Army Counterintelligence (CI) Field Analysis

Superior Essays
Army Counterintelligence (CI) field started in the Revolutionary War, when President George Washington first practiced the art of CI in the Continental Army. After the Revolutionary War, the government viewed the CI field as being necessary only during the time of war, and soon decommissioned the field. This method of activation and deactivation continued even throughout some of US history’s greatest wars: Indian War, War of 1812, Civil War, World War I, and World War II. With each activation CI agents would push their capabilities and accomplished some of the greatest moments in US history. But it wasn’t until the beginning of the post-war era in 1945, when the US government recognized the CI field is an integral part of the Army and kept …show more content…
That same year, cyber space was adopted by the military as the fifth domain of warfare (Rowen, 2016). Since then, the Army has been racing to react to this new battlefield by assigning new CI agents directly from Counterintelligence Special Agent Course (CISAC) to specialized cyber units with limited knowledge in computer systems, networks, and CI as a whole. The current process is undermining and weakening the necessary support, strength, and expertise to mitigate, neutralize, and exploit Foreign Intelligence Entities and International Terrorist Organizations in the cyber domain. When Soldiers are accepted to CISAC and become a CI Special Agents, the Soldiers are taught the basics of the multiple disciplines in the CI field. Support cyber is barely covered in the course brief compared to the other …show more content…
During the first year or more, they are required to learn two different unique and specialized career fields; how to become a CI agent through the Counterintelligence Probation Program (CIPP) and become a subject matter expert (SME) in the cyber field. Agents will attend the Defense Cyber Investigation Training Academy for basic training and certifications during their first year in the unit. The training includes: Introduction to Network and Computer Hardware, Computer Incident Response Course, Windows Forensic Environment, and Forensic Intrusion in a Windows Environment (See Appendix for each course description). Each course requires a set time period in order to have the agents apply their understanding of the material and to develop the necessary skills required to attend the next course. The average time for completing all courses and receive certifications is over a year. Once through the required courses, agents can complete investigations and collections pertaining to cyber intrusions and forensics. Time on station is typically three years, the unit is able to utilize these now highly trained agents for two years at most. This unique issue is a hindrance to the accomplishment of these complex and technical cyber

Related Documents

  • Improved Essays

    Serious Counterintelligence Mistakes During the Revolutionary War During the Revolutionary War counterintelligence was a critical component to a successful war. The Patriots and The British both had counterintelligence methods used in the Revolutionary War. Although they both used counterintelligence, many of the methods they used backfired. In the book Spies, Patriots, and Traitors: American Intelligence in the Revolutionary War by Kenneth A. Daigler, he explains the mistakes made by the British and the Patriots during the Revolutionary War.…

    • 615 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The Criminal Individual Division, who duties include CSI has one SAC (Special Agent in Charge) and three active duty SA’s Redstone CID Office 502nd Military Police Battalion (CID) Redstone Arsenal, AL 35898-7240 E-mail: usarmy.redstone.3-mp-gp.list.redstone-arsenal-cid-office@mail.mil Phone: 256-876-2037 DSN: 746 http://www.cid.army.mil/units-by-state.html Any information from this paper cannot be printed. It is not the intent of the author or researcher for it to be released or printed publicly. An official request for information for authorized print must be requested through the following url below: The Public Affairs Officer serves as the single point of contact for Public Information by facilitating news media queries, coordinating and disseminating news releases and media advisories, coordinating and executing media events, supporting Command Information and Community Relations, managing the Public Release Approval System, and processing Freedom of Information Act requests.…

    • 1767 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Ef 21 Research Papers

    • 965 Words
    • 4 Pages

    Fires 5. Command and Control / NET Centric 6. Cyberspace and the Electromagnetic Spectrum 7. Force Protection 8. Intelligence 9.…

    • 965 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Running Head: 1 INTELLIGENCE AGENCIES 1 Intelligent Agencies STS 364 Sadat Cano Arizona State University 3/23/2015 In the U.S national security Umbrella corporations it is composed of many agencies that related to the national security of the United States of America. The U.S national security organizations are composed of many different organizations safe guarding the United of States of American. This organizations serve a purpose to ensure the safety of the United States Citizens and they contribute to the national security of the country. The intelligence is often regard as “intelligence of the enemy”(Troy 1991-92,433), studying the enemy and intelligence organizations collect and analyze data.…

    • 1597 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Spies In The Civil War

    • 1918 Words
    • 8 Pages

    During the Civil War, both the Union and the Confederacy made extensive use of spies. Harnett Kane, a Southern historian asserts that, “This war between Americans probably saw more espionage, involving more people, than any in our history” (Kane 11). The nature…

    • 1918 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Cyber System Operations install and support systems to ensure they operate properly and remain secure from outside intrusion. They also create systems and programs to give the military an advantage in Cyber technology. This is something I want to do because I think it's really cool that you get to create programs and hacks improve the United States cyber operations. Skills wise I have none, but I could learn from my dad or from the "Cyber Systems Operations Initial Skills" course. When I retire from the Air Force I can either create tools for the U.S. government to use or teach civilians to do…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The use of the intelligence method is prominent with the AFP through collecting information and data to produce intelligence. The AFP also employs the use of both strategic and Tactical intelligence in their practices, theoretically being that strategic intelligence uses long-term initiatives, strategies on emerging problems and structures of serious organised crime while tactical intelligence focuses on short-term initiatives, looking closely at criminal groups and activities (Buckley 2013). A practical example is the Specialist Response group that provides tactical strategies through intelligence operational priorities for a diverse range of AFP operations and building missions (AFP 2016). A difference identified through analysing the AFPS initiatives compared to the academic intelligence methods is the AFP’s use of public relations through educating the public with critical matters and receiving information from the public to improve statistics and crime prevention techniques. This is initiated through the AFPs virtual global taskforce for cyber crime, focusing on informing the public on risks and preventative actions (AFP Corporate Plan 2015-2019).…

    • 1017 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Army Counterintelligence field first began in 1942 as the Army Counter Intelligence Corps. Army CI has undergone many changes in the last 74 years since then. Some of the time, changes were made with the intention of furthering the successes of Army CI. Other times, changes were made to prevent shortfalls that were identified through previous failures. All in all, there are many things right with the Army CI and there are many things wrong.…

    • 1129 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Introduction Since ancient times, intelligence tactics and espionage have evolved and become more complex with the changing of the global landscape and culture. American intelligence, in particular, has seen many changes during its lifetime and continues to adjust to the vicissitudes of the nation—although, these changes have not always been the most effective. History implies that effective transformation rarely occurs during uneventful times. Instead, significant adjustments often result from some type of external disruption—a tragedy, catastrophic event or scandal that exposes the imperfections of the status quo. For example, World War II gave rise to the CIA with the creation of the National Security Act of 1947, the fall of the Soviet…

    • 2241 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Unconventional Warfare (UW) is considered the trademark of the U.S. Army Special Forces (SF). In fact, UW often serves as the focus for training, planning, and discussion within every aspect of the SF community. Most debates involving UW turn into an analysis of defining Unconventional Warfare and trying to figure out how to fit current SF operations into that definition. Special Forces prides itself on owning UW and serving as the Department of Defense’s subject matter experts on operating by, with, and through an indigenous force. The debate over Special Force’s ownership of this domain should not rely solely on the training, funding, or even doctrine that validates UW as a SF core task.…

    • 1241 Words
    • 5 Pages
    Great Essays
  • Brilliant Essays

    “Espionage and Counterespionage during World War II.” Encyclopedia of World War II. Vol. 1. New York: Facts on File, 2007.…

    • 2328 Words
    • 10 Pages
    • 7 Works Cited
    Brilliant Essays
  • Improved Essays

    “ By the 20th century, military organizations confronted the problem of not only adapting to technological changes in peace time, but also the fact that war itself has inevitably turned up the speed of technological change”. The first Gulf War constitutes a turning point in the history of modern conflicts essentially because of the integration of technology into all levels of military operations. War was always been a declaration of hostility between two opposing groups clashed over a battlefield in a duel with the ultimate aim to impose its will on the other. However, the advent of new technologies has completely changed these legendary and almost static clashes.…

    • 1300 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Attacks Research Paper

    • 2349 Words
    • 10 Pages

    Chapter One Introduction As the information era takes a new shape with introduction of network and digital platforms of communication and mode of doing things, which has been adopted into many sectors such as our personal lives, military, business and even the government, this means that there is an abundance of information available right at our fingertips. But this however faces a serious and more deadly enemy which revolves around hackers that are increasingly posing threats to the digital networks. Warfare is also changing drastically as new and more modern forms of fighting war are been seen without necessarily engaging into the battlefield. For example, the recent American fighting tactics were by use of modern and remote viewing gadgets…

    • 2349 Words
    • 10 Pages
    Great Essays
  • Great Essays

    Many of these systems are on helicopters, cutters, boats, and operational settings across the country. If attacks are successful, the missions fail, and rebuilding is necessary, costing countless resources, time, and possibly civilian lives. Furthermore, strikes on these systems could lead to the death or injury of members in the Coast Guard or NMS, equipment damage, or economic damage. Therefore, the Coast Guard intelligence requirement of cyber-security and cyber operations is crucial to the Coast Guard’s survival. Only one opening in a cyber system can lead to a failure, making it crucial to secure these systems.…

    • 1698 Words
    • 7 Pages
    Great Essays