CHAPTER XXIV

                         DETECTING CI TARGETS


     The identification of CI targets are done through the intelligence
rules. A data base WITH a line and block box, used in connection WITH existing
black, grey and white lists, intelligence reports and additional information
from the police agencies, army and other agencies, provides us WITH basic
information required to identify the potential CI targets.


     A.    Review the CI estimate to determine the hostile threat:

           1.   Identify those threats to security that are of an immediate

           2.   Identify anticipated future threats.

NOTE:  The selection of CI targets must be based in an evaluation of a
complete hostile threat.

     B.    Identify the specific CI targets of the local area:

     a.    The CI targets are of interest due to the threat that they
present, or the usefulness to the Armed Forces. CI targets include:

     a.    PERSONALITIES (SEE FIGURES #2, 3 and 4): that could or not be
friendly or hostile.

     b.    INSTALLATIONS (SEE FIGURE #5): that represent a threat to the
national security.

     c.    ORGANIZATIONS AND TeamS (SEE FIGURE #6): that represent a threat
to the national security. Its threat perhaps is not openly detectable due to
their undercover operation methods.

     d.    DOCUMENTS AND MATERIALS (SEE FIGURE #7): WITH value to the
intelligence or the counter intelligence.

NOTE:  Use the CI Work Sheet (SEE FIGURE #1) as the principal paper to assist
in the development of the targets:


LN324-91 3. Obtain information about the potential CI targets in the local area: a. Extract the local targets from the CI target lists at national level. b. Extract information from the existing Black lists (SEE FIGURE #2), White (SEE FIGURE #3), and Grey (SEE FIGURE #4). c. Extract information from the intelligence files, CI data base, and similar files. d. Obtain information from: 1) Civilian Affairs and Psychological Operations (G5) 2) Local intelligence units 3) Police elements C. Categorize the CI targets identified by the specialty or function. Examples: 1) Espionage agents 2) Sabotage specialists 3) Messengers 4) Camps or bases 5) Communications and link routes NOTE: To categorize the targets in this manner, it is essential that the history detailed information is obtained from the same source that was used to identify them. D. Assign priorities to the targets: 1. Determine the priority of each Target based on: a. The threat to the national security that the target represents. b. The urgency or the need to neutralize or exploit the target. c. The future capacities that await the target. d. The capacities of the units responsible to neutralize or exploit the targets. 222
LN324-91 2. Assign a numerical priority to each target: a. The numerical designations are always expressed in roman numerals (I, IV, XI). b. The numerical designation emphasizes the relative importance or the value of the CI targets. c. The numerical designation expresses the level of interest of the target. NOTE: If a target has been assigned a priority at a level higher than the Command, you at your level cannot alter this priority designation. The local CI elements will assign priorities to targets locally developed. E. Assign the responsibilities of the units to neutralization or exploitation of each target: 1. Determine the capacities of the units to carry out neutralization or exploitation missions based on: a. Amount of personnel b. Equipment available c. Specific experience 2. Identify the need, if any, to request support from the military police, infantry, national police, etc. NOTE: The tactical effort, except in special cases, takes precedence over the neutralization and exploitation of the targets. F. Notify the units of their mission(s). 223
LN324-91 FIGURE #1 CI TARGETS WORK SHEET REFERENCES TO CHARTS, MAPS DATE: _________________________________________________________________ KEYS TO CHART: 1. Target 2. Target classification 3. Priority 4. Localization 5. Team task 6. Team mission (Comments) 7. An administrative number that is written down in chronological order. 8. The classification identifies the target by type, name and provides specific data for identification about the target. 9. The priority is designated WITH roman numerals and is assigned based upon the target classification. 10. The localization will identify the place where you may find the target or if this is not known, it is identified where the target was found the last time. 11. The team's task of identifying the CI team whose mission is to neutralize the target is based in the number of persons available and could include tactical forces, military police and para-military forces. 12. This column is used to make a list of the coordination requirements, communications, specific details of the mission or other specific information required so that the team could fulfill its mission. 224
LN324-91 FIGURE #2 BLACK LISTS THESE CONTAIN THE IDENTITIES AND LOCALIZATIONS OF PERSONS WHOSE CAPTURE AND DETENTION ARE OF FOREMOST IMPORTANCE TO THE ARMED FORCES: EXAMPLES a. Enemy agents known or suspects, persons involved in espionage, sabotage, politics, and subversive persons. b. Hostile para-military guerilla team leaders, known or suspects. c. Political leaders known or suspected as hostile toward the Armed Forces or the political interests of the National Government. d. Known or suspected leaders of enemy governments whose presence in the area of operations represent a threat the national security. e. Collaborators and sympathizers of the enemy, known or suspects whose presence in the area of operations represent a threat to the national security. f. Military and civilian enemies, known or suspected of having participated in intelligence activities, counter-intelligence, security, police or political indoctrination between the troops or among civilians. g. Other personalities identified by the G2 as of immediate detention. This could include local political personalities, chiefs of police, and municipal leaders or leaders of the enemy's government departments. 225
LN324-91 FIGURE #3 GREY LISTS CONTAINS THE IDENTITIES AND LOCALIZATION OF THOSE PERSONALITIES WHOSE INCLINATIONS AND ACTIVITIES TOWARD THE POLITICAL AND MILITARY OBJECTIVES OF THE GOVERNMENT ARE OBSCURE (THAT IS, NOTHING IS KNOWN ABOUT THEM). THEIR INCLINATIONS OR ATTITUDES DOES NOT MATTER, IF THEY HAVE SOME INFORMATION OR SKILLS THAT ARE OF INTEREST TO THE NATIONAL GOVERNMENT. THOSE PERSONS WHOSE INCLINATIONS OR POLITICAL MOTIVATIONS REQUIRE MORE EXPLORATION OR EVALUATION BEFORE THEY COULD BE USED EFFECTIVELY BY THE GOVERNMENT CANNOT BE INCLUDED. EXAMPLES a. Defectors or potential defectors of the enemy cause whose motivation or loyalty has not been yet established. b. Persons that have resisted or are believed to have resisted the enemy government and that perhaps are willing to cooperate WITH the Armed Forces of the National Government, but their motivation or loyalty has not yet been established. c. Nuclear scientists, physicists and technical personnel suspected of having participated in development of nuclear projects for the enemy, or nuclear missile programs, against their will. 226
LN324-91 FIGURE #4 WHITE LISTS CONTAIN THE IDENTITIES AND LOCALIZATION OF PERSONS IN AREAS CONTROLLED BY THE ENEMY WHO HAVE BEEN IDENTIFIED AS OF INTEREST TO THE INTELLIGENCE OR TO THE COUNTER INTELLIGENCE, AND IT IS EXPECTED THAT THEY COULD PROVIDE INFORMATION OR ASSISTANCE IN THE ACCUMULATION OF INTELLIGENCE OR IN THE EXPLOITATION OF AREAS OF INTEREST. NORMALLY THESE PERSONS AGREE WITH, OR FAVORABLY BEND TOWARDS THE BELIEFS OF THE NATIONAL GOVERNMENT. THEIR CONTRIBUTIONS ARE BASED IN A VOLUNTARY AND COOPERATIVE ATTITUDE. THE DECISION TO PLACE A PERSON IN A WHITE LIST COULD BE AFFECTED BY THE COMBAT SITUATION, THE CRITICAL NEED FOR SPECIALISTS IN THE SCIENTIFIC FIELDS AND OTHER INTELLIGENCE NEEDS. a. Ex-political leaders of a hostile government that were deposed by the hostile political leaders. b. Intelligence agents employed by the National Government. c. Key civilians in the scientific development areas could include members of university faculties, whose loyalty has been established. d. Religious team leaders and other humanitarian team leaders. e. Other persons who could give significant material support to political objectives, scientists and military personnel of the National Government and whose loyalty has been established. 227
LN324-91 FIGURE #5 INSTALLATIONS 1. COMMAND POSTS. 2. COMMUNICATION CENTERS. 3. INVESTIGATION AND DEVELOPMENT CENTERS, LABORATORIES. 4. INSTALLATIONS THAT FORMERLY OR AT PRESENT ARE OCCUPIED BY ENEMY ESPIONAGE AGENCIES, SABOTAGE, AND INSURRECTION, OR ENEMY POLICE ORGANIZATIONS INCLUDING PRISONS. 5. INSTALLATIONS OCCUPIED BY ENEMY INTELLIGENCE ORGANIZATIONS OR SECURITY. 6. BELLIGERENT DEPOTS. 7. EMBASSIES OR HOSTILE GOVERNMENT CONSULATES. 8. MILITARY INSTALLATIONS. 9. PARA-MILITARY Team CAMPS FIGURE #6 ORGANIZATIONS AND TeamS 1. Local or national political party teams, or parties that have goals, beliefs or ideologies contrary or in opposition to the National Government. 2. Para-military organizations including student teams, police, military and veterans, or ex-fighter teams that are hostile towards the National Government. 3. Teams or hostile organizations whose objective is to create dissention or cause restlessness among the civilian population in the area of operations. 4. The central offices of these hostile organizations according to what the Commander of the Armed Forces says will be immediately neutralized. Personalities related WITH these offices will be arrested and detained. 5. Teams that operate undercover or clandestinely and their infrastructure. 6. Intelligence networks. 228
LN324-91 FIGURE #7 DOCUMENTS AND MATERIALS 1. Files at bases, training centers and enemy intelligence schools. 2. Court files (Judicial), prisons, police, and the political administrative executives. 3. National intelligence agencies' files, para-military organizations, and the enemy's secret police agencies. 4. Products or other materials that, if left unguarded could provide support to the enemy guerrilla in the area. 5. Special war materials: a. Chemical war products b. Harmful materials c. New combat products d. Rockets and rocket control centers e. Airships f. Charts and maps warehouses g. Communication equipment, including radios, radars and electronic equipment. 229