ipl-logo

CI Tactical Analysis Paper

901 Words4 Pages

Answer #1: The Counter Intelligence performs various functions from investigation, operations and collection of information to performing analysis. Through effective analysis, CI is able to analyze different intelligence activities as well as any threat being made against United States personal or activities. These analyses are carried out by the CI at both strategic and tactical level. Usually, at the tactical level the CI focuses on meeting the requirement and the ground plans of the mission. The CI tactical analysis has three fundamental components each with their own specific steps and processes. The three types of CI tactical analysis are:
1. C-HUMINT
2. C-SIGINT
3. C-IMINT
The general approach and steps involved within the tactical analysis are:
1. …show more content…

Take counter measures and perform risks assessments.
Furthermore, the three key analytic components including C-HUMINT, C-IMIINT and C-SIGINT would have been used. An effective CI tactical analysis cannot be conducted unless all of these key analytics components function as well as contribute properly. These three components collect, retrieve, organize and analyze crucial information. Furthermore, they contribute in collecting highly essential information regarding the intelligence on opposing/ friendly forces.
Answer #2:
If I was present during the November 2004 Battle of Fallujah, I would have adopted the analytic approach based on the three basic components of counterintelligence analysis. Through the entire operation that lead to the November 2004 Battle of Fallujah, there were some serious key missed opportunities that the U.S military Counterintelligence agency could have taken. These missed chances allowed Abu Musab al-Zarqawi’s terrorist activities to continue persistently.
The three basic components of the military Counterintelligence analysis available namely, C-HUMINT, C-SIGINT and C-IMINT would have been used and exploited to the fullest. [Imbus, (2002)].
Step 1: Determining Terrorist

Open Document