This pamphlet is the counterintelligence (CI) reference for CI investigative procedures and processes based on U.S. law, Department of the Army (DA) policy, Army Counterintelligence Coordinating Authority (ACICA) policy, and U.S. Army Intelligence Center of Excellence doctrine. Force protection is defined to be a defense against deliberate attack, not accidents or natural disasters. It is not always clear, under this doctrine, who is responsible for all intelligence collection threats against a military or other resource. The Russian Federation's major domestic security organization is the FSB, which principally came from the Second Chief Directorate and Third Chief Directorate of the USSR's KGB. Defensive counterintelligence operations that succeed in breaking up a clandestine network by arresting the persons involved or by exposing their actions demonstrate that disruption is quite measurable and effective against FIS if the right actions are taken. The Director of DCSA reports to the Und… In the specific context of counterintelligence, note that Peter Wright, a former senior member of the Security Service who left their service without his pension, moved to Australia before publishing his book Spycatcher. II. Opposition might indeed be a country, but it could be a transnational group or an internal insurgent group. Before trusting an enemy agent, remember that such people started out as being trusted by their own countries and may still be loyal to that country. Co-operation may consist of telling all one knows about the other service but preferably actively assisting in deceptive actions against the hostile service. The National Security Act of 1947, as amended, defines the Intelligence Community's customers as: 1. The full scope of US military counterintelligence doctrine has been moved to a classified publication, Joint Publication (JP) 2-01.2, Counterintelligence and Human Intelligence Support to Joint Operations. Pitts had been an FBI agent who had sold secret information to the Soviets, and, after the fall of the USSR, to the Russians. She wrote, “Security and counterintelligence are complementary missions, to be sure… However, the imperative in creating the NCIX was to have a single head of U.S. counterintelligence with a singular mission…purpose, and funding… Combining counterintelligence and security is part of a flawed historical model for the CI enterprise… Those wanting to reverse their role aren't confessing, they're negotiating. The counterintelligence community cannot cut off these relationships because of concern about security, but experience has shown that it must calculate the risks involved.[18]. Decision makers require intelligence free from hostile control or manipulation. Historically, CIA assigned responsibility for protecting its personnel and operations to its Office of Security, while it assigned the security of operations to multiple groups within the Directorate of Operations: the counterintelligence staff and the area (or functional) unit, such as Soviet Russia Division. In democratic societies, even in wartime, censorship must be watched carefully lest it violate reasonable freedom of the press, but the balance is set differently in different countries and at different times. He was caught by an FBI false flag sting, in which FBI agents, posing as Russian FSB agents, came to Pitts with an offer to "reactivate" him. An anti-terror magistrate may call upon France's domestic intelligence service Direction générale de la sécurité intérieure (DGSI), which may work with the Direction générale de la sécurité extérieure (DGSE), foreign intelligence service. The emphasis which the KGB places on penetration is evident in the cases already discussed from the defensive or security viewpoint. counterintelligence (CI) efforts taken to protect ones own intelligence operations from penetration and disruption by hostile nations or their intelligence services; EO 12333 defines "information gathered and activities conducted to identify, deceive, exploit, disrupt or protect against espionage This includes insurgent and terrorist infrastructure and individuals who can assist in the CI mission. Ian D. Thatcher, Late Imperial Russia: problems and prospects, page 50. National Security Council 3. Counterintelligence is defined by law as an embrace of both the collection of information and activities conducted to counter foreign intelligence threats (Cleave, 2007). – Anxious on initial hostile intelligence service contact (some also feel thrill and excitement). The insider threat has been a source of extraordinary damage to US national security, as with Aldrich Ames, Robert Hanssen, and Edward Lee Howard, all of whom had access to major clandestine activities. There is usually a domestic counterintelligence service, usually part of a larger law enforcement organization such as the Federal Bureau of Investigation in the United States. Education on the need to use secure communications, and instruction on using them properly so that they do not become vulnerable to specialized technical interception. Spain's 3/11 Commission called for this Center to do operational coordination as well as information collection and dissemination. Explain. Additionally, persons knowledgeable of subjects are contacted to better understand the subjects' private lives and how they are perceived by others while conducting espionage."[27]. Counterintelligence (CI) Scope Polygraph (CSP) CSP examinations may be conducted as part of initial personnel security vetting and may be administered at periodic or aperiodic intervals in support of reinvestigations or continuous evaluation. Those who are "Stressed out" want to confess. One example, however, can draw on the Operation RAFTER technique revealed in Wright's book. – They see espionage as a "Victimless" crime. Counterintelligence is part of intelligence cycle security, which, in turn, is part of intelligence cycle management. While the Counterintelligence Division continues to neutralize national security threats from foreign intelligence services, its modern-day mission is much broader. Personnel in sensitive positions, who have difficulty getting along with peers, may become risks for being compromised with an approach based on ego. Many British journalists find that the system is used fairly, but there will always be arguments. The purpose of CCI is to identify, deter, degrade, neutralise, and protect against adversary intelligence activities. But there are tried and true basic methodologies that work and that can also be transferred into the many new technologies we have to deal with. essential and multi-faceted motivational patterns underlying espionage. Its purpose is to deter, detect, and neutralize the threat posed by hostile intelligence services against U.S. diplomatic personnel, facilities, equipment, and information. "The Hizballah operatives believed to have conducted this attack began intelligence collection and planning activities in 1993. "The security intelligence process should not be confused with the liaison conducted by members of the Canadian Forces National Investigation Service (CFNIS) for the purpose of obtaining criminal intelligence, as the collection of this type of information is within their mandate.". In the 1995 US Army counterintelligence manual, CI had a broader scope against the various intelligence collection disciplines. For this assignment, you must write a paper of 750–1,000 words discussing how U.S. counterintelligence will be used to counter the potential threat from Kartesia. Diplomatic Security Service (DSS), Department of State, Direction générale de la sécurité intérieure, Direction générale de la sécurité extérieure, respective supporters in CIA and the British Security Service (MI5), censorship of material directly relevant to national security, "Towards the intelligent use of intelligence: Quis Custodiet ipsos Custodes? Counterintelligence and security are distinct but complementary disciplines, and it is important for organizations contemplating the establishment of a CI program to understand the difference. Had an electronic system to detect anomalies in browsing through counterintelligence files been in place, Robert Hanssen's searches for suspicion of activities of his Soviet (and later Russian) paymasters might have surfaced early. The CI Awareness Program also helps identify various threats from foreign intelligence entities, other illicit collectors of US defense information, and/or terrorists. MASINT is mentioned here for completeness, but the discipline contains so varied a range of technologies that a type-by-type strategy is beyond the current scope. This protection extends to the Department’s direct-hire employees as well as to Due to intense lobbying from William Melville and after he obtained German mobilization plans and proof of their financial support to the Boers, the British government authorized the formation of a new intelligence section in the War Office, MO3 (subsequently redesignated MO5) headed by Melville, in 1903. Assignment Guidelines. Defensive counterintelligence is thwarting efforts by hostile intelligence services to penetrate the service. You are a counterintelligence officer for the Defense Intelligence Agency (DIA) assigned to the Critical Technology Protection Division. This mandate is a good statement of a mandate to conduct offensive counterintelligence. • Every corporation in America needs an effective physical security capability that ensures employees, facilities, and information systems are protected. A key background to this development was The Great Game - the strategic rivalry and conflict between the British Empire and the Russian Empire throughout Central Asia between 1830 and 1895. National Counter-Intelligence Unit. Gleghorn distinguishes between the protection of national intelligence services, and the intelligence needed to provide combatant commands with the information they need for force protection. Figure 1… In other words, such investigations have a broader focus, and their implications are potentially far more concerning from a national security standpoint. CI includes all actions taken to detect, identify, exploit, and neutralize the multidiscipline intelligence activities of friends, competitors, opponents, adversaries, and enemies. The duties of the Canadian Forces National Counter-Intelligence Unit include "identifying, investigating and countering threats to the security of the DND and the CF from espionage, sabotage, subversion, terrorist activities, and other criminal activity; identifying, investigating and countering the actual or possible compromise of highly classified or special DND or CF material; conducting CI security investigations, operations and security briefings and debriefings to counter threats to, or to preserve, the security of DND and CF interests." Due to its success, the Government Committee on Intelligence, with support from Richard Haldane and Winston Churchill, established the Secret Service Bureau in 1909 as a joint initiative of the Admiralty, the War Office and the Foreign Office to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German government. His sentence required him to tell the FBI all he knew of foreign agents. – In the course of long-term activity, subjects may reconsider their involvement. Both attempt to minimize or avoid punishment. At the heart of exploitation operations is the objective to degrade the effectiveness of an adversary's intelligence service or a terrorist organization. [29] While a funding cut caused the loss of impetus in the mid-nineties, there are research data used throughout the security community. The terminology is not the same as used by other services, but the distinctions are useful: DND further makes the useful clarification,[31] Force protection, for forces deployed in host countries, occupation duty, and even at home, may not be supported sufficiently by a national-level counterterrorism organization alone. Counterintelligence and the Israeli Perspective All of these actions apply to non-national threats as well as to national organizations. Adding the new tools and techniques to [national arsenals], the counterintelligence community will seek to manipulate foreign spies, conduct aggressive investigations, make arrests and, In France, a senior anti-terror magistrate is in charge of defense against terrorism. They may even break contact. [28], By 1997, the Project Slammer work was being presented at public meetings of the Security Policy Advisory Board. For other mission areas, the USIC will examine collection, analysis, dissemination practices, and other intelligence activities and will recommend improvements, best practices, and common standards.[20]. Understanding what leads individuals to turn on their own side is the focus of Project Slammer. In most countries the counterintelligence mission is spread over multiple organizations, though one usually predominates. FIS are especially able to explore open societies and, in that environment, have been able to subvert insiders in the intelligence community. Educating personnel in all fields of security. – No other (easier) option (than to engage in espionage). A counterintelligence investigation, on the other hand, has a different purpose or objective—to identify and mitigate threats posed by foreign governments. Counterintelligence and security programs create a continuum of effective protection for your company. ", are not as internally cohesive as foreign intelligence services, potentially leaving them more vulnerable to both deception and manipulation. Central Intelligence Agency (CIA), principal foreign intelligence and counterintelligence agency of the U.S. government. Offensive counterespionage is the set of techniques that at least neutralizes discovered FIS personnel and arrests them or, in the case of diplomats, expels them by declaring them. There are other HUMINT sources, such as military reconnaissance patrols that avoid mixing with foreign personnel, that indeed may provide HUMINT, but not HUMINT especially relevant to counterintelligence. program is defensive in nature. The interdependence of the US counterintelligence community is also manifest in its relationships with liaison services. Some of the overarching CI tasks are described as. Frank Wisner, a well-known CIA operations executive said of the autobiography of Director of Central Intelligence Allen W. Dulles, that Dulles "disposes of the popular misconception that counterintelligence is essentially a negative and responsive activity, that it moves only or chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by the opposition." This is in part due to the fact that many terrorist groups, whose members "often mistrust and fight among each other, disagree, and vary in conviction. Offensive counterintelligence seeks to damage the long-term capability of the adversary. [23] Active countermeasures, whether for force protection, protection of intelligence services, or protection of national security interests, are apt to involve HUMINT disciplines, for the purpose of detecting FIS agents, involving screening and debriefing of non-tasked human sources, also called casual or incidental sources. Although all intelligence disciplines can be used to gather force protection intelligence, HUMINT collected by intelligence and CI agencies plays a key role in providing indications and warning of terrorist and other force protection threats.[24]. Gain information concerning other prisoners and soldiers missing or killed in action. – Subject finds that it is easy to go around security safeguards (or is able to solve that problem). A variety of security disciplines also fall under intelligence security management and complement counterintelligence, including: The disciplines involved in "positive security," measures by which one's own society collects information on its actual or potential security, complement security. Spain gives its Interior Ministry, with military support, the leadership in domestic counterterrorism. Ironically, he told them of suspicious actions by Robert Hanssen, which were not taken seriously at the time. This page was last edited on 20 March 2021, at 14:36. Rather, he sees that can be most effective, both in information gathering and protecting friendly intelligence services, when it creatively b… Clark, R.M. Chairman of the Joint Chiefs of Staff and senior military commanders 5. – Sometimes they consider telling authorities what they have done. Crossfire Hurricane was a lot of things, but an actual counterintelligence investigation was not one of them. Nearly everyone confuses counterintelligence with security. As an example of terrorist planning cycles, the Khobar Towers attack shows the need for long-term FPCI. [citation needed]. Transnational criminal organizations include the drug trade, money laundering, extortion targeted against computer or communications systems, smuggling, etc. What is the purpose of counterintelligence? The establishment of dedicated intelligence and counterintelligence organizations had much to do with the colonial rivalries between the major European powers and to the accelerating development of military technology. describes the most common reasons people break trust and disclose classified materials, reveal operations to hostile services, or join terrorist groups. The range of actions that might be done to support a friendly government can include a wide range of functions, certainly including military or counterintelligence activities, but also humanitarian aid and aid to development ("nation building").[19]. Wisner emphasized his own, and Dulles', views that the best defense against foreign attacks on, or infiltration of, intelligence services is active measures against those hostile services. Counterespionage goes beyond being reactive and actively tries to subvert hostile intelligence service, by recruiting agents in the foreign service, by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service. France, for example, builds its domestic counterterror in a law enforcement framework. Working under-cover from a flat in London, Melville ran both counterintelligence and foreign intelligence operations, capitalizing on the knowledge and foreign contacts he had accumulated during his years running Special Branch. Counterintelligence is information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements of foreign organizations, persons, or international terrorist activities. Intelligence is vulnerable not only to external but also to internal threats. The term counter-espionage is really specific to countering HUMINT, but, since virtually all offensive counterintelligence involves exploiting human sources, the term "offensive counterintelligence" is used here to avoid some ambiguous phrasing. understand counterintelligence or, who understanding its concepts, have climbed to the top of their career ladders by opposing it.” -- Senator Malcolm Wallop, Senate Intelligence Committee (1985) Counterintelligence is a fascinating and challenging discipline. Victor Suvorov, the pseudonym of a former Soviet military intelligence (GRU) officer, makes the point that a defecting HUMINT officer is a special threat to walk-in or other volunteer assets of the country that he is leaving. What is the purpose of the polygraph examination? Briefings could then be used to familiarize supported commands with the nature of the multidiscipline threat posed against the command or activity. Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities." CNI, which reports directly to the Prime Minister, is staffed principally by which is subordinated directly to the Prime Minister's office. Some people with changed spending may have a perfectly good reason, such as an inheritance or even winning the lottery, but such patterns should not be ignored. – Others find that espionage activity becomes stressful, they no longer want it. [15] The military has organic counterintelligence to meet specific military needs. As espionage became more widely used, it became imperative to expand the role of existing police and internal security forces into a role of detecting and countering foreign spies. Nosenko had exposed John Vassall, a KGB asset principally in the British Admiralty, but there were arguments Vassall was a KGB sacrifice to protect other operations, including Nosenko and a possibly more valuable source on the Royal Navy. When countering such threats as imaging satellites, awareness of the orbits can guide security personnel to stop an activity, or perhaps cover the sensitive parts, when the satellite is overhead. US military services have had a similar and even more complex split. Counterintelligence (CI) Scope Polygraph (CSP) CSP examinations may be conducted as part of initial personnel security vetting and may be administered at periodic or aperiodic intervals in support of reinvestigations or continuous evaluation. A component of this is the multidiscipline threat briefing. Defensive analysis is the practice of looking for vulnerabilities in one's own organization, and, with due regard for risk versus benefit, closing the discovered holes. The Counterintelligence Office was established pursuant to the Deputy Assistant Secretary of Defense, Counterintelligence and Security Countermeasures memorandum of Feb. 26, 1993. The Soviet operational officer, having seen a great deal of the ugly face of communism, very frequently feels the utmost repulsion to those who sell themselves to it willingly. counterintelligence Information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations, or foreign persons, or international terrorist activities. [3], The Okhrana[4] initially formed in 1880 to combat political terrorism and left-wing revolutionary activity throughout the Russian Empire, was also tasked with countering enemy espionage. Still, the FIS term remains the usual way of referring to the threat against which counterintelligence protects. Please help, Counterintelligence, counterterror, and government, Counterintelligence protection of intelligence services, Counterintelligence force protection source operations, Motivations for information and operations disclosure, Counter-MASINT (Measurement and Signature Intelligence). Glamour (if present earlier) subsides. [10], Many governments organize counterintelligence agencies separately and distinct from their intelligence collection services. The Okhrana became notorious for its use of agents provocateurs, who often succeeded in penetrating the activities of revolutionary groups - including the Bolsheviks.[6]. Army Regulation (AR) 381 – Hizballah leaders recruited replacements for those arrested, and continued planning for the attack. Counterintelligence is an integral part of the entire intelligence process. Developing, maintaining, and disseminating multidiscipline threat data and intelligence files on organizations, locations, and individuals of CI interest. Its purpose is to deter, detect, and neutralize the threat posed by hostile intelligence services against U.S. diplomatic personnel, facilities, equipment, and information. These are mutually reinforcing, often simultaneous events. Counterintelligence Force Protection Source Operations (CFSO) are human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander's intelligence requirements. Manipulating an intelligence professional, himself trained in counterintelligence, is no easy task, unless he is already predisposed toward the opposing side. The latter, headed by Sir Vernon Kell, originally aimed at calming public fears of large-scale German espionage. CI counters or neutralizes intelligence collection efforts through collection, CI investigations, operations, analysis and production, and functional and technical services. Terrorists on the other hand, although they engage in deception as a function of security appear to be more prone to manipulation or deception by a well-placed adversary than are foreign intelligence services. For international threats, the National Intelligence Center (CNI) has responsibility. The intelligence priority sometimes comes into conflict with the instincts of one's own law enforcement organizations, especially when the foreign threat combines foreign personnel with citizens of one's country. In many governments, the responsibility for protecting these things is split. They recognized American military personnel were billeted at Khobar Towers in the fall of 1994 and began surveillance of the facility, and continued to plan, in June 1995. The British government founded the Secret Service Bureau in 1909 as the first independent and interdepartmental agency fully in control over all government counterintelligence activities. From the perspective of one's own intelligence service, exploiting the situation to the advantage of one's side is usually preferable to arrest or actions that might result in the death of the threat. With the knowledge that Radiofrequency MASINT was being used to pick up an internal frequency in radio receivers, it would be possible to design a shielded receiver that would not radiate the signal that RAFTER monitored. For this purpose, the article reviews aspects of Israel’s security concept and the nature of the counterintelligence discipline and its implementation in Israel, and offers a framework for its integration into Israel’s security concept. "[17] Today's counterintelligence missions have broadened from the time when the threat was restricted to the foreign intelligence services (FIS) under the control of nation-states.