Counterintelligence Neutralize or exploit the collector or deny information. What Does a Human Intelligence Collector (35M MOS) Do? hb```, Continuity of action, timeliness, and accuracy of information are constantly stressed. DoDI 5240.18, 'Counterintelligence (CI) Analysis and Individuals previously holding political or civic positions of influence within the AO. Temporary duty (TDY) may be required 10% or more of the work schedule. C-HUMINT requires effective and aggressive offensive and defensive measures as shown in Figure 3-1. Law enforcement, including FBI and CIA analyst positions. Uniform system Indexed guidance(Registry) Greater specificity The linguistic capabilities of interrogators. MP and CI Elements. If you provided an email address, you will receive an email message acknowledging receipt of your application. DoDI 5210.45, 'Personnel Security Policies and Procedures Adversaries use air reconnaissance at all levels with organic or supporting manned and unmanned aviation assets. A career with the U.S. government provides employees with a comprehensive benefits package. DEPARTMENT OF THE ARMY - Army Publishing Adversary commanders and staffs of all combat arms and services organize reconnaissance operations. Advice and assistance programs are conducted by CI teams at all levels to improve the security posture of supported organizations. We must view a potential adversary's use of IMINT to develop intelligence and targeting information as potentially damaging to our interests. The full requirements for the MOS are available in the MOS Smartbook (DA Pam 611-21). Conducting evaluations and surveys on the effectiveness of security measures. In accordance with Change 3 to AR 600-85, Alcohol and Drug Abuse Prevention and Control Program, individual must successfully pass a urinalysis screening for illegal drug use prior to appointment and periodically thereafter. (See Section V to Appendix A.). They provide threat information and identify specific vulnerabilities to security beyond the capability of a security manager. Although CI personnel orient their monitoring mission primarily on subversion, espionage, and sabotage, they must also work with CA on programs designed to counter and neutralize a hostile threat. The cycle consists of five phases: planning and directing, collecting, processing, producing, and disseminating. Without an identifiable threat to US Army security interests, use of CI personnel is not recommended since there is no viable mission for them. We must have in place a carefully developed counterprogram to negate any tactical and strategic threat. You will receive classroom training as well as time in the field learning your new craft. Must be willing to undergo and successfully complete a counterintelligence-scope polygraph examination with No Deception Indicated (NDI) on a pre-appointment and periodic basis. All INSCOM employees may be subject to extended temporary duty (TDY) or worldwide deployment during crisis situations to perform mission essential functions as determined by management. sities and communities as clinical and research requirements dictate. b. Once the decision to execute is made, operations will generally be carried out by combat forces. Marine Counterintelligence (MOS 0211): Career Details When you perform a Civilian Permanent Change of Station (PCS) with the government, the Internal Revenue Service (IRS) considers the majority of your entitlements to be taxable. It is a continuous process and, even though each phase is conducted in sequence, all phases are conducted concurrently. $D bHvb-< BHpu 9 2EHs H&Fg ; 3 Current Army Defense Civilian Intelligence Personnel System (DCIPS) Employee, Current Department of Army Civilian Employees, Current Department of Defense (DOD) Civilian Employee (non-Army), Current DoD Defense Civilian Intelligence Personnel System (DCIPS) Employee (non-Army), Defense Civilian Intelligence Personnel System (DCIPS) Interchange Agreement, Disabled Veteran w/ a Service-Connected Disability, More than 10%, Less than 30%, United States Citizen Applying to a DCIPS Position. Training for a counterintelligence agent requires 10 weeks of Basic Combat Training, achieving the rank of at least E-4 (and 21 years of age), and 18 weeks of The Counterintelligence (CI) Awareness Program's purpose is to make DOD and Industry Security personnel aware of their responsibility to report unusual activities or behaviors. After review of these training products, additional training is available on this webpage to expand your knowledge and skills. Terrorism through sabotage is a criminal act and may well be a coordinated enemy effort. Army Counterintelligence Agent (MOS 35L) is responsible for collecting and interpreting intelligence 3-2. Sergeant (SGT) (Skill Level 2) a. Army Additional information on how to complete the online application process and submit your online application may be found on the. OCONUS and all CI elements provide CI support as directed by affected unified or allied command Commanders in Chief (CINCs). %%EOF Individuals and types of information which may be of interest to CI personnel are identified in the paragraphs below. Countering foreign HUMINT capabilities and efforts is a key part of accomplishing the CI mission. At all echelons, the goals are the same: These goals are achieved through vigorous application of a five-step C-SIGINT process: Threat assessment must be done first if the remaining steps are to be viable. New Mechanized Infantry Combat Vehicle prototype contract Study analyzed accounts of real-world security activities, events, or threats. Beginning of a dialog window for your session has expired. (a) The Soldier's current PMOS must be listed as over strength (N/Y) and the requested MOS must be listed as short (Y/N) on the current Reenlistment On the battlefield we must combat all of these methods to protect our force and to ensure the success of our operations. Army Counterintelligence Agent (MOS 35L): Career Details Looking for a fun way to encourage security awareness at your organization? This job originated on www.usajobs.gov. As a CI agent, you will all types of investigations. Procedures for these investigations and checks are outlined in Chapter 4 and Section VII to Appendix A. Two year trial/probationary period may be required. MP Investigations. (IPB) process; planning requirements and assessing collection and support to targeting. Contact the hiring agency for more information on the specific benefits offered. Both CA and CI personnel must continuously monitor the feelings and attitudes of the civilian population. CA personnel are great sources of initial Identifying vulnerabilities based upon analysis of collected information and recommendations of countermeasures. They are concerned with the ties criminals might have with local leaders, political parties, labor unions, legitimate businesses, and governmental agencies. endstream endobj 344 0 obj <. By the very nature of their mission, CI agents provide area coverage and are in a position to provide valuable assistance to supported commands in countering adversary activities in those areas. The exchange of information is a normal function of CI personnel among adjacent units and agencies. Commanders must ensure compliance with laws, policy, and regulations when employing COMSEC monitoring, electronic surveillance, or other technical CI collection activities as part of Red Team simulation operations. Requirements Model and AR/DA PAM 623-3. The CI agent is extremely dependent on such agencies as the MP, Civil Affairs (CA) units, Defense HUMINT Services (DHS), and interrogation prisoner of war (IPW) to identify persons of CI interest. Normal color vision required (waiver possible if theindividual can distinguish between green, red and amber). U.S. Army Counterintelligence Agent - LiveAbout Friendly force Communications-Electronics profile. INSCOM is responsible for providing life cycle CI support to SAPs. Should you submit a resume or any other document as part of your application package and it is confirmed that any of the information is Classified, in addition to being found ineligible for consideration for this position, your Security Office will be notified to determine if any further action is warranted. Cookies collect information about your preferences and your devices and are used to make the site work as you expect it to, to understand how you interact with the site, and to show advertisements that are targeted to your interests. %%EOF Conducting continued briefings to MP, CA personnel, interrogators, and G2/S2 staffs on adversary intelligence activity and method of operation, as well as other threats to force protection. Beginning of a dialog window for the agency announcing this job. It is the role of the MDCI analyst working with other CI and intelligence specialists in the analysis and control element (ACE) to analyze threat data and determine countermeasures to deny the enemy collection capabilities or other threats. 35L Counterintelligence Special Agent - HRC Homepage Support to Domestic Civil Disturbance. MP and CI elements require coordination. INSCOM, under the technical direction of DCSINT (DAMI-CI), operates the automatic data processing system security enhancement program (ADPSSEP). Support to Natural Disaster Operations. The commander then directs countermeasures implementation. WebOfficers in the counterintelligence (CI) career field perform a wide variety of tasks in support of the Defense Intelligence Agencys (DIA) mission. WebEntry Level. CI surveys, technical inspections, and preconstruction technical assistance. The documents you are required to submit vary based on the authority you are using to apply (i.e., applying as a veteran, applying as a current permanent Federal employee, applying as a reinstatement, etc). Red Team operations assist the commander or program manager and his security Your resume: To apply for this position, you must complete the online questionnaire and submit the documentation specified in the Required Documents section above. SAPs usually involve military acquisition, operations, or intelligence activities. As with all CI operations, detailed analysis of the adversary is necessary. ;Y/)(1#Zm9}9vk 2YM'Dba@ @o3:o {C\BFYL&i9 f Qc`$@I @ E An 18-year veteran of Army counterintelligence, Turner said the daily Those criminal actions and parties may extend into the subversive and sabotage arenas. Since military support to civilian LEAs is a law enforcement function, EO 12333 and AR 381-10 do not apply; however, DODD 5200.27, AR 380-13, and AR 381-20 do apply. This highly secretive world within the military and government risks their lives every day and work challenging hours to keep American safe from foreign adversaries. 11-1. Please follow all instructions carefully when applying, errors or omissions may affect your eligibility. WebAbout the Position: This position is in the Defense Civilian Intelligence Personnel System (DCIPS).Employees occupying DCIPS positions are in the Excepted Service and must adhere to U.S. Code, Title 10, as well as Department of Defense Instruction 1400.25.Serves as the Senior Logistics Management Specialist, advisor, and representative of all See FM 34-5 (S). Requirements 10 weeks of Basic Training 18 weeks at the Counterintelligence Special Agent Course 101 ASVAB Score: Skilled Technical (ST) U.S. Citizen 17 to 34 Years Old High School Diploma or GED Meet Tattoo Guidelines No CI activities that do not fall under the other functional areas of investigations, collection, or analysis and production are characterized as operations. Become a CI Special Agent | US Army Combined Arms We also gather it through electronic preparation of the battlefield based on what we know foreign SIGINT or radio electronic combat doctrine to be. Counterintelligence Awareness and Reporting Course for DOD Monitoring or collecting C-E transmissions to aid in vulnerability assessments, and providing a more realistic and stable basis from which to recommend countermeasures. Current or former competitive service federal employees. Analyzing of data collected during or after countermeasures implementation. 727 0 obj <> endobj You will be evaluated for this job based on how well you meet the qualifications above. USAJOBS is a Opens in a new windowUnited States Office of Personnel Management website. If selected, you may be required to provide supporting documentation. The exchange may be conducted formally through staff elements, or on a liaison-type basis. visit www.usajobs.gov/job/733081700. Any activity by CI personnel must comply with the following: To avoid questionable or illegal activities by CI personnel participating in this type of OOTW, thorough training prior to deployment is crucial. Current excepted service federal employees. The Counterintelligence Agent (35L) conducts counterintelligence surveys and investigations to assess and counter foreign threats. Searching for people who pose an intelligence collection or terrorist threat to US Forces. Prior to execution, CI support is coordinated with the task force senior intelligence officer and legal advisor, and is approved by the task force commander's designated law enforcement representative. Currently, there is no dedicated capability to accurately and completely capture friendly C-E emissions in the same way our adversaries do. Male applicants born after December 31, 1959, must complete a Pre-Employment Certification Statement for Selective Service Registration. C-SIGINT is addressed in greater detail in Appendix B. C-SIGINT provides the commander with the knowledge to assess the risk and probable success of alternatives before a plan is implemented. However, the following civilian occupations make use of the skills developed through MOS 35L training and experience. As a CI agent, gathering information from security investigations by processing evidence with a team of other military and law enforcement officials. CI is a total Army mission that relies on our ability to. The key is to be predictive. Military Intelligence (CMF 35) Career Progression Plan The intelligence exchange between these two elements is critical. You may conduct low-level source operations. %PDF-1.5 % There is no civilian occupation that is directly equivalent to MOS 35L. Military Intelligence Counterintelligence Investigative The CI agent must conduct preliminary screening to permit concentration on those of greatest potential interest or value. Army Although CA is valuable during wartime, it is even more important in OOTW. Red Team operations should be carried out as realistically as possible in accordance with AR 381-10 and AR 381-20. Debriefing selected personnel (friendly and hostile) including combat patrols, aircraft pilots, or other elements which may possess information of CI interest. Support should be confined to analytical and situation development activities. They are not equipped or trained to conduct standard military operations as a unit nor replace combat arms units, other combat support, or combat service support personnel. Download and display posters to promote security awareness in the workplace. Because of the complexity and high resource requirements, Red Team operations generally should be limited to extremely sensitive activities, such as SAPs, although Red Team operations may be useful in conjunction with major tactical exercises and deployments. USAJOBS - Job Announcement WebCI Awareness and Reporting summarizes the potential threats and collection methods used by Foreign Intelligence Entities (FIE), Potential Espionage Indicators (PIE), warning signs UNCLASSIFIED - Army Publishing Directorate 351L - Counterintelligence Technician - U.S. Army Once this has been done, the MDCI analyst develops countermeasures that will reduce or eliminate the threat, the vulnerability, or both. About the Position: This position is in the Defense Civilian Intelligence Personnel System (DCIPS). This career requires mature, professional, and competent soldiers. endstream endobj 728 0 obj <. Complete the online application, verify the required documentation is included with your application package, and submit the application. CI personnel are soldiers first. Become a CI Special Agent. SAEDA training, providing SAEDA materials, and training security managers in the SAEDA programs. US Army Counterintelligence - Special Agents Adversary IMINT collection efforts directed against US and allied forces vary according to weather, terrain, and the depth and density of friendly forces and their collection capabilities. Both MP and CI elements frequently develop information which may fall into the jurisdiction of the other. Members of underground resistance organizations seeking to join friendly forces. A detailed description and instructions on how to conduct investigations are included in Chapter 4 and Section I to Appendix A. FM34-60 COUNTERINTELLIGENCE - Chapter 3 OPERATIONS Human Intelligence Collector Any adversary may possess or acquire systems or products with a comprehensive and sophisticated IMINT capability. Counterintelligence 12. WebHome Defense Counterintelligence and Security Agency America's Gatekeeper DCSA is the largest security agency in the federal government dedicated to protecting America's trusted workforce and trusted workspaces. Army Counterintelligence Special Agents (CI) have the highest of security clearances and are therefore on the front lines of neutralizing foreign intelligence agent's abilities and since September 11, 2001 fighting terrorism and terrorist plots. These operations require extensive preparation. If you fail to provide these documents, you will be marked as having an incomplete application package and you will not be considered any further. For qualifications determinations your resume must contain hours worked per week and the dates of employment (i.e., HRS per week and month/year to month/year or month/year to present). Chapter 11 This agent will conduct all routine liaison and advice and assistance with the supported element. Now hiring: Army needs counterintelligence agents - Army Times CI personnel provide advice and assistance to installation commanders, and debrief Army personnel who may have come in contact with inspectors. They should strive to enhance their own Military Occupational Specialty (MOS) Use of Army Education Centers, the COOL site, and DANTES site endstream endobj startxref Analyzing air and ground operational situation reports. For example, in conflict, CI may identify threat collection assets that are legitimate tactical targets and recommend neutralization by appropriate artillery or air defense artillery fires. The CI agent recommends countermeasures developed by CI analysts that the commander can take against enemy collection activities. Presently, we gather adversary information from the existing SIGINT and electronic warfare (EW) collection capability of the IEW force. Choose from a variety of learning platforms to keep up to date with changing policies, procedures, and security environments to meet your performance requirements. hbbd``b`S`b IX \+* Permanent Change of Station (PCS) allowances may be authorized, subject to the provisions of the Joint Travel Regulations and an agency determination that a PCS move is in the Government Interest. Sponsor: Rep. Meng, Grace [D-NY-6] (Introduced 06/23/2023) Committees: House - Armed Services: Latest Action: House - 06/23/2023 Referred to the House Committee on Armed Services.All Actions Web(Counterintelligence and Security) Memorandum (Reference (c)). WebArmy counterintelligence (ACI) special agents (SAs) are responsible for investigating national security crimes and related incidents that affect Army equities. 343 0 obj <> endobj To accomplish C-HUMINT, the CI agent, individually or as part of a CI team, conducts investigations, operations, and collection. It begins with a heading 2 called "Learn more about Field Operating Offices of the Office of the Secretary of the Army". Acquiring the necessary information on foreign SIGINT collectors as well as information to support maintenance of friendly communications nodes database at all echelons is, at best, difficult. The SGT is the primary trainer of Soldiers, responsible for the health and welfare of their subordinates. This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission. C-IMINT Operations. %PDF-1.6 % Uploaded documents may take up to one hour to clear the virus scan. Degradation or neutralization of hostile SIGINT and radio electronic combat assets. The Army Counterintelligence (CI) Program requires its members to be mature, intelligent, and personable to carry out the broad The Joint COMSEC Monitoring Activity and INSCOM MI group or brigade will provide C-SIGINT operational support at all echelons as outlined in DODD 4640.6 and NACSI 4000. Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. Coordinate and deconflict requirements with the appropriate Defense CI Component analysis and