SlideShare une entreprise Scribd logo
1  sur  31
Counterintelligence   1
   At the end of this lesson, the student should be able to:

     Define COUNTERINTELLIGENCE;

     Identify the three types of counterintelligence;

     Describe how intelligence is safeguarded internally against
      counterintelligence;

     Understand various issues related to the classification of information;

     Define DECEPTION; and

     Assess the motivations and damage done by various spies in U.S.
      history.

                                Counterintelligence                             2
Efforts taken
 to protect one’s own intelligence operations
          from penetration and disruption
by hostile nations or their intelligence services.
     It is both analytical and operational.




                    Counterintelligence              3
   Collection: Gaining information about an opponent’s
    intelligence collection capabilities that may be aimed
    at you

   Defensive: Thwarting efforts by hostile intelligence
    services to penetrate your service

   Offensive: Having identified an opponent’s efforts
    against your system, trying to manipulate these
    attacks either by “turning” the opponent’s agents into
    double agents or by feeding them false information
    that they will report home
                         Counterintelligence                 4
Counterintelligence   5
   Try to determine where the
    officers go and with whom they
    communicate or are in contact
   TRADECRAFT is devoted primarily
    to frustrating this sort of activity
   Because this sort of surveillance is
    cumbersome and expensive, it is
    important to target it against
    actual intelligence officers

                        Counterintelligence   6
   Defector: A person who gives up allegiance
    to one country in exchange for allegiance to
    another. This act is usually in a manner which
    violates the laws of the nation from which the
    person is seeking to depart (as opposed to
    changing citizenship).



                      Counterintelligence            7
   Double Agent: A person who spies on a country
    while pretending to spy for it. A spy in the service
    of two rival countries or companies.
   Mole: A spy who becomes part of and works
    from within the ranks of an enemy
    governmental staff or intelligence agency.
   Dangle: An agent who pretends to volunteer to
    spy for the hostile intelligence service but in fact
    remains loyal to his/her country.

                        Counterintelligence                8
   Identify officers of the hostile intelligence service engaged in
    running agents
   Learn their adversaries’ operational methods
   Learn about their adversaries’ tradecraft and thus become better
    able counter it
   Examine specialized equipment provided to double agent by
    adversary
   Learn about the hostile service’s priorities
   May allow counterintelligence to dangle successfully another
    double agent


                               Counterintelligence                     9
   Sudden loss of a spy network
   Change in military patterns that corresponds to satellite
    tracks
   Penetration of the other service’s apparatus that reveals
    the possibility of having been penetrated as well
   Odd botched operation
   Failed espionage meeting or a negotiation in which the
    other side seems to be anticipating your bottom line


                           Counterintelligence                  10
Counterintelligence   11
   Classification of Information                 INFOSEC

   Personnel Security
                                          OPSEC
   Physical Security




                        Counterintelligence                 12
   Harry Truman established the
    first government-wide system of
    classification in 1951

   Current system is governed by an
    executive order promulgated by
    President Clinton in 1995


                     Counterintelligence   13
   Current classification in degrees of damage
    to national security
     Top secret: exceptionally grave damage
     Secret: serious damage
     Confidential: damage




                       Counterintelligence        14
 Background investigation
 Polygraph
 Determines if an individual can be granted a
 security clearance




                      Counterintelligence        15
 Seeks to safeguard not
               only the material object
               such as the documents
               that contain information,
               but also the information
               itself




Counterintelligence                        16
Counterintelligence   17
“the attempt to mislead
      an adversary’s intelligence analysis
concerning the political, military, or economic
                situation he faces,
              with the result that,
having formed a false picture of the situation,
he is led to act in a way that advances one’s
         interests rather than his own.”
                  Source: Shulsky, 117.


                   Counterintelligence            18
   Considered a form of counterintelligence
    because it attempts to thwart the fundamental
    purpose of the adversary’s intelligence
    operations
   Deception and intelligence failure are related
    things; one side’s successful deception implies
    the other side’s intelligence failure
   Deception can be attempted in wartime or
    peacetime, but it is much more prevalent during
    wartime
                       Counterintelligence            19
   Block: If too many true signals get through, the
    adversary is unlikely to be deceived

   Manufacture: Planned with adversary’s human
    and technical capabilities in mind

   Feedback:
     Were all the real signals blocked?
     Did manufactured signals reach the adversary?
     Were desired conclusions drawn?

                         Counterintelligence           20
Counterintelligence   21
   Covert
   Tendency to trust your own people who have
    been cleared and vetted
   Unwarranted suspicion can be just as
    debilitating as having a spy in the midst of an
    organization
   Source of friction between the CIA and FBI
   FBI has primary CI responsibility in the U.S.
                        Counterintelligence           22
   Identification of threats

   Monitoring of
    suspicious activity
    within local
    communities

   Community liaison

   CI component of law
    enforcement operations

                          Counterintelligence   23
    More about Denial
                 and Deception than
                 Offensive
                 Counterintelligence

                How do companies
                 accomplish CI?

                Is CI in business legal?

Counterintelligence                         24
   Prevent or neutralize the foreign acquisition of weapons of
    mass destruction (WMD) technology or equipment
   Prevent the penetration of the U.S. Intelligence
    Community
   Prevent the penetration of U.S. Government agencies or
    contractors
   Prevent the compromise of U.S. Critical National Assets
   Conduct aggressive CI operations focusing on those
    countries that constitute the most significant threat to
    U.S. Strategic interest

                           Counterintelligence                    25
   US is becoming more aggressive in CI

     2005 CI strategy called for pre-emptive action against
      foreign intelligence services viewed as threats to
      national security

     Office of the National Counterintelligence Executive
      (NCIX) created 2005

     2009 National Intelligence Strategy made
      counterintelligence a primary mission objective for
      the first time

                          Counterintelligence                  26
   2009 National Counterintelligence Strategy
    (approved in 2010) has 4 main goals:
      1. Detect insider threats
      2. Penetrate foreign services
      3. Integrate CI with cyber
      4. Assure the supply chain of the national
         security community “from foreign
         exploitation”
                      Counterintelligence          27
Klaus Fuchs                               Kim Philby, MI6                  Oleg Penkovsky, GRU
        TUBE ALLOYS/                                   (Britain)                            (USSR)
       Manhattan Project
         (Britain & US)
                                                   Source: http://www.bbc.co.uk/
Source: https://www.mi5.gov.uk/output/klaus-                                         Source: http://www.spymuseum.com/
                   fuchs.html                  history/worldwars/coldwar/cambridge      pages/agent-penkovsky-oleg.html
                                                         _spies_01.shtml




                                                    Counterintelligence                                            28
John Walker, US Navy                Jonathan Pollard, US Navy                            Ana Montes, DIA
Source: http://www.spymuseum.com/       Source: http://www.fbi.gov/about-us/           Source: http:// www.fbi.gov/news/
   pages/agent-walker-john.html     investigate/counterintelligence/cases/cases-1   stories/2008/september/montes_091209




                                               Counterintelligence                                                  29
Aldrich Ames, CIA                                           Robert Hanssen, FBI
    Source: http://www.gwu.edu~
nsarchiv/nsa/publications/ie/index.html                                       Source:
                                                                http://www.spymuseum.com/pages/agent-
                                                                          hanssen-robert.html




                                          Counterintelligence                                           30
   Spy Museum Interviews: http://spymuseum.org/from-
    spy/spycast
     June 4, 2010 features Martha Peterson, the first female CIA case
      officer in Moscow and discusses her capture by the KGB
     April 1, 2008 is about Col. Sergei Tretyakov, one of the most
      senior Russian defectors ever
     Oct. 1, 2007 features John Sullivan, the CIA’s longest-serving
      polygrapher
     Aug. 1, 2007 focuses on the Ana Montes case

   Teague, Matthew. 2006. “Double Blind: The Untold Story
    of how British Intelligence Infiltrated and Undermined the
    IRA” The Atlantic Monthly 297:53-62.

                              Counterintelligence                        31

Contenu connexe

Tendances

Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
Dr Paul Norman
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
Clifford Stone
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
Jose Van Tan
 
Role of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIARole of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIA
myeasyway
 

Tendances (20)

Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentation
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
Espionage
EspionageEspionage
Espionage
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Executive Protection
Executive ProtectionExecutive Protection
Executive Protection
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
 
Transnational crime
Transnational crimeTransnational crime
Transnational crime
 
World's Top 6 Intelligence Agencies
World's Top 6 Intelligence AgenciesWorld's Top 6 Intelligence Agencies
World's Top 6 Intelligence Agencies
 
Evidence Based Policing - Intro
Evidence Based Policing - IntroEvidence Based Policing - Intro
Evidence Based Policing - Intro
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Lesson plan 2.1 police ethics
Lesson plan 2.1 police ethicsLesson plan 2.1 police ethics
Lesson plan 2.1 police ethics
 
Criminal investigation presentation
Criminal investigation presentationCriminal investigation presentation
Criminal investigation presentation
 
cia
cia cia
cia
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Title ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the stateTitle ii crimes against fundamental laws of the state
Title ii crimes against fundamental laws of the state
 
Role of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIARole of CIA in Changing Strategic Operations of CIA
Role of CIA in Changing Strategic Operations of CIA
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 
The Israeli Intelligence Community Presentation
The Israeli Intelligence Community PresentationThe Israeli Intelligence Community Presentation
The Israeli Intelligence Community Presentation
 

En vedette

Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
IntelCollab.com
 
Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
Dario Ciro Vietri
 
Security training module
Security training moduleSecurity training module
Security training module
pagare_c
 

En vedette (8)

Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
Security Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security ModuleSecurity Awareness Training - Cyber Security Module
Security Awareness Training - Cyber Security Module
 
Security training module
Security training moduleSecurity training module
Security training module
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

Similaire à Counterintelligence

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
Kati Mccarthy
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
Valentin Vesa
 
INT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantINT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.Tallant
Eric Tallant
 
Covert action
Covert actionCovert action
Covert action
kelsports
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
melbruce90096
 
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
hyacinthshackley2629
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
OllieShoresna
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
Lori A. Ruff
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
aryan532920
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
Amber Wheeler
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
Blake Feldman
 
Question 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revQuestion 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, rev
kaylee7wsfdubill
 
Basic theories of Denial and Decept.docx
                           Basic theories of Denial and Decept.docx                           Basic theories of Denial and Decept.docx
Basic theories of Denial and Decept.docx
hallettfaustina
 

Similaire à Counterintelligence (20)

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
 
INT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.TallantINT476R.Martinez_FinalPaper_E.Tallant
INT476R.Martinez_FinalPaper_E.Tallant
 
Covert action
Covert actionCovert action
Covert action
 
Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docxW4 Lecture 1 The Landscape of Intelligence  Criminal Intellige.docx
W4 Lecture 1 The Landscape of Intelligence Criminal Intellige.docx
 
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
Steven Greer - CE5-CSETI - 19. Collection of Dr. Greer's Papers about Disclos...
 
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
11 Secret Intelligence, Covert Action and Clandestine Diplom.docx
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
INTRODUCTION & BACKGROUND Certain events in US history seldom c.docx
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren Chaker
 
Presentation democracy ethics vs. intelligencε security.
Presentation democracy ethics vs. intelligencε security.Presentation democracy ethics vs. intelligencε security.
Presentation democracy ethics vs. intelligencε security.
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
 
Question 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, revQuestion 1a· Using the government accountability office, rev
Question 1a· Using the government accountability office, rev
 
Basic theories of Denial and Decept.docx
                           Basic theories of Denial and Decept.docx                           Basic theories of Denial and Decept.docx
Basic theories of Denial and Decept.docx
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Counterintelligence

  • 2. At the end of this lesson, the student should be able to:  Define COUNTERINTELLIGENCE;  Identify the three types of counterintelligence;  Describe how intelligence is safeguarded internally against counterintelligence;  Understand various issues related to the classification of information;  Define DECEPTION; and  Assess the motivations and damage done by various spies in U.S. history. Counterintelligence 2
  • 3. Efforts taken to protect one’s own intelligence operations from penetration and disruption by hostile nations or their intelligence services. It is both analytical and operational. Counterintelligence 3
  • 4. Collection: Gaining information about an opponent’s intelligence collection capabilities that may be aimed at you  Defensive: Thwarting efforts by hostile intelligence services to penetrate your service  Offensive: Having identified an opponent’s efforts against your system, trying to manipulate these attacks either by “turning” the opponent’s agents into double agents or by feeding them false information that they will report home Counterintelligence 4
  • 6. Try to determine where the officers go and with whom they communicate or are in contact  TRADECRAFT is devoted primarily to frustrating this sort of activity  Because this sort of surveillance is cumbersome and expensive, it is important to target it against actual intelligence officers Counterintelligence 6
  • 7. Defector: A person who gives up allegiance to one country in exchange for allegiance to another. This act is usually in a manner which violates the laws of the nation from which the person is seeking to depart (as opposed to changing citizenship). Counterintelligence 7
  • 8. Double Agent: A person who spies on a country while pretending to spy for it. A spy in the service of two rival countries or companies.  Mole: A spy who becomes part of and works from within the ranks of an enemy governmental staff or intelligence agency.  Dangle: An agent who pretends to volunteer to spy for the hostile intelligence service but in fact remains loyal to his/her country. Counterintelligence 8
  • 9. Identify officers of the hostile intelligence service engaged in running agents  Learn their adversaries’ operational methods  Learn about their adversaries’ tradecraft and thus become better able counter it  Examine specialized equipment provided to double agent by adversary  Learn about the hostile service’s priorities  May allow counterintelligence to dangle successfully another double agent Counterintelligence 9
  • 10. Sudden loss of a spy network  Change in military patterns that corresponds to satellite tracks  Penetration of the other service’s apparatus that reveals the possibility of having been penetrated as well  Odd botched operation  Failed espionage meeting or a negotiation in which the other side seems to be anticipating your bottom line Counterintelligence 10
  • 12. Classification of Information INFOSEC  Personnel Security OPSEC  Physical Security Counterintelligence 12
  • 13. Harry Truman established the first government-wide system of classification in 1951  Current system is governed by an executive order promulgated by President Clinton in 1995 Counterintelligence 13
  • 14. Current classification in degrees of damage to national security  Top secret: exceptionally grave damage  Secret: serious damage  Confidential: damage Counterintelligence 14
  • 15.  Background investigation  Polygraph  Determines if an individual can be granted a security clearance Counterintelligence 15
  • 16.  Seeks to safeguard not only the material object such as the documents that contain information, but also the information itself Counterintelligence 16
  • 18. “the attempt to mislead an adversary’s intelligence analysis concerning the political, military, or economic situation he faces, with the result that, having formed a false picture of the situation, he is led to act in a way that advances one’s interests rather than his own.” Source: Shulsky, 117. Counterintelligence 18
  • 19. Considered a form of counterintelligence because it attempts to thwart the fundamental purpose of the adversary’s intelligence operations  Deception and intelligence failure are related things; one side’s successful deception implies the other side’s intelligence failure  Deception can be attempted in wartime or peacetime, but it is much more prevalent during wartime Counterintelligence 19
  • 20. Block: If too many true signals get through, the adversary is unlikely to be deceived  Manufacture: Planned with adversary’s human and technical capabilities in mind  Feedback:  Were all the real signals blocked?  Did manufactured signals reach the adversary?  Were desired conclusions drawn? Counterintelligence 20
  • 22. Covert  Tendency to trust your own people who have been cleared and vetted  Unwarranted suspicion can be just as debilitating as having a spy in the midst of an organization  Source of friction between the CIA and FBI  FBI has primary CI responsibility in the U.S. Counterintelligence 22
  • 23. Identification of threats  Monitoring of suspicious activity within local communities  Community liaison  CI component of law enforcement operations Counterintelligence 23
  • 24. More about Denial and Deception than Offensive Counterintelligence  How do companies accomplish CI?  Is CI in business legal? Counterintelligence 24
  • 25. Prevent or neutralize the foreign acquisition of weapons of mass destruction (WMD) technology or equipment  Prevent the penetration of the U.S. Intelligence Community  Prevent the penetration of U.S. Government agencies or contractors  Prevent the compromise of U.S. Critical National Assets  Conduct aggressive CI operations focusing on those countries that constitute the most significant threat to U.S. Strategic interest Counterintelligence 25
  • 26. US is becoming more aggressive in CI  2005 CI strategy called for pre-emptive action against foreign intelligence services viewed as threats to national security  Office of the National Counterintelligence Executive (NCIX) created 2005  2009 National Intelligence Strategy made counterintelligence a primary mission objective for the first time Counterintelligence 26
  • 27. 2009 National Counterintelligence Strategy (approved in 2010) has 4 main goals: 1. Detect insider threats 2. Penetrate foreign services 3. Integrate CI with cyber 4. Assure the supply chain of the national security community “from foreign exploitation” Counterintelligence 27
  • 28. Klaus Fuchs Kim Philby, MI6 Oleg Penkovsky, GRU TUBE ALLOYS/ (Britain) (USSR) Manhattan Project (Britain & US) Source: http://www.bbc.co.uk/ Source: https://www.mi5.gov.uk/output/klaus- Source: http://www.spymuseum.com/ fuchs.html history/worldwars/coldwar/cambridge pages/agent-penkovsky-oleg.html _spies_01.shtml Counterintelligence 28
  • 29. John Walker, US Navy Jonathan Pollard, US Navy Ana Montes, DIA Source: http://www.spymuseum.com/ Source: http://www.fbi.gov/about-us/ Source: http:// www.fbi.gov/news/ pages/agent-walker-john.html investigate/counterintelligence/cases/cases-1 stories/2008/september/montes_091209 Counterintelligence 29
  • 30. Aldrich Ames, CIA Robert Hanssen, FBI Source: http://www.gwu.edu~ nsarchiv/nsa/publications/ie/index.html Source: http://www.spymuseum.com/pages/agent- hanssen-robert.html Counterintelligence 30
  • 31. Spy Museum Interviews: http://spymuseum.org/from- spy/spycast  June 4, 2010 features Martha Peterson, the first female CIA case officer in Moscow and discusses her capture by the KGB  April 1, 2008 is about Col. Sergei Tretyakov, one of the most senior Russian defectors ever  Oct. 1, 2007 features John Sullivan, the CIA’s longest-serving polygrapher  Aug. 1, 2007 focuses on the Ana Montes case  Teague, Matthew. 2006. “Double Blind: The Untold Story of how British Intelligence Infiltrated and Undermined the IRA” The Atlantic Monthly 297:53-62. Counterintelligence 31