SlideShare a Scribd company logo
1 of 45
COUNTERINTELLIGENCE
CHAPTER 7
COUNTERINTELLIGENCE (CI)
• Refers to efforts taken to protect one's own intelligence operations
from penetration and disruption by hostile nations or their
intelligence services.
• CI Should pervade all aspects of intelligence, but it is often pigeon-
holed as a security issue.
• CI does not fit neatly with human intelligence, although CI is, in part,
a collection issue. Nor does it fit with Covert action.
• Successful CI can also lead to analytical and operational
opportunities.
2
COUNTERINTELLIGENCE (CI)
• This makes CI one of the most difficult intelligence
topics to discuss.
• Most nations have intelligence enterprises of some
sort. As a result, these agencies are valuable
Intelligence targets for other nations.
• Knowing if the other side is undertaking similar
Efforts is extremely helpful. As well as knowing
what they know.
3
COUNTERINTELLIGENCE (CI)
However, counterintelligence is more than a defensive activity. There are at least
three types of CI.
– Collection: gaining information about an opponent's intelligence collection capabilities
that
– May be aimed at one's own country
– Defensive: thwarting efforts by hostile intelligence services to penetrate one's service
– Offensive: having identified an opponent's efforts against one's own system, trying to
Manipulate these attacks either by turning the opponent's agents into double agents or
by Feeding them false information that they report home
The world of spy and counterspy is murky at best. Like espionage,
counterintelligence is a staple of Intelligence fiction.
4
INTERNAL SAFEGUARDS
• All intelligence agencies establish a series of internal processes
and checks, the main purposes of which are to weed out applicants
who may be unsuitable and to identify current employees whose
Loyalty or activities are questionable.
• The vetting process for applicants includes extensive Background
checks, interviews with the applicants and close associates, and, in
the United States at Least, the use of the polygraph at most
agencies.
• Most applicants likely have engaged in some level of
experimentation:
• sexual • drugs • both
5
INTERNAL SAFEGUARDS
• Some may have committed minor criminal offenses.
• It is crucial, However, that applicants be forthcoming about their
past and be able to prove that they are no longer Exhibiting
behaviors that are criminal, dangerous, or susceptible to blackmail.
• The ideal candidate is not necessarily someone whose past record
is spotless.
6
WHO SPIES ON WHOM?
• Some people assume that friendly spy agencies do not spy on one
another But what constitutes "Friendly“
 The United States and its "Commonwealth cousins”
 Australia
 Britain
 Canada
Enjoy a close intelligence partnership and do not spy on one another.
Beyond that, all bets are off
7
WHO SPIES ON WHOM?
• 1990s, the United States allegedly spied on France for economic
intelligence.
• In the 1980s, Israel willingly used Jonathan Pollard, a U.S. Navy
intelligence employee who passed Sensitive U.S. Intelligence that
he believed Israel needed to know.
– Aldrich Ames
– Robert Hanssen
• In the late 1990s, China stole nuclear secrets from the United
States at a time when the two nations were strategic partners
against the Soviet Union.
8
He betrayed his country, betrayed his
fellow Americans for no reason other
than greed, and he caused irreparable
harm to the national security of the
United States." - US Attorney Ken
Melson
For decades, thousands of Americans
in the Government and private sector
sworn oaths of allegiance to the
States. The vast majority of these
have honored their oaths and served
pride, loyalty, and integrity. However,
have faltered in their allegiance,
discredit to their country, families,
themselves. Such is the case of Robert
Hanssen, whose lust for fame,
and self-gratification led to his
downfall as a betrayer of the United
9
"A nation can survive its
fools and even the
ambitious. But it cannot
survive treason from
within." -Cicero (106-43
B.C.)
This quote illustrates the
seriousness of the insider
threat as well as the length
of time this threat has been
a concern. This poster
highlights Cuba because of
the success their recruited
insiders have had against
the United States over the
years. 10
The Man of Steel's
x-ray vision can't
detect the spies
among us, but we
mere mortals,
armed with the right
information, can.
Practice good
security and report
suspicious
behavior, and you,
too can become a
CI Super Hero!
11
A longstanding premise in
U.S. Government circles
is that a security
clearance does not equal
"Need to Know."
This is a critical issue
since the continued loss
of National Security
information through
unauthorized disclosures
denigrates America's
most sensitive
intelligence and analytic
capabilities.
12
The 1st Amendment to
the Constitution of the
United States was
enacted to guarantee
freedom of speech and
freedom of the press.
Violating this given right,
by either leaking or
mishandling sensitive
information is not only
wrong, it can endanger
the lives of others and the
security of the United
States of America.
13
The pictures of seven
convicted spies and a quote
from George Washington. In
the ensuing years, the
number of convicted spies
has increased, not
withstanding Washington's
warning that
"There is one evil I dread, and
that is, their spies. I could
wish, therefore, the most
attentive watch be kept..."
14
WHO SPIES ON WHOM?
• In the 1970s a "senior U.S. government official" (probably Secretary
of State Henry A. Kissinger) observed, "There is no such thing as
'friendly' intelligence agencies. There are only The Intelligence
agencies of friendly powers,“
"WHAT'S A LITTLE SPYING AMONG FRIENDS? If that
weren't the case, then there'd be no use for an intelligence
service," Obama told reporters in Tanzania.
"The United States and its coalition 'Five Eye' partners enjoy a close intelligence partnership and
do not spy each on each other," writes former CIA officer Mark Lowenthal in his book
"Intelligence: From Secrets to Policy." The group includes the U.S., Britain, Australia, Canada and
New Zealand. "Beyond that, all bets are off," he writes.
15
Americans who spied for foreign countries
CIA
• Aldrich Ames (1994)
• David Henry Barnett (1976)
• Larry Wu-Tai Chin (1985)
• William Kampiles (1977)
• Harold James Nicholson (1996)
• Sharon M. Scranage (1985)
NSA
• David Sheldon Boone (1988 to 1991)
• Ronald Pelton (1980)
FBI
• Robert Hanssen (1979 to 2001)
• Richard Miller (1984)
• Earl Edwin Pitts (1987 to 1992)
Armed Forces
• Clayton John Lonetree (1987)
• Morris Cohen (1961)
• John Anthony Walker (1967)
Other
• Kendall Myers (2009)
Federal Contractors
• Christopher John Boyce (1977)
• Andrew Daulton Lee (1977)
• Jonathan Pollard (1984)
• Stewart Nozette (2009)
16
Interview of Eric O'Neill by KTLA
17
Jonathan Pollard Revealed 1985
18
1994 Aldrich Ames Arrested for Espionage
19
WHY SPY?
• U.S. counterintelligence emphasizes personal financial issues in
assessing security risks. Many people involved in the worst espionage
cases suffered by the United States.
– Aldrich Ames,
– Robert Hanssen,
– The Walker spy ring,
– Ronald Pelton.
• They Were motivated largely by greed, not ideology. Some exceptions
were Julius Rosenberg, Alger Hiss, Larry Wu-tai Chin, and Ana Montes.
20
WHY SPY?
• By contrast, many involved in the worst espionage cases in Britain,
for example? Spied because of ideological devotion to the Soviet
Union.
– Kim Philly and his associates or
– George Blake
• Although espionage cases of either type (greed or ideology) can
arise in either country, some
• Observers have been struck by the difference. It can be explained,
in part, by the fact that Britain has had (and still has) a class system
that makes ideology a more likely reason for betrayal.
21
WHY SPY?
• In the United States, the main competition has always been based
on economic status, not social class spies may also be motivated
by vengeance toward superiors or agencies, by blackmail against
themselves or family members, by thrills, or by involvement with a
foreign national.
• However, a Defense Department study released in April 2008 found
that "divided loyalty" between the United States and the nation
enlisting the spy had greatly increased as a motive for espionage.
• Although "need to know" was the standard for decades, in the
aftermath of the terrorist attacks, many felt that this standard also
served to impede the necessary sharing of intelligence.
22
WHY SPY?
• In 2003, the Intelligence community began to stress the "need to
share," an important shift in emphasis.
• The clearest sign of this "data ownership" concept was the
classification marking ORCON, or "originator controlled.” ORCON
means that any further distribution of intelligence or its inclusion in
another document must be approved by the originating agency.
• ORCON reflects the concern that the intelligence could reveal a
sensitive source or method, a sensitivity that those wishing to use
the intelligence more broadly might not appreciate.
23
WHY SPY?
• In 2007, Director of National Intelligence (DNI) Mike McConnell signaled a
change in emphasis by promulgating a "responsibility to provide"
standard.
• In other words, officers and agencies now will be evaluated by the degree
to which they actively seek to share intelligence.
• Indirect costs include safes, couriers, and security officers to check
officers' clearances, and color-coded or numerically tagged papers, to
name a few.
• Other safeguards include the certified destruction of discarded material;
the use of secure phones, which cannot be easily tapped, for classified
conversations, In addition restricted access to buildings or to parts of
buildings where sensitive material is used.
24
WHY SPY?
• It is also means, in a period of greatly increased hiring, like the one
that began across the intelligence community in 2001, that hiring
delays will likely increase.
• The risk-avoidance approach also means that some candidates,
who may not actually pose a security risk, will not be hired because
of the guiding cautious approach.
• There is evidence to suggest that these candidates face particular
burdens under the risk avoidance approach, out of fear of divided
loyalties, family left behind whose influence is unknown or who
could become subject to external pressure, and so on.
25
WHY SPY?
• There is an irony here in that most of the worst espionage breaches
suffered by the United States came from individuals whose families
had been here for generations.
• As sensible as this approach may be, it can run into opposition from
those people who are supposed to administer it, the individuals
responsible for personnel security.
• These individuals are unlikely to see any benefit to clearing more
people if this means they have also cleared the individual who
becomes a security threat.
• This personnel policy shift will be an interesting test of the DNI's
authority over intelligence officers who work in agencies that the
DNI does not control directly.
26
Polygraph
• A polygraph (popularly referred to as a lie detector) measures and
records several physiological signs such as blood pressure, pulse,
respiration, and skin conductivity while the subject is asked and
answers a series of questions.
• The polygraph was on the Encyclopedia Britannica 2003 list of
greatest inventions, described as inventions that "have had
profound effects on human life for better or worse." The efficacy of
polygraphs is debated in the scientific community.
• The polygraph was invented in 1921 by John Augustus Larson, a
medical student at the UC Berkeley & a police officer of the
Berkeley PD.
• In some countries polygraphs are used as an interrogation tool with
criminal suspects or candidates for sensitive public or private sector
employment.
27
Polygraph
• In 2002, a review by the National Academies of Science found that
in populations untrained in countermeasures, polygraph testing can
discriminate lying from truth telling at rates above chance, though
below perfection.
• US law enforcement and federal government agencies such as the
FBI and the CIA and many police departments such as the LAPD
use polygraph examinations to interrogate suspects and screen
new employees.
• The belief underpinning the use of the polygraph is that deceptive
answers will produce physiological responses that can be
differentiated from those associated with non-deceptive answers,
i.e., the polygraph is used for lie detection.
• Effectiveness may also be worsened by counter measures.
28
• The polygraph, sometimes
mistakenly referred to as a lie
detector, is a machine that
monitors Physical responses
(such as pulse and breathing
rate) to a series of questions
A 2002 study by the National
Research Council found that
polygraphs are more useful in
criminal investigations, where
specific questions can be
asked, than for
counterintelligence, where
the questions are more
general and therefore are
more likely to yield false-
positive responses.
29
• In addition to new employees,
current Employees are
polygraphed at intervals of several
years; contractors are subject to
polygraphs; and the machines are
used with defectors.
• The Central Intelligence Agency
(CIA), Defense Intelligence
Agency (DIA), National
Reconnaissance Office, and
National Security Agency (NSA) all
use polygraphs; the State
Department and Congress do not.
• The Federal Bureau of
Investigation (FBI) began using
Polygraphs in the aftermath of the
2001 Robert Hanssen espionage
case, which revealed that
Polygraphs had not been in use at
the FBI.
30
• Despite the fact that so many agencies use polygraphs as part of
their security practice, there is no Standard procedure for these
tests.
• Each agency administers polygraphs to its own standards, which,
according to press accounts, can lead to different results for the
same subject.
• Thus, intelligence agencies have what they call the lifestyle poly
(Personal Behavior) and the counterintelligence poly (foreign
contacts, handling of classified information).
• Beyond taking a polygraph (known as "being put on the box"),
employees and prospective Employees are evaluated for other
possible indicators of disloyalty.
• Intelligence increased the amount of personal financial information
that intelligence personnel must report on a regular basis.
31
EXTERNAL INDICATORS AND
COUNTERESPIONAGE
• Besides internal measures taken to prevent or to identify problems,
counterintelligence agents look for external indicators of problems.
• They may be more obvious, such as the sudden loss of a spy network overseas,
a change in military exercise patterns that corresponds to satellite tracks, or a
penetration of the other services apparatus that reveals the possibility of ones
own having been penetrated as well.
• As VENONA showed, SIGINT can offer indications of ongoing espionage,
although the references to spying may be oblique and are unlikely to identify the
spy outright.
• The serious problems resulting from having been penetrated by a hostile service
also highlight the gains to be made by carrying out ones own successful
penetration of the hostile service.
• Possible penetrations of ones own service or other services; The agents also
present opportunities, as they are conduits to their own intelligence services.
32
PROBLEMS IN
COUNTERINTELLIGENCE
• Several problems arise in assessing counterintelligence operations.
• First, by its very nature, any counterintelligence penetration is going to be
covert.
• Counterintelligence officers are unlikely to come across initially compelling
evidence about a successful hostile penetration.
• Second, the basic tendency within any intelligence organization (or any
organization, for that matter) is to trust its own people, who have been
vetted and cleared.
• This appears to have been a problem in uncovering the espionage of
Ames; the CIA was slow to look inward for the cause of severe losses of
assets in Moscow.
33
PROBLEMS IN
COUNTERINTELLIGENCE
• It was originally thought that Hanssen escaped detection for more than
twenty years because of his familiarity with U.S. counterintelligence policy
and techniques.
• However, a 2003 report by the Inspector General of the Justice
Department (the FBI is part of that department) found that internal laxity
and poor oversight allowed Hanssen, who was portrayed as erratic and
bumbling, to avoid detection.
• Most telling, the FBI first concentrated on a CIA officer when hunting for
the spy who turned out to be one of his or her own, Hanssen.
• James Angleton, who was in charge of the CIA's counterintelligence from
1954 to 1974, became convinced that a Soviet mole; A deeply hidden spy;
had penetrated the CIA.
• Angleton was unable to find the mole, and some believe that he tied the
CIA in knots by placing virtually anyone under suspicion.
34
PROBLEMS IN
COUNTERINTELLIGENCE
• Angleton remains a controversial figure, but his activities give Some
indication of the intellectual issues that can be involved me in spying and
counterintelligence.
• For many years counterintelligence was a major source of friction
between the CIA and the FBI.
• Lee, who was born in Taiwan, had been under investigation since 1994,
but the investigation was fitful and inconclusive.
• A good example is Edward Howard, a CIA Directorate of Operations (DO)
officer who was slated to be posted to Moscow in the 1980s.
• He eluded surveillance (using techniques he learned as a DO officer) and
fled to Moscow, claiming that he had not been a spy but had been driven
away by the CIA.
35
PROBLEMS IN
COUNTERINTELLIGENCE
• If One is able to answer this question it will reveal the nature of the penetration
and the goals of the Nation running the spy.
• Once a spy has been identified and arrested, the intelligence community
conducts a damage assessment, to determine what intelligence has been
compromised.
• In the United States, this cooperation often becomes a major negotiating point
between government prosecutors and the spy's attorney: cooperation in
exchange for a specific sentence or for consideration for the spy's family.
• Domestic phones can be tapped, but only after intelligence agents have obtained
a warrant from a special federal court (the foreign Intelligence Surveillance Act
Court), which was set up by the Foreign Intelligence Surveillance Act of 1978
(FISA, pronounced "fy-za").
• Prosecuting intelligence officers for spying was a major concern for the
intelligence agencies, which feared that accused spies, would threaten to reveal
classified information in open court as a means of avoiding prosecution.
36
PROBLEMS IN
COUNTERINTELLIGENCE
• In 1999, as part of government-wide response to revelations about
Chinese espionage, the FBI Proposed splitting its National Security
division into two separate units, one to deal with counterespionage and
the other with terrorism in 2003, the FBI created an Intelligence Division,
concentrating primarily on terrorism the 2004 intelligence legislation
formally recognized the new Office as the Intelligence Directorate.
• In addition to the FBI, which has the primary CI responsibility in the United
States, and the CIA, the Defense Investigative Service and the
counterintelligence units of virtually all intelligence agencies Or offices
share some CI responsibility.
• The diffusion of the CI effort reflects the organization of the community
and also highlights why coordination on CI cases has been problematic.
37
Great moments in espionage
38
LEAKS
• They may not be seen as being as dangerous as an espionage penetration
but they can have obvious counterintelligence concerns, because leaks often
entail the unauthorized release of classified information.
• (President Franklin Roosevelt, decrying leaks during his tenure, wondered
why the British had so many fewer leaks, even though Britain had freedom of
speech and tea parties.) The Intelligence Identities Protection Act (1982)
makes it a crime for someone who has access to classified information to
reveal the identity of a covert agent.
• The "pattern of activities" clause was aimed at individuals such as former CIA
officer Philip Agree, who made a practice of revealing the identity of CIA case
officers overseas after he quit the CIA.
• The Espionage Act (1917) has also been used in leak prosecutions.
39
LEAKS
• Enacted months prior to the United States' entry into World War 1, this act
covers traditional espionage but is also deemed broad enough to cover leaks,
even of information that is not classified but is related to the national defense.
• Use of the Espionage Act became controversial in 2006 when it was used as
the basis for prosecuting two officials of the American Israel Public Affairs
Committee (commonly called AIPAC) who received classified information
from a DOD official, Lawrence Franklin, and then passed it on to an Israeli
official and a journalist.
• It can be argued that the president cannot leak because the president also
has the right to declassify intelligence, but the motives behind a revelation
can be debated, as they were in this case.
40
Bradley Manning Sentenced To 35 Years
For Espionage
41
NATIONAL SECURITY LETTERS
• One investigative technique that has been used in espionage
cases, as well as counterterrorism, is National security letters
(NSLs).
• The USA Patriot Act, passed after the 2001 attacks, expanded the
authority to issue NSLs from FBI headquarters only to field offices,
included terrorism as a cause as well as espionage, and eliminated
the requirement that the information being sought pertain to a
Foreign power or its agent.
• The most obvious is the fact that they are not subject to judicial
review and that they come under a gag order, which raises civil
liberties concerns.
• Second, The use of NSLs has expanded greatly since 2001.
42
43
CONCLUSION
• As VENONA confirms, the espionage threat during the cold war was
pointed and obvious.
• Russian espionage did not end with the cold war. Neither did U.S.
activities against Russia, given the Russians arrested Agent of
Ames's spying or the source who led to Hanssen.
• In 2003, Russia arrested Alexander Zaporozhsky, a former
intelligence officer who had settled in the U.S. but had been lured
Back to Russia, was sentenced to eighteen years for spying for the
U. S.
• In 1999, The Cox Committee found that China had stolen U.S.
nuclear weapons designs during the 1980s, when the two states
were tacit allies against the Soviet Union.
44
• A 2002 report prepared for Congress listed China, France, India,
Israel, Japan, and Taiwan as being among the most active
collectors.
• In 2001, Ana Belen Montes, a DIA analyst, was arrested for spying
for Cuba. U.S. officials assume that much of the intelligence that
Montes provided over seventeen years was shared by Cuba with
Russia and possibly other nations.
• A 2002 report. Espionage against the U. S. by American Citizens,
1947-2001, prepared by the Defense Personnel Security Research
Center, noted changes in the demographics of U.S. citizens who
spied against their country. .
• Since the end of the Cold war, spies have tended to be older, to
have lower clearances, to be naturalized citizens instead of native-
born, and to include more women. Thus, it would be naive to
believe that the need for rigorous counter intelligence and
counterespionage ceased with the end of the cold war.
45

More Related Content

What's hot

POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxRoland994165
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manualLord Gonzaga
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceDoing What I Do
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigationjaredplata
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentationiChange
 
Covert action
Covert actionCovert action
Covert actionkelsports
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
15 crisis hostage negotiation
15 crisis hostage negotiation15 crisis hostage negotiation
15 crisis hostage negotiationDon Thompson
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionagedgnadt
 
Fourth Amendment
Fourth AmendmentFourth Amendment
Fourth Amendmentlisajurs
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR TraitorApijay Kumar
 
Cyber Deception - AttivoNetwork
Cyber Deception - AttivoNetworkCyber Deception - AttivoNetwork
Cyber Deception - AttivoNetworkVu Duc Du
 

What's hot (20)

POLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptxPOLICE INTELLIGENCE ppt.pptx
POLICE INTELLIGENCE ppt.pptx
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
Chapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligenceChapter 2 part 1 the development of the u s intelligence
Chapter 2 part 1 the development of the u s intelligence
 
Intelligence Cycle
Intelligence CycleIntelligence Cycle
Intelligence Cycle
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 
Intelligence presentation
Intelligence presentationIntelligence presentation
Intelligence presentation
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Covert action
Covert actionCovert action
Covert action
 
Sabotage
Sabotage Sabotage
Sabotage
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
15 crisis hostage negotiation
15 crisis hostage negotiation15 crisis hostage negotiation
15 crisis hostage negotiation
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionage
 
Fourth Amendment
Fourth AmendmentFourth Amendment
Fourth Amendment
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Snowden -Hero OR Traitor
Snowden -Hero OR TraitorSnowden -Hero OR Traitor
Snowden -Hero OR Traitor
 
Cyber Deception - AttivoNetwork
Cyber Deception - AttivoNetworkCyber Deception - AttivoNetwork
Cyber Deception - AttivoNetwork
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 

Viewers also liked

Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy makerDoing What I Do
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...IntelCollab.com
 
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...Ian McCarthy
 
Types of US Military Aircraft
Types of US Military AircraftTypes of US Military Aircraft
Types of US Military Aircrafttoothsomeauger257
 
Language Learning Game Concept
Language Learning Game ConceptLanguage Learning Game Concept
Language Learning Game ConceptManish Vashist
 
HOSTILE CONTROL TACTICS, GSA Supply Schedule
HOSTILE CONTROL TACTICS, GSA Supply ScheduleHOSTILE CONTROL TACTICS, GSA Supply Schedule
HOSTILE CONTROL TACTICS, GSA Supply ScheduleKevin D. James
 
Second ARC (Eighth report) combating terrorism
Second ARC (Eighth report) combating terrorismSecond ARC (Eighth report) combating terrorism
Second ARC (Eighth report) combating terrorismConsultant
 
CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach BarberZachary Barber
 
Emergency Rescue and Transfer
Emergency Rescue and TransferEmergency Rescue and Transfer
Emergency Rescue and TransferSam Olayvar
 

Viewers also liked (14)

Cover overt
Cover overtCover overt
Cover overt
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
How Internal Human Intelligence Networks (HUMINT) Develop External Primary So...
 
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
We’re Leaking, and Everything’s Fine: How and Why Companies Deliberately Leak...
 
Types of US Military Aircraft
Types of US Military AircraftTypes of US Military Aircraft
Types of US Military Aircraft
 
Language Learning Game Concept
Language Learning Game ConceptLanguage Learning Game Concept
Language Learning Game Concept
 
Acs Survival Skills Uburban
Acs Survival Skills UburbanAcs Survival Skills Uburban
Acs Survival Skills Uburban
 
HOSTILE CONTROL TACTICS, GSA Supply Schedule
HOSTILE CONTROL TACTICS, GSA Supply ScheduleHOSTILE CONTROL TACTICS, GSA Supply Schedule
HOSTILE CONTROL TACTICS, GSA Supply Schedule
 
Second ARC (Eighth report) combating terrorism
Second ARC (Eighth report) combating terrorismSecond ARC (Eighth report) combating terrorism
Second ARC (Eighth report) combating terrorism
 
CIA power point Zach Barber
CIA power point Zach BarberCIA power point Zach Barber
CIA power point Zach Barber
 
Survival skills
Survival skillsSurvival skills
Survival skills
 
Emergency Rescue and Transfer
Emergency Rescue and TransferEmergency Rescue and Transfer
Emergency Rescue and Transfer
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 

Similar to 402 chapter 7 counterintelligence

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsKati Mccarthy
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceAmber Wheeler
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018JErickPPTs
 
What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-ApprovedDuane Blackburn
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on futureRobert David Steele Vivas
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWINGAjeesh Mk
 
CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network
CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their NetworkCISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network
CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their NetworkSteven Wardell
 
8. Whistle Blowing.pptx By Akshit Jain .
8. Whistle Blowing.pptx By Akshit Jain   .8. Whistle Blowing.pptx By Akshit Jain   .
8. Whistle Blowing.pptx By Akshit Jain .Akshit Jain
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION Valentin Vesa
 

Similar to 402 chapter 7 counterintelligence (11)

Domestic Surveillance_ProsandCons
Domestic Surveillance_ProsandConsDomestic Surveillance_ProsandCons
Domestic Surveillance_ProsandCons
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
 
What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWING
 
CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network
CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their NetworkCISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network
CISummit 2013: Tom McAndrew, Discover Your Insider Threats through Their Network
 
whistleblowing
whistleblowingwhistleblowing
whistleblowing
 
8. Whistle Blowing.pptx By Akshit Jain .
8. Whistle Blowing.pptx By Akshit Jain   .8. Whistle Blowing.pptx By Akshit Jain   .
8. Whistle Blowing.pptx By Akshit Jain .
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
 

More from Doing What I Do (17)

403 10
403 10403 10
403 10
 
403 14
403 14403 14
403 14
 
403 12
403 12403 12
403 12
 
403 13
403 13403 13
403 13
 
403 2
403 2403 2
403 2
 
403 11
403 11403 11
403 11
 
403 9
403 9403 9
403 9
 
403 8
403 8403 8
403 8
 
403 4
403 4403 4
403 4
 
403 3
403 3403 3
403 3
 
403 1
403 1403 1
403 1
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Chapter 1 what is intelligence
Chapter 1 what is intelligenceChapter 1 what is intelligence
Chapter 1 what is intelligence
 

Recently uploaded

Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOMAIRIEORGERUS
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfCharlynTorres1
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingSERUDS INDIA
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书zdzoqco
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...Amil baba
 

Recently uploaded (20)

Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesMadurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Madurai Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdfMonastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
Monastic-Supremacy-in-the-Philippines-_20240328_092725_0000.pdf
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
Stop throwing your old clothes and start donating
Stop throwing your old clothes and start donatingStop throwing your old clothes and start donating
Stop throwing your old clothes and start donating
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书办理约克大学毕业证成绩单|购买加拿大文凭证书
办理约克大学毕业证成绩单|购买加拿大文凭证书
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in DLF Phase 1  gurgaon  🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in DLF Phase 1 gurgaon 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
NO1 Certified kala jadu Love Marriage Black Magic Punjab Powerful Black Magic...
 

402 chapter 7 counterintelligence

  • 2. COUNTERINTELLIGENCE (CI) • Refers to efforts taken to protect one's own intelligence operations from penetration and disruption by hostile nations or their intelligence services. • CI Should pervade all aspects of intelligence, but it is often pigeon- holed as a security issue. • CI does not fit neatly with human intelligence, although CI is, in part, a collection issue. Nor does it fit with Covert action. • Successful CI can also lead to analytical and operational opportunities. 2
  • 3. COUNTERINTELLIGENCE (CI) • This makes CI one of the most difficult intelligence topics to discuss. • Most nations have intelligence enterprises of some sort. As a result, these agencies are valuable Intelligence targets for other nations. • Knowing if the other side is undertaking similar Efforts is extremely helpful. As well as knowing what they know. 3
  • 4. COUNTERINTELLIGENCE (CI) However, counterintelligence is more than a defensive activity. There are at least three types of CI. – Collection: gaining information about an opponent's intelligence collection capabilities that – May be aimed at one's own country – Defensive: thwarting efforts by hostile intelligence services to penetrate one's service – Offensive: having identified an opponent's efforts against one's own system, trying to Manipulate these attacks either by turning the opponent's agents into double agents or by Feeding them false information that they report home The world of spy and counterspy is murky at best. Like espionage, counterintelligence is a staple of Intelligence fiction. 4
  • 5. INTERNAL SAFEGUARDS • All intelligence agencies establish a series of internal processes and checks, the main purposes of which are to weed out applicants who may be unsuitable and to identify current employees whose Loyalty or activities are questionable. • The vetting process for applicants includes extensive Background checks, interviews with the applicants and close associates, and, in the United States at Least, the use of the polygraph at most agencies. • Most applicants likely have engaged in some level of experimentation: • sexual • drugs • both 5
  • 6. INTERNAL SAFEGUARDS • Some may have committed minor criminal offenses. • It is crucial, However, that applicants be forthcoming about their past and be able to prove that they are no longer Exhibiting behaviors that are criminal, dangerous, or susceptible to blackmail. • The ideal candidate is not necessarily someone whose past record is spotless. 6
  • 7. WHO SPIES ON WHOM? • Some people assume that friendly spy agencies do not spy on one another But what constitutes "Friendly“  The United States and its "Commonwealth cousins”  Australia  Britain  Canada Enjoy a close intelligence partnership and do not spy on one another. Beyond that, all bets are off 7
  • 8. WHO SPIES ON WHOM? • 1990s, the United States allegedly spied on France for economic intelligence. • In the 1980s, Israel willingly used Jonathan Pollard, a U.S. Navy intelligence employee who passed Sensitive U.S. Intelligence that he believed Israel needed to know. – Aldrich Ames – Robert Hanssen • In the late 1990s, China stole nuclear secrets from the United States at a time when the two nations were strategic partners against the Soviet Union. 8
  • 9. He betrayed his country, betrayed his fellow Americans for no reason other than greed, and he caused irreparable harm to the national security of the United States." - US Attorney Ken Melson For decades, thousands of Americans in the Government and private sector sworn oaths of allegiance to the States. The vast majority of these have honored their oaths and served pride, loyalty, and integrity. However, have faltered in their allegiance, discredit to their country, families, themselves. Such is the case of Robert Hanssen, whose lust for fame, and self-gratification led to his downfall as a betrayer of the United 9
  • 10. "A nation can survive its fools and even the ambitious. But it cannot survive treason from within." -Cicero (106-43 B.C.) This quote illustrates the seriousness of the insider threat as well as the length of time this threat has been a concern. This poster highlights Cuba because of the success their recruited insiders have had against the United States over the years. 10
  • 11. The Man of Steel's x-ray vision can't detect the spies among us, but we mere mortals, armed with the right information, can. Practice good security and report suspicious behavior, and you, too can become a CI Super Hero! 11
  • 12. A longstanding premise in U.S. Government circles is that a security clearance does not equal "Need to Know." This is a critical issue since the continued loss of National Security information through unauthorized disclosures denigrates America's most sensitive intelligence and analytic capabilities. 12
  • 13. The 1st Amendment to the Constitution of the United States was enacted to guarantee freedom of speech and freedom of the press. Violating this given right, by either leaking or mishandling sensitive information is not only wrong, it can endanger the lives of others and the security of the United States of America. 13
  • 14. The pictures of seven convicted spies and a quote from George Washington. In the ensuing years, the number of convicted spies has increased, not withstanding Washington's warning that "There is one evil I dread, and that is, their spies. I could wish, therefore, the most attentive watch be kept..." 14
  • 15. WHO SPIES ON WHOM? • In the 1970s a "senior U.S. government official" (probably Secretary of State Henry A. Kissinger) observed, "There is no such thing as 'friendly' intelligence agencies. There are only The Intelligence agencies of friendly powers,“ "WHAT'S A LITTLE SPYING AMONG FRIENDS? If that weren't the case, then there'd be no use for an intelligence service," Obama told reporters in Tanzania. "The United States and its coalition 'Five Eye' partners enjoy a close intelligence partnership and do not spy each on each other," writes former CIA officer Mark Lowenthal in his book "Intelligence: From Secrets to Policy." The group includes the U.S., Britain, Australia, Canada and New Zealand. "Beyond that, all bets are off," he writes. 15
  • 16. Americans who spied for foreign countries CIA • Aldrich Ames (1994) • David Henry Barnett (1976) • Larry Wu-Tai Chin (1985) • William Kampiles (1977) • Harold James Nicholson (1996) • Sharon M. Scranage (1985) NSA • David Sheldon Boone (1988 to 1991) • Ronald Pelton (1980) FBI • Robert Hanssen (1979 to 2001) • Richard Miller (1984) • Earl Edwin Pitts (1987 to 1992) Armed Forces • Clayton John Lonetree (1987) • Morris Cohen (1961) • John Anthony Walker (1967) Other • Kendall Myers (2009) Federal Contractors • Christopher John Boyce (1977) • Andrew Daulton Lee (1977) • Jonathan Pollard (1984) • Stewart Nozette (2009) 16
  • 17. Interview of Eric O'Neill by KTLA 17
  • 19. 1994 Aldrich Ames Arrested for Espionage 19
  • 20. WHY SPY? • U.S. counterintelligence emphasizes personal financial issues in assessing security risks. Many people involved in the worst espionage cases suffered by the United States. – Aldrich Ames, – Robert Hanssen, – The Walker spy ring, – Ronald Pelton. • They Were motivated largely by greed, not ideology. Some exceptions were Julius Rosenberg, Alger Hiss, Larry Wu-tai Chin, and Ana Montes. 20
  • 21. WHY SPY? • By contrast, many involved in the worst espionage cases in Britain, for example? Spied because of ideological devotion to the Soviet Union. – Kim Philly and his associates or – George Blake • Although espionage cases of either type (greed or ideology) can arise in either country, some • Observers have been struck by the difference. It can be explained, in part, by the fact that Britain has had (and still has) a class system that makes ideology a more likely reason for betrayal. 21
  • 22. WHY SPY? • In the United States, the main competition has always been based on economic status, not social class spies may also be motivated by vengeance toward superiors or agencies, by blackmail against themselves or family members, by thrills, or by involvement with a foreign national. • However, a Defense Department study released in April 2008 found that "divided loyalty" between the United States and the nation enlisting the spy had greatly increased as a motive for espionage. • Although "need to know" was the standard for decades, in the aftermath of the terrorist attacks, many felt that this standard also served to impede the necessary sharing of intelligence. 22
  • 23. WHY SPY? • In 2003, the Intelligence community began to stress the "need to share," an important shift in emphasis. • The clearest sign of this "data ownership" concept was the classification marking ORCON, or "originator controlled.” ORCON means that any further distribution of intelligence or its inclusion in another document must be approved by the originating agency. • ORCON reflects the concern that the intelligence could reveal a sensitive source or method, a sensitivity that those wishing to use the intelligence more broadly might not appreciate. 23
  • 24. WHY SPY? • In 2007, Director of National Intelligence (DNI) Mike McConnell signaled a change in emphasis by promulgating a "responsibility to provide" standard. • In other words, officers and agencies now will be evaluated by the degree to which they actively seek to share intelligence. • Indirect costs include safes, couriers, and security officers to check officers' clearances, and color-coded or numerically tagged papers, to name a few. • Other safeguards include the certified destruction of discarded material; the use of secure phones, which cannot be easily tapped, for classified conversations, In addition restricted access to buildings or to parts of buildings where sensitive material is used. 24
  • 25. WHY SPY? • It is also means, in a period of greatly increased hiring, like the one that began across the intelligence community in 2001, that hiring delays will likely increase. • The risk-avoidance approach also means that some candidates, who may not actually pose a security risk, will not be hired because of the guiding cautious approach. • There is evidence to suggest that these candidates face particular burdens under the risk avoidance approach, out of fear of divided loyalties, family left behind whose influence is unknown or who could become subject to external pressure, and so on. 25
  • 26. WHY SPY? • There is an irony here in that most of the worst espionage breaches suffered by the United States came from individuals whose families had been here for generations. • As sensible as this approach may be, it can run into opposition from those people who are supposed to administer it, the individuals responsible for personnel security. • These individuals are unlikely to see any benefit to clearing more people if this means they have also cleared the individual who becomes a security threat. • This personnel policy shift will be an interesting test of the DNI's authority over intelligence officers who work in agencies that the DNI does not control directly. 26
  • 27. Polygraph • A polygraph (popularly referred to as a lie detector) measures and records several physiological signs such as blood pressure, pulse, respiration, and skin conductivity while the subject is asked and answers a series of questions. • The polygraph was on the Encyclopedia Britannica 2003 list of greatest inventions, described as inventions that "have had profound effects on human life for better or worse." The efficacy of polygraphs is debated in the scientific community. • The polygraph was invented in 1921 by John Augustus Larson, a medical student at the UC Berkeley & a police officer of the Berkeley PD. • In some countries polygraphs are used as an interrogation tool with criminal suspects or candidates for sensitive public or private sector employment. 27
  • 28. Polygraph • In 2002, a review by the National Academies of Science found that in populations untrained in countermeasures, polygraph testing can discriminate lying from truth telling at rates above chance, though below perfection. • US law enforcement and federal government agencies such as the FBI and the CIA and many police departments such as the LAPD use polygraph examinations to interrogate suspects and screen new employees. • The belief underpinning the use of the polygraph is that deceptive answers will produce physiological responses that can be differentiated from those associated with non-deceptive answers, i.e., the polygraph is used for lie detection. • Effectiveness may also be worsened by counter measures. 28
  • 29. • The polygraph, sometimes mistakenly referred to as a lie detector, is a machine that monitors Physical responses (such as pulse and breathing rate) to a series of questions A 2002 study by the National Research Council found that polygraphs are more useful in criminal investigations, where specific questions can be asked, than for counterintelligence, where the questions are more general and therefore are more likely to yield false- positive responses. 29
  • 30. • In addition to new employees, current Employees are polygraphed at intervals of several years; contractors are subject to polygraphs; and the machines are used with defectors. • The Central Intelligence Agency (CIA), Defense Intelligence Agency (DIA), National Reconnaissance Office, and National Security Agency (NSA) all use polygraphs; the State Department and Congress do not. • The Federal Bureau of Investigation (FBI) began using Polygraphs in the aftermath of the 2001 Robert Hanssen espionage case, which revealed that Polygraphs had not been in use at the FBI. 30
  • 31. • Despite the fact that so many agencies use polygraphs as part of their security practice, there is no Standard procedure for these tests. • Each agency administers polygraphs to its own standards, which, according to press accounts, can lead to different results for the same subject. • Thus, intelligence agencies have what they call the lifestyle poly (Personal Behavior) and the counterintelligence poly (foreign contacts, handling of classified information). • Beyond taking a polygraph (known as "being put on the box"), employees and prospective Employees are evaluated for other possible indicators of disloyalty. • Intelligence increased the amount of personal financial information that intelligence personnel must report on a regular basis. 31
  • 32. EXTERNAL INDICATORS AND COUNTERESPIONAGE • Besides internal measures taken to prevent or to identify problems, counterintelligence agents look for external indicators of problems. • They may be more obvious, such as the sudden loss of a spy network overseas, a change in military exercise patterns that corresponds to satellite tracks, or a penetration of the other services apparatus that reveals the possibility of ones own having been penetrated as well. • As VENONA showed, SIGINT can offer indications of ongoing espionage, although the references to spying may be oblique and are unlikely to identify the spy outright. • The serious problems resulting from having been penetrated by a hostile service also highlight the gains to be made by carrying out ones own successful penetration of the hostile service. • Possible penetrations of ones own service or other services; The agents also present opportunities, as they are conduits to their own intelligence services. 32
  • 33. PROBLEMS IN COUNTERINTELLIGENCE • Several problems arise in assessing counterintelligence operations. • First, by its very nature, any counterintelligence penetration is going to be covert. • Counterintelligence officers are unlikely to come across initially compelling evidence about a successful hostile penetration. • Second, the basic tendency within any intelligence organization (or any organization, for that matter) is to trust its own people, who have been vetted and cleared. • This appears to have been a problem in uncovering the espionage of Ames; the CIA was slow to look inward for the cause of severe losses of assets in Moscow. 33
  • 34. PROBLEMS IN COUNTERINTELLIGENCE • It was originally thought that Hanssen escaped detection for more than twenty years because of his familiarity with U.S. counterintelligence policy and techniques. • However, a 2003 report by the Inspector General of the Justice Department (the FBI is part of that department) found that internal laxity and poor oversight allowed Hanssen, who was portrayed as erratic and bumbling, to avoid detection. • Most telling, the FBI first concentrated on a CIA officer when hunting for the spy who turned out to be one of his or her own, Hanssen. • James Angleton, who was in charge of the CIA's counterintelligence from 1954 to 1974, became convinced that a Soviet mole; A deeply hidden spy; had penetrated the CIA. • Angleton was unable to find the mole, and some believe that he tied the CIA in knots by placing virtually anyone under suspicion. 34
  • 35. PROBLEMS IN COUNTERINTELLIGENCE • Angleton remains a controversial figure, but his activities give Some indication of the intellectual issues that can be involved me in spying and counterintelligence. • For many years counterintelligence was a major source of friction between the CIA and the FBI. • Lee, who was born in Taiwan, had been under investigation since 1994, but the investigation was fitful and inconclusive. • A good example is Edward Howard, a CIA Directorate of Operations (DO) officer who was slated to be posted to Moscow in the 1980s. • He eluded surveillance (using techniques he learned as a DO officer) and fled to Moscow, claiming that he had not been a spy but had been driven away by the CIA. 35
  • 36. PROBLEMS IN COUNTERINTELLIGENCE • If One is able to answer this question it will reveal the nature of the penetration and the goals of the Nation running the spy. • Once a spy has been identified and arrested, the intelligence community conducts a damage assessment, to determine what intelligence has been compromised. • In the United States, this cooperation often becomes a major negotiating point between government prosecutors and the spy's attorney: cooperation in exchange for a specific sentence or for consideration for the spy's family. • Domestic phones can be tapped, but only after intelligence agents have obtained a warrant from a special federal court (the foreign Intelligence Surveillance Act Court), which was set up by the Foreign Intelligence Surveillance Act of 1978 (FISA, pronounced "fy-za"). • Prosecuting intelligence officers for spying was a major concern for the intelligence agencies, which feared that accused spies, would threaten to reveal classified information in open court as a means of avoiding prosecution. 36
  • 37. PROBLEMS IN COUNTERINTELLIGENCE • In 1999, as part of government-wide response to revelations about Chinese espionage, the FBI Proposed splitting its National Security division into two separate units, one to deal with counterespionage and the other with terrorism in 2003, the FBI created an Intelligence Division, concentrating primarily on terrorism the 2004 intelligence legislation formally recognized the new Office as the Intelligence Directorate. • In addition to the FBI, which has the primary CI responsibility in the United States, and the CIA, the Defense Investigative Service and the counterintelligence units of virtually all intelligence agencies Or offices share some CI responsibility. • The diffusion of the CI effort reflects the organization of the community and also highlights why coordination on CI cases has been problematic. 37
  • 38. Great moments in espionage 38
  • 39. LEAKS • They may not be seen as being as dangerous as an espionage penetration but they can have obvious counterintelligence concerns, because leaks often entail the unauthorized release of classified information. • (President Franklin Roosevelt, decrying leaks during his tenure, wondered why the British had so many fewer leaks, even though Britain had freedom of speech and tea parties.) The Intelligence Identities Protection Act (1982) makes it a crime for someone who has access to classified information to reveal the identity of a covert agent. • The "pattern of activities" clause was aimed at individuals such as former CIA officer Philip Agree, who made a practice of revealing the identity of CIA case officers overseas after he quit the CIA. • The Espionage Act (1917) has also been used in leak prosecutions. 39
  • 40. LEAKS • Enacted months prior to the United States' entry into World War 1, this act covers traditional espionage but is also deemed broad enough to cover leaks, even of information that is not classified but is related to the national defense. • Use of the Espionage Act became controversial in 2006 when it was used as the basis for prosecuting two officials of the American Israel Public Affairs Committee (commonly called AIPAC) who received classified information from a DOD official, Lawrence Franklin, and then passed it on to an Israeli official and a journalist. • It can be argued that the president cannot leak because the president also has the right to declassify intelligence, but the motives behind a revelation can be debated, as they were in this case. 40
  • 41. Bradley Manning Sentenced To 35 Years For Espionage 41
  • 42. NATIONAL SECURITY LETTERS • One investigative technique that has been used in espionage cases, as well as counterterrorism, is National security letters (NSLs). • The USA Patriot Act, passed after the 2001 attacks, expanded the authority to issue NSLs from FBI headquarters only to field offices, included terrorism as a cause as well as espionage, and eliminated the requirement that the information being sought pertain to a Foreign power or its agent. • The most obvious is the fact that they are not subject to judicial review and that they come under a gag order, which raises civil liberties concerns. • Second, The use of NSLs has expanded greatly since 2001. 42
  • 43. 43
  • 44. CONCLUSION • As VENONA confirms, the espionage threat during the cold war was pointed and obvious. • Russian espionage did not end with the cold war. Neither did U.S. activities against Russia, given the Russians arrested Agent of Ames's spying or the source who led to Hanssen. • In 2003, Russia arrested Alexander Zaporozhsky, a former intelligence officer who had settled in the U.S. but had been lured Back to Russia, was sentenced to eighteen years for spying for the U. S. • In 1999, The Cox Committee found that China had stolen U.S. nuclear weapons designs during the 1980s, when the two states were tacit allies against the Soviet Union. 44
  • 45. • A 2002 report prepared for Congress listed China, France, India, Israel, Japan, and Taiwan as being among the most active collectors. • In 2001, Ana Belen Montes, a DIA analyst, was arrested for spying for Cuba. U.S. officials assume that much of the intelligence that Montes provided over seventeen years was shared by Cuba with Russia and possibly other nations. • A 2002 report. Espionage against the U. S. by American Citizens, 1947-2001, prepared by the Defense Personnel Security Research Center, noted changes in the demographics of U.S. citizens who spied against their country. . • Since the end of the Cold war, spies have tended to be older, to have lower clearances, to be naturalized citizens instead of native- born, and to include more women. Thus, it would be naive to believe that the need for rigorous counter intelligence and counterespionage ceased with the end of the cold war. 45