter Dependence on Anyone
who "Befriends"
.Much More Pliable
Great Need for Approval
of Interrogator
Repeatedly Frustrated
by Interrogator's Refusal to
Accept Statements, and
by Interrogator's Alternating
"Help" and Withdrawal of
Approval
Increased Suggestibility
Confabulation
Rationalization
Profound Relief
8. Respite
9. Trial "Confession"
10. P'unishment
effect of this is not necessarily planned by the police, but it is imin setting the stage for the reaction of the prisoner to his
experiences during imprisonment. This usually begins with a dramatic
seizure, often at night, which is classically followed by a period in
portant
complete
isolation in
detention
prison.
6o6
Sonmetiines
Excessively Salty
6. Elimination: Slo0) Jar in CellRllemove(d for Infrac( tionis Th'le reafter, Ta'ken
to Latrine only at Pleasure of the Guard
7. Temperature: May I)e Hot, or Cold and
D)anip
8. Pain May Result from Fixed Positions During Sleep and When Awake
COMMU\I
,NIST NAIETlHODS5
COiINS
MEHD
6 00 7
Fear, Incertainty
I to 3 D)avs
:3 to 10() I)a s
Activitv. Inereasing
I)ecreasinior, Repetitive Aets. Intense
:3 to 6 Weeks
6o8
TABLE: VII.
Begin:
Carriedl Ot:
lasts:
Stage I:
Stage II:
L.
In('recasinglv Stuggestible.
Stage III:
Stage I V:
Stage V:
CONINIUNIST NIETHODS
\IF'I'HOI)S
(0i\L\IL'NISI'
6o9
609
I ()
AWOLFF
2
3$
4S
5
17
2()
sleps
Anxiety
1. SuSi)icion
!2.
Criticism Sessions
Restrictions anid Annoyance by Police.
V
:3. Seizure under Dramuatic Circurnstances. Initial InterrogaA
1
tion by 3 "Judges"
t
4. House Arrest
1
5. SmIdden ltratsfer to Detentiont
IPrison. Isolation Resembling
'lo KGB Procedure
j
Revileda
I luulilialted
1
of Background
Attitudes
Because
8n
Brutalized
Public Self- an(l Group Criticism
1)ia ry and Autobiography Writing
Interrogators
24
7. Preparation of "Confession"
(Some Fellow i'risoners Sincerely helpSome Respite front Pressures
To
,ator
10)0
Reaction of Prisoner
Suspense
of Being
and
Awareness
Avoided
Feelings of Unfocused
Guilt
Fear, Cotuplete UncertaintY as to Fate
Reaction like that of
KGB Prisoner, Leaving
Subject Feeling Defeate(d, Humiliated, Mentally Dull, Pliable and
with Great Need for
Talk and Approval
Enmotional Nakedness
Unfocused Feelings of
Guilt and Unworthiness
I Ielpless, Degraded
Iio)eful, Rationalizes,
'I'ltankfuml for Kindness
an(1
Help and May
Acknowledge Apparent
Alternating Hopefulness,
Frustration and Degradlation
years.)
'to
Rationalization, and1
'Tentative Partial Belief is Able to Conformu
an(d Obtain Group Acceptance and Approval
l'rofound R~elief
By
Cotmmunist Materials
250
Gradual Readjustment of
Attitudes and Behavior
to the New Realitv
Situation
6 I 2
L. E.
HINKLE',
JR. AND H.
G. WVOLFF
well organized as that of the KGB. Some were detained for a time
under "house arrest" in their own homes, in rooms fitted up as prisons,
and guarded by police.
It is not uncommon that several "depositions" or "confessions" are
obtained from a prisoner of the Chinese, and usually one of these is
obtained from him early in his imprisonment. The most important
point at which the Chinese prison routine differs from that of the
Russians lies in the fact that the preparation of a proper deposition is
not necessarily the prelude to a "trial" and punishment. The prisoner,
even if he has already "confessed", usually finds himself transferred to a
group cell with about eight other prisoners, where he undergoes a
prolonged process of indoctrination, which may last for as many as
five years. The atmosphere within such a group cell, and the interaction of the prisoners with each other and with the various interrogators, has been ably described by Dr. Lifton.2 Disorganization and
demoralization of the prisoners in these cells are produced by the pressures of fellow prisoners, and by their rejection, humiiliation, and even
outright torture of each other, in an atmosphere in which they feel
totally without privacy, while at the same time utterly alone. Sooner or
later most prisoners under such pressure develop reaction patterns similar to those which occur in KGB prisoners, accompanied by a
depressive and fearful mood. Sometimes they attempt suicide.
The same sort of rationalization is offered to the Chinese prisoner
as a wvay out of an impossible situation. This rationalization is implicit
in the behavior and statements of the other prisoners, who make it clear
that only by proper cooperation with the interrogators, by the preparation of a proper confession, by the exhibition of suitable remorse about
his past behavior, and by the enthusiastic acceptance of the "new way
of life" offered to him, will the new prisoner ever escape the intolerable pressures of the situation. WVhen a prisoner achieves the necessary
rationalization, wulhen the pressures upon him are lifted, and when he
is finally accepted by the group, he usually has an exhilarating sense
of relief that may have the characteristics of a religious conversion. But
this is not necessarily the end of his imprisonment. He may recant some
portion of his confession at a later date and may have to go through
the whole procedure again several times before he is finally released.
All of this is carried out in an atmosphere in which the prisoner
group is totally isolated from contact with the outside world. They are
Bull. N. Y. Acad. Med.
CO.NIIUNIST NIETHODS
METHODS
6I 3
6i
6I4
The report from which these conclusions were taken was prepared
in January I956. In the year since that time new events have occurred
in Hungary and Poland, accompanied by the release of many former
political prisoners. The Soviet Union is said to have withdrawn from
the state police the right of summary execution, and recently it has
announced that state police cases will be tried in the regular courts
rather than in "military tribunals". However, all of the evidence which
we have received is in support of the conclusions stated above, and we
have received none which would lead us to alter them. The present
curbs upon the State Police in Russia and the restriction of their activities will very probably be temporary, like the many other transient
Bull. N. Y. Acad. Med.
COMMUNIST
6I
M ETrHODS
reforms of this system that have taken place in the past. From a clinical
point of viewer they can be looked upon as a remission of a chronic
disease that is almost certain to be followed by a serious exacerbation in
the future.
R EF E R E N C E S
Psglchiatry
1IB LIO
It :173-9.5, 19.56.
R A P II Y
Presentation by
Dapzury Valenzuela
Pallavi Shrivastava
Definitions
Aspects of Qualitative
Research Interviews.
Types of Interviews
Cont.
Telephone Interview
Telephone interviews enable a researcher to gather
information rapidly.
Like personal interviews, they allow for some personal
contact between the interviewer and the respondent.
Disadvantages:
Since the interviewer can control the quality of the result his/her
training becomes crucial.
Interviewer Bias
Clear - simple, easy and short questions which are spoken distinctly and
understandably.
Steering - to control the course of the interview to avoid digressions from the topic.
Sequence of Questions
Before asking about controversial matters, first ask about some facts.
Ask questions about the present before questions about the past
or future.
Encourage responses.
Convergent Interviewing
as Action Research
During the review session you also plan the questions which will
give a better understanding of the situation.
Cont.
There are two types of overlap in the themes
and two corresponding types of probes:
Probes become more specific, each interview begins with a very openended question.
Southern Cross University and the Southern Cross Institute of Action Research (SCIAR)
Bibliography
Campion, M.A., Campion, J.E., & Hudson, J.P., Jr. Structured Interviewing: A Note on Incremental
Validity and Alternative Question Types, Journal of Applied Psychology, 79, 998-1002, 1994
Dick, Bob. Convergent Interviewing. Sessions 8 of Areol-Action Research and Evaluation, Southern
Cross University, 2002
Foddy, William. Constructing Questions for Interviews, Cambridge University Press, 1993
General Accounting Office. Using Structured Interviewing Techniques. Program Evaluation and
Methodology Division, Washington D.C., 1991
Groat, Linda & Wang, David. Architectural Research Methods, John Wiley & Sons, Inc
Hollowitz, J. & Wilson, C.E. Structured Interviewing in Volunteer Selection. Journal of Applied
Communication Research, 21, 41-52, 1993
Kvale, Steinar. Interviews An Introduction to Qualitative Research Interviewing, Sage Publications, 1996
McNamara, Carter, PhD. General Guidelines for Conducting Interviews, Minnesota, 1999
Pawlas, G.E. The Structured Interview: Three Dozen Questions to Ask Prospective Teachers, NASSP
Bulletin, 79, 62-65, 1995
Trochim, William, M.K. Types of Surveys, Research Methods Knowledge Base, 2002
Watts, G.E. Effective Strategies in Selecting Quality Faculty, Paper presented at the International
Conference for Community College Chairs, Deans, & Other Instructional Leaders, Phx, AZ, 1993
MCWP 2-14
(Coordinating Draft -- 7 Oct 98)
COUNTERINTELLIGENCE
Marine Corps Doctrinal Publication 2, Intelligence, and Marine Corps Warfighting Publication
(MCWP) 2-1, Intelligence Operations, provide the doctrine and higher order tactics, techniques, and
procedures for intelligence operations. MCWP 2-14, Counterintelligence, complements and expands
upon this information by detailing doctrine, tactics, techniques, and procedures for the conduct of
counterintelligence operations in support of the Marine Air-Ground Task Force (MAGTF). The
primary target audience of this publication is intelligence personnel responsible for the planning and
execution of counterintelligence operations. Personnel who provide support to counterintelligence or
who use the results from these operations should also read this publication.
MCWP 2-14 describes aspects of counterintelligence operations including doctrinal fundamentals,
equipment, command and control, communications and information systems support, planning,
execution, security, and training. MCWP 2-14 provides the information needed by Marines to
understand, plan, and execute counterintelligence operations in support of the Marine Air-Ground Task
Force across the spectrum of conflict.
MCWP 2-14 supersedes FMFM 3-25, Counterintelligence, dated 22 September 1992.
Reviewed and approved this date.
BY DIRECTION OF THE COMMANDANT OF THE MARINE CORPS
JOHN E. RHODES
Lieutenant General, U.S. Marine Corps
Commanding General
Marine Corps Combat Development Command
Table of Contents
Page
3
4 Chapter 1.
5
6
7
8
9
10
11
1001
1002
1003
1004
1005
1006
1007
12 Chapter 2.
13
14
15
16
17
2001
2002
2003
2004
18 Chapter 3.
19
20
21
22
23
24
25
26
27
3001
3002
3003
3004
3005
3006
3007
3008
3009
28 Chapter 4.
29
30
31
32
33
4001
4002
4003
4004
Doctrinal Fundamentals
Introduction
Objective
Basis for CI Activities
Concepts of CI and Force Protection
MAGTF Counterintelligence OperationsOverview
Counterintelligence Measures
Counterintelligence Support to Operations
1-1
2-1
3-1
Counterintelligence Employment
Operational Environment
Employment of Counterintelligence Elements
Friendly Prisoners of War and Persons Missing (Non-Hostile)
and Missing in Action
Counterintelligence Support during Military Operations Other
TOC-1
4-1
Than War
2 Chapter 5.
3
4
5
6
7
8
9
5001
5002
5003
5004
5005
10 Chapter 6.
11
12
13
14
15
16
6001
6002
6003
6004
6005
17 Chapter 7.
18
19
20
21
22
23
24
25
26
27
28
29
30
31
7001
7002
7003
7004
7005
7006
7007
7008
7009
7010
7011
32 Chapter 8.
33
34
8001
8002
General
Basic Counterintelligence CIS Requirements
Command and Control
Communications and Information Systems Support to MAGTF
Counterintelligence Operations
Counterintelligence CIS Planning Considerations
5-1
Counterintelligence Planning
Marine Corps Planning Process and Joint Planning Process
Overview
Counterintelligence Planning
Counterintelligence Planning and the Intelligence Cycle
Counterintelligence Planning Requirements and Considerations
Counterintelligence Plans and Orders
6-1
7-1
Counterintelligence Training
General
Basic Counterintelligence and Security Training for All
TOC-2
8-1
8003
8004
8005
8006
8007
7 Chapter 9.
8
9
10
11
12
9001
9002
9003
9004
9005
13 Chapter 10.
14
15
16
17
18
10001
10002
10003
10004
10005
Personnel
Training for Officers and Staff Noncommissioned Officers
Mission-Oriented Training
Training of Intelligence Section Personnel
Peacetime Counterintelligence Training
Counterintelligence Training Programs
Counterintelligence Administration
General
Files
Reports
Personnel
Emergency and Extraordinary Expense Funds
9-1
10-1
Glossary
Counterintelligence Principal and Supporting Equipment
Counterintelligence Operations Appendix
Counterintelligence Analysis and Production
Counterintelligence Plans, Reports and Other Formats
Counterintelligence Training Courses
MAGTF Counterintelligence Planning Checklist
References
A-1
B-1
C-1
D-1
E-1
F-1
G-1
H-1
19 Appendices
20
21
22
23
24
25
26
27
A
B
C
D
E
F
G
H
28 Figures
29
30
31
32
33
34
35
1-1
2-1
2-2
3-1
3-2
3-3
5-1
5-2
6-1
6-2
6-3
6-4
6-5
6-6
6-7
6-8
7-1
7-2
7-3
7-4
B-1
D-1
D-2
D-3
D-4
D-5
D-6
D-7
D-8
D-9
D-10
Counterintelligence Architecture
Counterintelligence Elements Within the MAGTF Command
Element Combat Intelligence Center
The Marine Corps Planning Process (MCPP)
The MCPP and the Joint Deliberate Planning Process
The MCPP and the Joint Crisis Action Planning Process
Functions of the Planning and Direction Phase
Application of the Intelligence Cycle
Counter-HUMINT Operations
Counter-SIGINT Operations
Counterintelligence Threat Assessment
Example of a Checkpoint
Example of a Community Cordon and Search Operation
Example of a Community Collection Screening Station
Captive/Document/Equipment Tag
CI/HUMINT Automated Tool Set (CHATS)
Time Event Chart
Association Matrix
Activities Matrix
Link Diagram
Systems Component Quick Reference Matrix
C-SIGINT Threat Assessment Process
MAGTF Vulnerability Assessment Process
Friendly Unit Communications-Electronics Profile
Example of a Unit EEFI Statement
Vulnerability Matrix Format
TOC-4
CHAPTER 2
3
4
5
6
7
8
Mogadishu has been one tough nut to crack we are making steady
and perceptible progress. From my perspective, one of the most
encouraging outgrowths of our efforts in this socially, politically and
geographically complex urban environment has been the emergence of
tactical HUMINT as the driving force behind operations in-by-9 out-by-5
service on priority intelligence requirements.
9
10
11
12
13
14
15
16
2-1
Counterintelligence
Function
CI Operations
CI Investigations
CI Collections
and Reporting
CI Analysis, Production
and Dissemination
Objectives
-- Determine foreign intentions
-- Support tactical and strategic perception
management operations
-- Support all-source intelligence and other CI
operations
-- Support planning and military operations
-- Detect, exploit, prevent, or neutralize espionage
activities
-- Detect and resolve incidents of foreign directed
sabotage, subversion, sedition, terrorist
activities,
and assassinations
-- Documents elements of proof for prosecutions
-- Provide military commanders and policy makers
with intelligence and information to use to
eliminate security vulnerabilities and improve
security postures
-- Provide indications and warning of security
threats to U.S. forces, facilities, and operations
-- Provide intelligence on threats to forces to
support planning and implementation of
defensive
or offensive countermeasures
-- Respond to commanders priority intelligence
requirements
-- Provide analysis and assessments of threats to
U.S. forces, facilities, and operations
-- Provide causal analysis of past events to identify
vulnerabilities and risks
-- Identify adversary organizations, personalities,
and capabilities posing threats to forces,
facilities, and operations
2-3
2-4
Levels of CI Support
Strategic
Counter-proliferations
Treaty Support
Tech Transfer
OFCO
Rear Area
Security
Operational
Subversion
OFCO
Counterespionage
Investigations
Planning
Counterterrorism
Support
Deception
Combat
Information
Collection
Defensive CI
Operations
Tactical
Antiterrorism
Support
OPSEC
Pe
ac
eti
me
1
2
Te
rro
ris
m
SA
SO
LI
C
Force Protection
Support
Re
Co gio
nf nal
lic
t
UCW
Protection
Ge
ne
ral
W
ar
a. Strategic CI Support
(1) The strategic level focuses on national security objectives, and involves the National
3
4 Command Authority (NCA), National Security Council, JCS, and Congress. The perspective is far
5 more macro in looking at how the instrument of national power is used to satisfy the overarching
6 national objectives, interests and policies. Marines support these programs independently and are fully
7 integrated into these programs conducting CI Operations, often under the sponsorship of another
8 service or national agencies.
(2) Strategic-level CI helps provides answers to the question, What threats exist to the national
9
10 interests and instruments of national power? Strategic CI primarily supports national-level programs,
11 satisfying requirements across the spectrum of potential combat. Strategic CI emphasizes systems
12 protection, acquisition, proliferation, and strategic level Offensive CI Operations (OFCO). Although
13 the above programs may also impact on the operational and tactical level, they are generally focused on
14 addressing national-level requirements and support. The impact of these programs should be on
15 national-level decision-making with direct linkages supporting combatant commands' strategies and
16 initiatives. National-level agencies centrally manage and control strategic CI support, since the scope of
17 these operations spans across geographic regions or service or organizational lines.
18
b. Operational CI Support
2-5
(b) Peace Operations. CI helps identify and monitor the warring factions and possible third
1
2 parties to determine potential threats to the peacekeeping/peace enforcement forces.
3
(c) Humanitarian and Disaster Relief. CI helps identify potential threats to the relief force,
4
5 providers of aid and assistance, and aid recipients. Often the situation requiring assistance is caused by
6 conflict and can flash with little warning.
7
(d) Psychological Operations. Psychological operations are normally an activity embedded
8
9 within other operational activities. CI can assist in gauging the effectiveness of psychological operations
10 and assist in special contingency planning.
(2) Due to the intelligence requirements of commanders in direct contact with adversaries and
11
12 the indigenous forces, the line between CI and HUMINT at the tactical level is blurred almost beyond
13 differentiation. Ground order of battle (GOB) intelligence is a key area of CI support and seeks to
14 identify enemy forces, dispositions, capabilities, and vulnerabilities. In particular, the identification of
15 threats posed against the MAGTF and the development of countermeasures are key areas CI supports.
16 MAGTFs typically task organize CI and HUMINT elements into HUMINT exploitation teams (HET).
17 HETs satisfy both CI and HUMINT requirements through the collection of threat information from all
18 sources. The teams accomplish this through collection activities including CI force protection source
19 operations (CFSO), liaison, interrogation, observation, and debriefings. Threat information in a
20 contingency environment is highly perishable and may have limited utility to anyone other than forces in
21 direct contact. The standard reporting vehicles are the CI Information Report and the CI SALUTE
22 Report. In addition to this time-sensitive direct support, the MAGTF all-source fusion center (AFC) is
23 the other key producer of tactical CI support.
24 2004. Garrison Support. The primary peacetime/garrison mission of CI activities is planning,
25 preparing, and training to accomplish tactical CI functions. A secondary mission is to advise and assist
26 commanders in the planning, coordinating, and implementing of command security and force protection
27 efforts. See chapter 10 for additional information on garrison CI services.
2-7
CHAPTER 3
3 3001. General. CI, like intelligence, supports the entire spectrum of the battlefield and all warfighting
4 functions. Its effective integration within the intelligence effort requires a basic understanding of the
5 national through tactical intelligence organizations. The commander, through his intelligence officer,
6 depends on coordination and support from many organizations at all command echelons to satisfy his CI
7 and operational requirements.
8 3002. Commander. Intelligence and CI are inherent and essential command responsibilities that
9 require the personal involvement of the commander. Commanders at all command echelons are
10 responsible for formulating CI plans and implementing CI measures. To do so, commanders must have
11 a comprehensive understanding for the capabilities and limitations of CIan understanding of concepts
12 and theory, and an understanding of the practical capabilities, limitations and support requirements of his
13 CI personnel, systems, procedures, operations and products. He must specify CI requirements, focus
14 its efforts and operations, and provide any necessary guidance to ensure a timely and useful products
15 and support. CI activities and measures help the commander shape the battlefield for a decisive action.
16 CI measures support effective command security and force protection operations. While the intelligence
17 officer advises on, plans and implements command CI activities, it is the commander who ultimately
18 determines the meaning and effectiveness of the CI provided and how to use it. Additionally, the
19 commander supervises the overall intelligence effort to ensure that the product is timely, relevant, and
20 useful.
21 3003. Intelligence Officer. The commander directs the intelligence and CI effort. The intelligence
22 officer manages these efforts for the commander, acting as the principal advisor on intelligence and CI
23 and implementing activities that carry out the commanders responsibilities. The intelligence officer is
24 a full participant in the commanders decisionmaking process, ensuring that intelligence and CI
25 are effectively used throughout the command during all phases of mission planning and
26 execution. His CI responsibilities parallel his basic intelligence responsibilities and include:
27
b. Use CI support situation development and the commanders estimate of the situation through the
28
29 identification of enemy capabilities, strengths, and vulnerabilities as well as opportunities and limitations
30 presented by the environment.
c. Assist the commander in developing priority intelligence requirements and supporting CI
31
32 requirements.
3-1
8 3004. Operations Officer. The operations officer is the commander's principal staff assistant in
9 matters pertaining to organization, training and tactical operations. In addition to planning, coordinating
10 and supervising the tactical employment of units, his principal responsibilities requiring CI support
11 include:
12
a. Planning and coordinating command security (to include operations security and signal security).
13
c. Recommending missions and, with the intelligence officer, coordinating reconnaissance and
14
15 counterreconnaissance operations.
d. Planning and coordinating electronic warfare and command and control warfare operations and
16
17 activities (to include electronic protection and C2 protection).
18 3005. Individual Marines. All officers, staff noncommissioned officers, and NCOsregardless of
19 rank or military operations specialitywill ensure that the security of their unit is not compromised
20 through comprehensive understanding of the unique security vulnerabilities of their operations and
21 functions and the enforcement of necessary personnel, information, operations and electronic security
22 measures.
23 3006. Marine Corps Counterintelligence Organization
24
(b) Tasks
Direct and supervise intelligence activities conducted within the interrogation facility
11
12 and the document and material exploitation facility.
Perform CI and terrorism threat analysis and assist in the preparation of CI and
13
14 intelligence studies, orders, estimates, and plans.
15
Collect and maintain information designed to identify, locate, and recover captured or
16
17 missing personnel.
18
19
20
21
22
23
Maintain foreign area specialists who can provide sociological, economic, cultural and
24
25 geo-political information about designated countries.
3-3
I & II MEF
CI / HUMINT
Company
2dLt
WO
MSgt
Clerk
0204
0210
0211
0151 x 2
CI
Platoon
CI Team
Capt 0202/0204
1stLt 0204
MSgt 0211
Sgt 0211
Sgt 0251
Clerk 0151
HUMINT
Exploitation
Team
IT
Platoon
1stLt 0204
2dLt 0204
MSgt 0251
Clerk 0151 x 2
IT Team
0210
MSgt 0251
SSgt 0211
GySgt 0211
Sgt
0211
GySgt 0211
SSgt 0211 x 2 Sgt 0251 x 2
SSgt 0211 x 2 Sgt
= 115 MSgt 0251
0211 x 3TOTALS
Sgt
0211 x 5
0202/0204 Capt =
1 SSgt 0251 x 2
0251 x3
0204 1stLt
=
2 Sgt
0204 2dLt
=
2
0210 CWO
=
6
0291 MGySgt
=
1
0211
= 50
0251
= 53
TECH Team WO
3-4
III MEF
CI / HUMINT
Company
2dLt
CWO
MSgt
Clerk
0204
0210
0211
0151
CI
Platoon
HUMINT
Exploitation
Team
WO
CI Team
GySgt 0211
SSgt 0211 x 2
Sgt
0211 x 5
Capt 0202/0204
1stLt
0204
MSgt
0211
Sgt
0211
Sgt
0251 x 2
Clerk
0151
IT
Platoon
1stLt
2dLt
MSgt
Clerk
0204
0204
0251
0151 x 2
0210
GySgt 0251
IT Team
SSgt 0211
SSgt 0251 x 2
Sgt
0211
Sgt
0251 x 3
GySgt 0210 Sgt
0251 x 2
TOTALS
=
82
SSgt
0211
0202/0204 Capt = 1
Sgt
0211 x 3
0204 1stLt
= 2
0204 2dLt
= 2
0210 CWO
= 3
0211
= 36
0251
= 33
0151
= 5
1
2
Administrative. CI/HUMINT Company and its subordinate units are not capable of
5
6 self-administration. Administrative support is provided in by the parent MEF's Headquarters Battalion
7 or other designated unit. Administrative support for HETs and CI/HUMINT Company detachments is
8 provided by the supported unit.
Maintenance and Supply. CI/HUMINT Company and its subordinate units are
9
capable
of
first
echelon
maintenance support of organic equipment. All higher maintenance is provided
10
11 from the parent MEF's headquarters group, other designated external units, or the supported unit.
Transportation. CI/HUMINT has limited organic vehicular transportation support
12
to
support
Company
and subordinate units operations. External transportation support from the parent
13
14 MEF's headquarters group, other designated unit or the supported unit is necessary to displace all
15 company elements.
Selected Items of Equipment1
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
TAMCN
A03809
A0420
A0890
A1260
A2030
A2065
A2070
A2145
A2167
D0850
D1158
Description
Counterintelligence Equipment, Tech
Surveillance
Comm System, Counterintelligence
Facsimile, Digital, Lightweight
Navigation Set, Satellite (PLGR)
Radio Set
Radio Set
Radio Set
Radio Set
Radio Set
Trailer, Cargo, 3/4-ton, 2-wheel
Truck, Utility, Cargo/Troop Carrier
1/4-ton, HMMWV
Nomenclature
AN/UXC-7
AN/PSN-11
AN/PRC-68A
AN/PRC-104B(V)
AN/PRC-119A
AN/VRC-46
AN/VRC-88A
M-101A3
M-998
Qty
1
8
9
25
2
8
23
5
20
7
35
(2) HUMINT Exploitation Team (HET). As discussed above, HETs are part of the
31
32 CI/HUMINT Co. The HET, apart from mission specific task organized elements, is the smallest
33 element to deploy in support of a MAGTF and often serve as the basic building block for CI/HUMINT
34 CO support to subordinate elements of the MAGTF. Specific elements and capabilities provided in the
35 detachment will be based upon the mission of the supported unit, commander's intent, results of the
1
T/Es for CI/HUMINT company had not been finalized by the time of publication of this manual. The items and
quantities shown here were drawn from those designated for the ITP and the CITs in the T/Es for the intelligence as
companies
of
22 Oct 97. Refer to the current tables of equipment
for accurate current information.
3-6
(b) Tasks
Conduct liaison with unit, JTF, other services, allied and host nation intelligence and
21
22 local intelligence, CI, and law enforcement agencies as appropriate.
Conduct CI investigations about espionage, sabotage, terrorism, subversion, and
23
24 defection; and other special CI investigations, during combat operations per theater directives.
Conduct debriefings/interrogation of known or suspected foreign intelligence
25
26 personnel and agents taken prisoner.
27
3-7
Command and Control. HETs are normally attached to the units they support, but
12
13 may be placed in direct support. When attached they are OPCON to the supported commander, who
14 exercises this via the unit intelligence officer. Finally, as discussed above, technical direction of HET
15 operations generally will be retained by the MAGTF commander.
Concept of Employment. HETs will be employed in accordance with the supported
16
17 commander's concepts of intelligence and operations.
(3) Intelligence Section Staff Officers CI/HUMINT Responsibilities. The MAGTF
18
19 G/S-2 section is the focus for MAGTF CI and HUMINT planning and management. Its principal C2
20 node is the command element's combat intelligence center (CIC). The CIC may consist of a number of
21 subordinate elements depending upon the size of the MAGTF, operational requirements, and other
3-8
Figure 3-3.
2
3
4 Intelligence section and intelligence unit commanders/OICs SIGINT and related responsibilities and
5 tasks include:
(a) Intelligence Operations Officer. The intelligence operations officer is responsible to
6
the
G/S-2
for
the overall planning and execution of MAGTF all-source intelligence operations. Specific
7
8 duties include:
Planning and implementing a concept of intelligence operations based upon the
9
mission,
threat,
commander's
intent, and concept of operations.
10
Developing, consolidating, validating and prioritizing recommended PIRs and IRs to
11
12 support MAGTF planning and operations.
Planning, developing, directing MAGTF intelligence collections, production and
13
14 dissemination plans, to include the effective employment and integration of MAGTF multi-discipline
15 intelligence, CI and reconnaissance operations.
See MCWP 2-1,Intelligence Operations, for additional information on the CIC and its component parts.
3-9
In intelligence sections without a CIHO, a designated officer will generally be assigned to perform
these tasks. If a HET or other CI/HUMINT Co element is attached, its senior CI/HUMINT officer will
serve in this capacity.
3-10
Monitor command Cl/HUMINT MOS training and provide advice and assistance for
2
3 the maintenance of an effective program.
Coordinates, on behalf of the G-2, with the G-3 for support to the commands force
4
5 protection mission, including OPSEC, and deception.
Maintain CI/HUMINT reference material for contingency planning and provides for
6
7 further dissemination as appropriate.
Conduct planning for the CI processing of friendly prisoners of war (POWs) who
8
9 have been returned to friendly control.
When a crisis action team is established in response to a terrorist or criminal situation,
10
11 provide personnel to jointly man the CAT with CID, NCIS, and if required, civilian law enforcement
12 agents.
When the MAGTF CE is designated as a Joint Task Force headquarters, the CIHO
13
14 may assume the role as the Task Force CI Coordinating Authority (TFCICA). (See Joint Pub 2-01.2,
15 JTTP for CI Support to Operations.)
16
(c) Collection Management Officer (CMO). The CMO is responsible for formulating
17
18 detailed intelligence collection requirements (ICR) and tasking and coordinating internal and external
19 collection operations to satisfy these. The CMO receives PIRs and IRs from the intelligence operations
20 officer, and then plans and manages the best methods to employ organic and supporting collection
21 resources. Through coordination with the CIHO and CI/HUMINT Co commander, the CMO is
22 responsible for the following CI/HUMINT-related tasks:
Determination and coordination of the collection effort of PIRs/IRs that may be
23
24 collected via CI resources.
Determination of PIRs/IRs and preparation of requests for intelligence that are beyond
25
26 organic capabilities and must be submitted to higher headquarters and external agencies for satisfaction.
(d) MAGTF All-Source Fusion Center OIC. The MAGTF AFC OIC has primary
27
28 responsibility for managing and supervising the MAGTF's all-source intelligence processing, analytical
29 and production. Key all-source and CI/HUMINT-related responsibilities include:
Maintaining all-source automated intelligence databases, files, workbooks, country
30
31 studies, planning imagery, mapping and topographic resources, and other references.
3-11
11
12
Production of CI estimates.
21
22 operations.
Locations and times of all restricted fire areas and reconnaissance areas of
23
24
3-12
18
Monitoring the flow of intelligence and CI throughout the MAGTF, ensuring that it is
19
20 delivered to intended recipients in a timely fashion.
21
(4) Liaison
(a) CI requires extensive liaison to be effective during tactical operations. CI activities often
22
23 closely parallel functions and responsibilities of other organizations and agencies and, in some cases,
24 may overlap. Close and continuous liaison and coordination aids in the effectiveness of operations, the
25 exchange of information, and in providing for mutual assistance.
(b) Policies and procedures for liaison and the coordination of CI activities are developed
26
27 and promulgated at the MARFOR/MAGTF command echelons. Depending on the mission, area of
28 operations and the type of CI activity, liaison and coordination is normally conducted by CI elements
29 with local intelligence, CI, security and law enforcement organizations/agencies, and civil affairs and
30 psychological operations units where appropriate. In all cases, liaison must be conducted within
31 jurisdictional limitations imposed by higher authority.
3-13
(1) Prepares plans, policies, and directives, and formulates controlled CI/HUMINT missions.
(2) Coordinates with national-level Department of Defense (DOD) and non-DOD agencies on
7
8 matters dealing with Cl and HUMINT.
9
10
(5) Exercises staff responsibility for HUMINT resources and certain classified/special access
11
12 programs.
13
14
(8) Reviews reports from the field commands concerning security violations, loss of classified
15
16 material, and compromises.
17
(10) Represents the Marine Corps on national level interagency CI committees and
18
19 subcommittees.
20 3007.
a. N-2 Intelligence Officer. While afloat, the N-2 coordinates activities of the attached NCIS
21
22 agent to identify threats to the amphibious ready group (ARG). The N-2 coordinates vulnerability/threat
23 assessments and other intelligence and CI support of ARG intelligence and force protection
24 requirements for the ships. Close coordination between the MAGTF G/S-2 and the N-2 is required to
25 ensure consolidation and dissemination of applicable threat related data for the formulation of the
26 commanders estimate. Monitoring and rapid reporting of time sensitive information is critical for these
27 deployed commanders as the situation develops. The critical role is the monitoring for indications and
28 warning of impending attack during movement or the deployment of forces ashore. The ARG/MAGTF
29 team continues this interactive relationship through the rapid collection, processing, production and
30 dissemination of intelligence and CI in support of intelligence and force protection requirements.
31
3-14
a. CI Staff Officer (CISO). In accordance with DOD Dir 5240.10, DOD CI Support to U&S
10
11 Commands, each combatant command has a special staff officer within the J-2 with staff cognizance for
12 all CI activities within the theater. The CISO is the J-2s primary staff officer responsible for advising,
13 planning and overseeing theater CI activities. Responsibilities include:
(1) Advise commander & J-2 on CI investigations, operations, collections and production
14
15 activities affecting the command.
(2) Advise commander on counterdrug, OPSEC, counterterrorism and antiterrorism activities in
16
17 the commands AOR.
(3) Coordinate CI support activities within combatant commands headquarters staff and with
18
19 component organizations.
(4) Coordinate the combatant commanders CI requirements with pertinent U. S. CI
20
21 organizations and U. S. country teams as required.
(5) Coordinate tasking of CI within AOR and area of interest upon implementation of NCA
22
23 approved /directed action.
(6) Coordinate with the military services for integrated CI support to research and development
24
25 and acquisition programs to protect sensitive or critical technologies.
(7) Ensure significant CI threat information developed within commanders AOR is forwarded
26
27 to the J-2, other staff officers, and subordinate component commanders.
(8) Ensure CI support requirements are identified and satisfied during development of command
28
29 intelligence architecture plans (CIAP).
(9) Ensure CI staffing and analytic and production support is integrated the combatant
30
31 command's joint intelligence centers (JICs).
3-15
3-16
CHAPTER 4
COUNTERINTELLIGENCE EMPLOYMENT
3
4
5
6
7
8
9
4001. Operational Environment. As forces are committed to an operation, the threat picture
expands and situational awareness improves. As U. S. military involvement increases, existing threats
remain and may increase while new threats may emerge. In a humanitarian operations and other military
operations other than war (MOOTW), the criminal, terrorist, and espionage threats are generally the
principal ones facing the MAGTF. These threats continue into the upper levels of conflict, with the
addition of threats posed by irregular forces, special operations force, and finally, by large-scale
conventional military forces.
10 Within MOOTW and in lesser levels of conflict where there may be no designated MAGTF or joint
11 rear area, CI activities are directed at supporting force protection efforts by engaging with key civic
12 leaders, existing intelligence and security structure, factional leaders and cooperative personnel, and
13 allied forces. Threats are normally at the low to mid level. Threats at the higher levels of conflict
14 normally involve conventional or unconventional force threats that require combat forces to counter.
15 MAGTF CI elements conducts actions in support of these operations within the MAGTF area of
16 operations and other assigned sectors as directed (e.g., the joint rear area (JRA)).
17 The primary operational environmental factor influencing MAGTF CI activities is political, vice physical.
18 Accordingly, three basic political operational categories can be used to frame CI activities. These are:
Permissive Environment -- An operational environment in which there are specific
19
20 agreements that allow CI to conduct activities independently or in coordination with the host nation. In
21 these environments, MAGTF CI activities and support to the security posture of the deployed forces
22 are normally conducted in conjunction with the host nation, or the host nations has provided
23 concurrence, either direct or tacit.
Semi-Permissive Environment -- A operational environment in which there are either no
24
25 in-place government organizations and/or laws, or where the government in power is not duly
26 recognized by the U. S. or other international bodies. In situations of this type, the rules of engagement
27 established by the JTF or multinational force commander is often the key variable as the host nation's
28 civil, military and security agencies are frequently degraded or nonexistent (or may even be supporting
29 threat forces). The rules of engagement of the deploying force primarily drive limitations and restrictions
30 that may be placed on CI activities.
Non-Permissive -- A non-permissive operational environment is one in which U. S. CI
31
32 activities and contacts with the host nation are extremely limited, normally at the direction of the host
33 nation. The situation in these countries may also place the US in a situation where the actions of the host
34 nation or individuals in the host nation government may be inimical to those of the US government. In
4-1
4-2
4-3
c. CI Employment Considerations
(1) Characteristics of the AOR influence the nature and extent of MAGTF CI operations. The
2
3 following factors influence CI task organization, C2 and resulting concepts of operations and support
4 relationships.
Historical/recent threat, espionage, sabotage, subversion or terrorism activities within the area
5
6 of operations
7
The attitude of the people and political groups toward friendly and enemy forces.
10
The people's susceptibility to enemy penetration (hostile intelligence threat) and propaganda.
11
(2) The number of MAGTF CI resources available, particularly HETs, is critical. Careful
12
13 planning, awareness of CI operations throughout the joint AOR, and detailed intelligence and operations
14 preparation are required. CI targets which require early reduction must be selected and the
15 employment of MAGTF CI operations planned. Care must be taken to not overestimate CI element
16 capabilitiesthis risks overextending and dispersing CI activity on many targets with limited
17 effectiveness.
(3) During amphibious operations, the commander, landing force (CLF), assumes operational
18
19 control over all assigned CI assets. Clear responsibility for CI operations must be assigned amongst
20 MAGTF, naval and other supporting CI elements. CI investigations of a general support nature,
21 particularly in rear areas, may be tasked to NCIS or other supporting CI elements. In such cases,
22 jurisdiction must be clearly defined to optimize overall CI support.
23
24
25
Coordination and integration of MAGTF CI operations with JTF, multinational and other
26
27 supporting CI operations.
28
(1) Generally, the number of MAGTF CI elements employed in the GCE AOR is greater than
7
8 in other areas. In combat or occupied areas, the enemy has more opportunities to penetrate the CI
9 screen because of the constant contact of opposing ground forces and the presence of indigenous
10 displaced populations. After the area has been cleared of the enemy, the CI element operating with the
11 GCE is usually the first security unit to enter this area. They help determine initial requirements and
12 establish initial security measures. Additionally, CI element with the GCE perform critical preparatory
13 tasks for all subsequent CI and security operations. Prompt action by a CI element, particularly the
14 rapid development and dissemination of intelligence based upon interrogations or exploitation of
15 captured materials and documents, can be of substantial benefit to the GCEs operations and force
16 protection efforts. CI elements must identify and secure :
17
18
19
Enemy collaborators.
Key public buildings such as the seat of the local government, police stations and
20
21 communication centers.
(2) The CI element focuses its operations on the GCE's distant and close areas, with
22
23 responsibility for GCE rear area generally being coordinated with CI elements operating in general
24 support of the MAGTF or those in direct support of the rear area operations commander. The CI
25 elements operating with a division are generally deployed by task organizing multiple HETs. The HETs
26 are responsible for the CI coverage of specific areas within the jurisdiction of the command. Each HET
27 acts as an independent unit, but its activities are coordinated by the CI/HUMINT Company
28 Commander or by one of the HET OICs.
(3) Time is of the essence during the assault phase of an operation. CI elements employed with
29
30 attacking forces will generally limit their screening operation to identification and classification of civilians
31 disguised as military personnel, enemy agents, and collaborators. If time permits, immediate tactical
32 interrogation may be conducted of suspects. Normally, suspects will be passed to rear area,
4-5
(1) There is no significant difference in the mission of CI elements employed with either ground
4
5 or air units. However, air units are normally characterized by a static situation. In air operations or an
6 airborne movement, CI personnel are included in the tactical command echelon. They advise the
7 commander on the control and security of sensitive areas, civilian control measures, and screening of
8 local residents and transients. They also conduct security assessments of facilities in the vicinity as
9 required.
(2) The ACE is often widely dispersed with elements operating from separate airfields. Since
10
11 aircraft and support equipment are highly susceptible to damage and difficult to replace, aviation units
12 are high priority targets for enemy saboteurs and terrorists. In many situations, ACE units employ large
13 numbers of indigenous personnel in support roles, personnel who are a key target of enemy intelligence
14 activities. Under such conditions, it may be necessary to provide HETs in direct support of ACE
15 elements.
16
g. CI Support to the Combat Service Support Element (CSSE) and Rear Area Operations
(1) Within rear areas, the MAGTF CSSE (along with other MSE elements) is the principal
17
18 organizations requiring CI support. While the CSSE's CI requirements are primarily concerned with
19 military security, those of civil affairs elements generally deal with civil/military interaction and security of
20 the populace. Despite the apparent differences of interest between their requirements, their CI
21 problems are interrelated (e.g., a dissident civilian population hampering the efforts of MAGTF civil
22 affairs elements attempting to establish effective administrative control in the area also disrupting logistics
23 operations through sabotage, terrorism, and harassment attacks).
(2) MAGTF CE CI elements performing general support CI operations normally provide CI
24
25 support to CSSE and other rear area operation elements. This includes support for installations and
26 facilities dispersed through the combat service support areas. The number of team personnel supporting
27 civil affairs units depends on the number of refugees to be identified in the area.
28 4003. Friendly Prisoners of War and Persons Missing (Non-hostile) and Missing in Action
a. Friendly personnel who are captured by the enemy can be a source of information through the
29
30 compromise of documents, personal papers, or as the result of effective interrogation or coercion. It is
31 a fundamental commander responsibility to take necessary steps to counter any possible disclosure that
32 would affect the immediate tactical situation.
CI units are assigned responsibility for investigating and determining risks posed to MAGTF
33
34 operations by friendly personnel who have or may have been captured, collecting information of
4-6
(1) Provide information to aid in subsequently identifying and locating the individual.
16
17
(3) Collect intelligence information that will be of value when evaluating future intelligence reports.
18 The investigation must be as thorough and detailed as possible and classified according to content.
19 Every attempt is made to obtain recent photographs and handwriting samples of the captured Marine.
20 A synopsis of the investigation, including a summary of the circumstances, is prepared on the CI report
21 form. The completed basic identifying data form is attached as an enclosure to this report.
22 In the case of aircraft incidents, the investigation includes type of aircraft, location and sensitivity of
23 classified equipment, bureau or registration number, call signs, and any aircraft distinguishing marks,
24 such as insignia, etc. When feasible, the investigator should coordinate with the accident investigation
25 team or aviation safety officer of the unit that experienced the loss.
26
d. The CI report, with the attached personnel data form, is distributed to the following commands:
27
28
(2) Individual's parent command (division, MAW, or Force Service Support Group (FSSG)).
29
e. These reports are designed to aid follow-on CI operations. They do not replace normal G/S-1
2
3 casualty reporting procedures. When the CI report concerns a member of another Service assigned to
4 a Marine Corps unit, a copy of the report is also provided to the appropriate component commander
5 and Service headquarters. All subsequent pertinent information is distributed in the same manner as the
6 initial CI report.
f. MAGTF personnel returned to friendly control after being detained by the enemy are debriefed
7
8 by CI personnel. Normally, CI personnel supporting the unit that first gains custody of the individual
9 conduct an initial debriefing to identify information of immediate tactical value and the locations of other
10 friendly prisoners of war. As soon as possible, the returnee is evacuated to the MAGTF CE for further
11 debriefing and subsequent evacuation to a formal debriefing site.
12 4004. Counterintelligence Support during Military Operations Other Than War (MOOTW).
13 The CI operations previously discussed are generally applicable across the MOOTW, including
14 non-combatant evacuation, peace, and humanitarian and disaster relief operations. CI activities during
15 MOOTW require CI personnel to be thoroughly familiar with the nature of operation, to include its
16 causes, characteristics, and peculiarities, and with the threat infrastructure directing and controlling
17 efforts. Basic CI tasks are the denial of information to the threat force and the identification and
18 neutralization of intelligence operations. A key aim of MOOTW is to restore internal security in the
19 AOR, which requires a vigorous and highly coordinated CI effort. The nature of operation and the
20 threat's covert methods of operation require the employment of a greater number of CI personnel than is
21 generally required for conventional operations.
a. Jurisdiction. Effective CI operations require extensive coordination with the host country
22
23 intelligence, CI, security, and law enforcement agencies. In such operations, MAGTF operations are
24 normally covered by a status of forces agreement (SOFA). The SOFA may include limitations and
25 restrictions concerning the investigation and apprehension of host country citizens or other operations
26 matters.
27
b. MAGTF CI Employment
(1) The employment of CI elements during MOOTW is similar to that previously described. CI
28
29 area coverage is generally used as it provides continuity of operations. Also, as the threat's intelligence
30 operations usually have been are well established, area coverage allows MAGTF CI personnel to better
31 understand and more effectively counter the threat.
(2) When assigning areas of responsibility, MAGTF CI elements ensure coverage overlaps to
32
33 preclude gaps occurring between areas. Threat forces usually prefer to operate on the political or
34 military boundaries where the assigned responsibilities of U.S. and allied forces may be vague and
35 coordination is more difficult. CI elements employed through unit assignment are assigned responsibility
4-8
(1) The basic CI operations, techniques, and procedures previously are generally applicable
4
5 during MOOTW. However, such operations generally require that both passive and active CI
6 measures be increased and aggressively pursued to effectively counter the threat's advantages and
7 capabilities.
(2) All MAGTF units must institute and continuously enforce CI and security measures to deny
8
9 information to the threat force and to protect friendly units from sabotage. In coordination with host
10 country authorities, emphasis is needed on security measures and checks of indigenous employees or
11 other persons with access to MAGTF installations, facilities or command posts.
(3) A significant factor during MOOTW is population and resources control. The movement
12
13 channels and patterns necessary for support, communications, and operations of insurgent forces are
14 observed and controlled. Prior to implementing control measures, the population should be informed of
15 the reasons for controls. Whenever possible, such controls should be performed and enforced by host
16 country agencies.
(4) MAGTF CI elements must implement imaginative and highly aggressive special CI
17
18 operations and HUMINT collection programs targeted against the threat's intelligence infrastructure and
19 operational forces. The primary objective of special operations is the identification, location, and
20 neutralization of specific members of the threat's infrastructure. A CI special operation consists of
21 systematic intelligence collection and analysis with complete documentation concerning the activities of
22 each targeted individual. This provides the host country with an account of the individual's illegal
23 activities once the person is apprehended. Penetration of the infrastructure must be obtained at all levels
24 possibleHUMINT operations are implemented to cover critical areas to identify and locate threat
25 forces. Intelligence derived from HUMINT programs may also be useful in CI special operations.
(5) In MOOTW, cordon and search operations may be employed to ferret out the threat
26
27 infrastructure. Ideally, a cadre of MAGTF CI personnel are assigned to each unit conducting the
28 cordon and search operation in order to provide on scene exploitation and immediate reporting of threat
29 related time-sensitive intelligence. These operations may also be employed to ferret out individual threat
30 units that may use a community or area as cover for their activities or as a support base. Cordon and
31 search operations should be conducted in conjunction with host country forces and organizations, with
32 U. S. forces including CI units providing support, advice, and assistance for the entire operation. At a
33 minimum, host country personnel should be part of the screening and sweep elements of any cordon and
34 search operation. Sweep/screening is often conducted in conjunction with medical, civil affairs, and
35 psychological operations programs (which are accomplished after the screening phase). Throughout
36 the operation, care must be exercised to prevent an adverse psychological effect on the populace.
4-9
Security forces which surround the area, usually at night, to prevent persons from leaving
A sweep element that escorts detained people to a collection point at first opportunity.
4-10
CHAPTER 5
2
3
4 5001. General. The MAGTF CI effort is heavily dependent upon a secure, reliable, and fast
5 communication and information systems (CIS) support to receive JTF, other components, theater, and
6 national CI and all-source intelligence and to transmit organically collected and produced CI product
7 and reports. CIS are also required for the command and control of MAGTF and supporting CI units
8 and their integration with multi-discipline intelligence operations. Every mission and situation is unique,
9 requiring some modifications to the supporting CIS architecture to support MAGTF CI operations.
10 Detailed planning and close coordination between the CI/HUMINT company/detachment CO/OICs,
11 the MAGTF G/S-2 and G/S-6, and all pertinent operational and intelligence organizations is critical for
12 establishing a reliable and effective CI CIS support.
13 5002. Basic CI CIS Requirements. Regardless of the size of the MAGTF CI/HUMINT forces,
14 there are certain standing CI CIS requirements must be satisfied. These requirements are:
15
a. The capability to command and control subordinate units. Intelligence officers and
16
17 CI/HUMINT element commanders/OICs must be capable of positive C2 of subordinate units and
18 integration of its operations with broader MAGTF and external intelligence and operations C2.
19 Traditionally single-channel radio (SCR) and record message traffic have been used to support C2 of
20 MAGTF CI units. In semi-static situations, secure e-mail or telephone may be the method of choice,
21 while in highly fluid or mobile scenarios, cellular, SATCOM, and VHF and HF radio may be used.
b. The ability to receive collected data and information from deployed CI elements. The
22
23 CIS architecture must provide connectivity between organic and supporting CI/HUMINT elements
24 (such as the HUMINT exploitation teams or CI liaison elements), CI analysis and production centers,
25 and supported MAGTF operations and intelligence centers. Requirements include the capability to
26 transmit collection files and reports digitally via fiber-optics, wire, or radio in formats (both voice and
27 data) that are readily useable by the CI and all-source intelligence analysts.
c. The ability to provide intelligence to supported commanders. CI CIS requirements will be
28
29 influenced by supported commanders' intents, concepts of operations and intelligence, command
30 relationships, and standing PIRs and IRs. The CIS architecture must be capable of integrating
31 CI/HUMINT element C2 and supporting CIS operations (to include special communications
32 capabilities and channels unique to CI reporting) with the primary CIS channels used to by supported
33 commanders.
See MCWP 6-22, Communications and Information Systems, for a detailed review of MAGTF
communications and information systems (CIS) and supporting tactics, techniques and procedures.
5-1
b. MAGTF
(1) The MAGTF commander has operational control of all MAGTF CI elements. He exercises
20
21 this authority via the MAGTF intelligence officer. The intelligence officer's principal staff assistant
22 responsible for planning, directing and managing organic and supporting CI operations is the
23 Counterintelligence/HUMINT Officer (CIHO). At the CI unit level, the CI/HUMINT company
24 commander/detachment OIC has command and operational control. Regardless of the C2 relationships
25 and MAGTF CI concept of employment, technical control of all MAGTF CI/HUMINT company
26 elements will generally be retained by the MAGTF commander.
(2) The following are the principal C2 nodes from which MAGTF CI operations are planned
27
28 and directed:
(a) MAGTF Command Element Combat Intelligence Center (G/S-2). CI elements
29
30 are integrated within two key elements of the MAGTF CE combat intelligence center (CIC): the
31 surveillance and reconnaissance center (SARC) and the all-source fusion center (AFC). Additionally,
32 the MAGTF CIHO will integrate CI operations with those of the intelligence operations officer. The
33 SARC is the primary element for the supervision of MAGTF collection operations and is responsible for
34 the direction, coordination, and monitoring of intelligence collection operations conducted by organic,
35 attached, and direct support collection assets. A CI/HUMINT element will be established within the
36 SARC to monitor ongoing operations and to maintain designated CI radio nets. The AFC is the
37 primary analysis and production element of the MAGTF, responsible for processing and producing
5-2
c. Intelligence and CI/HUMINT Information Systems. The following are information systems
1
2 and selected databases typically established for either dedicated CI needs or are multi-purpose
3 intelligence systems that CI elements may either use or must interoperate with.
(1) Joint Deployable Intelligence Support System (JDISS). JDISS is an all-source
4
5 automated intelligence tool that provides the backbone of intelligence connectivity amongst the national,
6 theater, JTF headquarters, component commanders, and other intelligence organizations. JDISS
7 employs a transportable workstation and communications suite that electronically extends a joint
8 intelligence center to a JTF and other tactical users. Either SIPRNET or JWICS will provide the
9 principal communications connectivity for JDISS.
(2) Intelligence Analysis System (IAS). IAS provides automated applications and other
10
11 tools for all-source intelligence planning, management, analysis, production and dissemination. Various
12 configurations of IAS will be organic to intelligence sections from the battalion/squadron through
13 MAGTF CE levels.
(3) Defense Counterintelligence Information System (DCIIS). DCIIS is a DOD system
14
15 which automates and standardizes CI functions at all command echelons. DCIIS contains standardized
16 DOD forms (for CI investigations, collections, operations, and analysis & production) and shared CI
17 databases. DCIIS also contains supplemental forms to satisfy tactical reporting requirements of Marine
18 and Army CI elements. DCIIS is interoperable with JDISS and other intelligence systems.
19 Communications connectivity is via SIPRNET.
(4) Defense Intelligence Threat Data System (DITDS). DITDS is available via JDISS,
20
21 IAS and other intelligence systems. It contains the DOD CI/counter-terrorism/counter- proliferation
22 databases and is principally used by CI analysts and production personnel. The system provides a
23 number of analytical tools, such as automated and graphical link analysis hot-linked to the underlying
24 reports, automatic time lining as well as access to various communications systems to support
25 dissemination.
(5) Migration Defense Intelligence Threat Data System (MDITDS). The MDITDS is
26
27 being developed to operate on the DCIIS to provide an automated production system for DODIIS
28 Indications and Warning (I&W), counterintelligence, counterterrorism, and Arms Proliferation/Defense
29 Industry communities. Many of the current intelligence/counterintelligence databases that reside on
30 other systems will become resident within the MDITDS. Some of these include DITDS, SPHINX
31 (DIA's CI database), CANNON LIGHT (U. S. Army CI database), BLOODHOUND (EUCOM CI
32 database), Automated Intelligence Information Retrieval System (AIIRS), Automated Decision Making
33 and Program Timeline (ADAPT), Defense Automated Warning System (DAWS), Sensitive
34 Compartmented Automated Research Facility (SCARF), Terrorism Research & Analysis Program
35 (TRAP), and many others.
5-5
The task organization and command/support relationships of MAGTF CI units -CI/HUMINT company headquarters collocated with the MAGTF G/S-2. Although
company elements normally operate in general support of the MAGTF, task-organized
CI, interrogator-translator or HETs may be either attached to or placed in direct
support of MAGTF subordinate units..
Principal CI systems (e.g., CHATS) employed within and in support of the MAGTF.
5-6
5-7
T-SCIF
TROJAN
SPIRIT II
- JWICS
- DSSCS
- Other
TCAC
RadBn
OCAC
RRT
Concept
GOB
AOB
CI
JTF
DOTES
Netscape
Enabler
Integration:
Concept
SCR
INTEL, OPS,
FIRES NETS
MEF
IAS
SIPRNET
GATEWAY
TTC-42
Voice Switch
JWICS
GATEWAY
NIPRNET
GATEWAY
TSC-85
or 93
Intel
OpO
CI/HUMINT
Section
FIIU TEG
JSIPS
Collections Mgr
TSC-93
SATCOM
COUNTERINTEL
GENSER
DMS
SSO
INTERROGTRANS
SCR SCR
FORCE
RECON
SCR
UAV
SCAMP
SARC
OIC
Video
SCR
Dissemination Mgr
SCR
INTELLIGENCE
WATCH
MAGTF All-Source
Fusion Center
SCR
Combat
Operations
Center
SSCC/DSSCS
A (
R SC
EA I
N LO
ET C
W AL
O
R
K
)
Click to
submit
comment
Future
MEF
Operations
IAS
Center/
INTELLIGENCE
Future
PLANS TEAM
Plans
SCR
TPCS
JOINT STARS
CGS
SCR
MEWSS
JTF
Netscape
Enabler
TRSS
2 5005. CI CIS Planning Considerations. The following identifies key CIS requirements and planning
3 considerations in support of MAGTF CI operations.
a. Ensure that the MAGTF CE, CI/HUMINT elements, and other MAGTF units are included in
4
5 the distribution of CI/HUMINT-related address indicator groups to receive pertinent JTF, theater, &
6 national intelligence and CI products.
b. Determine and coordinate radio nets requirements, supporting frequencies, and operational
7
8 procedures in support of CI operations (external to MAGTF, internal MAGTF, intelligence broadcasts,
9 retransmission sites, routine and time-sensitive operations, etc.).
10
11
5-9
CHAPTER 6
COUNTERINTELLIGENCE PLANNING
3 6001. Marine Corps Planning Process and Joint Planning Process Overview1
a. General. Planning is an act of preparing for future decisions in an uncertain and
4
time-constrained
environment. Whether it is done at the national or the battalion/squadron level, the key
5
6 functions of planning are:
7
(3) Planning generates expectations about how actions will evolve and how they will affect the
9
desired
outcome.
10
11
12
b. Marine Corps Planning Process (MCPP). The MCPP helps organize the thought processes
13
14 of a commander and his staff throughout the planning and execution of military operations. It focuses on
15 the threat and is based on the Marine Corps warfighting philosophy of maneuver warfare. It capitalizes
16 on the principle of unity of effort and supports the establishment and maintenance of tempo. The MCPP
17 steps can be as detailed or as abbreviated as time, staff resources, experience, and the situation permit.
18 It applies to command and staff actions at all echelons. From the Marine Corps component
19 headquarters to the battalion/squadron level, commanders and staff members must master the MCPP in
20 order to be full participants in integrated planning. Additionally, the MCPP complements deliberate or
21 crisis action planning (CAP) as outlined in the Joint Operation Planning and Execution System (JOPES).
22 The MCPP establishes procedures for analyzing a mission, developing and analyzing COAs against the
23 threat, comparing friendly COAs against the commanders criteria and each other, selecting a COA,
24 and preparing an OPORD for execution. The MCPP organizes the planning process into six
25 manageable, logical steps. It provides the commander and his staff a means to organize their planning
26 activities and transmit the plan to subordinates and subordinate commands. Through this process, all
27 MAGTF levels of command can begin their planning effort with a common understanding of the mission
28 and commanders guidance. The six integrated steps of this process are:
1
MCWP 5-1, Marine Corps Planning Process, is now in development and will provide detailed doctrine and TTP regarding
the MCPP. Jt Pub 5-00.2,Joint Task Force Planning Guidance, likewise provides detailed discussion of the joint planning
processes.
6-1
MISSION ANALYSIS
COURSE OF ACTION
DEVELOPMENT
COA ANALYSIS
COA COMPARISON/
DECISION
ORDERS
DEVELOPMENT
TRANSITION
(1) Mission Analysis. Mission analysis is the first step in planning. The purpose of mission
3
4 analysis is to review and analyze orders, guidance, and other information provided by higher
5 headquarters and produce a unit mission statement. Mission analysis drives the MCPP.
(2) COA Development. During COA development, the planners use the mission statement
6
7 (which includes higher headquarters tasking and intent), commanders intent, and commanders planning
8 guidance to develop several COAs. Each prospective COA is examined to ensure that it is suitable,
9 feasible, different, acceptable, and complete with respect to the current and anticipated situation, the
10 mission, and the commanders intent. In accordance with the commanders guidance, approved COAs
11 are further developed in greater detail.
(3) COA Analysis. During COA analysis, each friendly COA is examined against selected
12
13 threat COAs. COA analysis involves a detailed assessment of each COA as it pertains to the threat
14 and the environment. COA analysis assists the planners in identifying strengths and weaknesses,
15 associated risks, and asset shortfalls for each friendly COA. COA analysis will also identify branches
6-2
(1) Joint Deliberate Planning. The deliberate planning process is used by the joint staff and
16
17 commanders in chief (CINCs) to develop plans (OPLANs, CONPLANs, functional plans) in support
18 of national strategy. The Joint Strategic Capabilities Plan (JSCP) apportions forces and resources for
19 use during deliberate planning by the combatant commanders and their service component commanders.
20 The figure below illustrates how the MCPP fits within and supports the joint deliberate planning process.
JSCP
Initiation
Concept
Development
Plan
Development
Plan Review
Supporting
Plans
Situational
Awareness at
MAGTF
Begins Here
AN
OPL
CON
Mission
Analysis
TPFDD
Maintenance
COA
Dev
PLA
COA
Analysis
Comparison/
Decision
Orders
Dev
Transition
MCPP
21
22
Figure 6-2. The MCPP and the Joint Deliberate Planning Process
6-3
6
7
Figure 6-3. The MCPP and the Joint Crisis Action Planning Process
See chapter three of MCWP 2-1, Intelligence Operations, for comprehensive discussion of each
phase of the intelligence cycle and the overall conduct of intelligence planning and direction.
6-4
3
4
(1) Focus. CI planning and subsequent operations are conducted in support of the MAGTF or
5
6 designated subordinate commanders in order to both support the overall intelligence effort and to aid
7 with force protection. Accordingly, CI must be planned in conjunction with the overall intelligence and
8 force protection efforts. The commander must incorporate CI early in the planning process in order to
9 formulate his estimate of the situation, identify the MAGTF's risks and security vulnerabilities, and begin
10 shaping his overall operations and supporting intelligence and force protection operations.
(2) CI and HUMINT. CI also has to be considered with many other intelligence activities
11
12 because of the mission of CI. HUMINT is the intelligence activity that has the most important
13 connective tie to CI. CI and HUMINT work hand-in-hand because of the nature of their targets and
14 the type of intelligence missions they perform: CI destroying the enemy intelligence effort and HUMINT
15 collecting information about enemy activity. The differentiation and coordination required for the
16 effective exploitation of human sources is critical, requiring integration of CI activities and HUMINT
17 operations (e.g., interrogator/translator exploitation of enemy prisoners of war (EPW)). See DIAM
18 58-11, DOD HUMINT Policies and Procedures, and DIAM 58-12, The DOD HUMINT
19 Management System, for additional information.
20
(a) Intelligence Officer. Primary staff responsibility for CI operations planning lies with the
21
22 G/S-2. Included in his responsibilities are:
Preparation of integrated, multi-discipline intelligence and reconnaissance operations
23
and
supporting
CI
plans, orders, annexes, and appendices.
24
6-5
Liaison with CI agencies and units external to the MAGTF, in particular the JTF
6-6
(a) Friendly Considerations. The CI operations effort must support and adapt to the
22
23 commander's intent, concepts of intelligence and operations, and the supporting scheme of maneuver.
24 Questions to answer include:
25
What is the MAGTF area of operations (AO) and area of interest (AI)?
26
27 efforts?
What is the MAGTF concept of operations, task organization, main and supporting
a. General
6-8
6-9
(3) The G-2/S-2 provides CI participation and assistance early in the planning phase of tactical
2
3 operations. The commanders benefit from CI information given at this phase because it helps to
4 formulate tactical plans and because CI/HUMINT operations, by their very nature, generally require
5 more time than other intelligence disciplines to yield substantive results. CI also provides the
6 commander with capabilities that are offered by no other discipline or technical system. CI is one of the
7 tools that can help the commander anticipate the action of the enemy. Particular attention is directed to
8 identifying friendly vulnerabilities to be exploited by hostile collections assets and to recommending
9 specific CI measures.
(4) The CI effort focuses on the overall hostile intelligence collection, sabotage, terrorist, and
10
11 subversive threat. The CI effort is also sufficiently flexible to adapt to the geographical environment,
12 attitudes of the indigenous population, mission of the supported command, and changing emphasis by
13 hostile intelligence, sabotage, terrorist, and subversive organizations.
b. Planning the Activity. The effectiveness of MAGTF CI operations depends largely on the
14
15 planning preceding the operation. The CI staff officer, assisted by the CI/HUMINT Co commander or
16 HET OIC, performs four separate functions in carrying out his planning responsibilities. First, he directs
6-10
Potential or actual defectors from the hostile cause whose credibility has not
6-13
16
Other persons who can significantly aid the political, scientific, and military
20
21 objectives of the U.S. and whose credibility has been established.
2 Organizations. These include any organization or group which is an actual or
22
23 potential threat to the security of JTF. or other allied forces and must be neutralized. However, an
24 organization or group may present a threat that is not immediately apparent. The enemy frequently
25 camouflages his espionage or subversive activities by establishing front organizations or groups. If these
26 organizations are permitted to continue their activities, they could impede the success of the military
27 operations. Examples of hostile organizations and groups which are of major concern to the CI unit
28 during tactical operations include:
29
National and local political groups and parties known or suspected to have aims,
30
31 beliefs, or ideologies contrary or in opposition to those of the United States.
6-14
6
7
Neutralize or exploit these to deny the enemy key friendly force information.
6-17
Aerial cameras.
30
Infrared sensors.
31
Imaging radars.
32
33
6-18
24
25 C-SIGINT provides commanders and planners with the knowledge to assess the risk and probable
26 success of alternative courses of action before a plan is implemented. C-SIGINT is a cyclic process
6-19
Realistic security measures, both INFOSEC and physical, that can be taken to deny
6
7 information to the enemy.
8 (See appendix D, section III, for additional information on C-SIGINT.)
(b) CI Analytical and Production Functions. CI analysts perform the following
9
10 analytical and production functions:
Analyze the multi-discipline intelligence, espionage, subversion, sabotage and
11
12 terrorism threats targeted against the MAGTF.
Assess enemy intelligence vulnerabilities and susceptibilities to friendly deception
13
14 efforts and other countermeasures.
15
22
34 See appendix E for a CI survey checklist and the format for a CI Survey/Vulnerability Assessment.
6-21
11
12
13 future.
An enemy resource or element that will attack or collect against the target in the
14
15
16
Area or unit which has received unusual enemy jamming or other electronic
26
CI target nominations.
HUMINT: briefly describe estimated enemy HUMINT activity for the reporting period.
SIGINT: briefly describe estimated enemy HUMINT activity for the reporting period.
IMINT: briefly describe estimated enemy HUMINT activity for the reporting period.
OTHER: briefly describe any other pertinent estimated enemy activity not addressed above.
6-23
(1) Provide assistance to the command operations security program. During the initial planning
2
3 phase, CI assets provide assistance to the G-3/S-3 in establishing the force protection planning and
4 operations.
(2) Complete studies of the enemy organization, weapons and equipment, techniques, and
5
6 effectiveness in conducting intelligence, subversion, terrorism, and sabotage operations. Timely
7 completion and dissemination throughout the MAGTF of the CI estimate is critical.
(3) Complete as early as possible the CI survey/vulnerability assessment to assist with
8
9 MAGTF force protection planning and countermeasures development and implementation.
(4) Release CI planning information and products in accordance with PIRs and IRs and
10
11 specified reporting criteria or as directed by the G/S-2. It is critical that CI personnel follow-up with
12 recipients of these products to ensure that the information is understood and to identify early any
13 resulting new CI IRs.
(5) Give appropriate security classification to all key information referring to the MAGTF's
14
15 operation. CI personnel will provide advice and assistance to the MAGTF security manager or force
16 protection officer with the development of operational classification guidance. MAGTF command
17 guidance should ensure that particularly sensitive items are identified and protected, particularly within
18 forward areas or in aircraft flying over enemy held areas. It should be determined if code symbols are
19 necessary for marking of vehicles and operational equipment. If so, code symbols are used to cover
20 existing tactical marking.
(6) Avoid compromising activities. Special inoculations or the issuance of special clothing and
21
22 equipment should be postponed until after embarkation or other time, when possible, to avoid providing
23 the enemy indications of future MAGTF activities. Leave and liberty are reduced gradually since any
24 sudden curtailment will engender speculation. Submit recommendations on the selection of
25 embarkation, assembly, and rehearsal areas, routes, and times for the movement to these areas in order
26 to minimize the probability of later compromise.
(7) Prepare appendix 3, Counterintelligence, and assist with preparation of appendix 5,
27
28 HUMINT, to the intelligence annex.
29
(1) Establish liaison with other CI agencies to ensure control of civilians in the area of
30
31 operations. Screen all civilians working within MAGTF command posts and installations.
(2) Initiate an aggressive CI/HUMINT collection program in response to the MAGTF PIR and
32
33 IRs developed by the G/S-2 and in support of EEFIs developed by the G/S-3.
6-24
(3) Recommend active and passive CI measures to deny the enemy access to potentially
1
2 lucrative MAGTF targets.
(c) Indications & Warning
(1) Emphasize protective collection activities to reveal plans and intentions of hostile elements
4
5 to inflict damage and casualties upon friendly forces.
6
(2) Lessen the chance of surprise by acting as an alarm to hostile intent. Extensive and
7
8 aggressive CI source networks provide a protective buffer to alert the MAGTF to developments that
9 run counter to previously made assumptions3 .
(d) Support to Force Protection
10
(1) Contact host nation authorities and persons known to be friendly to the U.S. to collect all
11
12 available CI information and to aid with screening of local inhabitants.
(2) In conjunction with the MAGTF provost marshall, advise the commander on establishing
13
14 security against sabotage and terrorism for all military installations and those civilian installations to be
15 kept in operation.
(3) Recommend procedures for all areas vacated by MAGTF units, particularly command
16
17 posts, to determine if any compromising material has been inadvertently left behind.
(4) Advise the G/S-3 on counter-reconnaissance and OPSEC measures.
18
(5) Identify necessary restrictions on informing MAGTF personnel about mission details,
19
20 D-day, H-hour, designated landing beaches, helicopter landing zones, selected objective and other
21 critical friendly force information requirements..
(6) In coordination with the G/S-6 and subordinate commanders, provide assistance with
22
23 MAGTF communications and information systems security.
(e) Support to Targeting. Supervise the accomplishment of CI operations in accordance with
24
25 the CI plan. Included are the following:
(1) Exploit sources of information to provide critical intelligence to commanders and planners.
26
27 Provide pre-targeting surveillance and route reconnaissance enabling the commander to determine the
28 appropriate method and force to be applied against the target.
3
This concept was effectively applied during Somalia operations to identify, with a 95% accuracy
rate, the impending attack of opposition elements of U.S. and multinational forces.
6-25
(b) CI units of adjacent or other theater forces and the support expected.
(c) In amphibious operations, JFMCC and amphibious task force CI elements that may
3
4 provide support to the landing force.
(d) Within JTF operations, pertinent CI capabilities and support from the combatant
5
6 command's joint intelligence center/joint analysis center, JTF J-2X, JFLCC, JFACC, and other
7 component commanders/task forces.
(2) Planned arrangement, employment, and use of external CI support (to include any special
8
9 collection, production, dissemination and CIS arrangements.)
(3) Establishment of coordinating instructions for the planning and control of CI operations to
10
11 include technical support expected from higher headquarters.
12
13
(6) CI dissemination priorities and plans, to include communication and information systems
14
15 support to the MAGTF CI effort.
16
(8) An appendix providing MAGTF countersigns challenges and passwords and supporting
17
18 procedures.
6-27
CHAPTER 7
17
(3) Detailed study of available maps and photographs of potential areas of operations.
18
(4) Study of all available intelligence products about the area of operations and threat.
(5) Location and plotting of all critical CI targets, categorized by personalities, organizations
19
20 and installations. These are categorized and studied and plans formulated for coverage and reduction.
21 Target priorities must be assigned in advance to ensure efficient use of personnel. The area surrounding
22 a target is studied to determine points where sealing off would be most effective. Streets and
23 approaches to targets are studied thoroughly, thereby minimizing the need for extensive physical
24 reconnaissance. Main traffic routes are studied to determine locations in which to establish screening
25 centers and checkpoints.
(6) Acquisition or development of personalities (black, gray, and white lists), organizations,
26
27 installations and incidents Databases (POI&I) for the target area.
(7) Study of all available records to identify host country, third party or other officials and
28
29 leaders within the area of operations that the enemy is hostile to. Also study of other persons who could
30 be of value in administrative assignments. These include members of the local police force, fire
7-1
(1) Where the nature of subordinate units missions require organic CI support.
16
17
(1) During both static and fluid tactical situations in populated areas, CI/HUMINT Co
18
19 headquarters normally is centrally located and easily accessible to indigenous personnel. The
20 headquarters is located to provide maximum assistance to other agencies and to ensure protection by
21 them if required. During high tempo operations, however, the CI/HUMINT Company HQ will be
22 located near the supported units main command post, but outside of its key vital area perimeter, in
23 order to enhance security while remaining accessible to key indigenous personnel.
(2) In deploying CI personnel, consideration is given to retaining at least one subteam at the
24
25 headquarters for special assignments and emergencies.
(3) When CI elements are held in reserve, personnel are organized and equipped so that the
26
27 augmentation subteams may be immediately dispatched to forward units that require CI support or
28 reinforcements.
1
CI Contingency Materials (CICM) are focused CI analytical products such as sanitized mapping,
imagery and reference material available from the MAGTF all-source fusion centers CI analytical team;
the theater JICs CI analytical cell through the combatant command's CISO; and DIAs Operational
Intelligence Coordination Center, Counterintelligence Division and Transnational Threat Division.
7-2
15
16
17
(4) Persons without identification papers or with forged papers (inconsistent with the norm).
18
19
20
21
(8) Target personalities, such as those on the personalities list (black, gray, or white lists).
22
(10) Persons who must be questioned because they are under consideration for employment with
23
24 U.S. forces or for appointment as civil officials by CA units.
b. Coordination. CI personnel plan these screening operations, as far as possible, in conjunction
25
26 with the following:
(1) Commander. The commander is concerned with channeling refugees and EPWs through
27
28 the AO, particularly in the attack, to prevent any hindrance to unit movement, or any adverse effect on
7-3
(4) Civil Affairs. CA elements are responsible for the proper disposition of refugees.
(5) Psychological Operations (PSYOP). PSYOP elements, under the G3, contribute to
10
11 screening operations by informing the populace of the need for their displacement.
(6) Local Civil Authorities in Hostile Areas. Civil authorities in hostile areas are included in
12
13 planning only if control has been returned to them.
14
c. Preparation
(1) Prior to the operation, CI personnel must become thoroughly familiar with all available
15
16 information concerning the enemy intelligence organization, the military and political situation within the
17 enemy controlled area, and the geography of the area.
(a) Enemy's Intelligence, Infrastructure and Organization. To successfully identify enemy
18
19 intelligence agents, CI personnel must be knowledgeable of the enemy intelligence organization,
20 including its mission, methods of operation, officials, schools and training, known agents, equipment, and
21 policies and regulations.
(b) Regulations. Knowledge of the political situation and of the restrictions placed on the
22
23 population within the enemy controlled area aid in detecting discrepancies during the screening.
24 Information required includes travel restrictions, curfews, draft and conscription regulations, civilian
25 labor forces and work patterns, and the education system.
(c) Enemy Order of Battle. Researching, analyzing and producing order of battle
26
27 information is primarily the responsibility of the MAGTF G-2 AFC. Collection of order of battle
28 information from human sources is the primary responsibility of the interrogator translators. However,
29 CI personnel must be aware of the enemy military units operating within the area. They must also be
30 knowledgeable of their disposition, composition, activities, training, equipment, history, and
31 commander's personalities. This information aids in identifying military intelligence personnel or other
32 persons attempting to hide their identity.
7-4
19
(f) Details of the individual's career to include schools, military service, technical and
20
21 professional qualifications, political affiliations, and foreign travels.
(g) Details of current travel to friendly lines/point of capture, to include point of departure,
22
23 destination, times, and purpose.
(h) Additional questions may be included which relate to specific indicators revealing areas
24
25 of CI interest.
d. Initial Screening
26
(1) The initial screening is designed to identify those persons who are, or are most likely to be,
27
28 of CI interest and who require interrogation by CI personnel. Initial screening is conducted as soon as
3
The Geneva Conventions do not require all of this. If the person refuses to give the information,
there is nothing that can be done about it. Prepare the form in the native language of the host nation and
enemy force, if different, ensuring that it is prepared in the proper dialect of the language.
7-5
(1) The success of the screening operation is influenced by the degree of preparation and the
14
15 quality of the information provided to CI and other personnel conducting the initial screening. CI
16 interrogation is the method used to confirm or to deny that the person is of CI interest and to exploit the
17 information obtained, when appropriate. CI interrogation is used throughout the entire screening
18 process.
(2) In many cases, numerous EPWs and refugees preclude CI interrogation of every individual.
19
20 Those persons who are of CI interest are evacuated through CI channels for further interrogation and
21 exploitation by rear area CI elements. During the conduct of the screening process, persons who are
22 determined not to be of CI interest are returned to EPW or refugee channels as appropriate. A
23 screening or an interrogation report is completed on each individual referred for further interrogation.
24 This report clearly identifies those areas of CI interest. It includes as much information as possible
25 concerning the individual's identity and documentation, background, recent activities, and route of travel
26 to friendly lines or point of capture.
(3) CI Screening Report. Appendix E contains formats for the CI screening report and for an
27
28 interrogation report. The CI screening report should include the following:
(a) Identity. Screen all identifying documents in the form of ID cards, ration cards, draft
29
30 cards, driver's license, auto registration, travel documents, and passport. Record rank, service number,
31 and unit if a person is, or has been a soldier. Check all this information against the form previously filled
32 out by the detainee if this was done.
(b) Background. The use of the form identified earlier will aid in obtaining the information
33
34 required; however, certain information areas on the forms will have to be clarified, especially if data
35 indicate a suspect category or the person's knowledge of intelligence information. If the form has not
36 been filled out at this point, try to gain the information through questioning.
7-6
(c) Recent Activities. Examine the activities of persons during the days before their
1
2 detainment or capture. What were they doing to make a living? What connection, if any, have they had
3 with the enemy? Why were they in the MAGTF's area? This line of questioning may bring out
4 particular skills such as those associated with a radio operator, linguist, or photographer. Make
5 physical checks for certain types of calluses, bruises, or stains to corroborate or disprove his story.
6 Sometimes soil on shoes will not match that from the area he claims to come from.
(d) Journey or Escape Route. CI personnel should determine the route the individual took
7
8 to get to MAGTF lines or checkpoints. Question the individual further on time, distance, and method of
9 travel to determine whether or not the trip was possible during the time stated and with the mode of
10 transportation used. Discrepancies in travel time and distances can be the key to the discovery of an
11 infiltrator with a shallow cover story. By determining what an individual observed enroute, the screener
12 can either check the person's story or pick up intelligence information concerning the enemy forces.
13 Interrogators/translators are well trained in this process and should be called upon for assistance and
14 training.
15
f. Indicators
(1) Indicators aid with identifying possible hostile infiltrators or other targets of CI interest.
16
17 They are determined after a thorough study of the enemy area, the political and military situation, and the
18 enemy intelligence organization.
(2) For maximum effectiveness, indicators must relate to designated PIRs and other IRs tasked
19
20 to CI elements. However, the following general indicators may serve as a guide to identify persons as
21 possible infiltrators:
22
(a) Persons of military age who are not members of the armed forces.
23
24
25
26
27
(e) Persons possessing unusually large amounts of money, precious metals, or gems.
28
(g) Persons having a pro-enemy background, family members in enemy area, or who have
29
30 collaborated with the enemy.
7-7
10
11
12
(1) Checkpoints are employed in screening operations in populated areas and along routes of
13
14 travel. Checkpoints are used to detect and prevent enemy infiltration of espionage, sabotage, terrorist,
15 and subversive agents. They are also used to collect information which may not otherwise be available
16 to intelligence units.
(2) Checkpoints are established at key locations throughout the AO where sufficient space is
17
18 available for conducting searches and assembling the people to be screened. Provision is made for the
19 security of the checkpoint, and personnel are positioned to the front and rear of the checkpoint to
20 apprehend anyone attempting to avoid it. Figure 7-1 depicts a typical checkpoint.
7-8
1
2
(a) A mobile checkpoint can be used as a moving system. This system consists of the
3
screening
team,
either mounted in vehicles or on foot, selecting individuals to be stopped for questioning
4
5 and a check of identity. The mobile checkpoint also may be established at various locations, usually for
6 periods not to exceed one day.
7-9
a. General
(1) The timely seizure and exploitation of CI targets require a detailed and coordinated plan that
13
14 has been prepared well in advance. CI elements, in most instances, cannot neutralize, guard, or
15 physically control targets without assistance. In some cases, this assistance must come from ground
16 combat units for the seizure and protection of well-defended targets. In other cases, the assistance may
17 be provided by combat support, combat service support, aviation units or even host country elements.
18 It is essential that the required assistance be provided for during the planning phase.
(2) The senior tactical unit commander will be the individual responsible for the conduct of the
19
20 cordon and search operation. That commander will plan, with advice from CI, interrogation, CA, and
21 PSYOP personnel, the cordon which is usually deployed at night, and the search which normally begins
22 at first light.
(3) MAGTF CI personnel normally accompany the troops used in cordon and search
23
24 operations to advise, assist, and examine and/or exploit the target at the earliest possible time. In some
25 instances, it may be advantageous for CI personnel to rendezvous with the assigned troops at the target
26 area. Except in unusual cases, the tactical effort takes precedence over the neutralization and
27 exploitation of CI targets. If assistance in target seizure is not available, CI elements may have to rely
28 on their own assets to neutralize or exploit targets. In friendly controlled areas, CI elements may
29 coordinate through the JTF TFCICA to receive assistance from other service CI elements, civil police
30 and security agencies.
31
(1) Community Operations. The basic operation is the community cordon and search operation
32
33 shown in figure 7-2.
7-10
2 As the screening element sets up the collection or screening station (see figure 7-3), the sweep element
3 escorts the residents toward the station, leaving behind one resident to care for family belongings, if
4 required by law.
7-11
(a) The search element follows behind the sweep element searching houses, storage areas,
2
3 cemeteries and so forth, with dogs and metal detection equipment. CI personnel are searching for
4 evidence of enemy intelligence collection operations to include communications codes or other such
5 paraphernalia. Each search element should include a CI team with an interrogator/translator element as
6 required, which will have a list of persons of CI interest.
(b) In the collection or screening station, bring the residents to the collection area (or holding
7
area)
and
then
systematically lead them to specific screening stations. Enroute to the screening station,
8
9 search each individual for weapons. Then lead the residents past the mayor or community leaders
10 (enemy defectors or cooperating prisoners who will be hidden from view so that they can
11 uncompromisingly identify any recognizable enemy). These informants will be provided with the means
12 to notify a nearby guard or a screener if they spot an enemy member. Immediately segregate this
13 individual and interrogate by appropriate personnel.
7-12
(c) At specific screening stations, ask the residents for identification, check against
1
2 personalities list (black list), and search for incriminating evidence by electronic equipment.
(d) Move suspected persons on for photographing, further interrogation, or put them in the
3
4 screening area detention point to be taken back to a base area or interrogation facility for detailed
5 interrogation upon completion of the operation.
(e) Pass innocent residents through to the post screening area where they are provided
6
7 medical assistance and other civic assistance, as well as entertainment and friendly propaganda.
(f) Return any persons caught attempting to escape or break through the cordon
8
9 immediately to the detention area.
(g) When the operation is terminated, allow all innocent individuals to return to their homes,
10
11 and remove the enemy suspects under guard for further interrogation. Photograph all members of the
12 community for compilation of a village packet, which will be used in future operations.
(2) "Soft" or area operation. The second type of cordon and search operation is very frequently
13
14 referred to as the "soft" or area cordon and search. This operation includes the cordoning and searching
15 of a rather vast area (for example, a village area incorporating a number of hamlets, boroughs, town, or
16 villages which are subdivisions of a political area beneath country level).
(a) This type of operation requires a larger military force to cordon off the area; a pooling of
17
18 all paramilitary, police, CA, CI and intelligence resources to conduct search and screening; and a
19 formidable logistical backup. This kind of operation extends over a period of days and may take as
20 long as a week or possibly longer.
(b) While screening and search teams systematically go from community to community and
21
22 screen all residents, military forces sweep the area outside the communities over and over again to seek
23 out anyone avoiding screening. As each resident is screened, CI personnel will issue documents
24 testifying to the fact that he was screened and if necessary, allow him restricted travel within the area.
(c) Other population and resource control measures are used as well. Such an opportunity
25
26 may allow the chance to issue new ID cards and photograph all of the area's residents.
(d) As each community screening proceeds, send individuals who were designated for
27
28 further interrogation to a centralized interrogation center in the cordoned area. Here, CI personnel will
29 work with interrogator/translator personnel, both MAGTF and indigenous, police, and other security
30 service interrogators.
7-13
32
33
34
35
(10) Persons who must be questioned because they are under consideration for employment with
5
6 MARFOR units or for appointment as civil officials.
b. Objectives of CI Interrogators. The CI interrogation in combat areas assists in the
7
8 accomplishment of three major objectives:
(1) In the screening process, refugees whose very presence threatens overall security are
9
10 removed from the battlefield.
(2) In detailed interrogations, enemy agents with espionage, sabotage, terrorist, or subversive
11
12 missions are detected.
(3) The wide range of CI activities and types of interrogations permit the collection of information
13
14 of value to other intelligence and security agencies and to the planners of military operations. CI
15 interrogators must be especially alert to obtain and report information of immediate tactical value which
16 may not have been previously obtained or reported.
c. Indicators Warranting Suspicion. CI personnel must be alert during interrogations for
17
18 indications of intelligence activity. The following are indicators which, separately or collectively, may
19 generate suspicion that a subject is in the employ of or acting in sympathy with enemy forces.
(1) Access to Information or Targets. A prospective terrorist, subversive, espionage, or
20
21 sabotage agent must have access to the information desired by the enemy or to the target installation to
22 be destroyed to carry out his mission. The interrogation should establish a subject's accessibility to
23 potential targets, including his location at the time he was apprehended.
(2) Technical Skills. Proficiency in certain technical skills is frequently an attribute of an
24
25 espionage or sabotage agent. The subject who has a mastery of one or several foreign languages and a
26 knowledge of radio operation or cryptography is questioned carefully on the nature and purpose of his
27 training in those fields. His practical experience and his work in those fields, during or shortly prior to
28 the war, should give CI personnel cause for strong suspicion. The individual's story then must be closely
29 examined.
7-15
18
(b) Accent peculiar to an area the subject refuses to acknowledge as his own.
19
20
21
(7) Suspicious Actions or Activities. Indigenous persons displaying unusual interest in troop
22
23 units of equipment or loitering persistently in the vicinity of troop units and installations without
24 reasonable explanation are sufficient to warrant interrogation for the purpose of clarifying the stature of a
25 person so involved.
(a) Violations of Civil or Military Regulations. Mere violation of military regulations in
26
27 an area controlled by the military may be relatively unimportant to CI elements. These violations may be
28 mandatory registration, curfews, travel restrictions, or declaration of weapons. However, the motives
29 which cause such violations despite severe penalties may be compelling and possibly of great interest to
30 CI personnel.
(b) Modus Operandi (MO). The frequent similarity in tactics of hostile agents working for
31
32 the same enemy agency, their means of contact with their agent handlers, type of cover story, and
7-16
13
14
15
16
17
18
(8) Methods and sources used, to include surveillance and polygraph support.
19
c. Order of Investigation. All CI investigations vary, and as such, all investigative plans will be
20
21 different. The following actions are typically conducted during an investigation. Tailor investigative plans
22 to each investigation. Investigative actions selected should be sequenced to ensure a swift and successful
23 completion of the investigation.
24
25
(3) Exploitation of new leads and consolidation of all available data for analysis and planning a
26
27 course of action (COA).
28
(4) Conduct physical and technical surveillance to augment other investigative activities4 .
10
(5) Conduct cordon, search and seizure when necessary. Do not conduct searches unless
11
12 directed by proper authority. CI personnel may coordinate this activity with law enforcement agencies,
13 depending on the nature of the investigation.
e. Files and Records. Checking files and records for pertinent information on the subject of the
14
15 investigation is the first action in CI investigations. Checks should begin with local unit files and expand
16 to include other possible sources. The full exploitation of records examination as an investigative tool
17 depends on several factors which the CI agent must consider.
(1) CI personnel must know what, where, by whom, and for what purpose records are
18
19 maintained throughout the AO. Upon assignment to an operational unit, the initial orientation should
20 stress that CI personnel be thoroughly familiar with records that may be of assistance in investigations.
(2) Most records are available to CI personnel upon official request. If all efforts to obtain the
21
22 desired information through official channels are unsuccessful, the information or records cannot be
23 subpoenaed unless legal proceedings are initiated.
(3) There are occasions when documentary information or evidence is best obtained through
24
25 other investigative means. The possibility of intentional deception or false information in both official and
26 unofficial records must always be considered. Because data is recorded in some documentary form
27 does not in itself ensure reliability. Many recorded statistics are untrue or incorrect, particularly items of
28 biographical data. They are often repetitious or unsubstantiated information provided by the subject
29 being investigated and are not to be confused with fact.
4
See FM 34-5, (S) Human Intelligence and Related Counterintelligence Activities, for a
detailed explanation of surveillance operations.
7-20
(a) Detection and prevention of activity that threatens the security of the U.S. Army.
(b) Collection of information of intelligence interest.
(3) When preparing for an interrogation, CI personnel should:
(a) Gather and digest (complete familiarization) all available material concerning the subject
28
29 and the case.
(b) Be familiar with those legal principles and procedures which may apply to the case at
30
31 hand. Legal requirements may differ depending on: whether the U.S. is at war or in a military
32 occupation; status of forces agreements; whether the subject being interrogated is a U.S. citizen; or
33 whether the subject is an EPW.
7-23
(c) All participants in the interrogation team are thoroughly briefed on the case and
8
9 interrogation plan.
10
(d) Sources or other persons to be used to confront the subject are available.
11
(f) As appropriate, arrangements are made for the subject to be held in custody or provided
12
13 billeting accommodations.
14
15
(6) When conducting the interrogation, the following points are important:
(a) Use background questioning to provide an opportunity to study the subject face-to-face.
(b) Avoid misinterpretation and impulsive conclusions. The fact that the person is suspected
16
17 may in itself create reactions of nervousness and emotion.
18
(c) Do not allow note-taking to interfere with observing the subject's reaction.
19
(d) Seek out all details concerning the subject's implication in a prohibited activity.
(e) Examine each of the subject's statements for its plausibility, relationship to other statements
20
21 or to known facts, and factual completeness. Discrepancies which require adjustment frequently
22 weaken the subject's position.
(f) Attempt to uncover flaws in details not considered relevant to the issue; finding the story's
23
24 weakness is the key to a successful interrogation.
(g) Build up to a planned final appeal as a sustained and convincing attack on the subject's
25
26 wall of resistance. Eloquent and persuasive reasoning and presenting the facts of the case may succeed
27 where piecemeal consideration of evidence failed to produce a confession. This appeal may be based
7-24
(a) The objective, or information desired, is the key factor in determining the subject, the
14
15 elicitor, and the setting.
(b) Once the subject has been selected because of his or her access to or knowledge of the
16
17 desired information, numerous areas of social and official dealings may provide the setting.
(c) Before the approach, review all available intelligence files and records, personality
18
19 dossiers, and knowledge possessed by others who have previously dealt with the subject. This will help
20 to determine the subject's background, motivation, emotions, and psychological nature.
(2) Approach. Approach the subject in normal surroundings to avoid suspicion. There are two
21
22 basic elicitation approaches: flattery and provocation. The following variations to these approaches may
23 be used:
(a) By appealing to the ego, self-esteem, or prominence of the subject, you may be able to
24
25 guide him or her into a conversation on the area of operation.
(b) By soliciting the subject's opinion and by insinuating that he or she is an authority on a
26
27 particular topic.
(c) By adopting an unbelieving attitude, you may be able to cause the subject to explain in
28
29 detail or to answer out of irritation. CI personnel should not provoke the subject to the point where
30 rapport is broken.
7-25
(b) A request for additional information where the subject's response is unclear; for
10
11 example, "I agree; however, what did you mean by...?"
(c) A hypothetical situation which can be associated with a thought or idea expressed by the
12
13 subject. Many people who would make no comment concerning an actual situation will express an
14 opinion on hypothetical situations.
h. Sabotage Investigations. Sabotage is defined as an act, the intent of which is to damage the
15
16 national defense structure. Intent in the sabotage statute means knowing that the result is practically
17 certain to follow, regardless of any desire, purpose, or motive to achieve the result. Because the first
18 indication of sabotage normally will be the discovery of the injury, destruction, or defective production,
19 most sabotage investigations involve an unknown person or persons. We expect acts of sabotage, both
20 in overseas AOs and in CONUS, to increase significantly in wartime. Sabotage is a particularly
21 effective weapon of guerrilla and partisan groups, operating against logistic and communications
22 installations in occupied hostile areas, and during insurgencies. Trained saboteurs sponsored by hostile
23 guerrilla, insurgent, or intelligence organizations may commit acts of sabotage. Individuals operating
24 independently and motivated by revenge, hate, spite, or greed may also conduct sabotage. In internal
25 defense or limited war situations where guerrilla forces are active, we must be careful to distinguish
26 among those acts involving clandestine enemy agents, armed enemy units, or dissatisfied friendly
27 personnel. Normally, we categorize sabotage or suspected sabotage according to the means employed.
28 The traditional types of sabotage are incendiary, explosive, and mechanical. In the future, nuclear and
29 radiological, biological, chemical, magnetic, and electromagnetic means of sabotage will pose an even
30 greater threat to military operations. Sabotage investigations require immediate action. The possibility
31 exists that the saboteur may still be near the scene, or that other military targets may require immediate
32 or additional security protection to avoid or limit further damage. We must preserve and analyze the
33 incident scene before evidence is altered or destroyed.
(1) Questions. The investigation must proceed with objective and logical thoroughness. The
34
35 standard investigative interrogatives apply:
7-26
10
11
12
13
(4) Study all available information such as evidence, technical and laboratory reports, statements
14
15 of sources, and information from informants in preparation for interrogation of suspects.
i. CI Walk-in Interviews. A walk-in is defined as an individual who seeks out MAGTF
16
17 authorities to volunteer information which is believed to be of intelligence value. The primary concern of
18 CI personnel is to obtain all information, both of intelligence and CI value. They must be alert to detect
19 whether the source provides leads for further exploitation.
(1) Motivation. When interviewing such persons, CI personnel must consider the source's
20
21 motives for divulging information. The motivation may not always be known, and sources may not
22 always be truthful about their motives. If the motive can be determined early in the interview, however,
23 it can be valuable in evaluating the information supplied and in determining the nature and extent of the
24 source's knowledge and credibility. Motivation includes, but is not limited to: ideology, personal gain,
25 protection of self or family ties, fear, misunderstanding of the function and mission of the MAGTF,
26 mental instability, and revenge.
27
(a) Should adapt to the intellectual level of the source, exercise discretion, and avoid
28
29 controversial discussions.
7-28
(c) Must remember security regulations and make no commitments which cannot be fulfilled.
(3) Conduct of a Walk-In Interview. Put the Source at ease. After determining that a walk-in
4
5 source has information of intelligence value, display the appropriate credentials.
(a) Take the source to a private place to conduct the interview. The initial attitude frequently
6
7 affects the success of the interview. The atmosphere should be pleasant and courteous, but
8 professional. In accordance with the Privacy Act of 1974, the source must be given a four point
9 Privacy Act Advisement to include authority, principle purpose, routine uses, and voluntary and
10 mandatory disclosure, prior to the CI agent obtaining the source's personal information. Ask the source
11 for some form of identification, preferably one with a picture.
12
(b) Record the pertinent data from the ID card and tactfully exit the room.
(c) Using the identity information just obtained from the source, check the office source or
13
14 informant files to see what, if any, information on the source is on file. Determine if the source is listed as
15 a crank, has a criminal record, or has reported information in the past, and if so, what was the validity
16 and value of that information.
(d) If the source is listed as a crank or a nuisance continue with the interview, but include this
17
18 information in the appropriate memorandum.
(e) Let the source tell the story. Suggest that the source start the story from the beginning,
19
20 using the Source's own words. Once started, let the Source talk without interruption. CI personnel
21 should, however, guide the source back if the he strays from the basic story. From time to time,
22 interject a word of acknowledgment or encouragement. At no time, however, should CI personnel give
23 any indication of suspicion or disbelief, regardless of how incredulous the story may seem. While the
24 source gives an account for the first time, take minimal notes. Taking notes could distract the source or
25 the CI interviewer. Instead, pay close attention and make mental notes of the salient points as a guide
26 for subsequent detailed interviewing.
27
(f) Review the story with the source and take notes. Once the source has finished telling the
28
29 basic story, he or she generally will freely answer specific questions on the details. Being assured that
30 the information will be kept in strict confidence, the source will be less apprehensive of your note taking.
31 Start at the beginning and proceed in a chronological order, using the salient features of the source's
32 account. Interview the source concerning each detail in the account so that accurate, pertinent
33 information is obtained, meticulously recorded, and that the basic interrogatives are answered for every
34 situation. This step is crucial.
7-29
Procedures for the disposition of enemy documents and material will be contained in MCWP
2-15.5, Human Resource Intelligence, planned for publication by the end of FY99.
7-30
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
INSTRUCTIONS
(Document Tag)
1. Complete lower half of tag for
each document or group of
documents captured from one
individual or location.
2. Wrap document to prevent loss
or damage.
3. Securely affix tag to document.
4. If captured from other than an
individual, evacuate through
intelligence channels.
Additional information:________
___________________________
___________________________
7-33
(b) When the subject of the investigation has been interviewed or thoroughly debriefed.
(c) When verification of the information by means of polygraph is deemed essential for
4
5 completion or continuation of the investigation.
(d) To determine if a person is attempting deception concerning issues involved in an
6
7 investigation.
(e) To obtain additional leads concerning the facts of an offense, the location of items,
8
9 whereabouts of persons, or involvement of other, previously unknown individuals.
10
11
(h) To provide a just and equitable resolution of a CI when the subject of such an
12
13 investigation requests an exculpatory polygraph in writing.
(2) Phases. The polygraph examination consists of three basic phases: pretest, intest, and
14
15 posttest.
(a) During the pretest, appropriate rights advisement are given and a written consent to
16
17 undergo polygraph examination is obtained from all examinees who are suspects or accused. Advise
18 the examinee of the Privacy Act of 1974 and the voluntary nature of examination. Conduct a detailed
19 discussion of the issues for testing and complete the final formulation of questions to be used during
20 testing.
(b) During the intest phase, ask previously formulated and reviewed test questions and
21
22 monitor and record the examinee's responses by the polygraph instrument. Relevant questions asked
23 during any polygraph examination must deal only with factual situations and be as simple and direct as
24 possible. Formulate these questions so that the examinee can answer only with a yes or no. Never use
25 or ask unreviewed questions during the test.
(c) If responses indicate deception, or unclear responses are noted during the test, conduct a
26
27 posttest discussion with the examinee in an attempt to elicit information from the examinee to explain
28 such responses.
(3) Outcomes. A polygraph examiner may render one or more of four possible opinions
29
30 concerning the polygraph examination:
7-34
15
(c) Any current medical disorder, to include colds, allergies, or other conditions (such as
16
17 pregnancy or recent surgery).
18
19
20
21 .
22
(a) To avoid such conditions as mental or physical fatigue, do not conduct prolonged or
23
24 intensive interrogation or questioning immediately before a polygraph examination. CI personnel tell the
25 potential examinee to continue taking any prescribed medication and bring it to the examination. Based
26 on information provided by CI personnel and the examiner's own observations, the polygraph examiner
27 decides whether or not a person is fit to undergo examination by polygraph. When CI personnel ask a
28 person to undergo a polygraph examination, the person is told that the examination is voluntary and that
29 no adverse action can be taken based solely on the refusal to undergo examination by polygraph.
30 Further, the person is informed that no information concerning a refusal to take a polygraph examination
31 is recorded in any personnel file or record.
7-35
(1) TSCM versus TEMPEST. TSCM is concerned with all signals leaving a sensitive or secure
27
28 area, to include audio, video, and digital or computer signals. There is a definite distinction between
29 TSCM and TEMPEST.
(a) TEMPEST is the unintentional emanation of electronic signals outside a particular piece of
30
31 equipment. Information systems, computers, and electric typewriters create such signals. The words to
32 focus on in TEMPEST are "known" and "unintentional" emanations. TEMPEST is controlled by careful
33 engineering or shielding.
(b) TSCM is concerned with the intentional effort to gather intelligence by foreign intelligence
34
35 activities by impulsing covert or clandestine devices into a U.S. facility, or modifying existing equipment
7-36
Fully justified requests of an emergency nature, or for new facilities, may be submitted
1
2 at any time, but should be submitted at least 30 days before the date the support is required.
(d) Compromises. The compromise of a TSCM investigation or service is a serious security
3
4 violation with potentially severe impact on national security. Do not compromise the investigation or
5 service by any action which discloses to unauthorized persons that TSCM activity will be, is being, or
6 has been conducted within a specific area. Unnecessary discussion of a TSCM investigation or service,
7 particularly within the subject area, is especially dangerous. If a listening device is installed in the area,
8 such discussion can alert persons who are conducting the surveillance and permit them to remove or
9 deactivate their devices. When deactivated, such devices are extremely difficult to locate and may
10 require implementation of destructive search techniques. In the event a TSCM investigation or service is
11 compromised, the TSCM team chief will terminate the investigation or service at once. Report the
12 circumstances surrounding the compromise of the investigation or service to the supported unit's or
13 installations intelligence officer or security manager.
(e) Completion. When a TSCM survey or inspection is completed, the requester is usually
14
15 given reasonable assurance that the surveyed area is free of active technical surveillance devices or
16 hazards.
TSCM personnel inform the requester about all technical and physical security
17
18 vulnerabilities with recommended regulatory corrective actions.
The requester should know that it is impossible to give positive assurance that there
19
20 are-no devices in the surveyed area.
The security afforded by the TSCM investigation will be nullified by the admission to
21
22 the secured area of unescorted persons who lack the proper security clearance. The TSCM
23 investigation will also be negated by: (a) Failing to maintain continuous and effective surveillance and
24 control of the serviced area; (b) allowing repairs or alterations by persons lacking the proper security
25 clearance or not under the supervision of qualified personnel; and (c) introducing new furnishings or
26 equipment without a thorough inspection by qualified personnel.
(f) Subsequent Security Compromises. Report immediately to the intelligence officer or
27
28 security manager the discovery of an actual or suspected technical surveillance device via a secure
29 means. All information concerning the discovery will be handled at a minimum of SECRET. Installation
30 or unit security managers will request an immediate investigation by the supporting CI unit or supporting
31 TSCM element.
32 7009. Counterintelligence Surveys/Vulnerability Assessments, Evaluations, and Inspections
a. Tactical Operations. During operations, CI surveys/vulnerability assessments, evaluations, and
33
34 inspections, including TSCM inspections and surveys, are usually limited to permanent installations in
7-39
(a) Determine if assigned personnel with access to classified material are properly cleared.
28
(c) Examination of facilities and containers used for storing classified material to determine
29
30 adequacy.
(d) Examination of procedures for controlling entrances and exits, guard systems, and special
31
32 guard instruction relating to security of classified material and sensitive areas.
33
(e) Examine the security and control of unit communications and information resources.
(f) Provide back brief to command security/intelligence personnel and formal results as
34
35 required.
7-40
(a) Announced Inspections. An announced inspection is one that has been publicized. All
2
3 personnel concerned are aware of the inspection schedule and make preparations as necessary.
4 Inspections are conducted on a recurring basis to ensure security standards remain at a high level. The
5 announced inspection is often accomplished with inspections conducted by the inspection staff of the
6 common or a senior headquarters.
(b) Unannounced Inspections. The unannounced inspection is conducted to determine
7
8 compliance with security policies and procedures at a time when special preparations have not been
9 made. The unit or section to be inspected is not informed in advance of the inspection. The inspection
10 may be conducted at any time during or after normal working hours.
11 7010. CI Support to the Crisis Action Team Intelligence Cell. When an intelligence cell is
12 established in response to a terrorist threat or incident, CI personnel jointly man it with CID, NCIS, and
13 if required, civilian law enforcement agents. The intelligence cell coordinates the intelligence,
14 investigative, and criminal information needs of the installation and the on-scene operational commander.
15 It should be separate from both the operations center and the crisis management force/on-scene
16 commander but linked to both by a side variety of wire and wireless communications means, including a
17 direct data link. The design of the intelligence should be flexible to allow for the rapid integration of
18 other federal, state, and local agencies, as appropriate. An intelligence cell may be established both in a
19 garrison and a field environment.
20 7011. CI Mission Profiles. The following CI mission profiles were initially developed to aid CI
21 planning and execution in support of MEU(SOC) special operations missions. They are, however,
22 pertinent to CI support of any MAGTF unit executing these missions.
a. Amphibious Raid. An amphibious raid is a landing from the sea on a hostile shore which
23
24 involves swift incursion into or temporary occupancy of an objective and mission execution, followed by
25 a planned withdrawal. Key CI requirements include:
(1) Assist the unit intelligence, operations and communications and information systems (CIS)
26
27 officers with intelligence, CI, security and force protection planning.
28
12
(9) Assist ground combat element (GCE) and aviation combat element (ACE) intelligence
2
3 officers with escape and evasion plans.
(10) Attach CI personnel to GCE when required.
4
5
(11) Conduct liaison with U.S. embassy country team for third party escape and evasion
6
7 assistance.
8
(5) Assist in the planning and conduct of counter-reconnaissance operations to support key sites.
(6) Establish access to CI and HUMINT databases, automated links to JTF, other joint and
24
25 services, coalitions, and host nation sources to help identify, assess, and develop countermeasures for
26 threats. Explore CI database for information related to enemy or other potential hostile PO&I, and then
27 develop the CI target reduction plan.
28
29
(9) Provide CI officer -- and possibly a CI subteam or HET -- to the forward command element
30
31 (FCE) for on-scene liaison and support.
7-43
(10) When directed, attach CI personnel to the combat service support element (CSSE)
1
2 evacuation control center (ECC) to assist in time sensitive debriefs, liaison, antiterrorism measures, and
3 to assist in personnel screening.
(11) Provide from CI database, a sanitized copy of the black, white, and gray lists to the CSSE
4
5 ECC for screening of persons of immediate interest.
6
(12) Conduct liaison with U.S. embassy country team for third party assistance.
(13) Conduct in-depth debriefs of non-combatant evacuees who may have information of
7
8 intelligence/CI value.
d. Show of Force Operations. A show of force operation is designed to demonstrate U.S.
9
10 resolve, which involves increased visibility of deployed military forces in an attempt to defuse a specific
11 situation that, if allowed to continue, may be detrimental to U.S. interests or national objectives.
(1) Assist the unit intelligence, operations and CIS officers with intelligence, CI, security and
12
13 force protection planning.
(2) Assist and coordinate with unit psychological operations, public affairs, and civil affairs
14
15 planners, with emphasis on development of operational plans to target and influence attitudes and
16 behaviors of personnel within the AO.
17
18
19
(5) Conduct liaison with U.S. embassy country team for third party assistance.
20
e. Reinforcement Operations
(1) Assist the unit intelligence, operations and CIS officers with intelligence, CI, security and
21
22 force protection planning.
23
(4) Assist in the planning and conduct of counter-reconnaissance operations to support key sites.
7-44
f. Security Operations
(1) Assist the unit intelligence, operations and CIS officers with intelligence, CI, security and
8
9 force protection planning.
10
(3) Provide recommendations and planning assistance regarding past hostile antiterrorism
11
12 measures, capabilities, and countermeasures development.
(4) Provide estimates and recommendations on on counterespionage and countersabotage
13
14 vulnerabilities and countermeasures.
15
(5) Conduct CI/HUMINT collection operations to satisfy tasked PIRs and IRs.
(6) Attach CI personnel to the GCE when directed for direct support to the GCE Commander
16
17 and to conduct special activities ashore.
18
(7) Assist in the planning and conduct of counter-reconnaissance operations in the rear area..
(8) Establish access to CI and HUMINT databases, automated links to JTF, other joint and
19
20 services, coalitions, and host nation sources to help identify, assess, and develop countermeasures for
21 threats. Research CI database for information related to PO&I and development of the CI target
22 reduction plan.
23
g. Civic Action. Military civic action is the use of preponderantly indigenous military forces on
24
25 projects useful to the local population at all levels in such fields as education, training, public works,
26 agriculture, transportation, communications, health, sanitation, and others contributing to economic and
27 social development, which would also serve to improve the standing of the military forces with the
28 population.
29
(2) Establish access to CI and HUMINT databases, automated links to JTF, other joint and
1
2 services, coalitions, and host nation sources to help identify, assess, and develop countermeasures for
3 threats.
4
(3) Provide terrorist and hostile intelligence services (HOIS) threat data.
5
6
18
(4) Ensure isolated personnel report (ISOPREP) cards are up-to-date and readily accessible
19
20 for all appropriate personnel prior to any operation. ISOPREP cards should be prepared and retained
21 by either the unit security manager or its administrative officer. (See appendix J to Joint Publication
22 3-50.2, Doctrine for Joint Combat Search and Rescue, for the format and instructions for completing
23 ISOPREP cards.)
(5) Conduct friendly POW/MIA investigations.
24
(6) Assist GCE and ACE intelligence officers and TRAP commanders in developing escape and
25
26 evasion plans.
7-46
(1) Assist the unit intelligence and operations officers with intelligence, CI and force protection
5
6 planning.
7
(2) Provide countersigns challenges and passwords.
8
9
(3) Attach CI personnel to the IHR strike element when directed for target exploitation and
10
11 personnel handling.
12
(4) Provide OPSEC guidance.
13
14
(5) Assist in rapid planning.
15
16
(6) Arrange for IHR force isolation.
17
18
(7) Conduct on-scene document and material exploitation when directed.
19
20
(8) Conduct initial hostage/terrorist debriefs.
21
22
(9) Provide assistance in training the IHR force in urban surveillance and counter-surveillance.
23
(10) Conduct liaison with national and theater intelligence agencies on hostage rescue and
24
25 HUMINT operations.
7-47
CHAPTER 8
COUNTERINTELLIGENCE TRAINING
3 8001. General. The effectiveness of command and supporting CI and force protection security
4 measures often rests on the individual Marine's ability to recognize and accurately report threats to the
5 security of the command. It also rests on his willing acceptance of a high degree of security discipline.
a. Overall Objective. The ultimate objective of CI training is to ensure effective contribution by all
6
7 MAGTF personnel to the CI effort and to instill a sense of security discipline. To ensure that the
8 individual Marine can provide effective CI and security measures, CI training is integrated with other
9 intelligence and command training programs.
b. CI Personnel Objective. For CI personnel, the objective of CI/HUMINT training is to ensure
10
11 that MAGTF CI personnel are capable of providing CI/HUMINT support required by the commander.
12 The desired result of CI/HUMINT training is that CI personnel can assist the commander in
13 accomplishing the assigned missions. Additionally, it is to ensure non-MAGTF CI organizations and
14 capabilities are understood and prepared to effectively integrate with and support MAGTF operations.
c. Basic CI Training. Basic CI and security training requirements are common to all commands.
15
16 However, emphasis on certain subjects will vary according to the mission of the command and duty
17 assignments of personnel within the unit. Generally, training can be divided into the following categories:
18
19
20
21
22 8002. Basic Counterintelligence and Security Training for All Personnel. All personnel receive
23 training in CI and force protection in order to safeguard friendly force information of value and
24 operations from exploitation by the hostile intelligence threat. Although not directly related to CI or
25 security, the following related areas should be covered to instill awareness on the part of all personnel:
a. Marine Corps personnel are subject to detention or captivity by foreign governments or
26
27 organizations because of their wide range of activities. At a minimum all Marines require training -28 individual, collective and unit -- in the following:
(1) Operations security, to include its purpose, how to identify unit/individual patterns and
29
30 profiles that can be identified and exploited by the enemy, and countermeasures to minimize or eliminate
31 these.
8-1
(2) Information security, to include levels of security classification, when to apply and
1
2 ramifications of these on friendly operations, development of operational and functional classification
3 guidance and criteria, downgrading and declassification,
(3) Personnel security, to include individual standards, how to identify risks and vulnerabilities,
4
5 and individual and command actions to take when these are identified.
(4) Challenges and practices for each of the above when conducting MAGTF operations with
6
7 non-U.S. military forces, non-governmental organizations, private volunteer organizations, and news
8 media organizations.
(5) Purpose and procedures for the use of countersigns challenges and passwords.
14
b. Marines may be required by operational necessity to detain foreign nationals. As a result, they
15
16 are required to know the laws of war and the individual rights and responsibilities under the Geneva
17 Convention of 12 Aug 1949, for those captured or detained by MAGTF units.
18 8003. Training for Officers and Staff Noncommissioned Officers. All officers and enlisted
19 personnel -- regardless of MOS -- must receive training in the following CI and security subjects. Entry
20 level and basic military occupational specialty training programs are best suited for initial training to these
21 areas. Follow-on training based on unit mission (mission-oriented training) and professional
22 development/education should be conducted throughout the careers of all Marines.
DOD Dir 1300.7, Training and Education Measures Necessary to Support the Code of
Conduct, provides policy and guidance on SERE training. It establishes three levels:
a. Level A: the minimum level of understanding required of all Armed Forces personnel, to be
provided during entry level training.
b. Level B: the minimum level of understanding required of military personnel whose military
occupational specialities and assignments entail moderate risk of capture. Level B training is to be
conducted as soon as possible upon assumption of the duty/MOS that makes them eligible.
c. Level C: the minimum level of understanding required of military personnel whose
MOS/assignment entails significant risk of capture, or whose position, rank, or seniority make them
vulnerable to greater than average targeting/exploitation by enemies or other threats. Examples include
aircrews, ground reconnaissance personnel, and military attaches.
8-2
34
g. The identities and responsibilities of all unit personnel responsible with key leadership roles
1
2 regarding unit security, to include:
3
(3) G/S-2 -- principal staff cognizance for sensitive compartmented information and special
5
6 security, and identification of enemy intelligence capabilities and operations.
(4) G/S-3 -- principal staff cognizance for force protection, command and control protection,
7
8 operations security, counter-reconnaissance, deception, and electronic protection.
(5) G/S-6 -- principal staff cognizance for communications and information systems (CIS)
9
10 security, cryptographic materials system.
(6) Headquarters commandant -- principal staff cognizance for physical security.
11
The unit security manager is generally either the chief of staff or executive officer.
8-4
10
11
12
13
14
15
16
17
18
19
20
21
22
23
10 8005. Training of Intelligence Section Personnel. The following subjects are considered
11 appropriate for the CI training of intelligence section personnel and should incorporate MAGTF, other
12 services, joint and national capabilities, issues and operations:
a. Counterintelligence Collection, Processing, Production and Dissemination Capabilities
13
14 and Organizations
b. C2 and CIS Architecture. C2 and supporting communication-information systems operations,
15
16 both for internal CI activities and for overall integrated CI/intelligence operations.
c. Counterintelligence Sources of Information and Methods of Reporting. Walk-ins, host
17
18 nation liaison activity, and line crossers and CFSO are examples of sources utilized in CI/HUMINT
19 operations to support command information objectives.
d. CI Support Activities. This includes CI surveys/vulnerability assessments, technical support
20
21 and technical surveillance countermeasures.
e. Intelligence Oversight. When intelligence specialist assets are attached/assigned, the minimum
22
23 reporting requirements and prohibited activities should be strictly monitored and enforced in accordance
24 with DOD 5240.1R Intelligence Oversight.
25
(2) MAGTF CI Course, Formal Resident Training (formal MOS school, NMITC).
b. Responsibilities. The following personnel have the responsibility for ensuring that a viable
3
4 program is established for each of the four levels of training:
5
(2) CI resident course -- Navy and Marine Corps Intelligence Training Center (NMITC).
(3) Advanced training community (CI/HUMINT Companies, MEF CIHOs, parent units,
7
8 HQMC).
9
c. Descriptions
(1) Pre-Resident On-The-Job Training. The foundation of the pre-resident OJT program is
10
11 a standardized pre-resident training course (PRTC). The pre-resident OJT program also serves as a
12 vehicle for screening and evaluating candidates for the CI MOS. The PRTC prepares the candidate for
13 the resident CI Course. It also provides him with a baseline knowledge from which resident training
14 commences. All candidates for the CI MOS must successfully complete the PRTC prior to advancing
15 to the second level of training. Commanders will diligently observe candidates during this period to
16 ensure they meet the high personal and professional standards required of CI personnel. To better
17 prepare a candidate for resident training, commanders should expand on the PRTC once a candidate
18 completes it. This training will include:
19
20
21
22
(d) MAGTFs, JTF and theater CI and intelligence organizations and capabilities
23
(e) CI methodology
24
25
(2) CI Resident Formal School Training. CI resident entry-level formal school training for
26
27 both officers and enlisted Marines is via the 17-weeks MAGTF Counterintelligence Agents Course
8-8
10
(b) TSCM
11
15
16
(g) Terrorism/counterterrorism
17
8-9
CHAPTER 9
COUNTERINTELLIGENCE ADMINISTRATION
3 9001. General. Administration for the CI elements consists of files, reports, communications, and
4 emergency funds. CI elements are responsible for establishing and maintaining operational files essential
5 to their combat CI mission. The accomplishment of the CI mission requires accurate, timely, and
6 pertinent reports disseminated in a usable form. CI has organic communications equipment to help
7 coordinate CI activities and report information to other organizations. Emergency and extraordinary
8 expense (E&EE) funds are made available for CI because of the nature of the missions.
9 9002. Files. The following operational files are normally maintained in a combat environment by CI
10 elements at all echelons. Formats, organization and content for each should be coordinated with the
11 MEF AFC OIC or the supported unit's intelligence officer.
a. Information concerning personalities, organizations, installations, and incidents, of current and
12
13 future CI interest. Often basic information of this type is recorded in a card file/folder or automated
14 data base for ready reference. It is also cross-indexed to more detailed information.
15
16
d. Area files containing basic reference data and information on enemy intelligence activity and CI
17
18 measures within a particular geographic area.
19 9003. Reports. CI reports are prepared to transmit accurate information to units to support planning,
20 decisionmaking and execution, to aid in the processing of intelligence, and to serve as a record of CI
21 activities. The method of dissemination of CI information depends primarily on the nature and urgency
22 of the information, the location of the receiving units, the security requirements, and the means available.
23 Normally, information is disseminated by record or voice messages, personal liaison, telephone,
24 briefings, messenger, and written reports. All CI reports will be written in accordance with the formats
25 prescribed for a standard naval letter or message. The report formats in appendix E of this publications
26 are DOD standardized formats meant to enhance joint interoperability and should not be modified
27 unless absolutely necessary and following coordination with all pertinent intelligence organizations.
28 Reports are classified according to content.
29 9004. Personnel
a. Augmentation. When additional personnel are needed, the requirement is identified through the
30
31 intelligence officer to the personnel officer for validation by the commander. The request will then be
9-1
Subhead 123.a funds are General Defense Intelligence Program (GDIP) monies intended for use
by Naval Attaches in the performance of their official duties and are managed by the Office of Naval
Intelligence and coordinated by CMC (CIC).
3
Subhead 123.b funds are Foreign Counterintelligence Program (FCIP) monies intended for CI
functions only and are managed through NCIS.
9-2
CHAPTER 10
3 10001. Mission. The primary garrison mission of CI activities is planning, preparing, and training to
4 accomplish MAGTF CI functions and operations. A secondary mission is to advise and assist the
5 commander in implementing the command's force protection and security programs and supporting
6 command initiated security measures. CI is designed to identify and neutralize the effectiveness of both
7 potential and active hostile collection efforts and to identify and neutralize the effectiveness of individuals,
8 activities, or organizations capable of engaging in hostile intelligence collection, sabotage, subversion, or
9 terrorism directed against his command. Additional doctrine pertaining to combating terrorism is
10 contained in MCO 3302.1, Antiterrorism Program.
11 10002. Counterintelligence Survey/Vulnerability Assessment
a. Basis. The CI survey/vulnerability assessment is designed to assist commanders in establishing
12
13 security systems, procedures, and safeguards to protect military personnel, organizations and
14 installations from espionage, sabotage, terrorism, or subversion. The survey assesses a units overall
15 security posture against threats identified in the CI estimate. The CI survey/vulnerability assessment will
16 identify specific vulnerabilities to hostile intelligence, espionage, sabotage, subversion or terrorist
17 capabilities and provide recommendations on how to eliminate or minimize these vulnerabilities. The
18 survey/vulnerability assessment is not a recurring event. Once it is conducted, the survey/vulnerability
19 assessment will remain valid for that specific installation until there are major changes in the physical
20 security of the installation, the mission of the command, or potential threats. It is necessary that the
21 survey/vulnerability assessment look forward in both space and time to support the development of CI
22 measures necessary to protect the unit as it carries out successive phases of the operation. The CI
23 survey/vulnerability assessment includes:
24
25
26
(3) An assessment of CI measures and deficiencies that currently exist and their effectiveness.
(4) Recommendations for improvements to these measures or the initiation of new security
27
28 measures to achieve required security standards and protection.
b. Initiation. The initiation of a CI survey/vulnerability assessment begins with a request from the
29
30 commander of a unit or installation concerned or with a higher commander in the same chain of
31 command. That request will normally occur under the following circumstances:
32
(4) The level of classified and sensitive information used, produced, stored, or compiled.
(5) The criticality of the installation with the overall defense posture of the U.S. based on its
21
22 mission/function.
(6) Whether there are other units/installations/facilities that can assume the role of the surveyed
23
24 unit/installation if it is neutralized or destroyed.
(7) The unit/installation's vulnerability to terrorist or special operations forces attacks based on
25
26 local/international threat and conditions.
e. Baseline. Once the level of security required has been determined, the posture and
27
28 effectiveness of existing security measures must be assessed. Areas that should be examined include:
(1) Document Security. Document security is systematic review and inspection of all security
29
30 procedures and records used in the handling of classified document, information, and other classified
31 material. The review should include the flow of classified material beginning from its creation/receipt at
32 the installation/unit/command/ to its final storage area or destruction.
10-3
(2) In addition to the CI credentials and military identification, inspectors must carry a letter of
1
2 identification and authorization for use only in emergency situations.
(3) Termination of the inspection will be done immediately if at any time personnel is subject to
3
4 physical danger or other safety risks.
(4) Preparation for and conduct of the inspection must not impair or disrupt the normal
5
6 operation/function of the command unless the inspection is specifically designed to do so.
(5) Command or installation personnel will not be utilized in any manner which would tend to
7
8 discredit them.
9 10004. Counterintelligence Evaluation
a. CI evaluations are similar to surveys but are limited in scope. The CI evaluation is normally
10
11 conducted for a small unit or a component of a larger organization when there has been a change in the
12 security posture, an activation or reactivation of a facility, a physical relocation, or substantive changes
13 to the units facilities or communications-information systems infrastructure. CI evaluations are normally
14 limited to areas containing or processing classified material.
b. The CI evaluation may be limited to an assessment of only one type of security, such as
15
16 document, personnel, or physical security, or it may include any combination, depending on the needs of
17 the unit. The procedures for the preparation and conduct of the evaluation are the same as those for the
18 CI survey/vulnerability assessment. However, the procedures usually are not as extensive. The CI
19 evaluation also may be used to update CI surveys when only minor changes have occurred within an
20 installation or major organization.
21 10005. Technical Surveillance Countermeasures (TSCM) Support
a. As discussed in chapter 7, the purpose of the TSCM program is to locate and neutralize
22
23 technical surveillance devices that have been targeted against U.S. sensitive or secure areas. CI TSCM
24 teams have specialized equipment and techniques to locate and identify threat technical surveillance
25 activity. TSCM support consists of inspections and surveys. A TSCM inspection is an evaluation to
26 determine the physical security measures required to protect an area against visual and audio
27 surveillance. TSCM surveys include a complete electronic and physical search for unauthorized
28 modification of equipment, the presence of clandestine audio and visual device, and other conditions
29 which may allow the unauthorized transmission of any conversation out of the area being surveyed. All
30 TSCM operations are governed by DOD Directive 5200.9, SECNAVINST 5500.31, and MCO
31 05511.11.
b. Historically, hostile intelligence services have used technical surveillance monitoring systems in
32
33 their intelligence and espionage operations against U.S. targets, both in the continental United States and
10-5
10
11
c. Requests for TSCM support must be classified and no conversation concerning the inspection
12
13 should take place in the vicinity of the area to be inspected. Procedures for requesting inspections and
14 surveys, TSCM responsibilities, and further information on the audio surveillance threat are contained in
15 OPNAVINST 0500.46 and MCO 5511.11.
d. Normally, one Marine team within the CI/HUMINT company at each MEF maintains a TSCM
16
17 capability to support tactical units of the MEF. This capability, designed primarily for combat support,
18 also supplements the NCIS TSCM responsibilities during peacetime garrison conditions.
19 (See chapter 7, paragraph 7008, for additional information on TSCMs.)
10-6
APPENDIX A
GLOSSARY
4 Note: Acronyms change over time in response to new operational concepts, capabilities, doctrinal
5 changes and other similar developments. The following publications are the sole authoritative sources for
6 official military acronyms:
7
1. Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms.
2. MCRP 5-12C, Marine Corps Supplement to the Department of Defense Dictionary of Military
8
9 and Associated Terms.
10 ------------------------------------------------------------------------------------------------------11 ---------------
12 ACE
13 AFC
14 ASAS
15 ATFIC
16 BDA
17 bn
18 CA
19 CE
20 C-HUMINT
21 CI
22 CIAT
23 CICM
24 CIC
25 CID
26 CIHO
27 CIIR
28 C-IMINT
29 CINC
30 CIS
31 CITEX
32 CLF
33 co
34 COA
35 CP
36 CPX
37 C-SIGINT
A-4
Part II -- Definitions
2 Note: Definitions of military terms change over time in response to new operational concepts,
3 capabilities, doctrinal changes and other similar developments. The following publications are the sole
4 authoritative sources for official definitions of military terms:
5
1. Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms.
2. MCRP 5-12C, Marine Corps Supplement to the Department of Defense Dictionary of Military
6
7 and Associated Terms.
8 ------------------------------------------------------------------------------------------------------9 ---------------
10
11 accountability - The obligation imposed by law or lawful order or regulation on an officer or other
12 person for keeping accurate record of property, documents, or funds. The person having this obligation
13 may or may not have actual possession of the property, documents, or funds. Accountability is
14 concerned primarily with records, while responsibility is concerned primarily with custody, care, and
15 safekeeping. (Joint Pub 1-02)
16 administrative control - Direction or exercise of authority over subordinate or other organizations in
17 respect to administration and support, including organization of Service forces, control of resources and
18 equipment, personnel management, unit logistics, individual and unit training, readiness, mobilization,
19 demobilization, discipline, and other matters not included in the operational missions of the subordinate
20 or other organizations. Also called ADCON. (Joint Pub 1-02)
21 agent - (1) One who is authorized or instructed to obtain or to assist in obtaining information for
22 intelligence or CI purposes. (Joint Pub 1-02)
23 agent authentication - The technical support task of providing an agent with personal documents,
24 accouterments, and equipment which have the appearance of authenticity as to claimed origin and which
25 support and are consistent with the agent's cover story. (Joint Pub 1-02)
26 agent net - (1) An organization for clandestine purposes which operates under the direction of a
27 principal agent. (Joint Pub 1-02)
28 all-source intelligence - Intelligence that incorporates all available sources of information, including,
29 most frequently, human resources intelligence, imagery intelligence, measurement and signature
30 intelligence, signals intelligence, and open source data, in the development of the finished intelligence
31 product. (Joint Pub 1-02)
A-5
23 basic intelligence - (1) Fundamental intelligence concerning the general situation, resources,
24 capabilities, and vulnerabilities of foreign countries or areas which may be used as reference material in
25 the planning of operations at any level and in evaluating subsequent information relating to the same
26 subject. (Joint Pub 1-02)
27 battle damage assessment - The timely and accurate estimate of damage resulting from the
28 application of military force, either lethal or non-lethal, against a predetermined objective. Battle damage
29 assessment can be applied to the employment of all types of weapon systems (air, ground, naval, and
30 special forces weapon systems) throughout the range of military operations. Battle damage assessment
31 is primarily an intelligence responsibility with required inputs and coordination from the operators. Battle
32 damage assessment is composed of physical damage assessment, functional damage assessment, and
33 target system assessment. Also called BDA. (Joint Pub 1-02) In Marine Corps usage, the timely and
34 accurate estimate of the damage resulting from the application of military force. BDA estimates physical
A-6
21 case - (1) An intelligence operation in its entirety. (2) Record of the development of an intelligence
22 operation, including personnel, modus operandi, and objectives. (Joint Pub 1-02)
23 cell - Small group of individuals who work together for clandestine or subversive purposes. (Joint Pub
24 1-02)
25 center of gravity - Those characteristics, capabilities, or localities from which a military force derives
26 its freedom of action, physical strength, or will to fight. (Joint Pub 1-02).
27 centralized control - In military operations, a mode of battlespace management in which one echelon
28 of command exercises total authority and direction of all aspects of one or more warfighting functions.
29 It is a method of control where detailed orders are issued and total unity of action is the overriding
30 consideration. (MCRP 5-12C)
A-7
1 combat information - Unevaluated data, gathered by or provided directly to the tactical commander
2 which, due to its highly perishable nature or the criticality of the situation, cannot be processed into
3 tactical intelligence in time to satisfy the user's tactical intelligence requirements. (Joint Pub 1-02)
4 combat information center - The agency in a ship or aircraft manned and equipped to collect, display,
5 evaluate, and disseminate tactical information for the use of the embarked flag officer, commanding
6 officer, and certain control agencies. Certain control, assistance and coordination functions may be
7 delegated by command to the combat information center. Also called "action information center." (Joint
8 Pub 1-02)
9 combat intelligence - That knowledge of the enemy, weather, and geographical features required by a
10 commander in the planning and conduct of combat operations. (Joint Pub 1-02)
11 combatant command -A unified or specified command with a broad continuing mission under a single
12 commander established and so designated by the President, through the Secretary of Defense and with
13 the advice and assistance of the Chairman of the Joint Chiefs of Staff. Combatant commands typically
14 have geographic or functional responsibilities.
15 combat surveillance - A continuous, all-weather, day-and-night, systematic watch over the battle area
16 to provide timely information for tactical combat operations. (Joint Pub 1-02)
17 command and control - The exercise of authority and direction by a properly designated commander
18 over assigned and attached forces in the accomplishment of the mission. Command and control
19 functions are performed through an arrangement of personnel, equipment, communications, facilities,
20 and procedures employed by a commander in planning, directing, coordinating, and controlling forces
21 and operations in the accomplishment of the mission. Also called C2. (Joint Pub 1-02) In Marine
22 Corps usage, the means by which a commander recognizes what needs to be done and sees to it that
23 appropriate actions are taken. (MCRP 5-12C)
24 commander's critical information requirements - Information regarding the enemy and friendly
25 activities and the environment identified by the commander as critical to maintaining situational
26 awareness, planning future activities, and facilitating timely decisionmaking. Also called CCIR. NOTE:
27 CCIRs are normally divided into three primary subcategories: priority intelligence requirement; friendly
28 force information requirements; and essential elements of friendly information. (MCRP 5-12C)
29 commander's intent - A commander's clear, concise articulation of the purpose(s) behind one or more
30 tasks assigned to a subordinate. It is one of two parts of every mission statement which guides the
31 exercise of initiative in the absence of instructions. (MCRP 5-12C)
32 communications intelligence -Technical and intelligence information derived from foreign
33 communications by other than the intended recipients. Also called COMINT. (Joint Pub 1-02)
A-9
1 cover (military) - Actions to conceal actual friendly intentions, capabilities, operations, and other
2 activities by providing a plausible, yet erroneous, explanation of the observable. (Joint Pub 1-02)
3 covert operations - Operations which are so planned and executed as to conceal the identity of or
4 permit plausible denial by the sponsor. They differ from clandestine operations in that emphasis is
5 placed on concealment of identity of sponsor rather than on concealment of the operation. (Joint Pub
6 1-02)
7 critical information - Specific facts about friendly intentions, capabilities, and activities vitally needed
8 by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable
9 consequences for friendly mission accomplishment. (Joint Pub 1-02)
10 critical vulnerability - An aspect of a center of gravity that if exploited will do the most significant
11 damage to an adversary's ability to resist. A vulnerability cannot be critical unless it undermines a key
12 strength. Also called CV. (MCRP 5-12C)
13 cultivation - A deliberate and calculated association with a person for the purpose of recruitment,
14 obtaining information, or gaining control for these or other purposes. (Joint Pub 1-02)
15 current intelligence - Intelligence of all types and forms of immediate interest which is usually
16 disseminated without the delays necessary to complete evaluation or interpretation. (Joint Pub 1-02)
17
18 damage assessment - (1) The determination of the effect of attacks on targets. (2) A determination of
19 the effect of a compromise of classified information on national security. (Joint Pub 1-02)
20 deception - Those measures designed to mislead the enemy by manipulation, distortion, or falsification
21 of evidence to induce him to react in a manner prejudicial to his interests. (Joint Pub 1-02)
22 decentralized control - In military operations, a mode of battlespace management in which a
23 command echelon may delegate some or all authority and direction for warfighting functions to
24 subordinates. It requires careful and clear articulation of mission, intent, and main effort to unify efforts
25 of subordinate leaders. (MCRP 5-12C)
26 declassification - The determination that in the interests of national security, classified information no
27 longer requires any degree of protection against unauthorized disclosure, coupled with removal or
28 cancellation of the classification designation. (Joint Pub 1-02)
29 departmental intelligence - Intelligence that any department or agency of the Federal Government
30 requires to execute its own mission. (Joint Pub 1-02)
A-14
29 espionage - Actions directed towards the acquisition of information through clandestine operations.
30 (Joint Pub 1-02)
31 espionage against the United States -Overt, covert, or clandestine activity designed to obtain
32 information relating to the national defense with intent or reason to believe that it will be used to the
A-15
-- Reliability of Source
A
B
C
D
E
F
Completely reliable
Usually reliable
Fairly reliable
Not usually reliable
Unreliable
Reliability cannot be judged
-- Accuracy of Information
1
2
3
4
5
2 evasion and escape intelligence - Processed information prepared to assist personnel to escape if
3 captured by the enemy or to evade capture if lost in enemy-dominated territory. (Joint Pub 1-02)
5 fabricator - Individuals or groups who, without genuine resources, invent information or inflate or
6 embroider over news for personal gain or for political purposes. (Joint Pub 1-02)
7 force protection--Security program designed to protect soldiers, civilian employees, family members,
8 facilities, and equipment, in all locations and situations, accomplished through planned and integrated
9 application of combating terrorism, physical security, operations security, personal protective services,
10 and supported by intelligence, CI, and other security programs. (Joint Pub 1-02)
11 foreign intelligence - Information relating to the capabilities, intentions, and activities of foreign
12 powers, organizations, or persons, but not including counterintelligence (with the exception of
13 information on international terrorist activities). (Joint Pub 1-02)
14 friendly force information requirement - Information the commander needs about friendly forces in
15 order to develop plans and make effective decisions. Depending upon the circumstances information on
16 unit location, composition, readiness, personnel status, and logistics status could become a friendly force
17 information requirement. Also called FFIR. (MCRP 5-12C)
18 fusion - In intelligence usage, the process of examining all sources of intelligence and information to
19 derive a complete assessment of activity. (Joint Pub 1-02)
20
21 global sourcing - A process of force provision or augmentation whereby resources may be drawn
22 from any location/command worldwide. (MCRP 5-12C)
23
24 host country - A nation in which representatives or organizations of another state are present because
25 of government invitation and/or international agreement. (Joint Pub 1-02)
26 host nation - A nation which receives the forces and/or supplies of allied nations and/or NATO
27 organizations to be located on, or to operate in, or to transit through its territory. (Joint Pub 1-02)
A-17
1 indicator - In intelligence usage, an item of information which reflects the intention or capability of a
2 potential enemy to adopt or reject a course of action. (Joint Pub 1-02)
3 infiltration - (1) The movement through or into an area or territory occupied by either friendly or
4 enemy troops or organizations. The movement is made, either by small groups or by individuals, at
5 extended or irregular intervals. When used in connection with the enemy, it infers that contact is
6 avoided. (2) In intelligence usage, placing an agent or other person in a target area in hostile territory.
7 Usually involves crossing a frontier or other guarded line. Methods of infiltration are: black
8 (clandestine); gray (through legal crossing point but under false documentation); white (legal). (Joint Pub
9 1-02)
10 informant - (1) A person who, wittingly or unwittingly, provides information to an agent, a clandestine
11 service, or the police. (2) In reporting, a person who has provided specific information and is cited as a
12 source. (Joint Pub 1-02)
13 information - (1) In intelligence usage, unevaluated material of every description that may be used in
14 the production of intelligence. (2) The meaning that a human assigns to data by means of the known
15 conventions used in their representation. (Joint Pub 1-02)
16 information exchange requirement - The requirement for information to be passed between and
17 among forces, organizations, or administrative structures concerning ongoing activities. Information
18 exchange requirements identify who exchanges what information with whom as well as why the
19 information is necessary and how that information will be used. The quality (i.e., frequency, timeliness,
20 security) and quantity (i.e., volume, speed, and type of information such as data, voice, and video) are
21 attributes of the information exchange included in the information exchange requirement. Also called
22 IER. (MCRP 5-12C)
23 informer - Person who intentionally discloses to police or to a security service information about
24 persons or activities considered suspect, usually for a financial reward. (Joint Pub 1-02)
25 infrared imagery - That imagery produced as a result of sensing electromagnetic radiation emitted or
26 reflected from a given target surface in the infrared position of the electromagnetic spectrum
27 (approximately 0.72 to 1,000 microns). (Joint Pub 1-02)
28 insurgency - An organized movement aimed at the overthrow of a constituted government through use
29 of subversion and armed conflict. (Joint Pub 1-02)
30 integration - (1) A stage in the intelligence cycle in which a pattern is formed through the selection and
31 combination of evaluated information. (2) In photography, a process by which the average radar picture
32 seen on several scans of the time base may be obtained on a print, or the process by which several
33 photographic images are combined into a single image. (Joint Pub 1-02)
A-19
31 joint force - A general term applied to a force composed of significant elements, assigned or attached,
32 of two or more Military Departments, operating under a single joint force commander. (Joint Pub 1-02)
A-21
19 law of war - That part of international law that regulates the conduct of armed hostilities. Also called
20 the law of armed conflict. (Joint Pub 1-02)
21 liaison -That contact or intercommunication maintained between elements of military forces to ensure
22 mutual understanding and unity of purpose and action. (Joint Pub 1-02)
23
24 main effort - The designated subordinate unit whose mission at a given point in time is most critical to
25 overall mission success. It is usually weighted with the preponderance of combat power and is directed
26 against a center of gravity through a critical vulnerability. (MCRP 5-12C)
27 maneuver warfare - A warfighting philosophy that seeks to shatter the enemy's cohesion through a
28 variety of rapid, focused, and unexpected actions which create a turbulent and rapidly deteriorating
29 situation with which the enemy cannot cope. (MCRP 5-12C)
30 Marine Corps planning process - A six-step methodology which helps organize the thought
31 processes of the commander and staff throughout the planning and execution of military operations. It
32 focuses on the threat and is based on the Marine Corps philosophy of maneuver warfare. It capitalizes
A-22
28 national intelligence - Integrated departmental intelligence that covers the broad aspects of national
29 policy and national security, is of concern to more than one department or agency, and transcends the
30 exclusive competence of a single department or agency. (Joint Pub 1-02)
31 need to know - A criterion used in security procedures which requires the custodians of classified
32 information to establish, prior to disclosure, that the intended recipient must have access to the
33 information to perform his official duties. (Joint Pub 1-02)
34 neutralize - As pertains to military operations, to render ineffective or unusable. (Joint Pub 1-02)
A-23
2 official information - Information which is owned by, produced for or by, or is subject to the control
3 of the United States Government. (Joint Pub 1-02)
4 open source intelligence - information of potential intelligence value that is available to the general
5 public. Also called OSINT. (Joint Pub 1-02)
6 operational control - Transferable command authority that may be exercised by commanders at any
7 echelon at or below the level of combatant command. Operational control is inherent in combatant
8 command (command authority). Operational control may be delegated and is the authority to perform
9 those functions of command over subordinate forces involving organizing and employing commands and
10 forces, assigning tasks, designating objectives, and giving authoritative direction necessary to accomplish
11 the mission. Operational control includes authoritative direction over all aspects of military operations
12 and joint training necessary to accomplish missions assigned to the command. Operational control
13 should be exercised through the commanders of subordinate organizations. Normally this authority is
14 exercised through subordinate joint force commanders and Service and/or functional component
15 commanders. Operational control normally provides full authority to organize commands and forces and
16 to employ those forces as the commander in operational control considers necessary to accomplish
17 assigned missions. Operational control does not, in and of itself, include authoritative direction for
18 logistics or matters of administration, discipline, internal organization, or unit training. Also called
19 OPCON. (Joint Pub 1-02)
20 operations security - A process of analyzing friendly actions attendant to military operations and other
21 activities to:
22
b. Determine indicators hostile intelligence systems might obtain that could be interpreted or
23
24 pieced together to derive critical information in time to be useful to adversaries.
c. Select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities
25
26 of friendly actions to adversary exploitation. Also called OPSEC. (Joint Pub 1-02)
27 order of battle - The identification, strength, command structure, and disposition of the personnel,
28 units, and equipment of any military force. Also called OOB. (Jt Pub 1-02)
29 overt operation - The collection of intelligence openly, without concealment. (Joint Pub 1-02)
30
A-24
24 ratline - An organized effort for moving personnel and/or material by clandestine means across a
25 denied area or border. (Joint Pub 1-02)
26 reach back - The ability to exploit resources, capabilities, expertise, etc. not physically located in the
27 theater or a joint area of operations, when established. (MCRP 5-12C)
28 rear area - For any particular command, the area extending forward from its rear boundary to the rear
29 of the area of responsibility of the next lower level of command. This area is provided primarily for the
30 performance of combat service support functions. (Joint Pub 1-02)
31 refugee - A civilian who by reason of real or imagined danger has left home to seek safety elsewhere.
32 (Joint Pub 1-02)
A-25
1 repatriate -A person who returns to his country or citizenship, having left his native country, either
2 against his will or as one of a group who left for reason of politics, religion, or other pertinent reasons.
3 (Joint Pub 1-02)
4 restricted area - (1) An area (land, sea, or air) in which there are special restrictive measures
5 employed to prevent or minimize interference between friendly forces. (2) An area under military
6 jurisdiction in which special security measures are employed to prevent unauthorized entry. (Joint Pub
7 1-02)
8 rules of engagement - Directive issued by competent military authority which delineate the
9 circumstances and limitations under which US forces will initiate and/or continue combat engagement
10 with other forces encountered. Also called ROE. (Joint Pub 1-02)
11
12 sabotage - An act or acts with intent to injure, interfere with, or obstruct the national defense of a
13 country by willfully injuring or destroying, or attempting to injure or destroy, any national defense or war
14 material, premises or utilities, to include human and natural resources. (Joint Pub 1-02)
15 safe area - A designated area in hostile territory that offers the evader or escapee a reasonable chance
16 of avoiding capture and of surviving until he can be evacuated. (Joint Pub 1-02)
17 safe haven - (1) Designated area(s) to which noncombatants of the United States Government's
18 responsibility, and commercial vehicles and material, may be evacuated during a domestic or other valid
19 emergency. (2) Temporary storage provided Department of Energy classified shipment transporters at
20 Department of Defense facilities in order to assure safety and security of nuclear material and/or
21 non-nuclear classified material. Also includes parking for commercial vehicles containing Class A or
22 Class B explosives. (Joint Pub 1-02)
23 safe house - An innocent-appearing house or premises established by an organization for the purpose
24 of conducting clandestine or covert activity in relative security. (Joint Pub 1-02)
25 sanitize - Revise a report or other document in such a fashion as to prevent identification of sources, or
26 of the actual persons and places with which it is concerned, or of the means by which it was acquired.
27 Usually involves deletion or substitution of names and other key details. (Joint Pub 1-02)
28 scientific and technical intelligence - The product resulting from the collection, evaluation, analysis,
29 and interpretation of foreign scientific and technical information which covers: (a) foreign developments
30 in basic and applied research and in applied engineering techniques; and (b) scientific and technical
31 characteristics, capabilities, and limitations of all foreign military systems, weapons, weapon systems,
32 and material, the research and development related thereto, and the production methods employed for
33 their manufacture. (Joint Pub 1-02)
A-26
1 security - (1) Measures taken by a military unit, an activity or installation to protect itself against all acts
2 designed to, or which may, impair its effectiveness. (2) A condition that results from the establishment
3 and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.
4 (3) With respect to classified matter, it is the condition that prevents unauthorized persons from having
5 access to official information that is safeguarded in the interests of national security. (Joint Pub 1-02)
6 security classification - A category to which national security information and material is assigned to
7 denote the degree of damage that unauthorized disclosure would cause to national defense or foreign
8 relations of the United States and to denote the degree of protection required. There are three such
9 categories:
a. Top secret - National security information or material which requires the highest degree of
10
11 protection and the unauthorized disclosure of which could reasonably be expected to cause
12 exceptionally grave damage to the national security. Examples of "exceptionally grave damage" include
13 armed hostilities against the United States or its allies; disruption of foreign relations vitally affecting the
14 national security; the compromise of vital national defense plans or complex cryptologic and
15 communications intelligence systems; the revelation of sensitive intelligence operations; and the
16 disclosure of scientific or technological developments vital to national security.
b. Secret - National security information or material which requires a substantial degree of
17
18 protection and the unauthorized disclosure of which could reasonably be expected to cause serious
19 damage to the national security. Examples of "serious damage" include disruption of foreign relations
20 significantly affecting the national security; significant impairment of a program or policy directly related
21 to the national security; revelation of significant military plans or intelligence operations; and compromise
22 of significant scientific or technological developments relating to national security.
c. Confidential - National security information or material which requires protection and the
23
24 unauthorized disclosure of which could reasonably be expected to cause damage to the national
25 security. (Joint Pub 1-02)
26 security clearance - An administrative determination by competent authority that an individual is
27 eligible, from a security standpoint, for access to classified information. (Joint Pub 1-02)
28 security countermeasures - Defensive security programs and activities that seek to protect against
29 both foreign intelligence collection efforts and unauthorized access to, or disclosure of, protected
30 facilities, information, and material. (Joint Pub 2-01.2)
31 security intelligence - Intelligence on the identity, capabilities and intentions of hostile organizations or
32 individuals who are or may be engaged in espionage, sabotage, subversion or terrorism. (Joint Pub
33 1-02)
A-27
10 tactical intelligence - Intelligence that is required for planning and conducting tactical operations.
11 (Joint Pub 1-02) In Marine Corps usage, tactical intelligence concerns itself primarily with the location,
12 capabilities, and possible intentions of enemy units on the battlefield and with the tactical aspects of
13 terrain and weather. (MCRP 5-12C)
14 tactical intelligence and related activities - Those activities outside the National Foreign Intelligence
15 Program that: a. respond to operational commanders' tasking for time-sensitive information on foreign
16 entities; b. respond to national intelligence community tasking of systems whose primary mission is
17 support to operating forces; c. train personnel for intelligence duties; d. provide an intelligence reserve;
18 or e. are devoted to research and development of intelligence or related capabilities. Specifically
19 excluded are programs which are so closely integrated with a weapon system that their primary function
20 is to provide immediate use targeting data. Also called TIARA. (Joint Pub 1-02)
21 tactical warning - (1) A warning after initiation of a threatening or hostile act based on an evaluation of
22 information from all available sources. (2) In satellite and missile surveillance, a notification to
23 operational command centers that a specific threat event is occurring. The component elements that
24 describe threat events are: Country of origin -country or countries initiating hostilities. Event type and
25 size -identification of the type of event and determination of the size or number of weapons. Country
26 under attack-determined by observing trajectory of an object and predicting its impact point. Event
27 time-time the hostile event occurred. Also called integrated tactical warning. (Joint Pub 1-02)
28 target - (1) A geographical area, complex, or installation planned for capture or destruction by military
29 forces. (2) In intelligence usage, a country, area, installation, agency, or person against which intelligence
30 operations are directed. (3) An area designated and numbered for future firing. (4) In gunfire support
31 usage, an impact burst which hits the target. (Joint Pub 1-02)
32 target intelligence - Intelligence which portrays and locates the components of a target or target
33 complex and indicates its vulnerability and relative importance. (Joint Pub 1-02)
A-30
4 unconventional warfare--A broad spectrum of military and paramilitary operations, normally of long
5 duration, predominantly conducted by indigenous or surrogate forces who are organized, trained,
6 equipped, supported, and directed in varying degrees by an external source. It includes guerrilla warfare
7 and other direct offensive, low visibility, covert, or clandestine operations, as well as the indirect
8 activities of subversion, sabotage, intelligence activities, and evasion and escape. Also called UW.
9 (Joint Pub 1-02)
10 unconventional warfare forces - United States forces having an existing unconventional warfare
11 capability consisting of Army Special Forces and such Navy, Air Force, and Marine units as are
12 assigned for these operations. (Joint Pub 1-02)
13 United States country team - The senior, in-country, United States coordinating and supervising
14 body, headed by the Chief of the United States diplomatic mission, usually an ambassador, and
15 composed of the senior member of each represented United States department or agency. (Joint Pub
16 1-02)
17
18 validation - A process normally associated with the collection of intelligence information that provides
19 official status to an identified requirements and confirms that the requirement is appropriate for a given
20 collector and has not previously been satisfied. (Joint Pub 1-02)
21
22 warfighting functions - The six mutually supporting military activities integrated in the conduct of all
23 military operations are:
1. Command and control -- the means by which a commander recognizes what needs to be
24
25 done and sees to it that appropriate actions are taken.
2. Maneuver -- the movement of forces for the purpose of gaining an advantage over the
26
27 enemy.
3. Fires -- those means used to delay, disrupt, degrade, or destroy enemy capabilities, forces,
28
29 or facilities as well as affect the enemy's will to fight.
A-32
6. Force protection -- actions or efforts used to safeguard own centers of gravity while
4
5 protecting, concealing, reducing, or eliminating friendly critical vulnerabilities. (MCRP 5-12C)
6 warning - A communication and acknowledgment of dangers implicit in a wide spectrum of activities by
7 potential opponents ranging from routine defense measures, to substantial increases in readiness and
8 force preparedness, to acts of terrorism or political, economic, or military provocation. (Joint Pub 1-02)
A-33
APPENDIX B
3 1. Marine Corps Common Equipment. The CI detachment or HUMINT exploitation team (HET)
4 is the basic building block for CI HUMINT support to support a MAGTF or subordinate unit. The
5 HET reports to the supported commander with their authorized organic equipment under the table of
6 equipment (T/E) 4714 series. This generally includes at a minimum, but is not limited to, the following
7 organic Marine Corps common equipment for each 3-man element and would require two sets to fully
8 equip a HET:
9
10
11
12
13
14
15
16
17
18
19
20
21
Qty
Description
(1)
M998, High Mobility Multi-Purpose Wheeled Vehicle (HMMWV) Complete
with SINGARS Radio mount
(1)
Trailer, Cargo, Ton, 2 Wheel, M101A3
(1)
Command Post (CP) Tent, with applicable support poles
(2)
Radar Scattering nets, with applicable support poles
(1)
Records Chest
(1)
Lantern Chest with (2) lanterns and Stove
(1)
SINGARS Radio (SL-3 Complete), Radio Set, AN/PRC-140B
(1)
Radio Set, AN/PRC-119A
(1)
Navigation Set, Satellite (PLGR) AN/PSN-11
(3)
Sleeping cots
(1)
6 Cube box containing, stools, extension cords, supplies etc.
22 2. CI/HUMINT Equipment Program (CIHEP). In addition to that equipment brought under T/E
23 4714, the CI/HUMINT company maintains a special allowance account of CI unique equipment
24 maintained in the companys CI platoon's technical surveillance countermeasures (TSCM) team. This
25 CIHEP allotment provides increased capabilities for conducting CI operations in an urban or
26 non-tactical environment. The CIHEP allowance is continuously upgraded. The following are items
27 currently included:
28
Qty
Description
29
30
31
32
33
34
35
(3)
(3)
(1)
(1)
(2)
(6)
(1)
Qty
Description
2
3
4
5
6
7
8
9
10
11
12
(1)
(1)
(1)
(1)
(1)
(1)
(1)
(2)
(1)
Secure FAX:
External Modem:
Digital Camera:
Printer:
Color Scanner:
1
2
3
4
5
Ilex PCMCIA
PCMCIA 33.6 BPS
Kodak Color DC50
Cannon BJC-70
Logitec PowerPage
6 When fully fielded1 , the system will enhance seamless integration of CI/HUMINT information from the
7 HET to intelligence units throughout the MAGTF. Current planning envisions the capability to be global
8 command and control system compliant and able to support the information exchange between CHATS
9 and the Marine Corps intelligence analysis system (IAS), the armys all source analysis system (ASAS),
10 and the joint community's joint deployable intelligence support system (JDISS).
PLANNED IMPROVEMENTS
11
12 Continuous and incremental upgrades to the CHATS through the entire product life-cycle. Current
13 plans include:
FY 98
14
FY 99
B-3
APPENDIX C
4------------------------------------------------------------------CLASSIFICATION
6
7
8
9
10
11 APPENDIX 3 TO ANNEX B TO OPORD XXX ( )
12 Counterintelligence Operations ( U )
13 ( ) REFERENCES: List unit standing operating procedures (SOP) for intelligence and
14 counterintelligence, maps and any other relevant documents that authorize the various levels of
15 anticipated CI operations.
16 1. ( ) GENERAL
17
a. ( ) Objectives. Discuss general objectives and guidance necessary to accomplish the mission.
a. ( ) Force or Headquarters
10
b. ( ) Military Security
11
c. ( ) Civil Authority
12
13
14
15
16
17
i. ( ) Counterterrorist Measures
22
23
(4) ( ) Debriefing of U.S. or other friendly personnel who evade, escape, or are released from
24
25 enemy control.
C-2
(1) ( ) Personalities
10
(2) ( ) Installations.
11
12
3 Tabs
4
5
6
A - ( ) Counterintelligence Estimate
B - ( ) Counterintelligence List of Targets
C - ( ) Countersigns Challenges and Passwords
C-4
COUNTERINTELLIGENCE ESTIMATE
2 Purpose. Provides a baseline of historical, threat related information to support initial MAGTF for
3 inclusion
4 ______________________________________________________________________________
CLASSIFICATION
6
7
8
9
14
15
16
17
18
19
20
21
22
23
24
a. ( ) Military Geography
(1) ( ) (Existing situation)
C-5
(2) ( ) (Estimated effects on enemy intelligence, sabotage, subversive and terrorist operations
1
2 and capabilities.)
3
4
5
(2) ( ) (Estimated effects on enemy intelligence, sabotage, subversive and terrorist operations
6
7 and capabilities.)
8
20
b. ( ) Composition.
26
27
a. ( ) Capabilities
(1) ( ) Intelligence. (Include all known/estimated enemy methods.)
(2) ( ) Sabotage. (Include all possible agent/guerilla capabilities for military, political, and
14
15 economic sabotage.)
(3) ( ) Subversion. (Include all types, such as propaganda, sedition, treason, disaffection, and
16
17 threatened terrorists activities affecting our troops, allies, and local civilians, and assistance in the escape
18 and evasion of hostile civilians.)
(4) ( ) Terrorist. (Include capabilities of terrorist personalities and organizations in area of
19
20 operation.)
b. ( ) Analysis and discussion of enemy capabilities for intelligence, sabotage, subversive, and
21
22 terrorism as a basis to judge the probability of their adoption.
23 5. CONCLUSIONS AND VULNERABILITIES. (Conclusions resulting from discussion in
24 paragraph 4. Relate to current all-source intelligence estimates of the enemy's centers of gravity, critical
25 and other vulnerabilities and estimated exploitability of these by friendly forces, enemy courses of action
26 beginning with the most probable and continuing down the list in the estimated order of probability, and
27 the estimated effects adoption of each capability would have on the friendly mission.)
a. ( ) Probability of enemy adoption of intelligence, sabotage, subversive, and terrorist programs or
28
29 procedures based on capabilities.
30
1 Enclosures
2 (As appropriate)
3
C-8
CLASSIFICATION
Copy no. ___ of ___ copies
Issuing Unit
PLACE OF ISSUE
Date/time group
Message reference number
2
3
4
5
6
C-9
1
2 1. Guidance and Procedures
Challenge
Password
10
11
Lamp
Wheel
11
12
Powder
Powder
12
13
Black
Table
Alternate
c. Dissemination of the initial primary and alternate countersigns for the initial introduction of forces
13
14 will be made in Annex B to the OPORDER. Subsequent countersign dissemination will be made by
15 other secure means (i.e. covered radio nets) prior to the effective time. A sample message form is as
16 follows:
17
18 Code 13."
Procedure: Alternate countersigns are any two numbers, that equal the alternate
19
20 number, one given as the challenge, the other as the password reply.
d. If at any time, there is reason to believe that a password or countersign has been compromised,
21
22 the unit which suspects the compromise will notify the MAGTF command element G/S-2 via the fastest
23 means available. The command element will issue alternate and any changes to the remaining
24 countersigns.
25
26
e. Below is the basic format for the countersigns challenges and passwords tab to appendix 3.
C-10
CLASSIFICATION
2
3
4
5
6
12
CODE/DATE
CHALLENGE
PASSWORD
C-11
ALTERNATE
APPENDIX D
Section I
5
6
7
8 1. General. Counter human intelligence (C-HUMINT) analysis increases in importance with each new
9 US involvement in worldwide operations. Especially in MOOTW, C-HUMINT analysis is rapidly
10 becoming a cornerstone upon which commanders base their concepts operations. This section presents
11 information for analysts to develop some of those products that can enhance the probability of
12 successful operations.
a. Counterintelligence (CI) analysts, interrogators, and CI agents maintain the C-HUMINT
13
14 database. Using this database, they produce15
16
17
18
19
20
21
22
b. The analytical techniques used in HUMINT analysis enable the analyst to visualize large amounts
23
24 of data in graphic form. We emphasize, however, that these analytical techniques are only tools used to
25 arrive at a logical and correct solution to a complex problem; the techniques themselves are not the
26 solution.
c. There are three basic techniques (tools) used as aids in analyzing HUMINT-related problems.
27
28 These techniques-time event charting, matrix manipulation, and link diagramming-used together, are
D-1
(a) The time event chart (see figure D-1) is a chronological record of individual or group
4
5 activities designed to store and display large amounts of information in as little space as possible. This
6 tool is easy to prepare, understand, and use. Symbols used in time event charting are very simple.
7 Analysts use triangles to show the beginning and end of the chart. They also use triangles within the chart
8 to show shifts in method of operation or change in ideology. Rectangles or diamonds are used to
9 indicate significant events or activities.
10
(b) Analysts can highlight particularly noteworthy or important events by drawing an "X'
11
through
the
event symbol (rectangle or diamond). Each of these symbols contains a chronological
12
13 number (event number), date (day, month, and year of event), and may contain a file reference number.
14 The incident description is a very brief explanation of the incident, and may include team size, type of
15 incident or activity, place and method of operation, and duration of incident. Time flow is indicated by
16 arrows.
D-2
(a) Construction of a matrix is the easiest and simplest way to show relationships between
6
7 similar or dissimilar associated items. The 'items" can be anything relevant to the situation under
8 investigation: persons, events, addressees, organizations, or telephone numbers. During this process, CI
9 analysts use matrices to determine "who knows whom" or "who has been where or done what." This
10 results in a clear and concise display which viewers can easily understand simply by looking at the
11 matrix.
(b) In general terms, matrices resemble the mileage charts commonly found in a road atlas.
12
13 Within the category of matrices, there are two types used in investigative analysis-association matrix and
14 activities matrix.
1 Association Matrix. The association matrix is used to show that a relationship
15
16 between individuals exists. Within the realm of HUMINT analysis, the part of the problem deserving the
17 most analytical effort is the group itself. Analysts examine the group's elements (members) and their
18 relationships with other members, other groups and associated entities, and related events. Analysts can
19 show the connections between key players in any event or activity in an association matrix shown in (see
20 figure D-2). It shows associations within a group or similar activity, and is based on the assumption that
21 people involved in a collective activity know one another.
D-3
a This type of matrix is constructed in the form of a right triangle having the same
2
3 number of rows and columns. Analysts list personalities in exactly the same order along both the rows
4 and columns to ensure that all possible associations are shown correctly. The purpose of the personality
5 matrix is to show who knows whom. Analysts determine a known association by "direct contact"
6 between individuals. They determine direct contact by a number of factors, including face-to-face
7 meetings, confirmed telephonic conversation between known parties, and all members of a particular
8 organizational cell. (NOTE: When a person of interest dies, a diamond is drawn next to his or her
9 name on the matrix.)
b CI analysts indicate a known association between individuals on the matrix by a
10
11 dot or filled-in circle. They consider suspected or "weak" associations between persons of interest to be
12 associations which are possible or even probable, but cannot be confirmed using the above criteria.
13 Examples of suspected associations includeA known party calling a known telephone number (the analyst knows to whom
14
15 the telephone number is listed), but cannot determine with certainty who answered the call.
The analyst can identify one party to a face-to-face meeting, but may be able to
16
17 only tentatively identify the other party.
D-4
16
D-5
Membership.
Organizational structure.
10
Communications network.
11
Support structure.
12
13
14
c As with the association matrix, known association between persons and entities is
15
16 indicated by a solid circle, and suspected associations by an open circle.
d Analysts use matrices to present briefings, present evidence, or store information in
17
18 a concise and understandable manner within a database. Matrices augment, but cannot replace,
19 standard reporting procedures or standard database files. Using matrices, the analyst can:
20
21
22
(3) Link Diagramming. The third analytical technique is the link diagram (see figure D-4).
23
24 Analysts use this technique to depict the more complex linkages between a large number of entities, be
25 they persons, events, organizations, or almost anything else. Analysts use link analysis in a variety of
26 complex investigative efforts including criminal investigations, terrorism, analysis, and even medical
27 research. Several regional law enforcement training centers are currently teaching this method as a
D-6
(a) The difference between matrices and link analysis is roughly the same as the difference
4
5 between a mileage chart and a road map. The mileage chart shows the connections between cities using
6 numbers to represent travel distances. The map uses symbols that represent cities, locations, and roads
7 to show how two or more locations are linked to each other. Different symbols on the map have
8 different meanings, and it is easy to display or discover the best route between two or more locations as
9 well as identify obstacles such as unpaved roads or bodies of water.
(b) The same is true with link analysis. Different symbols are used to identify different items.
10
11 Analysts can easily and clearly display obstacles, indirect routes or connections, and suspected
12 connections. In many cases, the viewer can work with and follow the picture easier than the matrix. Link
13 analysis can present information in a manner that ensures clarity.
(c) As with construction of association matrices, certain rules of graphics, symbology, and
14
15 construction must be followed. Standardization is critical to ensure that everyone constructing, using, or
16 reading a link diagram understands exactly what the diagram depicts. The standard rules follow:
D-7
1 Show persons as open circles with the name written inside the circle.
2 Show persons known by more than one name (alias, also known as [AKA]) as
2
3 overlapping circles with names in each circle.
4
5 person.
3 Show deceased persons as above, with a diamond next to the circle representing that
5 Show linkages or associations by lines: solid for confirmed and dotted for suspected.
(d) Certain conventions must be followed. For the sake of clarity, analysts arrange circles
10
11 and squares so that whenever possible, lines of connectivity do not cross. Often, particularly when
12 dealing with a large or especially complex problem, it is difficult to construct a link diagram so that no
13 connecting lines cross. Intersecting lines, however, muddle the drawing and reduce clarity. If lines must
14 cross, show the crossing as a crossing, not as an intersection, in exactly the same manner as on an
15 electrical schematic or diagram.
(e) Link diagrams can show organizations, membership within the organization, action teams
16
17 or cells, or participants in an event. Since each individual depicted on a link diagram is shown only once,
18 and some individuals may belong to more than one organization or take part in more than one event,
19 squares or rectangles representing non-personal entities may overlap.
(f) Construct the appropriate association matrices showing "who knows whom," "who
20
21 participated in what," "who went where," and "who belongs to what group."
(g) Draw information from the database and intelligence reports, and relationships from the
22
23 matrices. Group persons into organizations or cells based on information about joint association,
24 activities, or membership. Draw lines representing connections between individuals, organizations, or
25 activities to complete the diagram. You may have to rearrange the diagram to comply with procedural
26 guidelines, such as crossed lines of connectivity. The finished product will clearly display linkages
27 between individuals, organizations, and other groupings.
(h) When you finish the matrices and link diagram, make recommendations about the
28
29 group's structure. Identify areas for further intelligence collection targeting. Task intelligence assets to
30 confirm suspected linkages and identify key personalities for exploitation or neutralization. The
31 combination of matrix manipulation and the link diagram present, in effect, a graphic depiction of an
32 extremely complex threat situation in a clear and concise picture.
D-8
D-9
Section II
2
3
4
5 1. General. The proliferation of imagery systems worldwide, especially the platforms carrying imagery
6 systems, makes the task of the counter imagery intelligence (C-IMINT) analyst much more complicated
7 than ever before. Relatively inexpensive platforms that are easily transported and operated, such as
8 unmanned aerial vehicles, are becoming available to anyone who wants to employ them. For the more
9 sophisticated, there are other platforms either continuously circling the planet or in geosynchronous
10 orbit, available for hire by anyone with the desire and the ability to pay the freight. An adversary need
11 not possess the technology to build and launch such a platform. He merely buys time from the operators
12 of the platform and obtains the products acquired during his allotted time. Like all other CI functions,
13 C-IMINT depends on the analyst knowing the adversary and knowing ourselves. It begins long before
14 friendly forces deploy for any operation and continues throughout the operation. It goes on even after
15 our forces return to their home station after completion of the operation. Details on requesting Satellite
16 Vulnerability Assessments are contained in the classified supplement.
17 2. Operations. C-IMINT begins with knowledge. The CI analyst must have a thorough knowledge of
18 the threat in the objective area and any threat from outside the AO that may influence our operations.
a. Predeployment. Prior to any operation, the CI analyst needs to prepare in-depth. In addition to
19
20 researching data on the threat and the AO, the CI analyst gathers information and builds a database to
21 serve C-IMINT in the coming operation. During this phase, the CI analyst initiates quick reference
22 matrices and the IMINT situation overlay.
(1) Adversary Intelligence Flight Matrix. These matrices are concerned with other
23
24 platforms used by the adversary. Tracking these collection systems continuously allows the analyst to
25 analyze threat IMINT collection patterns.
(2) System Component Quick Reference Matrix. These matrices are concerned with
26
27 adversary system's capabilities and processing times (see figure D-5). This file is part of the database
28 which equates to an OOB file on threat IMINT systems.
D-10
(3) IMINT Situation Overlays. These are the paths of adversary intelligence collection flights
2
3 depicted on the friendly operations graphics. They identify areas susceptible to collection.
b. Friendly Patterns. Pattern analysis is the detailed study of friendly activities to determine if a
4
unit
performs the activities in a predictable manner, thus creating a monitorable pattern of activity. These
5
6 actions cue an observer to a unit's type, disposition, activity, and capability. Imagery coverage of the
7 AO is essential for planning and for reference later during operations. Small or intermediate scale
8 imagery covering the entire AO may be obtained from general reference files or national sources and
9 need not be newly flown. The presence of U.S. reconnaissance aircraft making numerous passes over
10 territory belonging to another nation would tip off an impending operation. Therefore, file imagery or
11 imagery obtained by satellite may be the only reference available.
(1) Friendly IMINT is used, when available and of high enough priority, to determine friendly
12
13 patterns which may be susceptible to IMINT collection. These patterns are key indicators to the enemy
14 of specific operational activities. Patterns usually occur because of a unit's SOP and doctrine. Example
15 patterns include16
(b) Locating command posts and other C2 facilities in the same relative position to
17
maneuver
elements
and to each other.
18
D-11
24
25
3 Place installations and equipment near hard roads where concealment is available.
(c) Our IMINT resources can determine the effectiveness of a friendly unit's program to
26
27 suppress its visual and thermal signatures, including positioning of assets. Friendly aerial reconnaissance
28 is extremely limited and must be planned for well in advance. The following are examples of
29 countermeasures that could be used to reduce our vulnerability to enemy IMINT:
1 Using traffic discipline when moving into and out of the installation. This may require
30
31 walking some distance to a CP.
32
8 Avoiding the use of direction signals and other devices which provide information.
11 Eliminating open-air storage of special equipment, raw materials, and telltale objects.
(d) The key to proper positioning of assets on the ground is to use natural features as much
10
11 as possible. Obvious locations such as clearings may be more convenient but should be avoided at all
12 costs. This includes night operations. Infrared and SLAR missions are particularly effective at night.
13 Units should be well dispersed since a high concentration of tents and vehicles, even well hidden, will
14 stand out on imagery to a trained analyst.
c. Evaluation of Countermeasures. For these countermeasures to be effective, every command
15
16 should develop a self-evaluation system to ensure proper employment.
17
D-13
Section III
2
3
4
20
21
22
23
24
e. CI analysts must continue to refine this list and identify other sources of information that may be
25
26 available for their particular AO.
D-14
Intelligence
a. Identify threat systems in the geographic area of responsibility. This task provides the initial focus
4
5 for the remaining threat assessment tasks. The primary objective of this task is to determine the specific
6 threat faced by the MAGTF. The CI analyst collects the required data to properly identify the threat.
7 Additionally, the CI analyst must coordinate and request assistance from the collection management
8 element. The procedures for identifying the threat systems follow:
(1) Identify the generic threat. The CI analyst enters the CI database and retrieves the most
9
10 recent appropriate threat assessment. Analysts then review this data to determine what threat systems
11 were known to be in their AO on the date of the assessment. Next, the analyst examines finished
12 intelligence products published by national level agencies to obtain technical and operational data on the
13 threat system. Some of the intelligence products include:
(a) ES and EA capability studies.
14
1
Within a MAGTF, C-SIGINT analysis and production generally results from the integrated
operations of the MAGTF all-source fusion center, the radio battalion operations control and analysis
center, and the supporting CI/HUMINT company element.
D-15
(2) Create the doctrinal template. The doctrinal template is a graphic display of threat's systems
4
5 deployment when not constrained by weather and terrain. The analyst should review the database for
6 existing templates before constructing a new one.
(3) Collect data. Data collection is required when the analyst receives tasking for a specific unit
7
8 or operation. The analyst must collect additional data to identify the threat to a particular unit or AO.
9
(4) Create the SIGINT situation overlay. The analyst reviews the collected data to determine:
10
11
12
13
14
15
(5) Enter data. The analyst enters this data on the situation overlay.
(6) Summarize the data and identify the threat system. The CI analyst reviews the SIGINT
16
17 situation overlay for patterns, electronic configurations, and threat C2, CIS and EW. Generally this
18 information is available from either the MAGTF all-source fusion center (AFC) or the radio battalion's
19 operations control and analysis center (OCAC). A common approach is to pose and answer questions,
20 such as:
21
22
23
24
25
(1) The CI analyst reviews, organizes, and evaluates key information components of the
12
13 collected information. He evaluates the data looking for trends and patterns of the threat system that will
14 provide an estimate of capabilities and intentions. He focuses on each component of the collected
15 information to determine if it reveals a tendency of the threat system to act or react in a particular
16 manner. Additionally, the analyst evaluates the information for trends or characteristics that will aid in the
17 ID and evaluation of the capabilities and intentions of the threat system. Additional support may be
18 required from other staff elements.
19
(2) The procedures for analyzing threat indicators and data are to:
(a) Compile and organize data. First, the analyst compiles and organizes the data that has
20
21 been collected. He updates the database with new information and organizes the data into collector
22 categories.
(b) Review data. The analyst reviews the collected data to determine the ability of the threat
23
24 systems to collect against a specific target.
(c) Determine intentions. To determine the intentions of the threat system, the CI analyst
25
26 poses the following questions and enters this information in the database:
27
28
29
30
4 How will the threat system attempt to collect against the target?
31
(3) Doctrinal templates are extracted from the database and compared to the SIGINT situation
3
4 overlay. The analyst lists similarities between current and doctrinal deployments and selects the doctrinal
5 template that has the greatest similarity to the current situation.
6
(1) The CI analyst identifies the probable threat. He reviews all the information that has been
7
8 collected and applies this information to the geographic AI and the capabilities and intentions of the
9 threat system.
10
(a) Determine probable location. Use the SIGINT situation overlay and doctrinal templates
11
12 to determine the location of the collectors. Overlay the doctrinal template over the situation overlay.
(b) Analyze terrain and weather effects. Integrate the terrain and weather data with the
13
14 doctrinal template and the SIGINT situation overlay and create a situation template for the current
15 environment. Terrain and weather conditions affect a threat system's ability to operate according to their
16 doctrine. For example, a radio DF site must have a clear line of sight (LOS) on the emission of the
17 target in order to gain an accurate bearing. Mountains, dense foliage, and water distort electronic
18 emissions and impair a collector's ability to target.
19
(c) Update the SIGINT situation overlay. Place the symbols for the collectors on the
20
21 doctrinal template that have not been confirmed on the SIGINT situation overlay as proposed locations.
e. Confirm threat. The CI analyst attempts to verify threat predictions. The procedures for confirming
22
23 the threat follow:
(1) Validate existing data. Review current intelligence reports and assessments to determine if
24
25 the information received in response to requests for intelligence submitted to higher headquarters and
26 other information sources used in the assessment are valid. If there are indications that the capabilities or
27 intentions of the threat system have changed, additional information may be required. This is determined
28 by looking for information that could indicate a change in a collector's ability to collect against the
29 command. For example, additional antennas have been added to the collector, or the collector has
30 moved to provide for better targeting are indicators of a change in collection capabilities.
(2) Request additional information. If additional information is required, these intelligence
31
32 requirements will be tasked to organic intelligence units or submitted to higher headquarters.
D-18
(3) Evaluate new information. If new information on the collector's intentions or capabilities is
1
2 received, review this information to determine its impact on the original assessment, and update the
3 situation overlay. If intentions and capabilities of the collector change, reevaluate the original threat
4 prediction by following the tasks identified in previous sections.
f. Produce output from SIGINT threat assessment. The CI analyst can present the SIGINT threat
5
6 assessment in briefings or reports. Portions of the threat assessment are included and presented in other
7 CI and all-source intelligence products.
18
19 The CI analyst performs the primary data gathering and analysis required. Assistance by and
20 coordination with the appropriate staff elements (intelligence, operations, CIS) is key to this process.
b. Data gathering requires access to command personnel and to local databases. Data sources
21
22 include:
23
24
25
26
27
c. The database of friendly technical data is used throughout the vulnerability assessment process for
2
3 key equipment information, mission data, and other supporting information.
d. MAGTF Vulnerability assessment is comprised of ten tasks. The first three tasks are ongoing
4
5 determinations of general susceptibilities. The next six are specific to the commander's guidance and
6 involve determinations of specific vulnerabilities. The final task is the output. MAGTF vulnerability
7 assessment tasks are shown in figure D-7.
b. The C-E data are a baseline for identifying friendly susceptibilities. A unit's equipment, personnel,
1
2 and associated characteristics must be identified before the pattern and signature analysis can proceed.
3 The CI analyst uses available databases to extract the table of equipment (T/E) and technical manuals
4 (TM) on MAGTF C-E equipment.
5
6
7
(1) Gather data on friendly C-E characteristics. Gather C-E data and characteristics of the
equipment. Identify the following types of C-E data:
(a) T/Es, TMs and technical data for all C-E equipment in a unit.
10
11
(d) Personnel status, including current training levels of personnel in the unit.
(e) Equipment performance capabilities and operational capabilities in all weather conditions,
12
13 at night, over particular terrain, and toward the end of equipment maintenance schedules.
14
15
(2) Organize C-E data. The CI analyst organizes the information into a format useful for
16
17 signature analysis. The data are organized by type of unit (if the support is multi-unit), type of emitter,
18 frequency range, number and type of vehicles or weapons which emit or carry emitters and the type of
19 cluster.
20 3. Determine Friendly Force Profiles.
a. This task includes the analysis of signatures and patterns of the C-E equipment and a summary
21
22 statement of the unit's C-E profile. A profile consists of the elements and standard actions, equipment,
23 and details of a unit, the sum of signatures and patterns.
24
25
26
(g) Performs tests with support from unit or higher echelon assets.
10
(2) Perform friendly pattern analysis. Identify standard practices, common uses of a unit's C-E
11
12 equipment, and operational patterns by:
(a) Reviewing the database to obtain information that might provide the threat with critical
13
14 data regarding unit type, disposition, activities, or capabilities.
(b) Extracting from the OPLAN and operations order (OPORD) particular means of
15
16 communication, operational characteristics, and key and secondary nodes for communications support.
17
(3) Correlate patterns and signature. In this subtask, compile the information from the signature
18
19 and pattern analysis, which creates the profile. The analyst:
20
(a) Lists the signature and pattern data for particular types of C-E equipment.
21
22
23
24
(d) Correlates signature and pattern data with past profiles to produce the current profile
shown in figure D-8.
D-22
higher headquarters
(4) Produce unit profile. Patterns and signatures can change as commanders, staff, and
2
3 operators change. Profile development must be an ongoing effort. To produce the unit profile, use the
4 OPORD to obtain the past task organization and then select the areas of concern to that organization,
5 that is, C2, intelligence, maneuver, fires, logistics, and force protection.
6 4. Identify Susceptibilities.
a. The analyst determines how the profiles would appear to threat systems and which equipment or
7
operations
are susceptible. A susceptibility is defined as the degree to which a device, equipment, or
8
9 weapon system is open to effective attack due to one or more inherent weaknesses. Any susceptibilities
10 are potential vulnerabilities.
11
12
13
14
15
(a) Review current profile and identify unique equipment or characteristics that the threat
2
3 may use to determine intentions.
(b) Review the CI database and compare historical profiles with current profile, noting
4
5 correlations and deviations.
(c) Plot friendly weaknesses to threat operations on a MAGTF electronic order of battle
6
7 (EOB) overlay shown in.
(2) Categorize susceptibilities. Categorize susceptibilities to allow more specific analysis by
8
9 equipment type, organization, and use. Do this:
10
11
(b) By activity (for example, logistic, CIS, intelligence, operations, and fire support).
12
13
14
D-24
2 b. This information enables the analyst to evaluate indicators of friendly COA in the context of what
3 the commander considers essential to the success of the operation. Setting priorities for the
4 vulnerabilities depends on the commander's operational concept. The primary information sources are:
5
(2) OPORDs.
(3) OPLANs.
5
6
7
8
(2) Compare COA to specific EEFIs. Review the COA for events or actions that could
compromise the unit's mission by disclosing key EEFI. The review is summarized in an events list
that describes a particular mission, COA, or event which may compromise the EEFI or the friendly
intentions.
(1) Identify the commander's preferences and perceptions about C-SIGINT operations. Seek
13
14 information about the commander's style from sources such as previous concepts, plans, and orders, or
15 interviews with subordinate commanders and staff officers.
(2) Integrate friendly profiles and COA. In the event planned location or movement data are not
16
17 available, retrieve friendly operational overlays shown from the database. The overlays help identify
18 friendly historical positions for the new COA. The integrate friendly force profiles and COAs:
19
(b) Identifying key C-E capabilities associated with the COA (for example, radio nets, types
20
21 of radios, radar, teletypewriters).
22
23
24
(a) Begin by using the commander's objectives to identify key operational constraints, that is,
25
26 nodes, paths, chokepoints, and standard C-E procedures followed during a particular COA. New or
27 critical data, not previously included in the friendly profile and COA integration, are then added to the
28 situation overlay.
D-26
10
(5) Set priorities. Once the type of operation is determined, set priorities for the events,
11
12 movements, and nodes by their overall importance to the operation.
13
(a) Using the C-E constraints and procedures identified from the information provided by the
14
15 commander, together with data obtained from previous tasks, determine key indicators of friendly
16 operations. For each COA, extract those preparations, activities, or operations that could tip off the
17 threat to the particular COA.
(b) List the indicators associated with a COA. Any special factors such as operational
18
19 constraints, optimum weather conditions, or terrain requirements associated with an indicator should be
20 described accordingly.
21 8. Review and Validate Threat Assessment Data.
a. Threat assessment data are further refined in order to proceed with the remainder of the
22
23 vulnerability assessment. The analyst organizes threat data in a format comparable to the friendly forces
24 data. Missing data is identified and requested. The C-SIGINT analyst performs the review and
25 validation of threat data with considerable exchanges of information with other analysts.
26
27
28
b. The procedures for reviewing and validating threat assessment data follow:
(1) Summarize and reorganize threat assessment data.
(a) Compile recent threat assessment information.
D-27
(c) Coordinate with the collection management section to initiate requests for information.
(a) Extract areas of threat operations most critical to the supported command.
7 9. Identify Vulnerabilities.
a. The analyst compares the enemy's intelligence collection threat with the friendly unit susceptibilities
8
9 to determine the vulnerabilities. Once the vulnerabilities have been identified, the analyst can rank them.
10
11
12
(b) Use the products developed earlier in the C-SIGINT process to determine where threat
13
14 capabilities and intentions are directed against susceptible MAGTF operations.
15
16
(c) Determine the probability of threat activity against MAGTF C-E operation.
(2) Determine which susceptibilities are vulnerabilities.
(a) Designate as vulnerabilities those C-E susceptibilities which are targetable by a specific
17
18 threat collector.
19
(c) Match indicators with threat systems and document specific event characteristics if
20
21 known; for example, time and location of vulnerabilities.
22 10. Rank Vulnerabilities.
a. The C-SIGINT analyst ranks the vulnerabilities by analyzing them in view of the indicators of
23
24 friendly COAs and EEFIs. The ranking is based on criteria estimating the uniqueness, degree of
D-28
(1) Establish criteria for measuring the vulnerability. Develop a means for judging whether each
4
5 identified vulnerability is critical, significant, or important to the success of the operation. These final
6 ratings are attained by evaluating each vulnerability against criteria which address how critical they are to
7 the success or failure of the operation. Uniqueness, importance, and susceptibility to threat are three
8 criteria which measure vulnerability and criticality, and permit an accurate ranking of them. They are
9 defined as follows:
10
(a) Uniqueness--the extent to which a vulnerability can be readily associated with a COA.
11
(b) Importance--a measure of how critical the vulnerability is to the success of the operation.
(c) Susceptibility to threat--a measure of the number and variety of threats placed against the
12
13 indicator.
14
(a) Combine the criteria and vulnerabilities in a matrix format shown in figure D-10. For
15
16 each vulnerability, conduct a review against the established criteria. The analysts have in their possession
17 the commander's objectives, prioritized EEFI, and ranking criteria, and can evaluate the vulnerabilities
18 using these data. Vulnerabilities are first rated according to each of the criteria. The horizontal axis of the
19 matrix lists the criteria of uniqueness, importance, and susceptibility.
D-29
Vulnerability
EEFI
Numerical
Rating
CRITERIA
Uniqueness
Importance Susceptibility
MUX at main
CP vulnerable
to DF
4(a)2
14
MUX at main
CP vulnerable
to jamming
4(a)4
0 - 2 = Low
3 = Medium
4 - 5 = High
0-4=
5-8=
9 - 11 =
12 - 15 =
Unimportant
Important
Significant
Critical
(b) List the vulnerabilities on the vertical axis. The degree of satisfaction of a criterion is
2
3 expressed numerically on a scale of 0 to 5 with 5 being the highest rating. If a vulnerability is highly
4 unique, that is, pertaining to very specialized and infrequently exhibited indicators, it would be assigned a
5 high rating. If the vulnerability is such that it is exhibited in many COA, in many operations, its
6 uniqueness rating would be low (0 to 2).
1 If a vulnerability is highly important, that is, involving disclosure of a critical EEFI, its
7
8 rating would be high. An EEFI lower-on the commander's list of priorities would receive a lower rating.
9 If the vulnerability is highly susceptible, that is, targeted by numerous threat systems of several types, its
10 rating for susceptibility would be high.
2 If a single threat system of limited capability is targeting the vulnerability, the rating
11
would
be
low.
The
overall ratings are determined by adding the values of the three criteria and placing it
12
13 under the overall number rating.
14
(a) Once an overall rating is established for each vulnerability, develop a prioritized ranking.
15
16 Vulnerabilities fall into the broader categories of critical, significant and important, based on the criticality
17 level of criteria satisfied. Vulnerabilities receiving overall ratings between 5 and 8 are considered
D-30
D-31
APPENDIX E
4 SECTION
TITLE
PAGE #
COUNTERINTELLIGENCE ESTIMATE
E-7
7
8
E-9
9
10
COUNTERINTELLIGENCE INFORMATION
REPORT
E-11
11
12
E-12
13
14
E-14
15
E-17
16
17
COUNTERINTELLIGENCE TACTICAL
INTERROGATION REPORT
E-19
18
E-22
19
20
10
E-24
21
22
11
COUNTERINTELLIGENCE INSPECTION/
EVALUATION REPORT
E-28
23
24
12
COUNTERINTELLIGENCE SURVEY/
VULNERABILITY ASSESSMENT
E-29
25
26
13
E-1
E-3
14
2 SECTION
TITLE
E-55
PAGE #
3
4
15
E-56
5
6
16
E-57
7
8
17
COUNTERINTELLIGENCE MEASURES
WORKSHEET
E-2
E-60
SECTION 1
COUNTERINTELLIGENCE ESTIMATE
3 Purpose. Provides a baseline of historical, threat related information for inclusion as Tab A of
4 Appendix 3, Counterintelligence to Annex B, Intelligence.
5 ______________________________________________________________________________
6
CLASSIFICATION
Copy no. __ of __ copies
ISSUING HEADQUARTERS
PLACE OF ISSUE
Date/Time Group
7
8
9
10
11 COUNTERINTELLIGENCE ESTIMATE (Number)
12 ( ) REFERENCES:
13
14
15
16
17
18
19
20
21
22
23
24
a. ( ) Military Geography
(1) ( ) (Existing situation)
(2) ( ) (Estimated effects on enemy intelligence, sabotage, subversive and terrorist operations
3
4 and capabilities.)
5
6
7
(2) ( ) (Estimated effects on enemy intelligence, sabotage, subversive and terrorist operations
8
9 and capabilities.)
10
22
b. ( ) Composition.
28
a. ( ) Capabilities
(1) ( ) Intelligence. (Include all known/estimated enemy methods.)
(2) ( ) Sabotage. (Include all possible agent/guerilla capabilities for military, political, and
15
16 economic sabotage.)
(3) ( ) Subversion. (Include all types, such as propaganda, sedition, treason, disaffection, and
17
18 threatened terrorists activities affecting our troops, allies, and local civilians, and assistance in the escape
19 and evasion of hostile civilians.)
(4) ( ) Terrorist. (Include capabilities of terrorist personalities and organizations in area of
20
21 operation.)
b. ( ) Analysis and discussion of enemy capabilities for intelligence, sabotage, subversive, and
22
23 terrorism as a basis to judge the probability of their adoption.
24 5. CONCLUSIONS AND VULNERABILITIES. (Conclusions resulting from discussion in
25 paragraph 4. Relate to current all-source intelligence estimates of the enemy's centers of gravity, critical
26 and other vulnerabilities and estimated exploitability of these by friendly forces, enemy courses of action
27 beginning with the most probable and continuing down the list in the estimated order of probability, and
28 the estimated effects adoption of each capability would have on the friendly mission.)
a. ( ) Probability of enemy adoption of intelligence, sabotage, subversive, and terrorist programs or
29
30 procedures based on capabilities.
31
/s/ _____________________
Name
Rank and Service
7 (As appropriate)
8 DISTRIBUTION:
9
E-6
SECTION 2
3 Purpose. A visual working tool for managing the CI targeting triad -- personalities, organizations and
4 installations (PO&I) -- and unit assignments.
5 _____________________________________________________________________________
6
CLASSIFICATION
9 TGT TARGET
10 NO.
11
12 1 Broadcasting
Station
13
14
15
16
LOCATION/
DESCRIPTION
Grid coordinates 3 km 1
NW of city on Victory
Road
17 2
18
19
20
21 3
22
23
24
25
26 4
27
28
29
30
31
32 5
33
34
35
36
37
38
Government
Control
Center
Military
Intelligence
Headquarters
SPECIAL
INSTRUCTIONS
INTERESTED
UNITS/SECT.
Locate/take into
custody station
state security officer
and all propaganda
file material
G-5/PAO
Grid coordinates
3
largest building in city
center, gable roof
G-5
Grid coordinates
located on liberation
military compound E
of city
Locate/search Cl
and agent operations section
Task Force
N2
Potential defector
handle accordingly
10th Army
MI
Infiltration
Training
Facility
Secure/search for
file information on
personalities and
operations. Coordinate with Task Force
N2
Task Force
N2
Grid coordinates
located W of city on
seaward peninsula
PRI
CI TEAM
ASSIGN
E-7
CLASSIFICATION
CLASSIFICATION
3 TGT TARGET
4 NO.
LOCATION/
DESCRIPTION
PRI
CI TEAM
ASSIGN
SPECIAL
INSTRUCTIONS
INTERESTED
UNITS/SECT.
56
6
7
8
9
10
11
Political
Prison
Personalities of Cl
interest on separate
listing. Provide list
of recovered
personalities to HQ
via most expedient
means
G-5
12 7
13
14
15
16
National
Intelligence
Field Office
Grid coordinates
located in concrete
block building on
corner of 5th St and
Liberation Ave
Immediately
evaluate all
documents/
equipment
G-2
E-8
CLASSIFICATION
E-9
SECTION 3
3 Purpose. A quick response report to get information into the All Source Correlated Database.
4 _____________________________________________________________________________
5
CLASSIFICATION
SALUTE
7 Reporting Unit:
(Text Field)
8 Record Creator:
(Text Field)
9 Report Number:
(Text Field)
10 References:
11 Requirement Reference:
12
(Text Area)
(Text Field)
(Text Field)
14 Activity Type:
15 Activity Status:
16 Activity Location:
(Text Field)
17
18
19
20
21
Map Coordinates:
22 Activity Direction:
(Text Field)
23 Unit:
(Text Field)
(Text Field)
(Text Field)
(Text Field)
(Text Field)
E-10
1
2
CLASSIFICATION
CLASSIFICATION
3 Equipment:
(Text Area)
4 SRC #:
(Text Field)
5 SRC Description:
(Text Area)
6 SRC Reliability:
7 Comments:
(Text Area)
8 Map Data:
(Text Field)
CLASSIFICATION
9
10 _________________________________________________________________________________
11 Additional Requirement:
a. Army tactics, techniques and procedures requires that transmit portions of the SALUTE report
12
13 to its ASAS (All Source Automated System). Hence, there is a requirement to parse some data
14 elements of a completed SALUTE message into U. S. message text format.
b. The TCP for DCIIS V2.0 includes a requirement to convert the CIIR from its database record
15
16 format to the USMTF message format as a step in transforming the CIIR into an IIR. The technique to
17 accomplish the CIIR requirement may be applicable to the SALUTE requirement.
18
E-11
SECTION 4
CLASSIFICATION
6
7
CI Information Report
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Title (Text):
27
28
29
30
Report Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Report Date (yyyymmdd): . . . . . . . . . . . . . . . . . . . . . . . . . . . .
To:
...............................................
Target: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
32
33
34
35
36
37
Individual Source: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reliability of the Source: . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Source ID Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Information Reliability: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Information Date (yyyymmdd): . . . . . . . . . . . . . . . . . . . . . . . .
Collection Date (yyyymmdd): . . . . . . . . . . . . . . . . . . . . . . . . .
Location: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
38
Report (Text):
39
Comments (Text):
E-12
E-13
SECTION 5
2
3
4 Purpose. Serves as the planning, approval, and execution vehicles for MAGTF Counterintelligence
5 Force Protection Source Operations.
6 _________________________________________________________________________________
7
CLASSIFICATION
9 From:
10
11 To:
12
13 Info:
(Originator)
(Text FieldPicklist?)
(Text FieldPicklist?)
14
15 Project Number:
(Text Field)
16 Name:
(Text Field)
17 Originating Hqs:
(Text Field)
18 Implementing Element:
(Text Field)
19 Collection Requirements:
(Text Area)
20 References:
(Text Area)
21 Date Submitted:
(Text Field)
22 Date Approved:
(Text Field)
23 Approval Authority:
(Text Field)
24 Operation Type:
25 Target Focus:
(Text Area)
26 Target Personnel:
(Text Area)
27 Target Country:
(Text Area)
28 Organizations:
(Text Area)
29 Base of Operations:
(Text Field)
30 Communications Methods
(Text Area)
E-14
1
2
CLASSIFICATION
CLASSIFICATION
3 Risks:
(Text Area)
4 Technical Support:
(Text Area)
5 Finances:
(Text Area)
6 Coordination:
(Text Area)
(Text Area)
9 Point of Contact:
(Text Field)
CLASSIFICATION
10
11 ____________________________________________________________________________________
E-15
SECTION 6
2
3
COUNTERINTELLIGENCE SOURCE
LEAD DEVELOPMENT REPORT
CLASSIFICATION
8 Date:
(Text Field)
9 Subject:
(Mandatory)
(Text Field)
(Mandatory)
10 Report No:
(Text Field)
11 Project No:
(Text Field)
12 References:
(Text Field)
13 Record Creator:
(Text Field)
(Mandatory)
(Mandatory)
14 Origin:
15
Source of Lead
(Text Field)
16
(Text Area)
17
18
(Text Area)
19
20
(Text Area)
21
Security Issues
(Text Area)
(Text Area)
22 Personnel Information:
23
Lead Status
(Text Area)
24
Nationality
(Text Field)
25
Citizenship
E-16
CLASSIFICATION
CLASSIFICATION
1
2
3
Motivation
(Text Area)
Character
(Text Area)
Personality
(Text Area)
Trait Exploitation
(Text Area)
8 Biographical Data
9
10
(Link to the INDIVIDUAL record. When printing, whole INDIVIDUAL record needs to print
out.)
(Text Area)
13 Investigative Checks:
14 Type
Status
15 Coordination Required
Type of Source
18
Placement
(Text Area)
19
Access
(Text Area)
20
(Text Area)
21
Qualifications
(Text Area)
22
Personal
(Text Area)
E-17
(Multiple Choice)
Motivation
(Text Area)
Strengths/Weaknesses
(Text Area)
CLASSIFICATION
CLASSIFICATION
3
4
5
Risk
To Source
8 Approach Plan:
(Text Area)
(Text Area)
9 ICF:
(Text Area)***
10 Comments:
11 Attachments:
(Text Area)
(Standard Repeating Group)
CLASSIFICATION
12
13 ______________________________________________________________________________
E-18
SECTION 7
CLASSIFICATION
Screening Report
7 Reporting Unit:
(Text Field)
8 Screener:
9
10 Report Date:
(Text Field)
11 Report Time:
(Text Field)
12 Capturing Unit:
(Text Field)
(Text Field)
13 Requirement Reference:
(Text Field)
14 Status:
PL - Military
15
Paramilitary
16
Civilian
17
Other
18
19 Name:
(Text Field)
20 Alternate Name(s):
(Repeating Group)
21 Personal ID No:
(Text Field)
22 EPW ID No:
(Text Field)
23 Date of Birth:
(Text Field)
24 Sex:
E-19
(Text Field)
CLASSIFICATION
CLASSIFICATION
2
3
4 Language Competence:
5 Language Used:
(Text Field)
6 Education:
7 Employment:
8 Military Service:
9 Date Captured:
(Text Field)
10 Time Captured:
(Text Field)
11 Place Captured:
(Text Field)
12 Circumstances of Capture:
(Text Area)
13 Documents at Capture:
(Text Area)
14 Equipment Captured:
(Text Area)
16
Remarks:
(Text Area)
(Text Field w/PL)
19 Specific Knowledgeability:
(Text Area)
20 Sources Cooperation:
21 EPW Category
E-20
(Text Field)
3 Approach Plan
4 Comments:
5
(Text Area)
CLASSIFICATION
E-21
CLASSIFICATION
(Text Field)
Record Creator:
(Text Field)
8 Report Date:
(Text Field)
Interpreter:
(Text Field)
9 Report Time:
(Text Field)
Language Used:
10 Capturing Unit:
(Text Field)
11 Requirement Reference:
(Text Field)
12 Map Data:
(Text Area)
13 Source No:
(Text Field)
14 Source Status:
15 Name:
(Text Field)
16 Alternate Name(s):
(Repeating Group)
17 Personal ID No:
(Text Field)
18 EPW ID No:
(Text Field)
19 Place of Birth:
(Text Field)
20 Date of Birth:
(Text Field)
21 Nationality:
(Text Field)
E-22
1 Sex:
2
3
4 Marital Status:
5 Language Competence:
CLASSIFICATION
CLASSIFICATION
(Text Field)
(Use text and field input from DCIIS Individual form)
6 Language Used:
(Text Field)
7 Education:
8 Employment:
9 Military Service:
10 Date Captured:
(Text Field)
11 Time Captured:
(Text Field)
12 Place Captured:
(Text Field)
13 Circumstances of Capture:
(Text Area)
14 Documents at Capture:
(Text Area)
15 Equipment Captured:
(Text Area)
19 Specific Knowledgeability:
(Text Area)
20 Sources Cooperation:
21 EPW Category
E-23
(Text Field)
3 Sources Reliability:
(Text Field)
4
5
CLASSIFICATION
CLASSIFICATION
6 Sources Production
(Text Area)
7 Approach Plan
8 Comments:
(Text Area)
CLASSIFICATION
9
10 _____________________________________________________________________________
E-24
SECTION 9
CLASSIFICATION
7 From:
(Text Field)
8 To:
(Text Field)
9 Info:
(Text Field)
10 Serial:
(Text Field)
11 Country:
(Text Field)
12 //IPSP:
(Text Field)
13 Subj:
(Text Area)
(Text Field)
19 REQS:
20 SOURCE:
(Text Area)
21 SUMMARY:
(Text Area)
22 TEXT:
(Text Area)
23 COMMENTS:
E-25
2
3
CLASSIFICATION
CLASSIFICATION
4 PROJ:
(Text Field)
5 INSTR: US NO
(Text Field)
6 PREP:
(Text Field)
7 ENCL:
8 ACQ:
(Text Field)
9 DISSEM: FIELD--
(Text Field)
(Text Field)
12 DECL:
(Text Field)
CLASSIFICATION
13
14 ______________________________________________________________________________
E-26
SECTION 10
3 Purpose. Standard report used to report unevaluated, unanalyzed biographical intelligence information.
4 ______________________________________________________________________________
5
CLASSIFICATION
7 FROM:
(Text Field)
8 TO:
(Text Field)
9 INFO:
(Text Field)
10 SERIAL:
(Text Field)
11 COUNTRY:
(Text Field)
12 //IPSP:
(Text Field)
13 SUBJ:
(Text Area)
(Text Field)
19 REQS:
20 SOURCE:
(Text Area)
21 SUMMARY:
(Text Area)
E-27
CLASSIFICATION
CLASSIFICATION
3 TEXT:
4 1.
Name of Country
5 2.
Date of Information
(Text Field)
6 3.
Date of Report
(Text Field)
(Text Field)
(Text Field)
11
(Text Field)
12
13
14
15
16
17
18
19
20
Rank
5A. English Language
(Text Field)
5B. Native
21
Date of Rank
22
Position/Billet
(Text Field)
(Text Field)
23
(Text Field)
24
(Text Area)
25
(Text Field)
E-28
CLASSIFICATION
CLASSIFICATION
2
3
4
(Text Field)
(Text Field)
6
7
(Text Field)
8
9
(Text Field)
(Text Field)
10
11
12
13
Specialty/Other Organizations
14
Date of Birth
(Text Field)
15
Place of Birth
(Text Field)
16
Sex
(Text Field)
17
Home Address
18
Telephone Number
19
14A. Home
(Text Fields)
20
14B. Work
(Text Fields)
21
Marital Status
22
Citizenship
(Text Field)
(Text Field)
(Text Field)
E-29
1
2 COMMENTS:
3
(FIELD COMMENT)
(Text Area)
4 PROJ:
(Text Field)
CLASSIFICATION
CLASSIFICATION
5
6
7 INSTR:
US NO
(Text Field)
8 PREP:
(Text Field)
9 ENCL:
10 ACQ:
11 DISSEM:
(Text Field)
FIELD--
(Text Field)
13 DRV FROM--
(Text Field)
14 DECL:
(Text Field)
CLASSIFICATION
15
16 ______________________________________________________________________________
E-30
CLASSIFICATION
5
6
CI Inspection/Evaluation Report
(Normally hard copy report not templated in DCIIS)
7 Reporting Unit:
8 Dissemination:
9
10 Report Date:
11 Report Time:
12 Reference:
13 Enclosure:
14 SYNOPSIS: (Summary of the report)
28
29
E-31
CLASSIFICATION
E-32
CLASSIFICATION
5
6
CI Survey/Vulnerability Assessment
(Normally hard copy report not templated in DCIIS)
7 Reporting Unit:
8 Dissemination:
9
10 Report Date:
11 Report Time:
12 Reference:
13 Enclosure:
14 SYNOPSIS: (Summary of the report)
15 1. PREDICATION: (How the survey was initiated.)
16 2. PURPOSE: (What the survey was to determine. State any limitations on the survey.)
17 3. BACKGROUND:
18
19
b. Previous surveys.
20
c. Mission.
21
24
(1) Mission
25
26
(3) Location
27
28
E-33
CLASSIFICATION
CLASSIFICATION
(6) Importance
4 4. RESULTS
5
a. Security of information
b. Security of personnel
c. Physical security
a. Security of information.
11
b. Security of personnel.
12
c. Physical security.
13
14
15
16
17
18
CLASSIFICATION
E-34
COUNTERINTELLIGENCE SURVEY/
2
VULNERABILITY ASSESSMENT CHECKLIST
3
4 ____________________________________________________________________________________
5 BACKGROUND:
6 Counterintelligence surveys/vulnerability assessments are conducted during peacetime as well
7 as times of hostilities, both in and outside the continental United States.
8 Manning of counterintelligence survey/vulnerability assessment teams should be task-organized
9 to meet the needs/requirements of the survey; i.e., counterintelligence officers/specialists,
10 physical security specialists from provost marshal, communications specialists, automatic data
11 processing security specialists, etc.
Name of Installation
Location of Installation
Type of Installation
12
13
14
18
19
c.
20
24
25
c.
26
d. Is this the only location where the activities taking place can be conducted?
27
e. Are there substitute places available which are suitable and practical?
28
What information about the installation would be of interest to hostile intelligence? Why?
E-35
11
(2) Numbers, types, and locations of buildings, and relationships among the various
12
buildings.
13
14
(3) Roads, paths, railroad sidings, canals, rivers, etc., on the premises of the installation.
15
16
c. Note any particularly vulnerable or sensitive points on the installation, and the reasons for
17
18 their vulnerability or sensitivity. Pay particular attention to the following:
19
20
21
22
23
24
(6) Warehouses.
25
26
27
E-36
(12) Aircraft
7 6. Perimeter Security
8
a.
(1) Type of fence or other physical barrier around the installation that affords perimeter
9
10 security?
11
12
13
14
(6) Are there any cuts, breaks, tears, holes, or gaps in the fence/barrier or any holes
15
16 under it?
17
18
19
(9) Are piles of scrap, refuse, or lumber kept near the fence/barrier?
(10) Is the fence/barrier patrolled and checked daily for cuts, breaks, holes, gaps,
20
21 tunnels, or evidence of tampering?
22
23
(13) Are the gates constructed in a manner where identity and credential checks of
24
25 persons or vehicles entering or exiting are accomplished, particularly during rush hours?
26
(14) During what hours is each gate open?
27
E-37
(15) Are there any railroad rights of way, sewers, tree lines, or other weak points on the
1
2 perimeter?
(16) Are these weak points guarded, patrolled, or secured in any fashion?
(17) Is high intensity lighting used to light up the perimeter during hours of darkness?
a.
11
12
13
14
15
16
17
(7) What is the level training for each member of the security force?
18
(8) What instructions are given to security forces regarding identity checks/challenges?
19
20
21
(12) Have roving patrols been utilized to patrol the perimeter? What are their number,
22
strength,
frequency, routes, and activity?
23
24
25
(13) What is the efficiency and manner of performance of perimeter guards and patrols?
b. Security weaknesses and recommendations.
E-38
(1) What specific weaknesses pertaining to both physical barriers and the perimeter
1
2 security force were noted during the survey?
(2) What specific and reasonable recommendations may be made to improve perimeter
3
security?
4
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
E-39
(17) Are exit and entry facilities adequate to meet an emergency situation?
10
11
12
(23) Are any measures taken to restrict entry into the building; i.e., pass, badges, access
13
14 rosters, etc.
15
(25) If the building is determined to be sensitive, high threat priority, or vulnerable, has it
16
17 been declared as restricted, and is the area surrounding it so designated?
(26) Are daily security checks conducted at the end of each working day in areas where
18
19 classified material is stored? Are all security containers checked?
20
21
(2) Are high intensity lights used to light up the exterior and the area surrounding the
22
23 buildings during hours of darkness?
24
25
26
27
(6) What are the means of activating the reactionary force? Are there backup systems?
28
E-40
e. List the frequency of periodic checks made throughout the building to detect the following:
(1) Holes, cracks, crevices which might conceal explosives, incendiary devices, or
5
6 audio/visual monitoring devices. Are such repaired?
(4) Any dangerous practices, including safety, electrical, or fire hazards which may result
9
10 from negligence or deliberate attempts at sabotage,
11
(1) What specific weaknesses pertaining to the security of interiors and exteriors were
12
13 noted during the survey?
(2) What specific reasonable recommendations may be made to improve the security of
14
15 the buildings?
a.
Description of the location, nature, and purpose of each dock, wharf, or platform.
(1) What administrative supervision of the docks, wharves, and loading platforms is
18
19 exercised? By whom?
20
21
(3) What measures are taken to prevent loitering in the vicinity of each?
(4) What measures are taken to prevent unauthorized observation of loading and
22
23 unloading?
(5) What protection is afforded mechanical sabotage, arson, explosion, or dangerous
24
25 practices)
(6) Are same precautionary measures taken as outlined for access as outlined above for
26
27 building interiors and exteriors?
28
b. Traffic conditions.
E-41
(1) Are inspections of deliveries made to guard against sabotage devices; i.e.,
1
2 explosives, caustic chemicals, etc.?
(2) What precautions are taken to conceal the loading and unloading of personnel or
3
material
if such handling requires secrecy?
4
(3) Are delivery trucks, railroad cars, and privately owned vehicles checked for possible
5
6 sabotage devices?
(4) How much is the movement of drivers and helpers about the installation controlled?
(5) In the case of movement of personnel, equipment, and material, are identifying
8
9 markings removed in an effort to assist in operations security?
10
(1) What specific weaknesses pertaining to the security of docks, wharves, and loading
11
12 platforms were noted during the survey?
(2) What specific and reasonable recommendations may be made to improve the
13
14 security of docks, wharves, and loading platforms?
17
(1) Are motor pools, dismount points, and parking areas adequately guarded?
18
(2) Are vehicles properly checked and accessible only to authorized personnel?
19
(4) What measures are taken to safeguard fuels, lubricants, tools, and equipment
20
21 against sabotage, theft, fire, and explosion?
22
(5) Are frequent checks made of all vehicles for possible mechanical sabotage?
(6) Are drivers and mechanics instructed as to the proper checks, to be made to guard
23
24 against or detect sabotage?
(7) What provisions are made to prohibit privately owned vehicle parking in motor pools,
25
26 dismount points/parking areas?
27
(8) Are fuels and lubricants frequently tested for possible contamination?
28
E-42
(12) Do parking arrangements/facilities impede efficient traffic flow through and near the
4
5 compound?
(13) Would parking arrangements interfere with firefighting or other necessary
6
7 emergency vehicles if there was an emergency?
(1) What specific weaknesses about the security of motor pools and parking lots were
9
10 noted during this survey?
(2) What specific and reasonable recommendations may be made to improve the
11
12 security of the motor pool and parking lots.
15
16
17
18
19
20
(6) Are all current sources ample to provide a reserve beyond full load demands?
21
22
(8) Is an alternate or auxiliary electric power system available for emergency use?
23
24
(10) How many and what kind of power substations/transformers fare on the installation?
(11) Are control panels, pressure valves, gas facilities, and control valves in good working
25
order?
How
frequently are they checked? Is adequate fire protective equipment available and
26
27 nearby?
E-43
5
6
7
(2) Do transformers have sufficient capacity, are they safely located and well protected
8
9 by physical barriers and guards?
10
(3) Are oil-filled transformers located in noncombustible well-drained buildings or outside?
11
(4) Are frequent inspections made of the oil, contact, and control apparatus of circuit
12
13 breakers and transformers?
14
15
16
(7) Is the pole line or underground line safe, reliable, and frequently checked?
17
18
19
20
21
22
(1) What specific weakness about the security of power facilities and supply were noted
23
24 during the survey?
(2) What specific and reasonable recommendations may be made to improve the
25
26 security of power facilities and supply?
E-44
(1) What fire fighting and first aid equipment are available on the installation?
(2) What types of fire extinguishers are available; i.e., foam, dry chemical, halon, water,
2
3 carbon dioxide, and carbon tetrachloride? Are they at locations where such types may be
4 needed?
(3) Are all extinguishers and other equipment in working order and frequently tested and
5
6 inspected?
(5) Do competent personnel make inspections of fire equipment and are the results
8
recorded?
9
(6) Are both first aid and firefighting equipment painted so as to be conspicuous? Are they
10
11 within reach of all personnel, unobstructed, and of reasonable size and weight to permit ease of
12 handling by all personnel?
Is first aid equipment available? Does it include ample amounts of materials that may
13
14 be needed?
15
16
17
(10) Are there sufficient numbers of alarms and sensors in the system?
18
19
(12) Are vulnerable and/or important facilities equipped with sprinkler systems?
(13) What type of sprinkler system(s) is/are used? Are they fed by public mains, tanks,
20
21 private reservoir, or pumps?
22
23
(15) Where are the main control valves of the system located?
24
25
(17) Are hydrants in working order? How often are they inspected and tested?
(18) Is the water pressure sufficient so that streams of water will reach and extinguish
26
27 flames in all sections of the installation?
28
(20) Does the installation have its own fire department? A brigade? What equipment does
29
30 it have? Are the personnel well trained?
E-45
(21) Have arrangements been made with public fire departments to furnish equipment
1
2 and personnel to augment the installation department/brigade?
(23) Has a program of fire drills been inaugurated? Are such drills conducted in an
4
5 efficient and earnest manner?
(25) What plans have been made for the action of all personnel if there is a fire?
(1) What specific security weaknesses about the firefighting equipment and facilities
9
10 were noted during the survey?
(2) What specific and reasonable recommendations may be made to improve the
11
security
of firefighting equipment and facilities?
12
(2) Are sources of water reasonably safe, adequately guarded, and protected by physical
16
17 security?
18
(3) If a public supply is used, what is the diameter of the main line?
(4) What is the water pressure? Is it adequate for normal use as well as for
19
20 emergencies?
(5) If a private reservoir or tank is used, what is its capacity, level, pressure, and
21
22 condition?
23
(7) What type of pumps are used in the water system (underwater, suction, centrifugal,
24
25 electric, etc.)?
26
(8) Are water pumping stations adequately protected, frequently inspected, and tested?
27
28
E-46
(11) How often is water tested for purification? By whom? Is the water treated? By
1
2 whom? By what chemicals?
(14) Are sewer mains, control, pumps, and disposal systems adequate?
(15) Is there a possibility of water or food contamination from the sewage system?
(16) Has there been any epidemic outbreak at the installation traceable to waste
7
8 disposal?
(1) What specific and reasonable recommendations may be made to improve the
10
11 security of the water supply?
12
(2) What specific weaknesses about the water supply were noted during the survey?
(1) From what sources does the installation receive food and allied supplies? Can these
15
16 sources be considered reliable?
(2) If food supplies are purchased from merchants and farmers in the local vicinity, have
17
they
been
checked and their food tested for cleanliness?
18
(3) Have caterers and companies or individuals who operate food, candy, soft drink, or
19
20 other concessions on or near the installation been checked? Have their products been
21 thoroughly tested?
22
(4) Have local food handlers been checked for health, cleanliness, and loyalty?
(5) Is entry to kitchens and food storerooms restricted to authorized personnel? How are
23
24 such restrictions enforced?
25
26
27
28
(9) Are frequent checks made of foods, drinks, etc., to prevent or detect toxicological or
E-47
6 survey?
(2) What specific and reasonable recommendations may be made to improve the
7
8 security of the food supply?
a.
11
(1) Description.
12
13
(3) Is the message center adequately protected by physical barriers and guards?
14
(5) Who handles the mail at the message center? Have all mail handlers been subject to
15
background
and local records checks?
16
(6) Are all encryption (hardware and software) devices properly safeguarded and properly
17
18 destroyed when obsolete?
19
(7) Are logs kept of authorized couriers and message traffic distribution?
20
21
26
(1) What specific weaknesses about the security of the communications systems were
27
28 noted during the survey?
E-48
3 16.
4
(1) What means of wire and wireless communications are used throughout the
5
6 installation?
(2) Where are the central points of such communications networks located?
10
11
(7) Are open wires, terminal boxes, cross connecting boxes, cables, and manholes
12
13 frequently inspected for indications of sabotage and/or wire tapping?
14
15
(9) Are civilian repairmen used? Are they checked and cleared?
(10) Have preparations been made to take care of sudden breaks in the system
16
17 efficiently?
(11) Have personnel been cautioned about discussing classified or sensitive matters
18
19 over unsecured telephone, teletype, or radios?
20
(1) What specific weaknesses about the security of the communications system were
21
22 noted during the survey?
(2) What specific and reasonable recommendations may be made to improve the
23
24 security of the communications system?
E-49
(4) Are fight safes and cabinets affixed to floors or chained to immovable objects?
(5) Are container doors closed and locked when not in use?
10
11
(8) What security measures are enforced about keys to doors, gates, or file cabinets?
12
(10) Who has access to combinations and keys? Do all authorized personnel have
13
14 access? Have they been cautioned about passing keys and combinations to unauthorized
15 personnel?
(11) Is a rigid chain of custody required for classified information (Secret and above).
16
17 Can custodians identify the location of classified at any time?
(12) Are only personnel with completed background checks and appropriate access
18
19 assigned to positions requiring the handling of classified material?
(13) Plans, blueprints, reports, or other classified material returned as promptly as
20
21 possible and properly turned in?
22
(14) Who has access to classified material (with and without approved access)?
25
(16) Is rank or position considered sufficient reason for access to classified information?
(17) Is classified material left unattended on desks where persons passing by can
26
27 observe or steal without detection?
28
(18) Have civilian janitors been checked and placed under supervision?
29
(19) How is classified waste disposed of? Are destruction records kept?
E-50
3
4
(21) Have all personnel been cautioned about unauthorized statements and releases?
b. Security of personnel.
(1) What specific weaknesses about the security of information were noted during the
5
survey?
6
(2) What specific and reasonable recommendations may be made to improve the
7
8 security of information?
9 18.
Security of Personnel
10
11
12
d. Is the command aware of continuous evaluation of those who have access to classified
13
or
sensitive
material or equipment?
14
15
16
17 19.
Identification System
a. What system is used to identify personnel authorized access within the confines of the
18
19 installation/facility?
20
(1) Are badges or identification cards of tamper-proof design and difficult to reproduce or
21
counterfeit?
22
(2) Is the makeup and issue of badges and identification cards rigidly controlled to
23
24 prevent:
25
(a) Reproduction?
26
(b) Theft?
27
E-51
1
2
(5) Are color or coded systems used to identify level of access or department personnel
4
5 are granted?
(8) Do regulations prescribe that everyone wears the badge at all times and are
8
9 regulations enforced?
10
11
(10) When badges are reported missing, lost, or forgotten what action is taken?
12
c.
13
14
(2) Are access rosters passed from one facility/ command to another via secure means?
15
d. What system is used to prevent persons working in one building, section, or unit from
16
wandering
about restricted areas without proper authorization.
17
18 20.
Visitor Controls
a. What system is used to identify and admit authorized and legitimate visitors to the
19
20 installation or facility?
21
(1) How and by whom is the legitimacy or necessity of a visitor's mission established?
22
(3) On arrival at the gate, entrance of the facility or section, are visitors escorted to a
23
24 reception area?
25
26
27
E-52
(8) Are visitors required to register in a logbook with the following information:
(c) Rank.
10
11
12
(10) Are visitors escorted or kept under surveillance during the time they are on the
13
14 installation?
15
16
17
18
19
20
21
22
23
24
25
(2) Has their visit been checked with higher commands to verify authority?
E-53
d. Are orders and credentials of allied military personnel examined by competent personnel
1
2 (linguists, etc.).
e. Are spot checks of persons within the installation/facility made from time to time?
(1) What specific weaknesses about identification and visitor's control were noted during
7
8 the survey?
(2) What specific reasonable recommendations may be made to improve security by
9
further
identification
and visitor's control?
10
11 21.
12
13
(1) Strength.
14
(2) Shifts.
15
(3) Reserves.
16
(4) Weapons.
17
(5) Training.
18
19
(7) Communications.
20
21
22
23
24
25
E-54
10
11
12
(17) Are guard force communications and alarm systems in use? Are they adequate?
(18) What type of communication and alarm system does the guard force have? Are
13
14 there backup systems?
15
16
(20) Does the guard force have communications with the military police?
17
18
19
20
(24) Are arms and ammunition adequately safeguarded when not in use?
21
(26) Where are the weapons and ammunition stored? Does storage prevent rapid
22
23 access to the guard force?
24
25
(28) What physical, mental, age, or other qualifications must protective guards have?
26
E-55
(30) Are guards uniformed, and do they have credentials or badges? What other system
1
2 of identification is used?
(31) Is the guard force competent and respected by personnel of the installation?
10
13
(f) Location and operation of all important steam and gas valves and of all main
14
15 electrical switches?
(g) Location and operation of fire protective equipment including use of sprinkler
16
17 control valves?
18
19
20
(j) Duties is the event of fire, blackouts, or other emergencies that can be foreseen?
21
22
23
24
25
26
E-56
(37) Do guards check the credentials of visitors and personnel working on the installation
4
5 or facility?
(38) Is the strength of the guard force consistent with -
6
7
8 open?
(a) The number of pedestrian, vehicle, and railroad gates and the hours they are
10
(c) The number of loading platforms, storage facilities, working areas, etc.?
11
(d) The number of vehicles to cover the entire installation in a reasonable time?
12
13
14
15
16
(39) What are the duties of the guard force if there are security violations? Does the
17
18 guard force have security clearance and access?
19
20
c. Guard headquarters.
(1) Is the guard headquarters conveniently located?
(2) Is the guard headquarters properly secured at all times, and does it contain all
21
22 necessary equipment?
(3) Does the guard headquarters contain adequate facilities for all members of the guard
23
24 force?
25
(1) What specific security weaknesses were noted during the survey of the installation's
26
27 guard force?
E-57
a. What is the general nature of the population and the area surrounding the installation?
(1) Does the nationality or political nature of the surrounding populace offer a natural
5
6 cover and aid to hostile agents and saboteurs?
(3) If so, are minimum altitudes for planes published at all local airports?
10
(6) Is the installation exposed to hazards that may be brought onto the installation by
11
12 natural conditions such as floods, extreme winds, forest fires, electrical storms, etc.?
(7) Is the installation or buildings within the installation well camouflaged against both air
13
14 and ground observation?
(8) Have places of amusement near the installation and persons frequenting them been
15
16 investigated, scrutinized, and checked?
(9) Have night clubs, pool rooms, bowling alleys, houses of prostitution, barber shops,
17
18 restaurants, taverns, stores, and other places frequented by personnel from the installation been
19 included and thoroughly checked.
(10) Has the surrounding area been carefully scrutinized for any place likely to be used
20
21 as bases for espionage or sabotage agents? Areas that could conceal antenna's, audio and
22 visual surveillance, etc.?
23
(1) What specific security weaknesses were noted during the survey of the area adjacent
24
to
the
installation?
25
26
(2) What specific and reasonable recommendations may be made to improve security?
27 23. Security of Air Installations. The security of air installations does not differ from that of
28 any other installation. Aircraft and maintenance facilities are high priority targets of saboteurs
29 and espionage agents. In general, checking the following major areas will assist in establishing
30 the security afforded to the installation.
E-58
d. Have precautions been taken to see that there is no smoking in the area?
g. Are vital repair parts in storage areas protected from unauthorized personnel, fire, and
7
8 the elements.
12 24.
a. This checklist is not all encompassing and should be used as a guide to initiate a survey.
13
14 Several methods of organizing a security check may be used. The following methods, through
15 usage, have been found to be practical and efficient.
(1) Itemize on index cards or automated data file all requirements as listed on the
16
17 checklist and write the required information on each card/file as it is checked off the list.
(2) Itemize basic subdivisions of survey checklist requirements on separate pages with
18
itemized
requirements listed in required order. Write in the required information in the proper
19
20 space as each item is checked off.
(3) Itemize all requirements of the survey checklist on separate pages, subdividing the
21
pages
according
to main subdivision requirements. Make detailed notes about each item as it is
22
23 checked off.
b. After completing notes on all requirements for each item, assemble in order and prepare
24
25 report.
E-59
SECTION 14
CLASSIFICATION
6
7
8
9
10
11
12
13
Record ID: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Point of Contact: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Classification: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Abstract: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Discretionary Access Control: . . . . . . . . . . . . . . . . .
Caveats: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14
Release To: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
16
17
18
19
20
21
22
23
24
25
Record Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Record Status: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Date Created (yyyymmdd): . . . . . . . . . . . . . . . . . . . .
Date Modified (yyyymmdd): . . . . . . . . . . . . . . . . . . . .
Community of Interest: . . . . . . . . . . . . . . . . . . . . . . . .
Source Record: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Report Detail
Case Number Reference: . . . . . . . . . . . . . . . . . . . . .
Case: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Event: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Date of Record (yyyymmdd): . . . . . . . . . . . . . . . . . .
26
Title (Text):
27
28
29
Role: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30
Status (Text):
31
32
33
34
35
36
E-60
CLASSIFICATION
SECTION 15
Release To: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
16
17
18
19
20
21
22
23
24
25
26
Record Type: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Record Status: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Date Created (yyyymmdd): . . . . . . . . . . . . . . . . . . . . . . . . . . .
Date Modified (yyyymmdd): . . . . . . . . . . . . . . . . . . . . . . . . . . .
Community of Interest: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Source Record: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Report Detail
Date (yyyymmdd): . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Case Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lead Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ROIA Number: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27
Title
28
Sub Title
29
30
Agency: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Number of Investigative Materials: . . . . . . . . . . . . . . . .
31
Text
32
33
34
35
36
37
38
39
Agent Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Organization: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sworn Statement
Individual Information: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Employer: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
OR Unit: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sworn Statement
E-61
1
2
Number of Witnesses: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CLASSIFICATION
E-62
SECTION 16
2
3
4 Purpose. Standard report used to record and document POW/MIA/missing personnel investigations.
5 ____________________________________________________________________________________
6
CLASSIFICATION
10 1. Personal Data
11
a. Name:
12
b. Rank:
13
c. SSN/MOS:
14
15
e. Organization:
16
f. Date of Birth:
17
g. Place of Birth:
18
h. Home of Record:
19
20
j. Marital Status (Include number, sex, citizen status, and age of children):
21
k. PEBD:
22
1. EAS/EOS:
23
24
n. Duty assignment:
25 2. Physical Characteristics
26
27
28
E-63
CLASSIFICATION
CLASSIFICATION
2
3
c. Build:
d. Hair:
e. Eyes:
f. Complexion:
g. Race:
h. Right/left handed:
9 3. Distinguishing Characteristics
10
11
b. Mannerisms:
12
c. Scars/identifying marks (Include type, location, size, color, and detailed description):
13
d. Others:
14 4. Circumstances of Incident
15
a. Date:
16
17
c. Circumstances:
18
d. Reported wounds:
19
20
21
22
25
26
c. Religion:
27
d. Civilian education:
28
e. Military schools:
29
E-64
CLASSIFICATION
CLASSIFICATION
g. Jewelry when last seen (Include description of glasses, rings, watches, religious
4 medallions, etc.):
5
6 6. Photograph
7 7. Handwriting Samples (Attach sample of correspondence, notes, etc. If no other sample is
8 available, include reproduction of signature from Service Record Book/Officer's Qualification
9 Record [SRB/OQRI.)
24
CLASSIFICATION
25 ____________________________________________________________________________________
E-65
SECTION 17
(2)
Categories of
Counterintelligence
Activities Involved
Assault Phase
1. Military Security
a. Security discipline.
(3)
Counterintelligence Measures
to be Adopted
Civil
CIS
Affairs Officer
c. Communication &
information security.
All
Units
CI
Units
SOP
SOP
CI elements check
SOP
CI elements check
(5)
Instructions regarding entries
in columns (3) and (4). Notes
for future action, and staff
coordination measures
X
b. Safeguarding of
classified
information and
equipment.
Provost Comm
Marshal Intel
Unit
SOP
SOP
SOP
Check with CIS officer for compliance
E-60
APPENDIX F
19 Faculty
F-1
F-2
12 Faculty
13 Eight full-time instructors with intensive counterespionage background supplemented with guest
14 speakers/subject-matter experts from DOD and other Intelligence Community components.
15 How Long? How Often?
16 Fifteen weeks (approximately 750 hours)/offered twice a year
17 Security Clearance Needed
18 Top Secret
19 Further Information
20 Contact the course director or senior instructor at (301) 677-5778/5779, FAX (301) 677-6362. Mailing
21 address is Commander, US Army Foreign CI Activity (USAFCA), USAINSCOM, Attn. IAFC-TC, Fort
22 Meade, MD 20755
23 Registration Data
24 Limited to those working in or en route to an foreign CI assignment; graduate of a basic CI course; three
25 years of strategic CI experience; effective communicator; supervisory and command recommendations;
26 favorable SSBI; CI-scope polygraph; and a valid civilian drivers license. Army registration procedures, a
27 special nomination packet must be submitted to Commander, US Army Intelligence and Security
28 Command; Attn. IAOPS-HUCI, Fort Belvoir, VA 22060-5246. An INSCOM selection board chooses
29 students on a best qualified basis. Other military services per service directives and guidance.
F-3
DESCRIPTION
3 Entry-level CI analysts
4 Course Activities
5 Lectures, discussions, videos, and case studies
6 Faculty
7 Instructors from the JMITC
8 How Long? How Often?
9 One week/two times a year
10 Security Clearance Needed
11 Top Secret/SCI
12 Further Information
13 JMITC, DIAC, Bolling AFB, (202) 373-3312
F-4
DESCRIPTION
F-5
DESCRIPTION
F-6
13 Faculty
14 NACIC and guest speakers
F-7
DESCRIPTION
Analyzes foreign
intelligence
services CI threat data.
Determines risks and
vulnerabilities to information
F-8
F-9
Topics include:
A history of COMSEC and
cryptology
The national information security
(INFOSEC) structure, mission, and
relationships
The vulnerability of threats to US
military and civil communications
systems
Physical, cryptographic,
transmissions, and emission
(TEMPEST) security
Off-line cryptosystems
Emergency destruction
18 Registration Data
19 Open to CI community personnel.
20 Registration request should be made
21 through parent agency training
22 coordinator to the NSA/NCS registrar.
F-10
Appendix G
3 INTRODUCTION .
G-1
Review HHQ and MAGTF standing intelligence plans (e.g., Annex B to an OPLAN), CI plans (Appendix 3 to Annex B),
HUMINT plan (Appendix 5 to Annex B), etc.
(HHQ)/supported
Assist with determination of the MAGTF AO and AOI
headquarters intent
Assess DIA's, CIA's
, combatant commands and other external organizations ongoing CI operations and
within
plans
the AO
Identify tasks
and AOI (e.g., availability and currency of CI contingency materials)
Determine the area of
Provide initial CI estimates
and other CIproducts to support initial planning (ensure needs of subordinate units are identified
operations (AO) and area of and met)
interest (AOI)
Determine specified, implied and essentialtasks
CI
Review available assets Develop proposed CImission statement; coordinate with G/S-2 intelligence operations officer and G/S-3 force protection
and identify personnel and officer; obtain G/S-2 officer's
approval
equipment resource shortfalls Assist security manager with development of security classification guidance to support planning and subsequent operations
Determine constraints and
Identify organic/supporting CI
elements & subordinate units' points
CI
of contact
; acquire an immediate operational status
restraints
report from each; determine personnel and equipment deficiencies
Determine recommended Review/prepare new CI survey/vulnerability assessment;
determine and prioritize significant security vulnerabilities
exist;
commanders critical
provide recommendations (e.g., CI active and passive measures); identify requirements for technical surveillance countermeasures
information requirements
support
(priority intelligence
Identify JTF/multinational CI
interoperability issues; provide recommendations
requirements, friendly force Establish/review/update the MAGTF CI databases
; special attention to
current threat estimates,
current CI estimates, and
CI
information requirements, targets (personalities, organizations, and installations)
essential elements of friendly Ensure subordinate units CI
POCs kept advised of pertinent actions and developments
information [EEFI])
Identify external organizations CI collection and production plans, and assess against MAGTF's initial requirements
Identify requests for
Determine CI personnel & equipment deficiencies; initiate augmentation requests (coordinate with intelligence operations
information
officer)
Determine assumptions Assign/task-organize organic CI elements (e.g., CI/HUMINT company detachments or HUMINT exploitation teams to
Draft mission statement major subordinate elements; CI element to MAGTF future operations/plans sections)
Present mission analysis Validate/update JTF CI tactics, techniques and procedures and MAGTF standing operating procedures (coordinate with
brief
HHQ and subordinate units)
Draft the warning order Validate and prioritize CI requirements; special attention to those needed for COA development
Convene/alert red
cell (if Begin development of CI operations plan; issue orders to CI collection and production elements (coordinate with collections
appropriate)
manager and AFC OIC, respectively)
Begin staff estimates
Update/begin necessary CI surveys/vulnerability assessments
Refine commanders
Determine initial CI communications and information systems (CIS) requirements & dissemination plans; identify
intent
deficiencies (coordinate with dissemination manager and G/S-6)
Develop the commanders Validate CI database management procedures (coordinate with JTF and subordinate units)
planning guidance
Ensure subordinate units' CI POCs kept advised of pertinent actions and developments
MCPP STEP
G-2
Continue intelligence
narrative development
COA(s) briefing
Commander
selects/modifies COA(s)
Assist with development and continued updating of the intelligence & CI estimates, with emphasis on the following:
Development of CI target reduction plans
Periodic CI summaries and threat estimate update
Development of CI target reduction plans
Recommendations and implementation of current/future CI countermeasures
Assist the intelligence, operations, and other staff sections with COA development
Develop the CI concept of operations for each COA; begin preparation of:
Appendix 3 (CI operations) to Annex B
Assistance to Appendix 5 (HUMINT operations) to Annex B
Assist operations section with force protection plans to Annex C
Determine CI capabilities required for each COA
Coordinate CI-related collection, production, and dissemination requirements for each COA
Continue development of CI estimate of supportability for each COA
Ensure subordinate units' CI POCs kept advised of pertinent actions and developments
G-3
MCPP STEP
COURSE OF
ACTION
COMPARISO
N AND
DECISION
MAGTF STAFF
ACTIONS
Evaluation of each Assist intelligence and operations sections with evaluation and comparison of each COA
COA
Continue development of Appendixto3Annex B consistent with the selected COA
Comparison of
Update, validate & prioritize CI
information requirements and supporting CI collection/
production requirements for the selected
COAs
COA; issue orders as appropriate to elements
CI
Commanders
Coordinate CIelement task-organization needs associated with the selected COA, with special attention to necessary support to
decision
the main effort
Issuance of
Continue coordination with the G/S-6 regardingCIS
CI requirements, to include standard and unique CIS for internal CI operations
warning order
and with other joint/multinational organization
Continue coordination with G/S-1 as necessary for physical courieringproducts
of CI to subordinate units; and with the G/S-1
and PMO for EPW handling/compound related plans development
Review actions associated with satisfyingpersonnel
CI
and equipment deficiencies associated with the selected COA
Ensure subordinate units receive pertinentproducts
CI
(e.g., current CI threat assessment); verify understanding; identify/update
subordinates current CI
IRs
Validate MAGTF CI IRsand tasks to support force protection EEFIs
Ensure subordinate units CI
POCs kept advised of pertinent actions and developments
G-4
MCPP STEP
Commanders
intent is refined
Concept of
MAGTF STAFF
ACTIONS
Complete Appendix 3 to Annex B; ensure copies provided to subordinate units and they understand
Update, validate & prioritize CI
information requirements and associated collection operations;
Monitor ongoing CI
production operations; update and issue orders as appropriateelements
to CI
Ensure pertinent CIproducts are disseminated to all subordinate units
Complete CIrelated CISactions
Maintain coordination with external elements
CI
G-5
APPENDIX H
REFERENCES
3 National
4 EO 12333, "United States Intelligence Activities."
5 NSCID 5, "U.S. Clandestine Foreign Intelligence and Counterintelligence Abroad."
6 DCID 1/7, "Security Control on the Dissemination of Intelligence Information."
7 DCID 5/1, "Espionage and Counterintelligence Abroad." (With supplemental MOAs)
8 Department of Defense
9 DOD Dir 1325.6, "Guidelines for Handling Dissident and Protest Activities Among Members of the
10 Armed Forces."
11 DOD Dir 0-2000.12, "DOD Combating Terrorism Program."
12 DOD Dir 3025.1, "Use of Military Resources During Peacetime Civil Emergencies Within the United
13 States, Its Territories and Possessions."
14 DOD Dir 5105.29, "Human Resources Intelligence (HUMINT) Activities."
15 DOD Dir 5105.32, "Defense Attach System."
16 DOD Dir 5200.27, "Acquisition of Information Concerning Persons and Organizations not Affiliated
17 with the Department of Defense."
18 DOD Dir S-5205.1, "Acquisition and Reporting of Information Relating to National Security."
19 DOD Dir 5205.2, "DOD Operations Security Program."
20 DOD Dir 5210.48, "DOD Polygraph Program."
21 DOD Dir 5210.50, "Unauthorized Disclosure of Classified Information to the Public."
22 DODINST 5210.84, "Security of DOD personnel at U.S. Missions Abroad."
23 DOD Dir C-5230.23, "Intelligence Disclosure Policy."
H-1
20 Joint Publications
21 --------, "Concept for Future Joint Operations --- Expanding Joint Vision 2010."
H-2
1996
7 --------
Jul 97
8 --------
Jul 97
9 -------10
11
Jul 98
12 --------
Aug 98
13 MCWP 0-1
(Draft)
14 MCWP 0-1.1
Componency
Jun 98
15 MCDP 1
Warfighting
Jun 97
16 MCDP 2
Intelligence
Jun 97
17 MCWP 2-1
Intelligence Operations
Feb 98
18 MCDP 3
Expeditionary Operations
Apr 98
19 MCWP 3-1
(Draft)
20 MCWP 3-2
Aviation Operations
(Draft)
21 MCWP 4-1
Logistics Operations
(Draft)
22 MCRP 4-27C
Apr 98
23 MCDP 5
Planning
Jun 97
H-4
1 MCWP 5-1
(Draft)
2 MCRP 5-12C
3
Jul 98
4 MCDP 6
Oct 96
5 MCWP 6-1
(Draft)
6 MCWP 6-22
(Draft)
Jul 94
9 Navy Publications
10 SECNAVINST 3300.2, "Combating Terrorism."
11 SECNAVINST 3800.8B, "Intelligence Oversight Within the Department of the Navy."
12 SECNAVINST S3810.5A, "Management of Foreign Intelligence, Counterintelligence and Investigative
13 Activities within the Department of the Navy."
14 SECNAVINST 3820.2D, "Investigative and Counterintelligence Collection and Retention Guidelines
15 Pertaining to the Department of the Navy."
16 SECNAVINST 3820.3D, "Oversight of Intelligence Activities Within the Department of the Navy."
17 SECNAVINST 3850.2B, "Department of the Navy Counterintelligence."
18 SECNAVINST S3850.3, "Support to Department of Defense Offensive Counterintelligence
19 Operations."
20 SECNAVINST 3875.1, "Counterintelligence and Awareness Briefing Program."
21 SECNAVINST 5500.30E, "Reporting of Counterintelligence and Criminal Violations to Office of the
22 Secretary of Defense Officials."
23 SECNAVINST 5500.31A, "Technical Surveillance Countermeasures (TSCM) Program."
24 SECNAVINST 5500.34, "Security of DOD Personnel at U.S. Missions Abroad."
H-5
1 SECNAVINST 5520.3B, "Criminal and Security Investigations and Related Activities Within the
2 Department of the Navy."
3 OPNAVINST 1620.1A, "Guidelines for Handling Dissident and Protest Activities Among Members of
4 the Armed Forces."
5 OPNAVINST 3300.53, "Navy Combating Terrorism Program."
6 OPNAVINST S3850.5, "Support to DOD Offensive Counterintelligence Operations."
7 OPNAVINST C5500.46, "Technical Surveillance Countermeasures."
8 OPNAVINST 5510.1, "Department of the Navy Information and Personnel Security Program
9 Regulation."
10 Army Publications
11 AR 381-10, "US Army Intelligence Activities."
12 AR 381-20, "The Army Counterintelligence Program."
13 AR 381-47, "US Army Counterespionage Activities."
14 AR 381-172, "Counterintelligence Force Protection Source Operations and Low Level Source
15 Operations
16 FM 34-5, Human Intelligence and Related Counterintelligence Activities.
17 FM 34-60, "Counterintelligence."
18 FM 34-60A, "Counterintelligence Operations -- Classified Supplement."
H-6
Introduction
Clear understanding of
Chinese intelligence
serves more than the CI
mission.
an important task for the US Intelligence Community, but clear understanding of Chinese intelligence
serves more than the CI mission. At
the core, analysis of Beijings intelligence institutions is about trying to
understand systematically how the
Chinese government uses information to inform its policy formulation, guidance to diplomats and
security officials, and the execution
of its policies.
Just as importantly, Chinas civilian intelligence and security agencies are empowered to arrest and to
operate inside and outside China.
The distinction between intelligence
and internal security policy is minimal, institutionally speaking. This
makes these services not just part of
a policy staff process but an integral
tool for the preservation of the
power of the Chinese Communist
Party (CCP). a 1 Yet, very little is
known about the organizations
themselves and their importance to
China and its future. 2
Beijing has consistently identified this goal as a core interest of China, indicating a willingness to
use force if necessary.
a
All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US government endorsement of its factual statements and interpretations.
47
48
Chinese foreign interests widen, Beijing increasingly will call upon the
intelligence services to provide
inputs to assessments of the intentions of states capable of harming
Chinas interests abroad.
Information Processing Systems
The final challenge is evaluation of
the Chinese intelligence communitys information processing systems. The civilian ministries include
national, provincial, and local elements, which operate under competing horizontal and vertical lines of
authority. The military intelligence
services under the General Staff
Department compose Chinas only
all-source intelligence capability, but
the mechanics of intelligence fusion
in the Peoples Liberation Army
(PLA) are opaque.
How these agencies collect, process, and disseminate intelligence
affects Chinese behavior, and, with
the rise of cyberspace issues, the
volumes of information are potentially staggering and difficult to
manage. Knowing how this system
works is a prerequisite to ensuring
US leaders can be certain US statements and acts are interpreted as
they were intended.
In this essay I will outline a
research agenda on the Chinese
intelligence services built around
these three challenges, and I will
suggest some of the factors that
should underpin future analysis.
Fundamentals of Chinese
Approaches
Before addressing the analytic
questions, I will briefly address some
misunderstandings of the nature of
Chinese intelligence operations.
Many, perhaps most, US observers of
Chinese intelligence have argued that
the Chinese think about and collect
intelligence in ways fundamentally
different from Western or even Russian intelligence.
In large measure this perception
stems from Chinese attempts to
acquire, legally and otherwise, Western technology information to support Chinese modernization and
economic priorities. These efforts
have been equated with Chinese
intelligence collection and have been
labeled the mosaic or grains of
sand approach. Chinese intelligence, it has been argued in this context, has four basic tenets:
Chinese intelligence focuses
on ethnic Chinese as sources;
It relies on amateur collectors
rather than professional intelligence officers;
It does not use intelligence
tradecraft familiar to Western services;
It pursues high volumes of
low-grade (if not entirely
unclassified) information. 4
This view falls down on both conceptual and empirical grounds. Conceptually, both US and Chinese
analysts describe intelligence in similar termsa specialized form of
knowledge for reducing uncertainty
during decision making. Empirically, the cases linked to the Chinese intelligence servicesnot
simply the illegal activities of Chinese nationals or companiesdemonstrate that professional Chinese
intelligence officers use familiar
tradecraft in formalized intelligence
relationships with their sources.
Additionally, cases are not limited to
ethnic-Chinese whatever their
nationality. a 5
Chinese Doctrine
Chinese writings on intelligence
bear remarkable similarity to familiar US definitions of intelligence
functions and goals. Sun Tzu taught
that foreknowledge (xianzhi)
allowed commanders to outmaneuver opponents. More modern definitions range from activating
[catalytic] knowledge (jihuo zhishi) to information to protect
national security, domestic stability,
or corporate interests in a competitive environment. 6
Chinese military scholars today
frame intelligence as a distinct subset of knowledge, defined by its relevance to decision makers and a
competitive environment. Specifically, intelligence is transmittable
(chuandi xing) and is knowledge that
satisfactorily (manzu xing) resolves
a specific decision-making
problem. 7
Empirically, Chinese intelligence
officers consistently have demonstrated the use of widely practiced
professional tradecraft, having successfully exploited for political and
military intelligence purposes agents
with vulnerabilities familiar to anyone who follows the subject. The use
of such tradecraft goes back to the
most famous early known cases,
Larry Wu-Tai Chin and Bernard
Boursicot (M. Butterfly). The former began in the 1940s and latter in
the 1960s.
Similar techniques have been
applied in more recent casesGregg
Bergersen, Chi Mak, James Fondren, and Tai-Shen Kuo. These
revolved around a single Chinese
intelligence officer, and possibly a
second. 8 Each of these sources was
paid for sensitive information and all
were aware of an intelligence relationship.
Consequences of the Conventional
View
Misapprehension of Chinese intelligence practices has consequences.
Most basically, the mosaic or
grains of sand concepts fail to
guide the organization, prioritization, and execution of CI efforts
against Chinese national and corporate intelligence threats because the
concepts do not differentiate
between the varied Chinese collectors and their motivations as well as
their varied signatures and risks to
the United States:
The mosaic concept does not
help clarify what aspects of
Chinese information and tech-
a The Chinese intelligence services have balanced finding targets with access and sources able to travel back-and-forth to China. That many of these individuals were ethnically Chinese is a function more of opportunity than intent, because China-based case officers have run most known Chinese operations. Moreover, many of Beijings intelligence targets are, in fact, ethnically Chinese, such as Taiwan and overseas dissident groupswhere foreigners are targeted, the
results are cases like Boursicots and Glenn Shrivers.
b After the Congressional investigation into the Chinese espionage scandals of the 1990s, the committee tried to warn future analysts to be clear in their distinctions. The Cox Committees final report admonished that those unfamiliar with Chinese intelligence practices often conclude that, because intelligence
services conduct clandestine operations, all clandestine operations are directed by intelligence agencies. In the case of [China], this is not always the rule.
49
The Challenges
Thinking of Chinas intelligence
services as bureaucratic organizations raises questions of what functions they serve as part of the states
administrative apparatus and how
well they perform those functions.
Below, I will outline what I believe
are the three principal analytic challenges to understanding the Chinese
intelligence services and their relationship to the future of China and
US-Chinese relations.
50
outpaced the cost of Chinas dramatic military modernization, coming in at $95 billion compared to
$92 billion in 2010 and up to $111
billion for 2012. 13
Following several years of locallevel experimentation with intelligence-led policing, State Councillor
and Minister of Public Security
(MPS) Meng Jianzhu announced the
nation-wide adoption of public
security informatization (gongan
xinxihua) at an MPS conference in
2008. Public security informatization refers to the process of integrating information more closely
into police operations, including
both domestic intelligence gathering
and information management components.
The idea of information control has deep roots in Chinese strategic thought.
51
52
It is highly likely that whatever reaches the top will have been
influenced by local procedures and biases.
logical and political prisms through
which Chinese officials at multiple
levels view the United States. In part
the answers lie in the institutional
frameworks through which intelligence about the United States flows
and the ways in which the Chinese
manage intelligence derived from
the new digital world of large data.
Institutional Frameworks
China, like the United States, has
separate civilian and military organizations, but it also has components
of national security and intelligence
distributed throughout provincial
and, in some cases, lower levels.
This is true both for civilian ministries, which have provincial and
lower level bureaus, and for PLA
intelligence organizations. An excellent military example is the Third
Department of the PLAs General
Staff Department (3PLA). The
3PLAresponsible for signals intelligence, computer network reconnaissance (cyber), and technical
countermeasureshas offices and
technical reconnaissance bureaus in
each of Chinas seven military
regions and several major cities, 35
and it is likely that the Chinese services have their own training and
procurement units in these areas. If
so, it follows that regional differences in performance and equipment will exist throughout the PLAs
intelligence organizations. 36
With multiple levels between the
sources of intelligence and Chinas
leadership, it is highly likely that
whatever reaches the top will have
a Students of deception basically come to the same conclusions about what makes deceptioninfluencing an adversary to make disadvantageous decisions by
denying or supplying informationfunction well. Would-be deceivers need time, control over their own information, channels through which pass information, and the ability to monitor the adversarys thinking and behavior.
53
Conclusion
Chinas intelligence services have
long been underanalyzed as major
bureaucratic organizations and components of state power. This may
have mattered relatively little during
Chinas inward-looking and underdeveloped years. Today, its leaders
are significant players on the world
stage, and understanding how and
what they learn about the world and
how they formulate their policy
choices is more important than ever.
Given the complex choices the Chinese face, it is likely that their intelligence services will play an even
greater role than they have in the
past. 41
The intelligence and intelligence
analysis challenges the Chinese face
will look familiar to many US analysts:
Determining sources of energy
and maintaining the security
of delivery routes.
Protecting Chinese officials
and citizens working abroad.
Preserving markets for Chinese goods and defense of key
supply chains, among many
others.
All of these interests will put pressure on the intelligence services to
be more active abroad against a wide
variety of targets, both official and
not. How intelligence performs missions in support of these and other
goals will also serve as indicators of
Chinese national policy, and possibly in some cases as indicators of
independent policymaking in the
services.
54
Endnotes
1. See, Chinas Peaceful Development, Information Office of the State Council, Peoples Republic of China, 6 September
2011.
2. Ely Ratner and Steven Weber, American Policy toward China: Getting Beyond the Friend-or-Foe Fallacy, New America
Foundation Policy Paper, June 2011. For example, many analysts and commentators focus on the Chinese Peoples Liberation
Armys (PLA) new equipment and senior most leaders at the expense of analyzing doctrine, internal self-assessments of PLA
modernization, and training exercises that are more critical to Beijings ability to use force. See, Dennis Blasko, China in
2012: Shifting PerspectivesAssessing the PLA from the Ground Up, Jamestown Foundation China Brief 12, no. 2 (20 January 2012).
3. Christopher Andrew, Intelligence, International Relations, and Under-Theorisation, Intelligence and National Security 19,
no. 2 (2004): 17084; Michael Herman, Intelligence Services in the Information Age. (London: Frank Cass, 2001), 1920.
4. For the three most accessible descriptions of the mosaic, grains of sand, or human-wave approach to intelligence collection, see David Wise, Tiger Trap: Americas Secret Spy War with China (New York: Houghton Mifflin Harcourt Publishing
Company, 2011), 519; Special Report: Espionage with Chinese Characteristics, StratFor, 24 March 2010; and Howard
DeVore, Chinas Intelligence and Internal Security Forces (Coulsdon, UK: Janes Information Group, 1999). For a separate
analysis of the validity of these propositions for Chinese intelligence related to the Glenn Duffie Shriver case, see, Peter Mattis, Shriver Case Highlights Traditional Chinese Espionage, Jamestown Foundation China Brief 10, no 22 (5 November
2010).
5. The Chinese intelligence services have balanced finding targets with access and sources able to travel to and out of China.
That many of these individuals are ethnic Chinese is in part of a function of the fact that most operations have been managed
by intelligence officers inside China and in part a reflection of Beijings concern for Chinese dissidents abroad and developments in Taiwan. See Peter Mattis, Chinese Intelligence Operations Reconsidered: Toward a New Baseline, M.A. Thesis,
Georgetown University (April 2011).
6. Chen Jiugeng, Guanyu qingbao he xinxi [Regarding Intelligence and Information], Qingbao Zazhi (Journal of Information) 19, no. 1 (January 2000): 46.
7. Yan Jinzhong, Junshi qingbao xue [The Study of Military Intelligence] (Beijing: Shishi chubanshe, 2003), 12; Cheng Lei,
Qingbao yuan yu qingbao genyuan [Intelligence Sources and Intelligences Roots], Tushuguan zazhi [Library Journal], No.
3 (1994), 1618.
8. Wise, Tiger Trap, 22126, 238.
9. This deficiency shows in the publication record. Of the books and articles written on Chinese intelligence, only three, however minimally, examine the Chinese intelligence services as organizations and a fourth explores public security within the
context of governance. For the former, see, Eftimiades, Chinese Intelligence Operations; Eftimiades, Chinas Ministry of
State Security Comes of Age in the International Arena, Intelligence and National Security; and Devore, Chinas Intelligence
and Internal Security Forces. For the latter, see, Murray Scot Tanner and Eric Green, Principals and Secret Agents: Central
Versus Local Control over Policing and Obstacles to Rule of Law in China, The China Quarterly no. 191 (September 2007):
64470.
10. These differences can be explained both psychologically and philosophically, see, respectively, Richard Nisbett, The Geography of Thought: How Asians and Westerners Think DifferentlyAnd Why, (New York: The Free Press, 2003); Robert Ames
and Bruce Hall, Thinking through Confucius (Albany, NY: State University of New York Press, 1987).
11. Mass incidents presumably refer to riots or other kinds of public demonstrations against local authorities. The last official statistics were released in 2006 and placed the number of mass incidents around 90,000. Leaked figures and Chinese
scholars estimates range as high 180,000 per year in more recent years. See, Barbara Demick, Protests in China over Local
Grievances Surge, and Get a Hearing, Los Angeles Times, 8 October 2011; Jeremy Page, Wave of Unrest Rocks China:
Threats to Social Order Increasingly Hit Cities, Bringing Iron-Fist Response, Wall Street Journal, 14 June 2011.
55
12. Murray Scot Tanner, Cracks in the Wall: Chinas Eroding Coercive State, Current History 100, no. 647 (September
2001): 243.
13. Leslie Hook, Beijing Raises Spending on Internal Security, Financial Times, March 6, 2011; China boosts domestic
security spending by 11.5 pct, Reuters, 5 March 2012.
14. Peter Mattis, Chinas Adaptive Approach to the Information Counter-Revolution, Jamestown Foundation China Brief
11, no. 10 (3 June 2011).
15. Zhou Yongkang, Jiaqiang he chuangxin shehui guanli; jianli jianquan zhongguo tese shehui zhuyi shehui guanli tixi
[Strengthen and Innovate Social Management; Construct a Sound Social Management System under Socialism with Chinese
Characteristics], Qiushi [Seeking Truth], 1 May 2011.
16. Gongan bu: ba gongan weibo jianshe cheng jingwu gongkai xin pingtai [MPS: Let microblog construction take police
openness to a new level], Xinhua, 27 September 2011; Liu Yang and Wu Min, Gongkai wei xian fuwu wei ben; zunzhong
junzhong shunying minyi; goujian juyou xianming tese de gongan weibo jun [Place openness first and be service-oriented;
respect the masses and heed public opinion; construct a public security microblogging group with distinct characteristics],
China Police Daily, 27 September 2011. See also, Peter Mattis, Public Security Officially Joins the Blogosphere, Jamestown
Foundation China Brief 11, no. 16 (30 September 2011).
17. Liu Xuegang, Renmin gongan bao kaizhan ruhe tigao qunzhong gongzuo nengli da taolun [China Police Daily reports a
great discussion over how to improve capability for mass work], Renmin Gongan Bao [China Police Daily], 31 January
2012.
18. Michael Warner, The Divine Skein: Sun Tzu on Intelligence, Intelligence and National Security 21, no. 4 (August 2006):
48392.
19. Peng Guangqian and Yao Youzhi, The Science of Military Strategy (Beijing: Academy of Military Science, 2005),
340343; Li Yueli, Lun junshi qingbao zuozhan [On Military Intelligence Warfare], Qingbao Zazhi [Journal of Information]
21, No. 7 (July 2002): 99100.
20. The idea of infiltrating potentially dissenting sectors of society continues to be present, see, Li Anjin, Mao Zedong tongyi
zhanxian sixiang de dangdai jiazhi [The Contemporary Value of Mao Zedongs United Front Thinking], Xuexi Shibao
[Study Times], 8 August 2011. For a full explanation of united front activities during the Chinese revolution, see, Lyman
Van Slyke, Enemies and Friends: The United Front in Chinese Communist History (Stanford: Stanford University Press,
1967).
21. Cheng Li, Think National, Blame Local: Central-Provincial Dynamics in the Hu Era, China Leadership Monitor 17
(Winter 2006).
22. Sui-Lee Wee, Chinese Rebel Villagers Vow March to Press Complaints, Reuters, 19 December 2011.
23. Mattis, Chinas Adaptive Approach to the Information Counter-Revolution.
24. Joseph Fewsmith, Social Management as a Way of Coping with Heightened Social Tension, China Leadership
Monitor 36 (Winter 2012).
25. Communist China: The Political Security ApparatusPart II Destruction and Reconstruction 19651969, POLO Paper
No. 37, CIA Directorate of Intelligence, 28 November 1969 (Declassified May 2007).
26. Peter Mattis, Assessing the Foreign Policy Influence of the Ministry of State Security, Jamestown Foundation China
Brief 11, no. 1 (14 January 2011).
27. Amber Wang, Sex Lured Taiwan General to Become China Spy, Agence France Presse, 9 February 2011; TECRO Representative: Lo Hsien-che Posted to Thailand, Not United States [zhu mei guan yuan: luo xianzhe zhu tai fei zhu mei], China Times
[zhongguo shibao], 9 February 2011; Lo Hsien-che Spies for Mainland; President Demands Thorough Investigation and
Strengthening of Protection of Secrets [luo xianzhe she gong die; zongtong yaoqiu che cha, zuo hao mimi baowei], China Times
[zhongguo shibao], 9 February 2011; Rich Chang, General Arrested, Accused of Spying, Taipei Times, 10 February 2011.
28. Luo Tianwen, Liu Ying, Liu Shoushuo, Tan Haifeng, and Wu Di, Junshi qingbao gongzuozhong mubiao yaohai panding
yanjiu, Qingbao Zazhi [Journal of Information] 29, no. 6 (June 2010): 107109.
56
29. Kan Zhongguo, Intelligence Agencies Exist in Great Numbers, Spies Are Present Everywhere; Chinas Major Intelligence Departments Fully Exposed, Chien Shao (Hong Kong), 1 January 2006.
30. For a useful analysis of the importance of Chinas growing military intelligence needs see, Ian Easton and Mark Stokes,
Chinas Electronic Intelligence (ELINT) Satellite Developments: Implications for U.S. Air and Naval Operations, Project
2049 Institute Occasional Paper, 23 February 2011.
31. For an analysis of the PLA intelligence and foreign affairs leadership and the transition from intelligence experts to military operations personnel, see James Mulvenon, The Dawn of HeavenA New Player in Sino-U.S. Mil-Mil, China Leadership Monitor, no. 24 (Spring 2008); James Mulvenon, Ding, Dong, The Witch is Dead!Foreign Policy and Military
Intelligence Assessments after the Retirement of General Xiong Guangkai, China Leadership Monitor, no. 17 (Winter 2006).
32. Jen-kai Liu, China Data Supplement: The Main National and Provincial Leadership, Journal of Current Chinese
Affairs 19, no. 5 (2011).
33. Lu Ning, The Central Leadership, Supraministry Coordinating Bodies, State Council Ministries, and Party Departments,
in The Making of Chinese Foreign and Security Policy in the Era of Reform 19782000, ed. David Lampton (Stanford, CA:
Stanford University Press, 2001), 50, 414.
34. For expression of these views at the highest levels, see, for example, President Obamas remarks in Australia, The White
House, Office of the Press Secretary Remarks By President Obama to the Australian Parliament, Parliament House, Canberra, Australia, 17 November 2011; Hillary Clinton, Americas Pacific Century, Foreign Policy, 11 October 2011.
35. Mark Stokes, Jenny Lin, and L.C. Russell Hsiao, The Chinese Peoples Liberation Army Signals Intelligence and Cyber
Reconnaissance Infrastructure, Occasional Paper, Project 2049 Institute, 11 November 2011; John Pomfret, China Finds
Bugs on Jet Equipped in U.S.; Devices Taken Off Presidential Plane Could Become Issue at Summit, Washington Post, 19
January 2002.
36. Mattis, Chinas Adaptive Approach to the Information Counter-Revolution.
37. James Q. Wilson, Bureaucracy: What Government Agencies Do and Why They Do It (New York: Basic Books, 1989),
especially pp. 1428, 158171; Graham Allison, Essence of Decision: Explaining the Cuban Missile Crisis (Boston: Little,
Brown and Company, 1971), especially pp. 7896.
38. See, Michael Handel, War, Strategy, and Intelligence, New York: Routledge, 1989, 38095; J.C. Masterman, The DoubleCross System in the War of 1939 to 1945 (New York, Ballantine Books, 1972), 132; Li Mingyang, ed., Sunzi Bingfa [SunTzus Art of War] (Hefei, Anhui: Huangshan Shushe, 2001), 193.
39. These official linkages with Chinese intelligence are well-known and have been thoroughly traced in the public literature,
see, Bates Gill and James Mulvenon, Chinese Military-Related Think Tanks and Research Institutions, The China Quarterly,
No. 171 (September 2002); Bonnie Glaser and Phillip Saunders, Chinese Civilian Foreign Policy Research Institutes: Evolving Roles and Increasing Influence, The China Quarterly 171 (September 2002): 599; Eftimiades, Chinese Intelligence Operations, 19; Intelligence Threat Handbook, 2004 (Interagency OPSEC Support Staff. Alexandria, VA: Centre for
Counterintelligence and Security Studies, 2004), 7273; DeVore, Chinas Intelligence and Internal Security Forces, Sections
310.
40. For example, see, China-based Hacking of 760 Companies Shows Cyber Cold War, Bloomberg, 13 December 2011;
Michael Joseph Gross, Enter the Cyber-dragon, Vanity Fair, 1 August 2011; Josh Rogin, The Top 10 Chinese Cyber
Attacks (That We Know Of), Foreign Policy (22 January 2010).
41. Francesco Sisci, Too Many Cooks Spoil Foreign-Policy Stew, Asia Times Online, 7 January 2011; Linda Jakobson and
Dean Knox, New Foreign Policy Actors in China, SIPRI Policy Paper, no. 26 (September 2010).
57
NEGOTIATION:
Methodology and training
Louise Nieuwmeijer
CHSRC 1988
Published by
HSRC Publishers
134 Pretorius Street
PRETORIA
Contents
Preface
1
2.
3.
4.
5.
6.
Preface
viii
1
Introduction:
The nature and significance of negotiation
2
Concept definitions
The clear and unambiguous definition of concepts relevant to the
negotiation field, is one of the needs as identified in Chapter one.
One concept often constitutes more than one meaning, while
various concepts are often defined in the same way.
COLLECTIVE BARGAINING
Collective bargaining, or rather collective negotiation, is a
negotiation process between two or more parties consisting of
groups of people acting collectively. The purpose is therefore to
come to an agreement on issues that concern the group.
Collective negotiation can also be undertaken by agents or
representatives on behalf of the group, and moreover, these
agents need not be members of the groups concerned. This form
of negotiation is usually found in labour relations (Piron 1978).
PERSUASION
Persuasion is a communication process that results in a change
of attitude or behaviour. Bostrom (1983:11) expands on this
MEDIATION
Mediation is the process through which agreements are reached
with the aid of a neutral third party or helper (Susskind, Ozawa
1983). The third party should have no decision making power and
have no vested interest in either of the parties. The mediator acts
mainly as a communication and problem-solving catalyst, or as
an agent to maximise the exploration and generation of
alternatives; while the responsibility for the final agreement rests
with the conflicting parties.
In South Africa, the appointment and function of a mediator in
labour conflicts is controlled by Section 44 of the Labour
Relations Act of 1981.
ARBITRATION
Arbitration is also based on the intervention by a third party in an
attempt to reach an agreement, but the final decision lies with the
arbitrator. The parties no longer have the right to conclude an
agreement. Each presents his case to the arbitrator, who takes
the facts into consideration in forming his verdict. The arbitrators
decision is usually binding (Piron 1982:91). For further reading on
the role of the arbitrator and how it differs from that of the
mediator, refer to Susskind (Susskind, Bazerman 1985).
10
LOBBYING
Lobbying is mainly found in national and international
negotiations, where one party tries to pressurise the other,
directly or indirectly through a third party, to accept their point of
view or objective. Lobbying includes influencing a person or
persons influential enough to advance your issue or viewpoint
(Peters 1983).
11
12
13
THEORETICAL APPROACHES
The most prominent theoretical approaches used in negotiation
studies are
14
15
NEGOTIATION MODELS
Negotiation models that have developed from the discussed
theoretical approaches are as numerous as the theories of
negotiation, if not more so. A discussion of each model will not
add to a better understanding of the viewpoints covered by
contributors to the field. A synopsis of existing models will be
given in the form of a typology. A typology has been chosen as
classification framework, since negotiation models cannot be
classified in non-overlapping classes, because of their humanscientific nature.
16
18
The underlying
classes
structure
of
negotiation
model
19
20
CONCLUSION
Negotiation is a process that proceeds in phases that can be
identified through the interaction patterns. This process is
influenced by various elements. An ideal model of negotiation
should therefore be a combination of these three typology types.
The detailed discussion of negotiation model types in Table 1
indicates that mathematical type of model has severe limitations
21
o
d
TABLE 1
OVERVIEW OF THE NEGOTIATION MODEL TYPOLOGY
Mathematical
(a) Continuous
(mostly
economical)
Strengths
Limitations
1. Assumes rationality
of negotiator
2. No semantically related
problems
Language
Theoretical
calculus
Selected models
Zeuthen
Nash
Pen
Schelling
1930
1950
1952
1960
Foldes
Cross
Coddington
Harsanyi
1964
1965
1968
1977
Type
22
o
d
TABLE 1 (cont.)
Type
Strengths
(b) Non1
continuous
(mostly game
theory)
Realistic mathematical
1
assumptions not found
in continuous models
Assumes rationality
of negotiator
Discrete negotiation
issues
Language
(1944)
(1952)
(1960)
(1963)
(1973)
3 Empirically testable,
especially in two-party
situations
(1976)
5 Relative little
semantically related
problems
23
Theoretical
algebra
Selected models
Von Neumann &
Morgenstern
McKinsey
Schelling
Limitations
o
d
TABLE 1 (cont.)
Type
Strengths
Limitations
Language
Selected models
6 Conceptual framework
can be designed and
altered
Hybrid
Strengths and
weaknesses depend on
the nature of the model
(1977)
Verbal
theory
Boolean
algebra
(1950)
(1964)
(c)
Verbal
Process
1 Provides a realistic,
understandable
description of the
negotiation process
(a)
Semantic problems,
e.g. concept
definition,
complicates comparison of models
24
Homans
Berne
Walton &
McKersie
Peterson &
Tracey
Mastenbroek
(1965)
(1977)
(1983)
TABLE 1 (cont.)
Type
Strengths
Limitations
(b)
Phase
(stages)
1 Strengths as process
models
Language
Selected models
No equilibrium
result is defined
Empirical testing is
limited because of
model range
often to a few
variables
Difficult to analyse
the sequence of
events
Limitations as
process models,
with the exception
of no. 5
25
Verbal
interaction
analysis
Markov
analysis
Douglas
Karrass
Druckman
Richardson
(1957)
(1970)
(1973)
(1977)
TABLE 1 (cont.)
Type
Strengths
Limitations
Language
2 Permits analysis of
negotiations that lead to
a breakdown or
settlement
(c)
(d)
Elements
Limits
1 Strengths as process
models
1 Limitations as
process models
2 Primary emphasis is
placed on
psychological
elements with little
attention to structural
considerations
1 Strengths as process
models
1 Process model
limitation nos. 2 & 3
26
Selected models
Atkinson
Zartman &
Berman
Pienaar &
Robinson
(1980)
Verbal
vector
analysis
Weber
McGarth
Robinson
(1961)
(1966)
(1977)
Verbal
calculus
Pigou
Stagner &
Rosen
Randle & Wortman
(1924)
(1982)
(1983)
(1965)
(1966)
TABLE 1 (cont.)
Type
Strengths
Delineates a settlement
range
More amenable to
empirical testing than
other verbal models
Language
Selected models
Limitations
(f)
Clarke
(e) Intervention
Hybrid
27
Primarily
verbal,
depends
on model
(1977)
28
Negotiation research
29
RESEARCH DIMENSIONS
Van Leent (1968) distinguished three research approaches or
dimensions: the depth, height and breadth dimensions. Marais
(1983) illustrated and explained these research dimensions as
follows:
30
Figure 3
RESEARCH DIMENSIONS
Height
dimension
Depth
dimension
Explain
(causality)
Quantitive
(digital data)
Understand
Qualitative
(non-digital data)
Breadth dimension
Describe
Quantitative
(digital data)
Depth dimension
Research in the depth dimension in the negotiation field includes
direct observational case studies, retrospective case studies and
31
Historical-ethnography
Many negotiation studies are theoretical analyses of cases from a
historical or ethnographical viewpoint. Gulliver (1979:64) used
this method for example to study negotiation among African
tribes. He explored the theoretical premise, that negotiations and
joint decision-making, in any society, deal with any kind of issue
over which dispute occurs, that is with anything at all, and the
hypothesis that there are common patterns and regularities of
interaction between the parties in negotiation irrespective of the
particular context or the issue in dispute. Gulliver used direct
observation in a variety of negotiation situations to study his
hypotheses, where many other researchers that employ this
method, often use descriptions of historically important
negotiations such as those on Vietnam for their analyses.
The advantage of the analysis method used by Gulliver is that
it can be used in real negotiation situations and factors that
influence negotiation can be exposed to add to the knowledge of
the process. Gullivers study spanned various cultures. More
recent examples of this research method are Touvals (1987)
study of Arab-Israeli negotiations, and a study of a New York
State negotiation by Vessels (1987).
This method does, however, have certain limitations. It is not
possible to determine the external validity of the results of this
type of research. It is therefore not possible to generalise the
results in other negotiation situations. Comparison between
cases is not possible, unless the framework used for the
comparison is clearly spelled out which makes the study less of
a case study and more quantitative by nature.
32
Self-reflective introspection
Bostrom (1983) and Krippendorf (1984) mention another depth
research method used in negotiation research, namely selfreflective introspection. A participant or observer reflects on his
observation of the negotiation. This method can provide a useful,
overall view of the negotiation process. This overview must by
nature of the research method be superficial, unverifiable and
unstructured. Examples of this research can be found in
negotiations that took place on Korea, Vietnam, the Middle-East,
Zimbabwe and Namibia (see Zartman, Berman 1982:3).
Research methods in this dimension are mainly applied to gain
a better understanding of the negotiation process as a whole; the
result is qualitative data that reflect the nature of the process well,
but that cannot be compared with or generalised in negotiation
processes in general.
Height dimension
Studies in the height dimension are usually simulated or
laboratory studies that take place in situations where the
negotiation process and factors that influence the process
can be controlled to establish the result of a treatment. Many
negotiation studies fall under this category (for example
Bazerman, Neale 1982; Donohue, Diez, Hamilton 1984; Hillthrop,
Rubin 1982; Putnam, Jones 1982; and Rapoport, Kahan 1984).
The results of the laboratory studies are usually quite useful in
understanding the role of a particular variable in the controlled
negotiation situation. Given the complex nature of real life
negotiation, and the vast differences between the settings (the
participants are usually students and the negotiation is not
subject to the many factors in the environment that influence it),
the results cannot be transferred to real negotiations. The results
of Donohue, Diez and Hamilton (1984), and Konetchnis (1987)
empirical research, and studies by Pruitt (1986) and others
support this statement.
33
Game simulations
For at least three decades, research based on the game theory
principles was very popular amongst researchers. Many
researchers still use game simulations for research, as these do
not involve all the complexities of other simulations or real life
research.
Prisoner A
Not
Admit
admit
Not
admit
0,0
10,0
Admit
0,10
5,5
Prisoner B
34
m
o
r
f
d
a
Figure 5
EXPERIMENTAL GAME FOR SOCIAL INTERACTION
B
O
Right
Button
Left
Button
Left
Button
Right
Button
B
35
37
Figure 6
38
Breadth dimension
Research in the breadth dimension includes data collection
methods such as questionnaires, interviews, and surveys. An
important issue perceived in real life that is not well understood
can be researched with the use of these methods, by developing
hypotheses about it and then testing the hypotheses. The
influence of the negotiators credibility on the negotiation process
in which data is collected through questionnaires is an
example of such a study (De Koning, Hall 1988).
Studies in the breadth dimension can also be stimulated by
theory on, for example, the effect of mood on negotiation.
Concepts pertinent to an understanding of mood can be put into
operation and researched with the aid of the above mentioned
methods in the empirical reality.
39
Interviews
40
41
CONCLUSION
The type of research method used in negotiation determines the
value of the available knowledge. Most of the research is in the
form of simulated studies, where causal relationships between
variables are synthetically manipulated. These research methods
are extremely useful, as all the practical problems and external
influences are circumvented, but the applicability of the results in
real life negotiation is in serious doubt.
Field research such as negotiation interaction analysis and
interviews based on participants experience in naturalistic
negotiations, proved to be of value in understanding negotiation,
but they still need a great deal of refinement.
In an era where negotiation is becoming an increasingly
important process to manage conflict in many areas of life, it is
essential to systematize and extend the knowledge on
negotiation so that it becomes more accessible and therefore
useful. It is also necessary to pool all research resources and
methods to gain more useful knowledge, for example, to develop
research designs that enable the researcher to compare results
of research done with different research methods, and methods
that enable one to collect qualitative and quantitative data so that
the results reflect the richness of the negotiation process as well
as being exact and applicable to other negotiation situations.
43
44
5
Elements of Negotiation
PERCEPTION
Perception is the process by which man ascribes meaning to
information. Mortensen (1972:69) defines perception as, . . . how
man translates raw sensory data into meaningful experience. . .
45
46
47
Figure 7
MASLOWS HIERARCHY OF NEEDS
Selfactualisation
Worth
Social Acceptance
(love and acceptance)
Security
(protection, comfort, predictability)
Basic Survival
(hunger, thirst, reproduction)
Figure 8
download
Free
from
www.hsrcpress.ac.za
49
POWER
50
What is power
Power is therefore a concept as difficult to define, as it is
complicated. The literature studied throws little light on the nature
and function of power. Power is, however, a social reality and so
relevant in negotiation that one should attempt to define and
examine it.
As starting point for an examination of power the dictionary
definition (Concise Oxford Dictionary) is used, namely that power
is the ability to do, to obtain, or bring about something.
Definitions of power can be divided into three types, namely:
(a)
(b)
(c)
Elements of power
Power building is a process that takes place in negotiation and is
influenced, according to Mintsberg (1983:3) by basic elements
such as
(a)
51
(b)
(c)
(d)
Principles of power
Karrass (1970:56) identifies eight basic principles of power,
namely:
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
52
(a)
(b)
Sources of power
How does power originate, or what can be used to build power?
Power of expertise.
Legitimate power.
53
Referred power
Power of reward
(e)
Coercive power
Official power
Power of coalition
54
Team power
Personal power
Apart from situational power, the motivation of the individual is
also a source of power (McClelland 1961). The individual can
have three motives or sources of power, namely:
(a)
(b)
(c)
55
(a)
The market
Product image
Control of alternatives
Meeting place
56
Interdependence
Scarcity
Environment
Heterogeneous
goals
Heterogeneous
persuasions
about
Technology
Conflict
Significance
Distribution of Power
Politics
57
(c)
Perception of power
58
2.
3.
59
Power goals
A party must decide what his own and the other partys power
goals are.
According to Mintzberg (1983), goals and power are
inseparable. The perception of power and power building will
depend on the number and the nature of the negotiators goals.
The goals or aspirational level of a negotiator can be decided
on or determined with the aid of a technique such as Atkinsons
(1980:44) Expectation Test.
Negotiating goals are arranged between two positions, namely
the base level and the aspirational level. The base level is the
lowest possible offer that will be accepted, while the aspirational
level is the goal towards which is strived or aspired. The positions
are not static and may be moved many times during a negotiating
situation. Robinson (1977:199) represents the goal positions as
follows:
Figure 11
NEGOTIATING BASE AND ASPIRATION LEVEL
Negotiater A
Base level
Aspiration level
Direction of
diminished use
Direction of
increased use
Base level
Aspiration level
Negotiater B
60
(c)
(d)
(e)
(f)
61
be used, should the need arise. The party must be aware of the
extent of the power, how it is composed, how to build it and how
to use it in order for it to be effective. According to Bacharach and
Lawler (1981: 43), power constitutes the tactical possibilities for
action in negotiation.
The paradox of power is that it is not always the obvious
person who could utilize it the most effectively. It is not the most
intelligent, physically strongest, most rational, or person with the
largest financial resources who obtains the best results.
Agreement is often reached, because a negotiators bluff has not
been called, a final offer was interpreted as final instead of as a
feeler, or because a negotiator has acted irrationally and played
on the others feelings. An agent who has been restricted by his
superiors has more bargaining power in certain situations than
someone who has total jurisdiction that enables him to make
large concessions. This use of power has already been
successfully employed on several occasions against America by
Russia and Japan (Karrass 1970:55-64).
No power
Brinkmanship
62
Focus points
(d)
Irrationality
Influence
63
Figure 12
source mediates
reinforcements
MODES OF INFLUENCE
Open influence
Manipulation
YES
Threats
and
Promises
Reinforcement
Control
NO
Persuasion
(warnings &
mendations)
Information Control
1. Cue control
2. Filtering of
information
3. Warnings &
mendations
64
(b)
(c)
65
Summary
A considerable amount is known about the players in a powergame, as well as about the sources of power, and the
circumstances for the use of power, but there is still a need for
information about the nature and functioning of power. Mintzberg
(1983:xiv and i) reiterates this need: More important, though, is
the nature of the phenomenon; . . ., that what is of interest in the
study of power in and around organisations who gets it, when,
how and why, . . .
Therefore, because power is situation bound, its role in the
negotiating situation will have to be examined specifically.
CREDIBILITY
Credibility refers to the image of a source in any communicative
situation (Mortensen 1972:145). Credibility is therefore the
receivers perception of certain characteristics attributed to the
source. The receiver must believe that the information that is
communicated is credible.
The concept credibility has been identified 2 300 years ago by
Aristotle. In his Rhetoric (Devito 1978:79) he writes that
persuasion is achieved by the speakers personal character
when the speech is so spoken as to make us think him credible.
There are things which inspire confidence in the orators own
character the three, namely, that induce in us to believe a
66
thing apart from any proof of it: good sense; good moral character
and good will. The perception of certain character attributes (not
tangible characteristics) therefore leads to a belief in the truth of
the senders message. The three characteristics identified by
Aristotle continue to play an important role in the success of
negotiation.
Hovland and Weiss (1951) are pioneers in the research on
credibility characteristics. They found that dependability and
accomplishment are such characteristics. Since Hovland and
Weisss research, a variety of studies have been launched in this
field.
security
qualifications
dynamics
authority
attractiveness
respect
personal integrity
Mortensen
capability
character
equanimity
sociability
extroversion
PERSONALITY
Negotiation is the face-to-face interaction between two or more
parties, with the aim to reach an agreement. The parties,
however, are not abstract representatives, but people with
emotions, and values and who live in a real world. (Fisher, Ury
1981: 19). Although it is essential to separate the person and the
problem in order to reach an agreement, insight in the
participants personalities is also necessary to reach an effective
agreement. The reason for negotiating failures is often a lack of
knowledge of the failure of human relations (Hannah 1981: 2).
68
(b)
(c)
Atkinson
Atkinson (1980:22) lays down three requirements for a successful
negotiator, namely:
(a)
(b)
(c)
Chelune
According to Chelune (1979:28), self-revelation is a criterion of a
good negotiator. Self-revelation is the verbal presentation of
69
Druckman
According to Druckman (1977:250-252), motivation is an
important element, which enables the negotiator to manipulate a
situation. Motivation springs from needs, perception, the situation,
et cetera.
(d)
(e)
(f)
integrity dependability;
empathy it is essential to understand the other partys
standpoint, even if only to improve ones own reaction;
value adjustment and accommodation learning must be
allowed to take place over time, in order to solve problems
and to accomplish effective communication (sometimes
also within parties);
self-assurance a certain courage is needed if you are to
succeed as a negotiator (Zartman, Berman 1982:20);
ingenuity the ability to proffer new arguments, and
especially, alternative suggestions when differences arise;
stamina especially under mental and physical pressure;
stamina to persevere is more important than any intelligent
70
(b)
(c)
(b)
(c)
the more complex and tense the situation and the clearer
the definition of roles in the situation, the less significant the
influence of the personality variables will be on the
negotiating behaviour;
the greater the uncertainty about the goal and the
opponents goals, the greater the tendency will be for
personality variables to have an influence on negotiating
behaviour;
negotiating behaviour is most closely linked to aspects of
the immediate situation which confronts the negotiator, for
example strategy, the structure of results, and threats.
Mortensen
Like Zartman and Berman, Mortensen (1973:241) also refers to
negotiation as a meeting of personalities. He too, upholds
Argyles social interaction techniques as good negotiator
characteristics. These characteristics comprise a capacity for
71
Karrass
72
Summary
Different authors consider different personality traits important to
a good or successful negotiator. In contrast to the viewpoint that
specific characteristics make a successful negotiator, there is the
latest school of thought on the personality of successful
negotiators. This school of thought has developed from research
on leadership qualities. Authoritarianism (Rubin, Brown 1975:
186187) and Machiavellism (Rubin, Brown 1975: 189-191 and
Tubbs, Moss 1974: 67) are no longer acceptable as leadership
types, and a specific set of characteristics is also no longer
acceptable in all situations. According to this latest view, specific
characteristics, which would ensure a negotiators success in all
situations, do not exist, but there is a nucleus of characteristics
that vary from situation to situation (Pottas 1987). The negotiator
should therefore be selected and, if necessary, trained for a
specific negotiating situation.
Leaversuch (1983:5) for example does not consider the
negotiators personality, but his flexibility in a situation, to be
conclusive. The Bible tells us that for all things there is a season.
For negotiations, there is a time to bargain forcefully, fight, and
win. There is also a time to harmonize and heal . . .
Archibald (1971:8) maintains that a negotiator does not
necessarily have to be a specialist in negotiating, but that he
should have the general ability to communicate effectively.
It is therefore evident that a negotiator should possess a few
core characteristics such as communication skills, adaptibility,
perceptivity, integrity and motivation, but that the other abilities
are specific to the situation.
73
74
all the criteria, or about whom there were not sufficient data
available.
After 56 planning and goal setting sessions with the
experimental group and 37 sessions with the control group, the
researchers gathered data from actual negotiating situations with
the aid of notes and sound recordings.
The findings, measured
behaviour, were as follows:
during
face-to-face
negotiating
Table 2
SUMMARY OF RACKHAMS FINDINGS
Successful
Negotiators
Control
Group
1. Irritating remarks
2,3
10,8
2. Counter proposals
3. Aggressive
1,7
1,9
3,1
6,3
1,8
6,4
3,0
1,2
17,2
21,3
12,1
8,3
9,6
7,8
4. Reasons to substantiate
statements
5. Prediction of behaviour
6. Testing for understanding and
recapitulations
7. Search for information
8. Information on emotions
75
Figure 13
HALLS MODEL OF DEALING WITH CONFLICT
9
1/9
9/9
5/5
Differences should be treated in the light of the common good.
At times some parties are obliged to lay aside their own views
in the interest of the majority; this allows the relationship to
continue to function, however imperfectly, and affords a basis
for redress later on. Everyone should have an opportunity to
air his views and feelings, but these should not be allowed to
block progress. It is never possible for everyone to be satisfied
and those who insist on such an unrealistic goal should be
shown the error of their way. Resolution requires a good deal
of skill and persuasive ability coupled with flexibility.
1/1
9/1
1
Concern for Personal Goals
76
9
1,9
Win lose
tough battler
Relationship
orientation
9,9
Integrative
problem solver
5,5
compromise
1,1
Iose withdraw
(physically and
mentally
1
9,1
concede lose
friendly helper
9
goal directed
77
Figure 15
INTERACTION PATTERNS OF
PERSONALITY EGO STATUSES
1
2
3
1
2
3
4
5
6
4
5
6
7
8
9
7
8
9
R
78
ATTITUDES
In the literature that was studied, attitudes are defined in the
following ways: Osgood, Suci and Tannenbaum (1957), . . . predisposition to evaluative response; Sarnoff, (1960), . . . a
disposition to act favourably or unfavourably; Staats (1965), . . .
attitudes-reinforcer-discriminator system, OKeefe (1980), . . .
evaluative responses.
79
80
81
82
(87%) occurred among the people who could see and hear each
other and the least (41%) among those who were isolated. Where
they could only see, the co-operation was 48% and where they
could only hear, 72%.
83
Assimilation activities
(a)
(b)
(c)
(d)
Management activities
(a)
(b)
(c)
(d)
Information-seeking
Paralanguage
Visual
Proxemic
Pre-articulation
processing
Paralanguage
Visual
Reactions/response
selection
Paralanguage
Facial
Visual
85
(e)
(f)
Culture
The use of personal space, in cross cultural context in particular,
was examined. Druckman, Rozelle and Baxter (1982:21) found
that the preference for spatial arrangement, distance, posture,
touch and architectural design differs among cultures. People
from different cultures interpret behaviour such as proximity, eye
contact during conversations, touch, and furniture arrangement
differently.
A knowledge of the other partys cultural preferences in
nonverbal negotiating behaviour enhances good impressions;
otherwise isolation and rejection may set in.
Research requirements
There are considerable dimensions of verbal and non-verbal
communication that have not yet been examined and that could
contribute to an understanding of, and more effective, negotiation
communication.
Aspects of communication that have not yet been thoroughly
examined but are enjoying some attention are:
86
(a)
(b)
(c)
(d)
(e)
(f)
(b)
(c)
Summary
Verbal and non-verbal communication is probably the most
important element in the negotiating process. Not only does it
influence the process and individuals involved in it, but it is also
the conveyor of the other elements. Without communication it is
not possible to resolve conflict, build power, establish position
and achieve goals.
Non-verbal behaviour is, however, an area of human interaction
which is sufficiently deliberate to complicate prediction.
87
ACTIVE LISTENING
Mutual understanding is a result of maximal communication
through mutual empathy Joost A. M. Meerlo (in Gordon, 1969:1).
88
MESSAGE CONTENT
89
90
Figure 17
CHANNELS
A communications channel is the route along which, or the
mechanism whereby information is transmitted from a source to a
destination.
A channel may therefore be a mechanism, a medium or a
route. In a negotiating situation, the channel as mechanism or
medium is usually language sometimes directly, or alternatively,
by way of translators. According to Devito (1978:11), the channel
in face-to-face communication may be any sensory form, In fact,
everything about us communicates.
The channel can also be the written word, as in the case of
indirect negotiation. A mass medium may be used as a
communication channel in negotiation, but especially as power
building medium, or for strategic reasons.
91
Dyads
A dyad is interpersonal interaction which occurs between two
people, where the communication content, the intimacy of the
relationship and the time lapse before feedback, are determining
factors. A dyad usually arises when agreement, a fulfilment of
needs, exchange of social resources, emotional investment and
closeness are required.
92
Dyadic communication is therefore face-to-face communication, which can occur between two spouses, friends, bloodrelations, business partners, or strangers.
If the negotiating structure takes the form of a dyad, it has a
certain influence on the process:
(a)
(b)
(c)
(d)
Individual-to-group
Pienaar and Robinson (1983:2) linked the type and the strategy
of negotiation to the structure of the negotiation.
As illustrated in Figure 18, negotiation that takes place between
an individual and a group on a direct and continued (sustained)
basis, would focus on the negotiation strategy rather than the
process. The strategy and factors of the negotiation (such as time
fixing, agenda setting, communication and media use) are of
great significance in this situation and not the processes such as
persuasion, influence and attitude shift. The individual cannot
afford to attempt these against a group.
93
Figure 18
STRUCTURES AND STRATEGIES OF NEGOTIATION
Group-to-group
Group-to-group is the most common form of negotiation. It is
used so often that negotiation may be seen as a group
communication process. The influence of this structure on the
negotiating process and results is better understood when the
nature and function of groups and group communication are
examined.
A group forms when the face-to-face interaction of two or more
people occurs in such a way that members of the group can
accurately recall the characteristics of every other member
(Burgoon, Heston, McCroskey 1974:2). The most important
characteristics of a group are therefore the proximity of the group
(face-to-face), the fact that interaction takes place, the number of
people involved (two or more, but not too many for interaction),
and the fact that members must be able to describe the other
participants characteristics accurately.
94
socio-emotional leadership;
task oriented leadership;
keeping record; and
analysis of the process.
95
Figure 19
96
are unwieldly rather than being of any value. Adler and Rodman
(1982:249-267) however state various reasons why groups are
suitable for problem solving.
Resources
For most problem solving tasks, a group has greater access to
resources than most individuals. Not only are they better
equipped physically (which is an important aspect of negotiation
according to Zartman and Berman 1982:64), but they can also
usually find a better solution. Available resources can be utilised
more effectively due to the groups interaction.
Accuracy
Another advantage of a group is that members have a better
chance to intercept mistakes. No one is without faults, and in
negotiation a mistake can cost human lives. Sometimes a
mistake is not so obvious, which makes a team effort even more
valuable, as there are more members who might be in a position
to spot it.
Commitment
Apart from effective solutions, a group structure usually leads to
greater commitment to the execution of decisions; especially if
members share in the decision taking. This phenomenon is
known as the principle of participatory decision taking, which is
now also applied in South African organisations (De Villiers
1975:5) and which leads to greater emphasis on negotiation at all
levels.
At almost every phase of problem solving, a group is more
effective than an individual; also in the identification and analysis
of problems. It is however especially in the development and
evaluation of alternative solutions (which can make or break
negotiations) where a group has greater potential and therefore
achieves better results.
97
(d)
(e)
Domination by a minority
Unequal participation by group members diminishes the
effectiveness of a group. The quantity of a members contribution
98
Pressure to conform
No individual should be a member of a negotiating team if he has
no confidence in his problem solving abilities. If a member snows
potential, but is hesitant, it is up to the leader to encourage the
member or to omit him from the team.
Complexity
There are not only one receiver and one communicator in a
group. The communicator must consider more than one receiver
when coding his message. In negotiation, receivers outside the
immediate situation should also be kept in mind.
99
Withdrawal
The dynamic combination of a group sometimes facilitates and
sometimes complicates withdrawal by a member. Specific role
expectations exist, making it difficult or easy for members to
withdraw. In a negotiating situation, the withdrawal of a team
member can have drastic results, for example, forfeiting the other
teams trust.
Influence
Recent research on various communication areas (for example
the communication of development innovations by small groups)
indicates the strong power of influence that this negotiating
structure has.
The influence and intimacy that result from group cohesion are
unique to the small group. This power of influence makes the
small group unique.
Public dimension
Negotiation visibility has an influence on negotiation behaviour.
(Clarke 1977:22). The structure of the negotiation is influenced by
visibility, whether as a result of an audience being present, or by
means of reporting by, or communication to, mass media.
According to Marais (1979:129), mass media reporting has the
same effect as the presence of an audience especially
psychological.
The most important influence of a public dimension on the
negotiating structure is the tendency displayed by negotiators to
impress the audience, and the pressure that the audience
reaction subsequently puts on the negotiator. During the Falkland
War, Jean Kirkpatricks press releases succeeded in confusing
Mrs Thatcher rather than helping her to establish Americas
standpoint. President Sadats exposure of his visit to Israel, on
the other hand, contributed to a positive attitude on the part of
100
Summary
Negotiating channels are mechanisms or routes to transmit the
negotiation message to the destination. Various elements of
negotiation influence the choice and form of the channel,
102
of which the negotiating structure is the most prominent. Groupto-group is the most popular negotiating structure, and knowledge
of its functioning is important for an understanding of the
dynamics of the negotiating process. In Durkheims
(1964:110-111) words:
The first origins of all social processes of any importance
should be sought in the internal constitution of the social
group, rather than in the psychology or physiology of the
members.
GOAL SETTING
Free
download
from
www.hsrcpress.ac.za
103
Figure 20
NEGOTIATION BY OBJECTIVES
A GUIDELINE FOR DATA PREPARATION, STRATEGY DEFINITION
AND THE EVALUATION OF NEGOTIATING RESULTS
Bargaining *
items
Priorities
**
Pessimistic
*
**
***
Realistic
Optimistic
Evaluation
Results
Initial ***
Bargaining
Position
105
ROLES
107
Figure 21
108
109
Perception
Perception in intercultural situations occur selectively as a result
of prejudices, stereotypes, and a difference in the connotative
meaning assigned to concepts. Davis and Triandis (1965) found,
for example, in an investigation of world perceptions more than
100 operational definitions of attitude and personality scales in
studies among different cultures.
Attitudes
In cultural context, attitudes are often expressed as us and
others, and owing to prejudices, ethnocentrism and stereotyping,
social distance is established. Attitudes develop from the parties
reference frameworks (which differ) and in turn influence
perception and therefore communication and behaviour.
According to Rich (1974:38), emotionally based attitudes lead to
the selection of elements in the environment and the
rearrangement of reality. An effective negotiator cannot allow
his attitude to cause inaccurate perception and therefore
ineffective negotiation.
110
Personality
Personality is also influenced by culture, as it is partially formed
by culture. Tubbs and Moss (1974:138) mention one particular
stumbling block in intercultural communication, namely a high
anxiety level. If, however, the atmosphere remains sympathetic,
and the communication is accurate and effective, cultural
differences should not create any problems regarding personality
in negotiation.
Credibility
Ritual confirmation
The ritual confirmation of an agreement is firmly imbedded in the
culture of traditional African negotiation in particular. In the past
this was done by the ritual parading of their new acquisition, for
example their wife or cattle (Gulliver 1979:163), while today it is
usually accomplished by means of announcements to the mass
media.
Code systems
The most important verbal code system used by man in
communication and interaction is language. In intercultural
situations one of the biggest problems is a difference in language.
Language is expressed in symbols, and they carry the meaning
of the message. If the two parties frames of reference regarding
111
Figure 22
RICHS MODEL FOR INTERCULTURAL COMMUNICATION
112
Negotiating patterns
Conclusion
Communication, especially non-verbal communication, is the best
indicator of the difference that exists in meaning assignment
between communicators of different cultures. According to Rich
(1974:161), the real self is more easily exposed by non-verbal
communication. Communication, is however, also the only
Figure 23
114
(b)
(c)
115
Process
116
Method
The literature on negotiation makes no distinction between the
definitions of the concept method and those of strategy or tactic.
Method can therefore be interchanged with both strategy and
tactic.
117
Figure 24
118
Figure 25
Free
download
from
www.hsrcpress.ac.za
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
119
Figure 26
KARRASSS PLANNING TABLE FOR NEGOTIATION
Strategic planning
(policy)
Tactical planning
(operational)
To optimise realisation of
negotiation potential
Determination of sub-goals,
persuasive arguments and
means appropriate to
reaching strategic goals;
testing intent of opponent
Administrative
planning
Product-market mix
Make or buy mix
Constraints customer
and environment
Decision-making structure
Competition philosophy
Basic goals technical,
price, delivery, management
Trade-offs
Risk-taking and risk
identification
Power relationships
Attitude relationships
Fact-finding methods
Proposal and information control (security)
Ethical values
Selection of chief
negotiator
Worth-analysis
Organisation: Team
support, and special
assistance
Information: Fact-finding,
channels, analysis,
security and assumption
testing
Resources: Personnel,
tools, training, facilities,
third parties
Sub-goals: Issues,
problems, targets,
assumption and intent
testing
Techniques: Agenda,
questions, affirmative
statements, concessions,
listening, commitments,
moves, threats, promises,
recess, delays, deadlock,
nonverbal communications, focal points and
standards
Inoculation
Maneuvres: Timing
inspection association,
authority, amount,
brotherhood, diversion
120
121
Figure 27
Goal
Setting
Decide
on goals
Power
building
Identification of
issues
Deter-
Strategic
mine
position
(own and
others
Establish
power
Issues
Plan ex-
Power
Synthesis
Face-toface
negotiation
Prepara-
Proces-
Conclu-
ses
Tactics
sion
arrangements
tion of
presenchange
tation
Agenda
preparation Form of
team
122
Verification
do
not
distinguish
separate
Atkinson (1980)
Exploration
Position development
Joint exploration
ii
Expectation structuring
Emphasis on bargaining
Emphasis on discussion
iii
Emphasis on bartering
and movement
iv
Conclusion
Finalisation of agreement
Finalisation of agreement
123
124
Summary
NEGOTIATION RELATIONSHIP
An important element that influences negotiation is the formation
and maintenance of relationships.
Relationships are formed when interaction occurs between two
individuals. In the negotiating situation, relationships are
established through the interaction between the participants and
influenced by personality, roles, trust, conflict, compromise, and
the contract zone.
It is desirable that a sound working relationship emerges
between individuals or parties, and within a party in a negotiating
situation to ensure successful negotiation. The situation often
determines the type of relationship. The relationship also exists
as part of the situation an element which co-influences the
negotiation. A negotiating relationship fosters trust, clears
125
126
TRUST
Trust is the perception of a person as reliable or trustworthy.
127
(b)
(c)
(d)
If the other party accepts the action that has been offered,
and if a party can be persuaded that an action is to his
advantage. Beware of trading definite economic, political or
military goods when there is no reciprocity.
(e)
(f)
128
Summary
It is easy to develop trust in a sound negotiating relationship. If
trust exists, it is possible to resolve the conflict that led to a need
for negotiation, and conflict that arises from the negotiating
process. It is also easier to grant concessions, and to reach a
compromise, if there is trust between parties.
129
Competitive conflict
In this type of conflict the resources are scarce, or are perceived
as being such, while the parties have corresponding interests.
One partys gain means the others loss.
130
Disruptive conflict
Here the resources are scarce and the interests are different. The
parties have not concurred on a set of ground rules for
negotiation on the conflict, and actions are not always rational.
The goal is not to win, but to harm, vanquish, or drive out an
opponent. The atmosphere is fraught with anxiety, tension, and
fear.
Differences
Problem solving
If sufficient resources are available, and the parties interests
concur, it is possible to resolve the conflict. The objective here is
to obtain the most acceptable result that would allow both parties
the greatest possible benefit or gain. During this process, the skill
and knowledge of both parties are improved by a constant
striving for interaction that would benefit both.
According to Filley, conflict therefore involves incompatible
goals and different values. These differences can however be
perceived as real. If the parties can change their perception of
scarce resources to sufficient resources, and if they would
recognise common interests, it is possible to resolve conflict.
Antecedent Conditions
Perceived
Conflict
Felt
Conflict
Manifest
Behaviour
Conflict Resolution
or Suppression
Resolution Aftermath
Antecedent conditions
These conditions are features of the situation that may lead to
conflict, although the conditions may exist without conflict.
Conditions include ambiguous jurisdiction, conflict of interests,
communication barriers, excessive dependency of one of the
132
Perceived conflict
Perceived conflict is a set of conditions perceived to be conflicting
for the parties.
Manifest behaviour
Manifest behaviour is the perceptible action that follows conflict,
namely aggression, competition, debating or problem solving.
The aftermath
After the resolution follows the aftermath, or the consequences of
the conflict.
If the conflict process is considered part of human interaction
(therefore also of negotiation), methods for resolving conflict
should be examined.
Cavanaugh (1983:7) recommends that, apart from specific
methods, conditions and a general atmosphere of conciliation
should be created: . . . not in a negative sense by abusiveness
133
or telling people off, but by creating the conditions which allow the
intimidator to reflect upon, examine, question or change some
aspects of his or her behaviour.
Win-lose methods
A typical example of these methods is the use of authority or
mental or physical power. Failing to react is also a method of winlose, and so is the use of a majority or minority government (by a
chairman or through pressure).
Lose-lose methods
A compromise, where neither party really achieves his goal, is a
form of the lose-lose method. A compromise however is
sometimes required, to arrive at a solution for a problem.
Payments on the sly, bribes to fake losing also in fact constitute a
loss for both parties. A neutral third party who becomes involved
as mediator or arbitrator also seldom leads to a satisfactory
resolution. Referring to rules in order to avoid a confrontation also
leads to Jose-lose results.
In the above mentioned methods there is a difference in
perception and in goals among the parties. These methods are
the most prevalent, although the third method offers the best and
most lasting resolution.
Win-win methods
Two types of strategies are found among these methods, namely
consensus and integrative decision taking. In both of these, the
focus is on the goals rather than on the differences (see Fisher
134
Consensus
As with compromise, consensus also leads to a resolution which
is not really acceptable to either party, but it is often employed to
arrive at some agreement. Thousands of soldiers had to die in
Vietnam, for example, before Hanoi or Washington decided to
grant the first concession regarding the location for the peace
negotiation Warschau or Honolulu.
Both parties have to focus on the problem. Consensus does
not include voting, an exchange, or an average, but focuses on
behaviour that is not self directed. This method includes
concessions. Concessions involve an adjustment of position until
an agreement is reached. Beaumont (1980: 116) even describes
negotiation as a process of concessions.
135
Figure 31
FILLEYS METHOD OF INTEGRATIVE DECISION-MAKING
Problem
Definition
Search
Process
Consensus
Summary
Potential conflict areas should be identified in advance, and plans
to counter unforeseen events should be at the ready to
136
COMMON GROUND
For successful negotiation, it is necessary that, in spite of conflict,
an agreement should in fact be reached. The most effective way
of reaching an agreement as soon as possible is the
establishment of common ground.
Common points, viewpoints or ground are seldom known. The
onus is on the negotiator to identify these points or areas. This
can be done by establishing the opponents negotiation base or
position and his aspirational base.
137
Figure 32
THE CONTRACT ZONE
Party A
Aspiration
base
Negotiation
Base
Low
usefulness
contract zone
XXXXXXXX
XXXXXXXX
contract zone
Aspirational
Base
High
usefulness
Negotiation
base
Party B
COALITION FORMING
(b)
(c)
139
Such factors are inter alia the relative power of the other party,
the status, skills and potential which the other party has for
success, and the fulfilment of previous coalition agreements.
A possible coalition which could have been formed for the 1984
American presidential election was that between the Democratic
party (with Mondale) and black organisations such as the People
United to Serve Humanity (of Jesse Jackson), or the Southern
Christian Leadership Conference (established by Martin Luther
King). If preliminary surveys had shown that Jesse Jackson
would not get enough black Americans to register so that he
could be a contender in his own right, or if the Democratic
candidate had felt that he would not be able to defeat the
president, they probably would have formed a coalition. With the
new votes that Jackson could have gained in his campaign
(estimated at 1 million before end of August 1983) and the better
distribution of white votes that the Democrats could have had
(Time 22 (8), 22nd August 1983: 38-48), it would have helped
both parties to achieve a greater input in policy matters, had they
formed a coalition.
Conclusion
If coalition formation cannot be employed, and even in the event
of such an action, parties can try to use bluff, threats,
manipulation or force.
140
Threats
A threat may be defined as the explicit intention to behave in
such a way that it is perceived as detrimental to the interests of
the other party.
The aim with threats is to transmit information about the
negotiators preferences and intentions. If, therefore, threats
occur during the early stage or opening movements of a
negotiation, they may lead to mutual suspicion and competition
(Rubin, Brown 1975:263). By monitoring the other partys tempo,
frequency and intensity of threats or promises, his real intentions
and preferences may be determined.
Threats also reveal information about how the party who utters
them perceives the other party. If the other partys attitude is
perceived as negative, a threat, rather than a positive reaction will
141
Coercion
If threats are carried out, or if a person is forced to do something
against his will, coercion comes into play. Force or coercion
however should be distinguished from tactics such as influence or
persuasion, where a party is indeed persuaded to change his
standpoint, but voluntarily, not against his will. Although
persuasion may therefore be acceptable and successful,
persuasive speaking is essential because it is the key to problem
solving in democracy (Adler, Rodman 1982: 370), coercion is not
acceptable and often not successful. Even though an agreement
may be reached as a result of coercion, the long term relationship
will suffer, and the decisions might not necessarily be
implemented.
Coercion can also lead to violence. Gulliver (1979:1) identifies
five categories of problem solving. The most general and most
universal of these, according to Gulliver, is negotiation and
adjudication or arbitration. The most dangerous is violent self
help such as strikes, attacks, or war. Violence usually does not
solve the problem, but escalates it.
143
Manipulation
Manipulation is the agitation and sometimes threatening of
people to achieve a goal. In this way, the partys expectations,
behaviour structure, and perception may be manipulated. This is
usually accomplished through the information that is
communicated (Young 1975:303).
Manipulation does have negative connotations, but
nevertheless is used by most negotiators to achieve their goal. If
both parties accept the agreement, manipulation is probably
justified. If, however, it is used to make a party change his
standpoint against his will, such a party needs to defend himself.
Fisher and Ury (1981:134-137) suggest various counter
mechanisms:
(a)
(b)
(c)
(d)
Summary
Bluff, threats, coercion and manipulation do occur in negotiations,
but their effectiveness and desirability have not yet been
emperically determined.
SITUATION
The negotiating situation includes all aspects which are not
explicitly part of the process itself and the elements, but which
influence them. These are the physical and psychological
environment, time, and culture.
144
Time
The length, tempo, and position of time influence the negotiating
process. Time affects each phase of the negotiating process, as
well as the strategies and tactics that are employed in each
phase.
145
Figure 33
TIME SCHEDULE FOR NEGOTIATING PROCESS
Content
units
Time units
1
Opening
(Socioemotional
phase)
Problem
defining
phase
Exchange
Implementation
PROGRESSIVE SUMMARY
Common
ground
Exchange
Agreement
Security
Formulation
Conclusion
(Socioemotional
phase)
PROGRESSIVE SUMMARY
146
related
Patience
Acquiescence and the maturity to live with a situation for the sake
of greater gain in the future are important in negotiation. Most
people have a strong desire to end the tension of negotiation as
soon as possible. This does not necessarily lead to good results.
Protraction
This is a special form of patience. In this case a party takes the
conscious decision to protract the negotiation for as long as
possible, until certain known or unknown aspects reveal
themselves, before the final agreement. Such a negotiation
should only be entered into after a rational consideration of its
implications.
Deadline
The use of a deadline is a powerful tactic in negotiation, as it
carries the potential for real loss to both parties. Last minute
negotiation occurs so frequently, that it has been said by Dunlop
and Jealy (1955) to be a fundamental feature of the collective
bargaining process. The cost of possible work strikes is
considerable, which place these last minute decisions under
great pressure (Young 1975:137).
Time restrictions in negotiation can be implicit or explicit, self
generated or applied from the outside, flexible (as in the case of
the SALT negotiations) or rigid, and may be seen in the same
way or differently by parties. They can also be advantageous, for
example, a cool down period, or to obtain concessions. Time
restrictions or time pressure, however, have significant
implications, as they heighten the possibility of acquiescence
against a partys wishes and diminished aspirations. The
demands and degree of bluffing also contribute to this possibility.
Speed
Shorter negotiations cost less money.
147
Surprise
Speedy action catches the other party on the wrong foot and
provides a considerable advantage.
Status quo
Static and unchanged conditions can sometimes be advantageous to a party.
Fait accompli
Research requirements
Rubin and Brown (1975:293) indicate that the following problems
of time utilisation in negotiation still need to be researched:
(a)
(b)
(c)
(d)
(e)
(f)
(b)
149
IMPLEMENTATION
150
Training in negotiation
152
153
154
THE NATURE
RESEARCH
OF
SUPPORT
BY
EMPIRICAL
The training material and courses covered here, differ little from
the general state of negotiation theory. The instructors make
certain statements or prescriptions about successful negotiation
behaviour which they illustrate with examples from negotiation
situations. The statements, however, are seldom based on
research, and only one programme has been evaluated once.
There is an abundance of available research (as reported in
Chapters four and five). It need not be necessary, therefore, for
instructors to use examples and anecdotes as if they were
scientific facts. Some trainers use the work of researchers, but do
not cite the source.
Researchers often complain that they do not have negotiators
to participate in their studies. The training programmes seem to
present an excellent opportunity of overcoming this problem,
while the results of the research can then be used in the courses.
If instructors take note of available research to emphasise their
views, and researchers develop research designs that add to the
knowledge useful to instructors, this co-operation could result in
high quality training programmes and applicable of research.
155
156
References
157
negotiation.
The
159
relations.
American
161
162
163
164
165
166
167
168
169
170
171
172
173
174
Index
active listening, 88
Adler and Rodman, 46, 87, 88,
97, 134, 143
agent, 10,
analysing negotiation interaction,
41
arbitration, 10,
Archibald, 73
aspiration level, 60
Atkinson, 9, 26, 47, 60, 69, 104,
123-124, 126, 151, 154
Atkinsons negotiating phases,
123
attitudes, 79, 110
175
Dahl, 50-51
Davis and Triandis, 110
De Villiers, 101-102
De Swardt, 101, 130
De Koning, Hall, 39
De Vito, 137
deadline, 147
defined, 7, 8, 9,
definition
of concepts, 7,
of power, 51
Deutsch and Krauss, 36
Devito, 46, 66, 91, 135
direct observation, 40
disruptive conflict, 131
distributive negotiation, 8,
Donohue, 9, 37, 39, 119
Donohue, Diez, and Hamilton,
33, 36-37, 39, 40, 42
Douglas, 25
Drucker, 69
Druckman, 25, 30, 47, 69-70, 90,
103, 113, 116-117, 119, 142
Galbraith, 56
Gallo, 36
game
theory, 14, 23
theory models, 19
simulations, 34
Gamson, 139
goals, 49
setting, 103
Goldstein and Sies, 53, 88
Gordon, 88
Gribben, 36, 156
176
group-to-group, 94
Gulliver, 3, 9, 16, 32, 87, 113,
116, 143
Jealy, 147
Johnson,
Karrass, 25, 47, 48, 55, 58, 59,
61, 62, 72, 81, 87, 89,
106-107, 109, 113, 117, 142,
146, 150-151, 153
Karrasss planning table, 120
Katz and Kahn, 92
Kelley, 149
Kiesler, Collins and Miller, 81
Kleinke and Pohlen, 83
knowledge of negotiation, 2,
Kohan, 15, 16
Konetchni, 33
Krippendorf, 33
Hall, 76-77, 89
Hamblin and Kunkel, 65, 126
Hamilton, 9
Hammer and Uki, 119
Hannah, 68
Harris, 77
Harriss personality-ego-statuses,
78
Harsanyi, 22
Harvard program on Negotiation,
3,
Hatch, 47
Hillthrop, Rubin, 33
Hinde, 82
historical ethnography, 32
Homans, 24
Hopmann and Walcott, 37
Hovland and Weiss, 67
Human Sciences Research
Council, 3,
Hunger and Stern, 37
hybrid, 24, 27
hybrid-type models, 19,
Landsberger, 37
language, 21-27,
latent and manifest communication
Leaversuch, 73
legitimate power, 53
Leth, Vandemark, 95
Levin, 151, 153, 154
Lewicki, 9,
Lewis and Fry, 37
limitations, 19, 21-27
limits, 26
Liska, 68
lobbying, 11,
Lose-lose methods, 134
Ikls, 2,
implementation, 150, 154
implementing tactics, 153
individual-to-group, 93
inequality, 110
influence, 63
information assimilation, 85
integrated approach, 8,
integrative decision taking, 135
interaction analysis, 25
intercultural negotiation in
Southern Africa, 42, 44
intercultural interaction, 112
International Labour Office, 107
intervention, 19, 27
interviews, 40
irrationality, 63
Machiavellism, 73
manipulation, 141, 144
Marais, 9, 30, 95, 99, 100
Markov analysis, 25
Maslow, 48
hierarchy of needs, 48
mass media, 100
Mastenbroek, 24
mathematical negotiating models,
17,
maxim, 29
McClelland, 55
McCroskey, Wheeless, 81
177
McGarth, 26
McGrath and Julian, 37
McKinsey, 23
McLaughlin, 68
measurement of power, 65
Mediation, 10,
Mehrabaan, 112
message content, 89
meta-models, 20,
method, 116, 117
of conflict resolution, 134
Milburn, 47
Mintzberg, 50, 51, 60, 66
models, 16,
modes of influence, 63
monitoring, 154
Morley and Stephensons, 38
Mortensen, 46-47, 66-67, 71, 127
communication, 82
OKeefe, 79
official power, 54
Oliva and Leap, 19,
Oliva and Leap, 17
Olivia & Capdevielle, 24
organisational negotiating structures, 101
Osgood, Suci and Tannenbaum,
79
Pen, 22,
perceived conflict, 133
perception, 46, 49, 110
of power, 58
Perrow, 50
personal power, 55
personality, 68, 111
traits, 68
persuasion, 9, 10,
Peters, 11,
Peterson & Tracey, 24
Pettigrew, 58
Pfeffer, 57, 66
phase, 19, 21, 25
phases in the negotiating process, 121
Pienaar and Robinson, 26, 58, 81,
87, 93, 98, 117, 121, 146, 151
Pienaar and Robinsons negotiating phases, 122
Pigou, 26
Piron, 9, 10, 101, 103, 126
position, 65, 110
Pottas, 44
power, 50, 110
goals, 59
of coalition, 54
of reward, 54
of expertise, 53
perception, 59
principles of power, 52
prisoners dilemma, 34
problem solving, 131
N-person games, 35
Nash, 22,
needs, 49
for power, 64
negotiating
base, 60
behaviour, 154
phase, 124
patterns, 113
roles, 108
styles, 77
significance, 1,
system, 45
negotiation, 1, 7, 9, 45, 125
by objectives, 105
Negotiation Cue Response, 37
Negotiation Process Analysis
Method, 37
Negotiation interaction analysis,
36
Nierenberg, 151, 154
Nieumeijer, 46
Nieumeijer, 39, 40, 42, 44, 156
no power, 62
non-mathematical, 14,
non-verbal
behaviour, 85
178
Staats, 79
Stagner & Rosen, 26
state of negotiation knowledge, 3,
Stern, Sternathal, Craig, 37
strategy, 8, 116, 117
Strauss, 15,
strengths, 22-27
structures and strategies of negotiation, 94
successful negotiators behaviour,
40
Summers, Stewart, Orcken, 114
Susskind, Ozawa, 10,
Susskind and Bazerman, 10, 17,
21, 151
symbolic message content, 89
symbolisation, 90
systems theory, 15,
Rackam, 40-42, 74
Raiffa, 2-3, 151, 153
Randle & Wortman, 26
Rapoport, 14, 35
Rapoport and Kahan, 19, 33
Rapoport, Gyer, Gordon, 17, 23
Raven and Kruglanski, 142
real, 40
referred power, 54
relationship, 125
research 155
- dimensions, 30
- methods, 30
results and implementation, 149
Rich, 110, 112, 114
Richardson, 25, 104
Ritual confirmation, 111
Robinson, 26, 60, 129, 138, 142
Rogers and Farace, 41
roles, 107
Roloff, 87, 90, 126
Rotter, 49
Rubin, 3,
Rubin and Brown, 2, 9, 65, 72-73,
82, 87, 138, 141, 148-149,
Sarnoff, 79
Sawyer and Guetskow, 2, 9, 103,
104, 116, 149
Schelling, 22, 23, 142
Schmikl, 65
Schneider, 80
self-reflective introspection, 33
Sermat, 37
Shears, 139
Sidowski, Wycoff and Tabory, 36
situational power, 53, 55
skills, 152
small group communication, 99
sources of power, 53, 153
sources of conflict, 129
179
types, 129
typology, 16, 17
of negotiation models, 18,
Zand, 79
Zartman, 51
Zartman and Berman, 9, 26, 33,
40, 70-71, 91-92, 97, 105-106,
109, 112, 115-116, 123,127129, 141
Zechmeister and Druckmans, 37
Zeigarnik effect, 87
zero-sum, 19,
Zeuthen, 22
180
Human Rights
Training
A Manual on Human Rights
Training Methodology
UNITED NATIONS
Human Rights
Training
A Manual on Human Rights
Training Methodology
UNITED NATIONS
New York and Geneva, 2000
NOTE
The designations employed and the presentation of the material in this
publication do not imply the expression of any opinion whatsoever on the part of
the Secretariat of the United Nations concerning the legal status of any country,
territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries.
*
*
Material contained in this publication may be freely quoted or reprinted, provided credit is given and a copy of the publication containing the reprinted material
is sent to the Office of the United Nations High Commissioner for Human Rights,
United Nations, 1211 Geneva 10, Switzerland.
HR/P/PT6
CONTENTS
Chapter
III.
III.
IV.
IV.
Page
1-14
2
3
4
5
6
7
8
9
10
11
12
13
14
1
1
1
1
1
2
2
2
2
2
2
2
2
15-38
A.
B.
C.
D.
E.
F.
Learning objectives................................................................................
Tailoring courses....................................................................................
The participatory method.......................................................................
Participatory techniques ........................................................................
Locations for training courses ...............................................................
Planning for participants needs ............................................................
15-16
17
18-20
21-36
37
38
3
3
3
4
5
5
TRAINERS ........................................................................................................
39-47
A.
B.
C.
D.
E.
F.
39-40
41
42
43
44-47
7
7
7
8
9
9
48-84
10
49-50
51
52
53-54
10
10
11
11
55
56-64
65
66-70
71-77
78
79-80
81-83
84
11
11
12
12
12
13
13
14
14
A.
B.
C.
D.
E.
F.
G.
H.
I.
J.
K.
L.
M.
III.
Paragraphs
iii
15
CHAPTER I
HUMAN RIGHTS TRAINING METHODOLOGY
a variety of effective techniques for training adults. In particular, suggestions are made for the use of creative, interactive teaching methods, which offer the best hope for
securing the active involvement of the programme participants. OHCHR has identified the following techniques
as especially appropriate and effective in human rights
training for adults: presentation and discussion, panel discussion, working groups, case studies, problem-solving/
brainstorming, simulation/role-playing, field trips, practical exercises (including drafting), round-table discussions
and visual aids. Pointers on the use of such techniques are
provided below in chapter II.
1. The Office of the United Nations High Commissioner for Human Rights (OHCHR) has been involved for
many years in training persons working in various professions in areas of human rights which touch on their particular field of competence. The methodological approach
developed on the basis of the experience gained is comprised of basic elements which, appropriately adapted and
modified for each target group, can provide useful guidance for the conceptualization, planning, implementation
and evaluation of human rights training programmes for
adult professionals. These elements are described below.
A. Collegial presentations
D.
2. For the selection of resource persons, OHCHR
advises drawing from a list of experts which is practical in
orientation. Rather than assembling panels composed
entirely of professors and theorists, it is better to opt for
practitioners in the relevant field. In the experience of
OHCHR, much more can be accomplished through a collegial approach, in which development professionals,
police, or judges, for example, discuss these matters with
each other, than by a professor-student model of training.
This approach allows the trainer to access the distinctive
professional culture which surrounds each particular audience. At the same time, practitioners/trainers should be
accompanied and supported by experts in human rights,
thus ensuring that the substance of international human
rights standards is fully and consistently reflected in the
course contents.
B.
A practical approach
C.
Audience specificity
J.
and literature on the current best practice for the profession in question.
K.
Teaching to sensitize
12. The importance of appropriate regard for the selfesteem of adult trainees cannot be overemphasized. Professionals will bring to the classroom their own professional expertise and practical experience, which should be
acknowledged and can be tapped for the benefit of the
course. The extent to which the trainer does so will largely
determine the trainees reaction to the training exercise.
Obviously, participants will not respond well to instruction which is seen as spoonfeeding; nor will a schoolteacher approach or a military approach be well
received. Instead, trainers should seek to create a collegial
atmosphere in which the exchange of expertise and
experience is facilitated, the professional knowledge of
trainees recognized and professional pride encouraged.
The goal here is to send the message that knowledge of
human rights is a key element of professionalism in the
work of the target group and that, accordingly, the trainees
have much to gain and also much to contribute in this area.
Evaluation tools
Planned follow-up
Competency-based
CHAPTER II
EFFECTIVE TRAINING TECHNIQUES
A. Learning objectives
(c) The largely practical and pragmatic orientation of adult trainees who are professionals should be
reflected in the education and training methods adopted.
This means:
Creating the opportunity to translate ideas and concepts into practice;
Enabling participants to focus on real problems of
their profession;
Responding to issues of immediate concern to participants raised by them during the programme.
Collegial presentations;
Training the trainers;
Interactive pedagogical techniques;
Tailoring courses
Audience specificity;
17. When arranging training programmes, the principles of audience specificity and relevance require that
organizers follow a few basic rules of thumb:
A practical approach;
Teaching to sensitize;
(b) Whenever possible, separate training programmes should be arranged for different categories
within the profession, according to the particular function
and context of that sub-groups daily work. This allows
training to focus on:
Competency-based;
Evaluation tools;
The role of self-esteem;
3
InteractiveThis programme implies the use of a participatory, interactive training methodology. Adult
trainees most readily absorb human rights course curricula when they are not spoonfed the material.
Rather, for effective training, they should be fully
involved in the process. As practitioners, the trainees
will bring to the course a rich pool of experience,
which must be actively drawn on in any interesting and
effective course.
D.
Participatory techniques
RelevantThe unspoken question of the trainee throughout the course will be: What does this have to do with
my daily work? The extent to which the trainer continuously answers this question will be an important
measure of his/her success. Every effort must therefore
be made to ensure that all material presented is relevant
to the work of the audience, and that such relevance is
made clear where it is not self-evident. This task may
be easier when operational themes are being addressed.
It may require more careful preparation, however, with
respect to more topical themes, such as the protection
of especially vulnerable groups.
2. Panel discussion
24. The formation of a panel of presenters or experts,
possibly following a presentation by one or more of them,
has frequently been shown to be a useful training device.
Such an approach is particularly effective when presenters
have expertise in different aspects of a topic, because of
their professional backgrounds or countries of origin. Ideally, human rights experts should be included on the
panel, together with experts in the relevant professional
field.
Working groups
4. Case studies
27. In addition to dealing with discussion topics,
working groups can consider case studies. These should
be based on credible and realistic scenarios which are not
too complex and which focus on two or three main issues.
Case studies should require participants to exercise their
professional skills when responding to them and to apply
human rights standards.
9.
Round-table discussions
10.
Visual aids
6. Simulation/role-playing
F.
38. The level of physical comfort of course participants will have a direct impact on the outcome of the
learning exercise. For planning purposes, keep in mind,
the following basic factors:
7. Field trips
33. Group visits to relevant institutions or sites can
provide valuable perspectives. The purpose of the visit
should be explained in advance and participants should be
instructed to pay critical attention and to record their
observations for a subsequent discussion.
8. Practical exercises
34. This involves the assignment of trainees to apply
and demonstrate particular professional skills in a super5
CHAPTER III
TRAINERS
1.
A. Selection of trainers
To encourage the development of skills, and the formulation and application of policies, necessary to
transform that information into practical professional behaviour;
2.
A typical course session consists of a brief presentation by two team members, followed by the application of a participatory training method. Plenary discussions are open to all and are led by the resource
person delivering the session. All members of the
training team are expected to contribute to all session discussions, as necessary.
B. Briefing trainers
41. It is important that trainers are adequately briefed
on the following matters:
If the training is country-based: basic historical, geographical, demographic, political, economic, cultural and social information on the country where
the programme is to be introduced; basic information on the constitutional and legal arrangements of
that country; human rights and humanitarian law
treaties to which the State is a party; current or
planned human rights projects;
C.
(i) Be honest;
(k) Do not let discriminatory, intolerant, racist or sexist comments pass without comment. Address them as you
would address any other issue which may be encountered
during discussions, that is, calmly, tactfully, directly and
substantively. Point out the relevant standards and explain
why they are important for the effective, legal and humane
performance of the work of both the United Nations and
the relevant profession, and the role they play in fostering
professionalism within those groups. Be prepared in
advance to counter myths and stereotypes with facts.
Remember that the goals of the trainer include the
improvement of knowledge, skills and attitudes, and that
the latter goal, albeit the most difficult to achieve, is often
the most important;
Draft your speaking points (introduction, body, conclusion, summary of major points);
Select the exercise and questions to be used;
Select or prepare your visual aids (handouts, overhead transparencies, etc.);
Practise your presentation until you can deliver it
naturally and confidently and within the time limit.
E. Key terminology
CHAPTER IV
AN INTRODUCTION TO HUMAN RIGHTS AND THE UNITED NATIONS
HUMAN RIGHTS PROGRAMME
B.
51. Human rights and fundamental freedoms are enumerated in the Universal Declaration of Human Rights
and in various treaties (also called covenants and conventions), declarations, guidelines and bodies of principles elaborated by the United Nations and by regional
organizations. They include a broad range of guarantees,
addressing virtually every aspect of human life and
human interaction. Among the rights guaranteed to all
human beings are:
The right to life;
A.
C.
F.
What is development?
52. For the United Nations, sustainable human development means looking at development in an integrated,
multidisciplinary way. Human rights are central to this
concept of development, which stresses not just economic
growth, but equitable distribution, enhancement of peoples capabilities and enlargement of their choices. It
gives highest priority to the elimination of poverty, the
integration of women in the development process, selfreliance and self-determination of people and governments, including the rights of indigenous peoples. Sustainable human development places people at the centre
of development and advocates the protection of the life
opportunities of present and future generations, respecting the natural systems on which all life depends.
68. Instruments of universal application are elaborated in United Nations human rights bodies (such as the
Commission on Human Rights), for submission to the
General Assembly for adoption. Additionally, expert
studies on various human rights problems which may lead
to the development of new human rights standards are
undertaken each year by the Sub-Commission on the
Promotion and Protection of Human Rights.
69. Specialized instruments of universal application
are also elaborated and adopted by United Nations specialized agencies, such as the International Labour Organization (ILO) and the United Nations Educational, Scientific and Cultural Organization (UNESCO).
I.
G.
Trade unions;
66. Human rights standards are developed and codified in various international forums, through a process in
which representatives of State members of those forums
meet, usually repeatedly over a period of years, to work
77. In addition, the United Nations High Commissioner for Human Rights has established human rights
field presences with monitoring mandates in several
countries.
75. The second type of monitoring is extraconventional (or Charter-based) monitoring. It is based on procedures and mechanisms established by the Commission
on Human Rights or the Economic and Social Council,
including a confidential procedure (known as the 1503
procedure) for dealing with communications relating to
consistent patterns of gross violations of human rights and
special procedures which examine, monitor and publicly
report on human rights situations either in specific countries and territories (country mechanisms or mandates)
or concerning a specific human rights problem (thematic
mechanisms or mandates). They are entrusted to working groups composed of experts acting in their individual
capacity (such as the Working Group on Enforced or
Involuntary Disappearances and the Working Group on
Arbitrary Detention), to individuals designated as special
rapporteurs, representatives or independent experts (such
as the Special Rapporteur on the independence of judges
and lawyers, the Special Representative of the SecretaryGeneral on the situation of human rights in Cambodia,
and the independent expert on the situation of human
rights in Haiti) or directly to the Secretary-General (as
is the case for the question of human rights and mass
exoduses).
76. The third type of monitoring is through peacekeeping and human rights field operations. Recently, the
inclusion of human rights aspects in the mandates of
United Nations peacekeeping operations has increased
dramatically. The assignment of various human rights
functions to the international personnel involved in their
implementation, has included monitoring the human
rights situation and reporting on it. Extensive human
rights mandates were assigned to the United Nations
Observer Mission in El Salvador, the United Nations
Transitional Authority in Cambodia, the United Nations
Mission for the Verification of Human Rights in Guate13
and the former Yugoslavia, ad hoc tribunals were established by the United Nations Security Council to bring to
justice persons responsible for serious abuses in those
countries. Subsequently, as the decade and the millennium
drew to a close, the international community advanced the
cause of enforcement significantly, with the adoption, in
Rome on 17 July 1998, of the Statute of the International
Criminal Court, laying the foundation for a permanent
international tribunal to give effect to the half-centuryold affirmation of the Universal Declaration of Human
Rights that:
Enforcement
84. The United Nations receives thousands of complaints of human rights violations every year. A variety of
mechanisms have been established by the Organization to
handle such complaints, including:
Treaty-based procedures, which provide for the consideration of communications by treaty bodies
described above;
Extraconventional mechanisms, such as special rapporteurs and working groups of the Commission on
Human Rights, including through urgent appeals to
Governments;
The 1503 procedure (so named after the Economic
and Social Council resolution by which it was established), handles complaints confidentially, identifying patterns of gross violations of human rights.
Further information can be obtained from: The Office of the United Nations High Commissioner
for Human Rights, Palais des Nations, 1211 Geneva 10, Switzerland
14
ANNEX
The Universal Declaration of Human Rights
[Adopted and proclaimed by the General Assembly in its resolution 217 A (III) of 10 December 1948]
Preamble
Article 2
Whereas disregard and contempt for human rights have resulted in barbarous acts which have outraged the conscience of
mankind, and the advent of a world in which human beings shall
enjoy freedom of speech and belief and freedom from fear and
want has been proclaimed as the highest aspiration of the common people,
Article 3
Everyone has the right to life, liberty and security of person.
Article 4
Whereas the peoples of the United Nations have in the Charter reaffirmed their faith in fundamental human rights, in the
dignity and worth of the human person and in the equal rights of
men and women and have determined to promote social progress and better standards of life in larger freedom,
Article 5
No one shall be subjected to torture or to cruel, inhuman or
degrading treatment or punishment.
Article 6
Now, therefore,
Everyone has the right to recognition everywhere as a person
before the law.
Article 7
All are equal before the law and are entitled without any discrimination to equal protection of the law. All are entitled to
equal protection against any discrimination in violation of this
Declaration and against any incitement to such discrimination.
Article 1
Article 8
All human beings are born free and equal in dignity and
rights. They are endowed with reason and conscience and
should act towards one another in a spirit of brotherhood.
Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights
granted him by the constitution or by law.
15
Article 9
Article 17
Article 10
Everyone is entitled in full equality to a fair and public hearing by an independent and impartial tribunal, in the determination of his rights and obligations and of any criminal charge
against him.
Article 11
1. Everyone charged with a penal offence has the right to
be presumed innocent until proved guilty according to law in a
public trial at which he has had all the guarantees necessary for
his defence.
Article 19
Article 12
Article 13
1. Everyone has the right to take part in the government of
his country, directly or through freely chosen representatives.
Article 14
1. Everyone has the right to seek and to enjoy in other
countries asylum from persecution.
Article 22
Article 15
1.
Article 23
Article 16
2. Marriage shall be entered into only with the free and full
consent of the intending spouses.
16
Article 27
1. Everyone has the right freely to participate in the
cultural life of the community, to enjoy the arts and to share in
scientific advancement and its benefits.
Article 24
Everyone has the right to rest and leisure, including reasonable limitation of working hours and periodic holidays with pay.
Article 25
Article 28
Article 26
1. Everyone has the right to education. Education shall be
free, at least in the elementary and fundamental stages. Elementary education shall be compulsory. Technical and professional
education shall be made generally available and higher education shall be equally accessible to all on the basis of merit.
Article 30
Nothing in this Declaration may be interpreted as implying
for any State, group or person any right to engage in any activity
or to perform any act aimed at the destruction of any of the rights
and freedoms set forth herein.
17
COURSE OFFERINGS
TABLE OF CONTENTS
PHOENIX TRAINING CENTER
COURSE OFFERINGS
2013 2014
Advanced Debriefing and Elicitation Course.......................................................... 8
Advanced Elicitation Course.................................................................................. 9
Advanced Military Source Operations Course..................................................... 10
Advanced Operational Support Course................................................................ 11
Analyst Support to HUMINT Course..................................................................... 12
Analytical Support to Interrogation Course........................................................... 13
Asset Validation Course....................................................................................... 14
Asset Validation System Course.......................................................................... 15
Battlefield HUMINT Collection Course................................................................. 16
Competitive Assurance Seminar......................................................................... 17
CounterIED/Triage Course................................................................................... 18
Counterintelligence Awareness Seminar.............................................................. 19
Debriefing and Elicitation Course......................................................................... 20
Defense Strategic Debriefing Course Follow-On................................................. 21
Elicitation Seminar................................................................................................ 22
Elicitation/Counterelicitation Seminar................................................................... 23
Elicitation and Psychological Profiling Seminar.................................................... 24
Elicitation and Trade Shows Seminar................................................................... 25
Field Negotiations Course.................................................................................... 26
COURSE OFFERINGS
Number of Days: 10
Maximum Number of Participants: 20
Number of CEUs Awarded: 6.5
Clearance Required: S
DESCRIPTION:
This course is designed for personnel who have attended the Debriefing and
Elicitation Course or have experience in the HUMINT world and want to improve
on the basic skills. The AD&E includes a review of basic persuasive interpersonal
communication skills as well as defensive skills such as counter elicitation,
detecting deception and congruency and legend. This course also introduces
negotiation as a tool for HUMINT collection.
Number of Days: 5
Maximum Number of Participants: 20
Number of CEUs Awarded: 3
Clearance Required: No
DESCRIPTION:
Knowing how to effectively build rapport and transparently employ elicitation
techniques to gather critical information is invaluable to professionals in any
community. Advanced Elicitation will teach students to proficiently obtain the
information critical to making good decisions and solving problems. Students
will effectively determine which communication skills and elicitation techniques
to employ when engaging supervisors, peers, employees and clients. Students
will present effective, well-received consultation and advice, and advance in their
professions by correctly employing rapport building and elicitation techniques.
This seminar will build upon the basic elicitation techniques taught in the Elicitation:
Non-Intrusive Information Gathering and Elicitation & Counterelicitation. It is
designed to equip the student with techniques to quickly establish rapport with a
person you wish to engage. You will be able to select the appropriate elicitation
techniques to properly engage and disengage a person without his/her awareness.
The instruction will include advanced communication techniques and practical
exercises are used to maximize the learning experience.
Number of Days: 72
Maximum Number of Participants: 24
Number of CEUs Awarded: 43
Clearance Required: S
DESCRIPTION:
The Advanced Military Source Operations Course (AMSOC) is designed to
produce a qualified field collection officer with the basic knowledge and skills of
controlled human intelligence collection. Students will learn TTPs of controlled
HUMINT collection in both strategic and semi-permissive environments.
This course can be discussed in greater detail on-site once government security
clearance requirements have been met. Please contact Phoenix Training Center
at www.intellpros.com or 1-703-960-7700.
10
Number of Days: 5
Maximum Number of Participants: 12
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
This two week course is aimed at personnel involved in supporting sensitive
operations abroad.
This course can be discussed in greater detail on site once government security
clearance requirements have been met. Please contact Phoenix Training Center
at www.intellpros.com or (703) 960-7700.
11
Number of Days: 5
Maximum Number of Participants: 20
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
The Analyst Support to HUMINT course is tailored for purely analysts, purely
collectors, or a combination there-of, who leverage HUMINT information and
collection in support of Requirements Driven/Mission Oriented activities. The
course is designed to bridge the gap between all-source analysis and HUMINT
collection, aligning perspectives by providing students a common set of principles
and methodologies for use in their respective disciplines.
Through classroom instruction and hands-on practical exercises, students are
exposed to the mindsets that often keep them apart. And through practice of
established doctrine (F3EA, Target Centric Analysis, and creation of a common
Mission Mindset) students form a unity of effort that improves over all effectiveness
and interoperability.
12
Number of Days: 10
Maximum Number of Participants: 20
Number of CEUs Awarded: 6
Clearance Required: S
DESCRIPTION:
The Analytical Support to Interrogations training course is designed to present
intelligence professionals with both the information and hands-on experience
needed to effectively support DoD-directed intelligence interrogation operations.
The course has been specifically tailored to focus on introducing the all-source
analyst to not only the intelligence interrogation methodology as it is defined
by FM 2-22.3, but also enable all intelligence analysts to practice some of the
auxiliary skills which are inherent to all HUMINT collection activities. Additionally,
this course will provide attendees with multiple scenario-based practical
exercises that are run by a group of DoD-certified interrogators, allowing for
active participation in a simulated operational environment.
13
DESCRIPTION:
This course is aimed at developing an understanding of the asset validation system
in the U.S. Intelligence Community and the principles, strategies, and tools used in
the vetting of intelligence sources across all disciplines of HUMINT.
This course can be discussed in greater detail on-site once government security
clearance requirements have been met. Please contact Phoenix Training Center at
www.intellpros.com or (703) 960-7700.
14
Number of Days: 15
Maximum Number of Participants: 12
Number of CEUs Awarded: 10
Clearance Required: S
DESCRIPTION:
This three week course was designed for personnel involved in supporting
sensitive operations abroad.
This course can be discussed in greater detail on site once government security
clearance requirements have been met. Please contact Phoenix Training Center at
www.intellpros.com or (703) 960-7700.
15
Number of Days: 15
Maximum Number of Participants: 20
Number of CEUs Awarded: 10
Clearance Required: S
DESCRIPTION:
In the Battlefield HUMINT Collection Course (BHCC), students will learn to
maximize their efforts during HUMINT collection operations, while simultaneously
protecting themselves and members of their team. They learn to conduct and
support HUMINT collection operations ranging from tactical to strategic and from
deployment during pre-hostility phases to combat operations. Phoenix Course
Developers can help you assess your training needs and adapt the course of
instruction accordingly. A practical exercise follows each training module, with
succeeding modules building upon that foundation. The BHCC can be taught as
a 10-day or a 15-day course depending upon organizational requirements.
16
Number of Days: 2
Maximum Number of Participants: 20
Number of CEUs Awarded: 0.5
Clearance Required: No
DESCRIPTION:
Safeguarding proprietary information is perhaps one of the most fundamental
and fiduciary responsibilities that any business leader has in an information-rich
environment. As increasing numbers of companies turn to the use of valuation
models that emphasize intellectual capital over physical capital, the protection
of information takes on whole new meanings. Competitive Assurance involves
the isolation of those critical elements that are truly needful of protection and
developing the answers to the implied questions: what has to be protected and
for how long?
Companies that recognize that it takes more than standard security measures
to protect their assets have dramatically increased their reliance upon Phoenix
Training Centers Competitive Assurance professionals and practices since the
mid 1990s. Based on established principles of counterintelligence practiced in
governments around the world, the Competitive Assurance process has been
specially designed, developed and implemented for the peculiar protection needs
of businesses in an increasingly competitive environment.
17
Number of Days: 5
Maximum Number of Participants: 5
Number of CEUs Awarded: 3
Clearance Required: No
DESCRIPTION:
IEDs are the number one threat to deployed U.S. and coalition forces in overseas
contingency operational theaters. The goal of the CounterIED/Triage Course is
to minimize the overall impact of these weapons to deploying Soldiers, Sailors,
Marines, Airmen and DOD Civilians by increasing individual situational awareness
and by making the student proficient in the principles of Tactical Combat Casualty
Care (TCCC). The CounterIED phase of the course provides an overview of
the various improvised explosive weapons, highlighting their basic components,
multiple means of employment and potential indicators of an attack. The Medical
Triage phase of the course includes dealing with; 1) Care under fire 2) Tactical field
care and 3) Casevac Care. The CounterIED/Triage Course consists of two days
of counterIED training and two days of medical training. The course culminates in
a one day field training exercise that covers both counterIED measures and the
requisite combat lifesaving medical procedures.
18
Number of Days: 1
Maximum Number of Participants: 20
Number of CEUs Awarded: 0.5
Clearance Required: S
DESCRIPTION:
In todays environment, the complete Intelligence organization provides not only
information collection and analysis but also a protection function. The business
intelligence professional is increasingly called upon to provide a realistic and
effective means of protecting information - particularly in those enterprises
in which the security function is unaccustomed to dealing with competitive
intelligence, industrial espionage and economic espionage threats to the
companys sensitive and proprietary information. You must ensure that your
firms countermeasures and security program are consistent with the level and
type of attacks against your sensitive information without compromising corporate
culture issues.
Provided in a highly interactive, one day format, this seminar provides
identification of the nature and types of threats to your proprietary information.
Consideration also includes legal and ethical issues, to include application,
relevance and limitation of the Economic Espionage Act of 1996. Students will
learn assessment of the approaches, competencies and skills of rival collection
activities as well as active assessment of a firms vulnerability rival collection
methods and approaches. The integration of counterintelligence awareness
activities with corporate counterintelligence activities will be taught to ensure
uniform and coherent coverage. A combination of lecture and scenario-driven
team exercises will be drawn from actual situations designed to test the
understanding of the methodologies.
19
Number of Days: 5
Maximum Number of Participants: 20
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
This course trains student in the basic techniques of information/intelligence
collection. Students are taught persuasive communication skills such as elicitation
in addition to direct questioning. Through a hands on approach, students plan
and conduct debriefings and tactical screenings as well as develop proper, topical
questioning plans.
Throughout the course, students are provided with direct methods and examples
of how the techniques trained are integrated into tactical and operational
environments, greatly enhancing the collectors effectiveness.
20
Number of Days: 20
Maximum Number of Participants: 20
Number of CEUs Awarded: 13
Clearance Required: S
DESCRIPTION:
The Defense Strategic Debriefing Course (DSDC) Follow-On course provides
practical work and instruction in skill sets that complement those learned in the
DSDC, and augments specific skills not covered in the DSDC. The course serves
as a Phase II of DSDC to enhance the preparation for strategic debriefers
selected for assignments in DoD intelligence components. The performance
environment consists of demonstrations and practical exercises, including
role-player exercises between students and instructors against developed
requirements essential for overt HUMINT collection operations. DSDC-FO affords
the students opportunities to demonstrate their understanding of multiple aspects
of intelligence activities including surveillance detection, elicitation/counterelicitation, overt source assessment and intelligence funding.
Phoenix development personnel will meet with you to discuss course
topics, teaching and training methodologies and to adapt the course to your
organizations specific needs.
21
ELICITATION SEMINAR
Number of Days: 1
Maximum Number of Participants: 20
Number of CEUs Awarded: 0.5
Clearance Required: No
DESCRIPTION:
This seminar consists of lectures and practical exercises where students
learn elicitation techniques to obtain sensitive information from people without
them being aware that they are providing it. Instruction includes video-based
demonstrations, practical exercises and takeaway material to include an
authoritative text on elicitation techniques. Students who successfully complete
the seminar will be able to employ elicitation techniques in virtually any personal
or professional context.
22
ELICITATION/COUNTERELICITATION SEMINAR
Number of Days: 2
Maximum Number of Participants: 20
Number of CEUs Awarded: 1.3
Clearance Required: No
DESCRIPTION:
Elicitation and Counterelicitation will provide the skills needed to obtain
information from diverse sources and the skills to protect your personal
or organizations information. Students will enhance their ability to get the
information they need in any kind of professional setting or situation, recognize
which tools and techniques work best with which sources of information and
master several proven techniques that have been used by information collectors
as well as how to recognize when these techniques are being used against them.
Attendees will learn elicitation approaches as well as how to match the right
tools and techniques to the individual being dealt with, tailor the techniques,
recognize when they are being used against them and how to deflect them.
Using a combination of highly effective video-based demonstrations, challenging
small group in-class exercises and take away materials, students will be able to
immediately employ the tools and skills learned in virtually any professional or
personal setting.
23
Number of Days: 1
Maximum Number of Participants: 20
Number of CEUs Awarded: 0.5
Clearance Required: No
DESCRIPTION:
Elicitation and Psychological Profiling will provide an introduction into information
gathering techniques which consist of questioning, interviewing and elicitation.
This will be followed by intelligence applications of elicitation, characteristics of
elicitation, susceptibility to elicitation and begin introductions and demonstrations
into the elicitation techniques. Students will learn to understand their own
personality type through the use of the Myers-Brigg Type Indicator (MBTI) in order
to improve communications and approaches to internal and external sources and
gain a better understanding of the primary sources of information with whom you
deal in order to maximize collection of information.
This seminar maximizes the learning experience through the use of challenging
exercises supported by classroom instruction and extensive video demonstrations
of the techniques. The combination of formal presentation, video and classroom
demonstration, off-site exercises and reporting on the results of those exercises will
be used to enhance the outcome of the seminar.
24
Number of Days: 2
Maximum Number of Participants: 15
Number of CEUs Awarded: 1.3
Clearance Required: No
DESCRIPTION:
This seminar will introduce information gathering techniques involving
questioning, interviewing and elicitation. This will be followed by intelligence
applications of elicitation, characteristics of elicitation, susceptibility to elicitation,
and begin introductions and demonstrations into the elicitation techniques.
Students will then select a conference to attend by discipline, focus and industry.
They will develop the key elements to conference presentation, complete on-site
activities and interact in a post conference assessment to evaluate their
performance and plan for future conferences.
This interactive seminar maximizes the learning experience through the use of
challenging exercises supported by classroom instruction and extensive video
demonstrations of elicitation techniques. There will be a video-based self test
as well as pre-conference organizing activities, on-site activities and interim
lessons learned.
25
Number of Days: 5
Maximum Number of Participants: 20
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
Negotiation can be utilized by any individual but those who have been trained in
the effective and efficient methods are often able to accomplish their goals while
maintaining rapport with the source. Field Negotiations provides students with
techniques to negotiate within and without their military unit. In 40 cumulative hours
students learn methods of rapport building, non-verbal communication, elicitation
and counterelicitation. They will be taught negotiation techniques and then given
an opportunity to test their abilities through multiple practical exercises. The course
includes time for students to utilize Phoenixs Electronic Language Simulation
device to fully understand the challenges posed in using a translator.
26
Number of Days: 10
Maximum Number of Participants: 12
Number of CEUs Awarded: 6.5
Clearance Required: S
DESCRIPTION:
This two week course is aimed at personnel involved in supporting sensitive
operations abroad.
This course can be discussed in greater detail on site once government security
clearance requirements have been met. Please contact Phoenix Training Center
at www.intellpros.com or (703) 960-7700.
27
Number of Days: 20
Maximum Number of Participants: 20
Number of CEUs Awarded: 13
Clearance Required: S
DESCRIPTION:
For those who are just beginning in the HUMINT world or those who need
an overview of operations prior to an assigned task, the HUMINT Operations
Familiarization Course (HOFC) provides a concise synopsis of multiple aspects
of HUMINT.
HOFC provides the student familiarization in the conceptual, doctrinal, legal
and technical aspects of conducting operations within various sub-disciplines of
human intelligence. Students learn the fundamentals of intelligence operations
and are introduced to the application of these basics to human intelligence
operations. The performance environment consists of demonstrations and practical
exercises, including role-player exercises between students and instructors against
developed requirements essential for HUMINT collection operations. HOFC offers
opportunities for the students to demonstrate understanding in multiple human
intelligence activities; e.g. collection, targeting, surveillance/surveillance detection,
controlled human intelligence operations, terrorism/counterterrorism, elicitation,
counterintelligence, interrogation and debriefing.
28
Number of Days: 15
Maximum Number of Participants: 20
Number of CEUs Awarded: 10
Clearance Required: S
DESCRIPTION:
Formerly Maritime Interdictions Operations Course
This course is designed to provide all services with training for individuals who will
by the nature of their mission or position be involved with information collection at
the tactical level. It incorporates lessons learned from current and past operations.
The course is exercise heavy and provides a very solid base for units to conduct
tactical collection. The exercises are conducted focusing on the units standard
operating procedures.
The course provides students with the necessary skills to operate effectively as a
member of HUMINT or TSE team. Working in teams students will plan and conduct
debriefings and basic personnel and site searches.
29
Number of Days: 5
Maximum Number of Participants: 15
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
Certified interrogators provide an essential skill to HUMINT Operations. The
global security environment is ever-changing and certified interrogators must
incorporate newly advanced techniques with those they already know and
apply. The Interrogation refresher course is a review of the fundamentals of
interrogation and a chance for students to revise and improve their style and
technique. Classroom instruction is followed by video-taped practical exercises
that allow instant feedback and self-evaluation. The class provides for students
to test their mental agility and interrogation skills to cope with uncooperative
sources played by experienced role players and trained interrogators.
The Interrogation Refresher course is highly recommended for interrogators
about to deploy or those who have not utilized their skills for an extended period
of time. Class is limited to Certified Interrogators only.
30
Number of Days: 50
Maximum Number of Participants: 15
Number of CEUs Awarded: 33
Clearance Required: S
DESCRIPTION:
Trained interrogators are essential to the successful operation of intelligence
gathering. As the only DIA-certified interrogation course, I-10 is a comprehensive
detail-oriented course that takes students from the principles to the practical.
Instructors focus on teaching students applicable interrogation techniques and
procedures while adhering to current doctrine, FM2-22.3, Geneva Convention and
Law of Land Warfare.
The I-10 course teaches the fundamentals of human behavior and communication
as applied to interrogation in the contemporary HUMINT operating environment.
Experienced instructors/mentors work with students individually to hone their
interrogation styles and techniques. Training includes three weeks of practical
exercises culminating in a challenging final exercise.
All skill sets are reinforced with practical exercises, interrogations and mentoring.
Upon completion of the course, each student will have conducted over thirty full
interrogations to include a five-day FTX and seven graded interrogations with
certified, experienced interrogators as role players.
31
Number of Days: 5
Maximum Number of Participants: 24
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
This intensive course enhances the capabilities of communicators engaged in
cross-cultural communications, interpreter-assisted meetings, and negotiations in
permissive, semi-permissive, and hostile environments. The training will consist
of at least 50% practical exercises in realistic conditions and can be tailored for
specific areas. Practical application, role-playing and scenario-driven exercises
provide students the opportunity to practice the skills taught in the classroom.
This course also includes time for students to utilize Phoenixs Electronic
Language Simulation device to fully understand the challenges posed by the use
of a translator.
32
Number of Days: 10
Maximum Number of Participants: 20
Number of CEUs Awarded: 6
Clearance Required: S
DESCRIPTION:
The National Security Advanced Training Course (NSAT) has been developed as
a comprehensive program of instruction for the Department of Homeland Security.
By integrating the previous training and experience of Special Agents into the
operational skill sets of DoD Human Intelligence Collectors, this course has been
designed to provide for optimal functionality within a Joint Terrorism Task Force
(JTTF) environment.
From a law enforcement perspective, participants will in fact become actively
familiarized with the full spectrum of Human Intelligence Operations, intended
specifically to enhance the investigation and prosecution of terrorist-related threats
to our national security. Throughout this training, NSAT focuses on the essential
considerations and methodological studies of Human Behavioral Profiling,
Intelligence Debriefing/Analysis, Custodial Interviewing, Source Management and
Surveillance, looking to add layers of proficiency upon existing skills that relate to
mission-critical aspects of Counterterrorism Operations. Additionally, because this
training is being presented at the professional level, attendees will discover via
practical exercise how to successfully recruit, control, and exploit human sources
of information, gaining both a tactical and strategic advantage over any would-be
adversary or criminal suspect. This all-inclusive introduction will equip participants
with a new perspective on interactive communication techniques, all of which will
contribute to establishing a longer term interoperability within the Joint Intelligence
and Law Enforcement Communities.
33
DESCRIPTION:
Many individuals have a working knowledge of basic first aid. However, this is not
sufficient as we face the medical challenges of todays combat zones, prepare for
situations resulting from terrorist related activities in non-combat environments
or travel where personal emergency medical care may be superior to what is
locally available.
The Personal Emergency Medical Care Seminar provides medical treatment
beyond basic first aid. Students receive one day of hands-on training from
medics with experience in combat zones and other hostile environments. The
instructor to student ratio is low (1:5) to create an optimum learning environment.
The simulated medical emergencies on the second day of training teaches
students to render life-saving emergency medical treatment in a variety of
hostile environments.
This seminar is also available as a five day CounterIED Course with two days of
medical training and two days of CounterIED training. The training will culminate
with a one day field training exercise where students are immersed into a
simulated tactical environment that will utilize all practical applications learned to
include both counterIED measures and medical applications.
34
Number of Days: 1
Maximum Number of Participants: 20
Number of CEUs Awarded: 0.5
Clearance Required: No
DESCRIPTION:
People expose information about themselves from head to toe, but many
intelligence operatives cannot read the signs. An intelligence professional who
understands an assets needs and thought processes gains a decisive edge.
Profiling a sources personality provides such an edge.
Phoenix Training Center has expanded the applications of the Myers-Briggs
Type Indicator (MBTI) to enhance the capabilities of Intelligence professionals
beyond traditional organizational effectiveness applications. This highly effective
and predictive instrument can be used to understand personality type in order to
improve communications and approaches to internal and external clients while
gaining a better understanding of the primary sources of information in order to
maximize the collection of information. Each student will be able to employ the
MBTI as an operational framework for the collection of personality and
predictive information.
35
Number of Days: 5
Maximum Number of Participants: 20
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
The Source Management Course is designed for personnel who find themselves
responsible for managing HUMINT collection assets. This course will acquaint
students with collection management procedures, tactics, techniques and
procedures associated with HUMINT Operations at the strategic, operational
and tactical levels. This course identifies the specific roles, responsibilities
and tasks required to manage HUMINT Operations. Students identify areas of
collection and analyze the threat beyond a commanders requirement. Students
will perform a practical exercise to demonstrate their understanding of the
management process.
36
Number of Days: 15
Maximum Number of Participants: 20
Number of CEUs Awarded: 10
Clearance Required: S
DESCRIPTION:
The Special Debriefing Course is a highly intensive, interactive course of instruction
for strategic debriefers. Students will be trained in legal considerations, including
Geneva Conventions, and the benefits of understanding and using the Myers
Brigg Type Indicator (MBTI), as well as personality assessment tools, effective
communication skills, rapport building skills, cross-cultural communications, basic
and symmetric questioning techniques, and report writing skills.
Strategic debriefers will learn to perform their mission through a combination
of platform instruction, role-playing and practical exercises (PEs). Additionally,
students will learn to write a variety of reports such as source data reports,
intelligence information reports (IIRs), contact memoranda, and knowledgeability
briefs, assessments and reports. They will receive critical after action review on
each learning objective to ensure complete comprehension of each topic.
37
Number of Days: 5
Maximum Number of Participants: 20
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
This course provides the ground work for individuals to participate in the
debriefing of witting law enforcement and DoD HUMINT Sources. Students learn
to conduct intelligence gathering DoD style debriefings. The course provides
additional training in skills that will enhance the law enforcement officers
effectiveness in questioning, intelligence collection, and conducting investigations.
Strategic Debriefing of Law Enforcement Sources (SDLES) recognizes that DoD
and law enforcement officers are operating in nontraditional capacities. This
course will not only provide instruction in debriefing operations but will include
practical exercises. These practical exercises will require the students to conduct
intelligence debriefings as the debriefer or subject matter expert or both. They
will employ proper questioning, elicitation, rapport building and related
interpersonal skills.
38
Number of Days: 10
Maximum Number of Participants: 6
Number of CEUs Awarded: 6.5
Clearance Required: No
DESCRIPTION:
Of the many challenges facing U.S. intelligence officers, the ability to detect foreign
intelligence surveillance is a critical skill requiring as much practical hands-on
experience as traditional platform training. While the concepts of detecting foreign
surveillance are relatively easy to teach, the ability to detect surveillance is more
difficult and demands not only practice, but also a certain degree of confidence and
self-assurance that can only come from practice, failure and success, and clear,
honest critiques from experienced instructors.
The Surveillance Detection course combines classroom instruction with handson practical exercises. The course is based on a progressive learning curve
with students receiving valuable classroom instruction on the basics of detecting
surveillance before being led to conduct street runs. Each student will conduct
multiple street runs with both pre-designated and original street routes. Students
will also apply their new abilities to aid them in creating a Travel Security Plan.
The small instructor to student ratio allows each student ample time to seek
information and receive feedback from advanced instructors specializing in
surveillance detection.
39
SURVEILLANCE/COUNTERSURVEILLANCE COURSE
Number of Days: 15
Maximum Number of Participants: 12
Number of CEUs Awarded: 10
Clearance Required: S
DESCRIPTION:
Foreign governments and entities frequently surveil intelligence professionals,
government employees, businessmen and diplomats. These professionals
cannot afford to become an unknowing target, their every move maybe watched,
noted and reported for reasons that may range from intelligence collection to
threats to themselves or national security.
This 3-week course teaches students basic surveillance and countersurveillance
operations where students learn to identify surveillance detection techniques by
recognizing and executing mobile and static surveillance tactics and countersurveillance tactics. Intelligence professionals also learn to conduct area
familiarization for surveillance-related operations. Practical exercises are
central to the course, allowing the students to practice the skills they learned in
the classroom.
40
Number of Days: 10
Maximum Number of Participants: 20
Number of CEUs Awarded: 6.5
Clearance Required: S
DESCRIPTION:
In order for HUMINT personnel to enhance their ability to perform tactical
debriefings they must be familiar with current interrogation techniques, screening
operations, and how to collect time-sensitive intelligence from non-cooperative
sources. The Tactical Debriefing course delivers all of these skills. During this
course the instruction of debriefing techniques within the confines of the Geneva
Conventions and FM 2-22.3 will enhance the students ability to collect intelligence
from sources within tactical and operational environments. The attendees will
enhance their collection skills, gain the ability to maximize cooperation from
sources, learn proven techniques and how to apply them with specific sources
and gain knowledge on how to organize and refine their information collection and
reporting approach.
Traditional platform training as well as practical exercise are used as instruction
tools during this course to reinforce the students learning ability. Each student is
trained and mentored to collect human intelligence from sources captured at the
tactical objective. Students are familiarized with current interrogation techniques,
full screening operations and hostile debriefing capabilities. An exercise scenario
used throughout the course culminates in a major screening and debriefing
exercising in which students learn to collect time-sensitive intelligence from
non-cooperative sources.
41
Number of Days: 4
Maximum Number of Participants: 15
Number of CEUs Awarded: 2.5
Clearance Required: S
DESCRIPTION:
This course accentuates the statement Every soldier is a collector. While
focusing on direct questioning and basic screening tactics, TQ Screening
provides a basic level understanding of the benefits of immediate tactical
information collection. This course is designed for personnel with limited or no
HUMINT collection experience. In addition to TQ and Screening, the students
will learn the fine line of where TQ ends and interrogation begins. They will
understand the current laws, rules, regulations and conventions governing
tactical questioning and collection. This course will enhance the commanders
ability to identify immediate threats and will provide a timely and accurate picture
of the current situation.
42
Number of Days: 5
Maximum Number of Participants: 10
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
Tactical Questioning and Tactical Site Exploitation (TQ/TSE) are combined into
an intensive course allowing students the opportunity to use both skill sets to
enhance their productivity in a tactical environment. Through tactical questioning
training, students will gain knowledge on effective questioning through enhanced
information collection. They will learn techniques on how to question and how to
apply their questions to the information they are collecting. Through tactical site
exploitation the students will use appropriate tactical debriefing skills to quickly
screen personnel for further exploitation as well as sensitive site exploitation
methods, techniques and tools to quickly identify material on personnel.
Lastly they will learn how to combine these skill sets to strengthen their overall
intelligence collection in the tactical environment.
This course will address the needs of each student through challenging practical
exercises that support classroom instruction. TQ/TSE offers an excellent
pre-deployment train-up in support of tactical and operational intelligence
requirements. This course is taught by subject matter experts with vast
experience in Human Intelligence, Intelligence Collection and Analysis and
Special Operations.
43
Number of Days: 3
Maximum Number of Participants: 10
Number of CEUs Awarded: 2
Clearance Required: S
DESCRIPTION:
The Tactical Site Exploitation Course is relevant to organizations seeking greater
fidelity, thoroughness and standardization in collecting and exploiting physical
and human information on a combat objective. In addition to learning objectiveoriented questioning skills, students discover how to maximize Time on Target
during the Tactical Debriefing of both suspected individuals and non-combatants.
Students will learn the basic techniques required to thoroughly exploit the
tactical environment.
This course consists of challenging practical exercises to maximize support from
classroom instruction. The first day teaches tactical questioning. The second
day teachers site exploitation, and the third day consists of practical exercises
designed to challenge the students to maximize time on target, collect, identify
and evaluate the material collected on site.
44
TRAVELERS COURSE
Number of Days: 5
Maximum Number of Participants: 15
Number of CEUs Awarded: 3
Clearance Required: S
DESCRIPTION:
The Travelers course makes students aware of the various security rules,
regulations and requirements of foreign travel in todays highly charged security
environment. Students are provided with training in specialized techniques when
dealing with foreign officials to ensure successful travel with minimal interruptions.
The attendees will learn to utilize short-term rapport building skills as well as verbal
and non-verbal techniques.
The course utilizes practical exercises and various scenarios to replicate most
common overseas travel-related difficulties and troublesome situations, and offers
the solutions to overcome them. The tools and techniques students will learn
maximize their security and safety awareness while minimizing their profile during
foreign travel.
45
CONTACT INFORMATION
For information on any of our courses please contact
Tiffany Wilson, Project Control Lead at 703-960-7700.
Fact Sheet
Positive psychology
What this fact sheet covers:
What is positive psychology?
Practical strategies to increase your psychological wellbeing
Where to get more information
What is positive psychology?
Traditionally in psychology, the focus has been on identifying and treating mental health
problems such as depression. This is critically important for those facing mental illness
however, it provides an incomplete picture of mental health.
Positive psychology is a relatively new branch of psychology that shifts the focus from
what is clinically wrong, to the promotion of wellbeing and the creation of a satisfying life
filled with meaning, pleasure, engagement, positive relationships and accomplishment.
Gable and Haidt (2005) defined positive psychology as the study of the conditions and
processes that contribute to the ourishing or optimal functioning of people, groups, and
institutions .
Positive psychology is not about putting on a happy face all the time. Life can be hard and
disappointments and challenges are inevitable. However, scientific research has shown
that there are some strategies and skills that allow people to navigate the challenges of
life more effectively and enjoy life despite the upsets.
Practical strategies to increase your psychological wellbeing
1.
Enhancing pleasure
Sharing with others - Seek out others to share the experience and tell others how
much you value the moment. This is the single strongest predictor of the level of
pleasure
Self-congratulation - Dont be afraid of pride; tell yourself how great you are and
remember how long you have waited for this to happen
Sharpening perception - Focus on certain elements and block out others, like
closing your eyes and listening to the music
Absorption - Allow yourself to become totally immersed and try not to think, just
sense
This document may be freely downloaded and distributed on condition no change is made to the content.
The information in this document is not intended as a substitute for professional medical advice, diagnosis
or treatment. Not to be used for commercial purposes and not to be hosted electronically outside of the
1
Black Dog Institute website. Updated October 2012.
Fact Sheet
Positive psychology
Avoid forming habits: Rapidly repeated indulgence in the same pleasure does not
work. Neurons are wired to respond to novel events, and not to fire if the events do not
provide new information. Seek out a variety of experiences and spread out pleasurable
events over time. Surprise yourself or others with small presents of pleasure.
2. Engagement
Mindfulness: Mindlessness pervades much of human activity. We act and interact
automatically, without much thinking. Mindful attention to the present moment can be
developed through meditation and mindfulness based therapies. Through mindfulness
we can focus our perspective and sharpen our experience of the present moment.
Nurture relationships: Your income level has a surprisingly small effect on your
psychological well-being. The most fundamental finding from positive psychology is that
strong personal relationships have the greatest impact on your satisfaction with life. Make
sure that you invest time and energy in your friends and family.
Identify and use your strengths: Think about your personal strengths and how you
might use them in your everyday life. Are you a leader, playful, fair, curious or original? Do
you have a good sense of perspective? Do you love learning? Are you genuine? Are you
good at teamwork? If you have internet access you can take an online test on Martin
Seligmans website (www.authentichappiness.org) to explore your personal strengths.
Cultivate and use your strengths at work, in family life and in your leisure time.
Seek out flow experiences: Through his research, Mihaly Csikszentmihalyi sought to
understand how people felt when they most enjoyed themselves and why. He
developed the concept of flow which describes a state of joy, creativity and total
involvement. Problems seem to disappear and there is a feeling of transcendence. Flow
is the way people describe their state of mind when they are doing something for its own
sake. Some activities consistently produced flow such as sport, games, art and hobbies.
Csikszentmihalyi has identified the key ingredients to creating these optimal experiences:
The task is challenging and requires skill
We concentrate
There are clear goals
We get immediate feedback
We have deep, effortless involvement
There is a sense of control
Our sense of self vanishes
Time stops
This document may be freely downloaded and distributed on condition no change is made to the content.
The information in this document is not intended as a substitute for professional medical advice, diagnosis
or treatment. Not to be used for commercial purposes and not to be hosted electronically outside of the
2
Black Dog Institute website. Updated October 2012.
Fact Sheet
Positive psychology
Csikszentmihalyi says work and family life can provide important opportunities for flow.
When people were in flow, either at work or in leisure, they reported a much more
positive experience. When challenges and skills were both high, people felt happier, more
cheerful, stronger and more active. They concentrated more, felt more creative and
satisfied.
3.
Finding meaning
Keep a gratitude diary: Take the time each day to write down three things that went
well and why. This causes psychological well-being levels to increase in a lasting way.
Thank a mentor: Write a letter of thanks to someone to whom you owe a debt of
gratitude such as a teacher or grandparent. Then visit the person and read the letter to
them. People who do this are measurably happier for more than a month.
Learn to forgive: Let go of anger and resentment by writing a letter of forgiveness to a
person who has wronged you. Inability to forgive is associated with persistent rumination.
Weigh up your life: Take time out occasionally to consider how you are going in the
major facets of your life such as family, work, finances, health and play. Reflect on the
progress you are making in working towards your major life goals. Make changes in your
life to match your priorities.
Perform small acts of kindness: Performing five kind acts a week, especially all in
one day, creates a measurable boost to levels of psychological well-being. Giving not only
makes you feel good about yourself, it enhances your connection with others and can
bring you positive feedback from others.
These and other strategies are detailed in Martin Seligmans book Authentic Happiness:
Using the New Positive Psychology to Realize Your Potential for Lasting Fulfillment.
Where to get more information:
Positive Psychology
Lyubomirsky, S (2008). The How of Happiness: A Scientific Approach to
Getting the Life You Want. Penguin Putnam
Seligman, M E P (2011). Flourish: A New Understanding of Happiness and
Wellbeing. Nicholas Brealey Publishing
Flow
Csikzentmihalyi M (1991). Flow: The Psychology of Optimal Experience.
Harper Perennial
This document may be freely downloaded and distributed on condition no change is made to the content.
The information in this document is not intended as a substitute for professional medical advice, diagnosis
or treatment. Not to be used for commercial purposes and not to be hosted electronically outside of the
3
Black Dog Institute website. Updated October 2012.
Positive psychology
Fact Sheet
Altruism
Post S, Neimark J (2007). Why Good Things Happen to Good People. Broadway
Gratitude
Emmons R (2007). Thanks!: How the New Science of Gratitude Can Make
You Happier. Houghton Mifflin
Positive Psychology Academic resources
Bryant F B, Veroff J (2006). Savoring: A New Model of Positive Experience.
Lawrence Erlbaum Associates
Gable S L, Haidt J (2005). What (and Why) Is Positive Psychology. Review of
General Psychology, Vol. 9: 103-110
Kahneman D, Diener E, Schwarz (eds) (2003). Well-Being: The Foundations of
Hedonic Psychology. Russell Sage Foundation Publications
Keyes C L M, Haidt J (eds) (2003). Flourishing: Positive Psychology and the
Life Well-Lived. American Psychological Association
Petersen C (2004) Character Strengths and Virtues: A Handbook and
Classification. Oxford University Press
Petersen C (2006). A Primer in Positive Psychology. Oxford University Press
Snyder C R (2005) Handbook of Positive Psychology. Oxford University Press
The Journal of Positive Psychology. Published by Routledge
Useful Websites
Centre for Confidence and Well-being, Scotland www.centreforconfidence.
co.uk
Positive Psychology Institute, Sydney www.positivepsychologyinstitute.com.au
The Positivity Institute - www.thepositivityinstitute.com.au
The University of Pennsylvania, Positive Psychology Centre www.ppc.sas.upenn.
edu
Time Magazine article: The New Science of Happiness. Jan 2005 www.time.com/
time/2005/happiness
Six Part BBC Series: The Science of Happiness. April 2006 http://news.bbc.co.uk/2/
hi/programmes/happiness_formula
Black Dog Institute
Hospital Road, Prince of Wales Hospital, Randwick NSW 2031
(02) 9382 4530 Email: blackdog@blackdog.org.au
www.blackdoginstitute.org.au
This document may be freely downloaded and distributed on condition no change is made to the content.
The information in this document is not intended as a substitute for professional medical advice, diagnosis
or treatment. Not to be used for commercial purposes and not to be hosted electronically outside of the
4
Black Dog Institute website. Updated October 2012.
A trend reported during the first half of 2012 is the increase of targeted
attacks. These attacks need time (in some cases a few years) to be detected
and are rather hard to avoid.
Spearphishing and social engineering techniques are on the rise.
Spearphishing is increasing, mainly due to the increased use of social
networking for private and business purposes.
Agenda
Social engineering attack methodology
Dissecting a social engineer
Dissecting social engineering attacks
Demonstration of some tools of the trade
Prevention and mitigation advice
Information
Gathering
Reconnaissance
Breach
Public records
Reach sensitive areas of the building, server room, mail room etc.
Phish credentials or perform client exploits
Client Side
Attacks
Physical
Intrusions
Telephone
Attacks
Calls into organisation under relevant pretext, i.e. impersonate staff member
calling IT helpdesk for password reset or setup a site visit.
Off-site wingman, providing off-site standby cover should the need arise. i.e. to
provide confirmation of the legitimacy of a pretext
Attack Plan
Steal user credentials
Launch a phishing attack against Outlook Web Access
Use compromised accounts to allow for physical breach
Ensure security policies and procedures include cover for social engineering
vectors
Implement & enforce clear desk policies
Implement & enforce visible staff ID badges (to be removed outwith buildings)
Report detected social engineering attempts to security officer
Report mistakes or suspected mistakes to security officer
Regularly audit policies and procedures
Regularly assess your controls
Assess Staff
Assess staff through simulated social engineering attacks on a regular basis
UK Offices
Australian Offices
San Francisco
Sydney
Cheltenham
Atlanta
Edinburgh
New York
Leatherhead
Seattle
London
Thame
European Offices
Amsterdam - Netherlands
Munich Germany
Zurich - Switzerland
Delivery. Both components are essential for creating an interesting lecture. If the beginning of a lecture captures your at-
students need access to it. In fact, one of the most effective learning strategies students can employ is to read
and then re-read their text assignment.
One counterproductive lecture activity is to read the text
Elements of Delivery
Resources on Lecturing
tors inform the students, through the lecture, what material they should have read in the text. Generally, it is not
a good idea to lecture from the text.
Page 62
of the information.
Many instructors find PowerPoint useful in enhancing lectures and emphasizing key point to their students. However,
misuse and overuse of this software can lead to a room full
of bored looks and glassy stares. To avoid death by PowerPoint, consider the following tips.
PowerPoint is a visual medium. Use graphics, pictures,
models, and other images instead of bullets to make your
point whenever possible.
In PowerPoint, less can be more. Think big, bold, and
Page 63
for no more than seven lines per slide and ruthlessly edit
course website.
Active Lectures
are discussing.
Think contrast when selecting colors for the background
passive listeners.
Lectures Combined with Class Discussion
general rule.
Page 64
Example
How many of you agree with _____ s position on
(topic)? When students raise their hands, choose
one and ask why he or she agrees with that position.
Or, ask the other students why they disagree. Another strategy is to divide the class in half ask one
half to take a pro position with regard to the topic,
the other, a con position. Ask how the topic could be
viewed differently from each viewpoint.
Page 65
Example
Todays lecture is about the rules for establishing
Example
If a persons name is found in a relational database
more than once, can it still be normalized?
for the lower end of this, and you are more likely to be
Example
I am going to talk about five types of data: text,
integer, floating point, images, and date/time. Can
someone give me an example of text data?
Page 66
Listening Skills
ity to grab their attention and maintain it. Your job is easier
material.
Page 67
Learners As Lecturers
Example
you, yet they have misinterpreted what you said. One way
method moves you away from the straight lecture and into a
lecture/discussion presentation.
English perfectly.
The first words out of our mouths form a first impression that
influences communication. Many students will accommodate
to dialects, and sometimes to less than perfect English, but
it can be a barrier that hinders learning. In these cases, it is a
good idea to use other teaching techniques frequently and to
rely on lecture as little as possible. Or, get help in becoming a
better speaker.
To reduce concerns related to language, speak slower
when lecturing so students can adjust to a different
accent and dialect. Consider writing unfamiliar words
on the chalkboard or displaying on PowerPoint so that
students do not have to struggle with terms.
Acknowledge that you may pronounce words differently
and ask students for their pronunciation.
Avoid misunderstandings by rephrasing a students
question such as I understand you are asking about.
Page 68
Resource
At FSU, students and faculty can get help from the
Center for Intensive English Studies.
Page 69
Elements of Delivery
How you say something is equally as important as what you say. The three major components of delivery are: vocal elements,
body language and gestures, and in instructional situations, visuals (or artifacts).
Vocal
The basic concept is that you are communicating with each individual in the audience. You have
to speak loudly enough to be heard, clearly enough to be understood, and with enough enthusiasm to maintain attention.
Intonation
Intonation is the range of your voice. Some speakers are monotone, which tends to be boring.
On the other hand, some speakers are too histrionic, which tends to become tiresome, e.g., a Bob
Barker voice. A natural speaking voice with a good range of inflection works best.
Loudness
Too soft and the audience cannot hear you. Too loud and they will not want to. Of the two, too
loud is preferable, but somewhere in the middle is just right.
Rate
Speaking too fast does not give students time to digest what is being said. Too slow puts them to
sleep. Research has shown that students attribute more intelligence to someone who talks at a
more rapid pace; yet, it does not say how much they learn.
Stress
Stress and inflection are related to intonation but they are not the same. Stress is how you emphasize an important point or issue, which can be applied by slowing speech, stopping, spelling
a word out, repeating a phrase. Use stress to highlight important detail, but used too much, it
becomes tiresome.
Pauses
Pauses are used both to stress a point and to allow students time to think and catch up. A pause
can be used to gain attention, for transition to a new event, to give students time to catch up with
an illustration, or to take notes.
Example - You might say, Copy down what is on the board, or Look at Figure 2 on your handout, and then pause so that they can focus their attention on it.
Page 70
Body
Gestures
Two extremes of gesturing are: none and wild. Gestures and movement convey a sense of comfort
with the material. They can be used along with vocal variation to stress the importance of something, or simply to point out an important part of a visual.
Movement
Two extremes of movement are: clutching the podium and pacing the room. Both are distracting
to the communication process. Movement should be a natural flow, from the podium to the board
to the audience. Another consideration is your position in the room. Changing location causes the
students to refocus their attention, and can keep students alert.
Visuals
Chalkboard
Two extremes of chalkboard use are: Too much time spent writing information on the board,
which could have been provided in a handout; and no use of the board, when it would have been
helpful to the learners.
Graphics
The biggest problems with graphics are that they are usually too small to read and contain too
Complexity
Graphics Use
Discuss the graphic in your lecture. A graphic that is not referenced during the lecture is not much
help. The graphic is an elaboration to aid recall of verbal information or propositions.
Types of Visuals
All of your visuals do not have to be PowerPoint slides. The use of real objects can increase attention, particularly if they are passed around the room. Remember to pause, giving students time to
look at them.
The Gestalt
While it is possible to break the presentation or delivery into the above-listed components analytically, the lecture is more than
the sum of its parts. All of these delivery components work together with the content to capture the attention and imagination of
the audience.
Page 71
Suggestions
Introduce yourself.
Speak so everyone can hear you.
learner understand.
on a few 3 x 5 cards.
Have fun!
Page 72
Just Right
Needs Improvement
Verbal Communication
Speaks too softly.
Articulates precisely.
important content.
monotone.
podium.
Non-Verbal Communication
the content.
Distracts the audience by looking out
eye contact.
the students.
Uses no visuals, no handouts, or lecture
support materials.
the situation.
Preparation/ Organization
Seems unprepared, disorganized.
Instructions
Place a check in the box that you feel most accurately provides feedback to the person you are evaluating.
Example
If a person is speaking too slowly and you feel his or her rating should be too slow, then put a check
somewhere in that box.
Page 73
Resources on Lecturing
Books/Articles
Gardner, H. (2000). The disciplined mind: Beyond facts
and standardized tests, the K-12 education that every
child deserves. Penquin Books: New York, NY.
Penner, J. G. (1984). Why many college teachers cannot
lecture: How to avoid communication breakdown in the
classroom. Charles Thomas Publishers.
Page 74